lecture12 - Philadelphia University

Download Report

Transcript lecture12 - Philadelphia University

Module 12
Virtual Private Networks
MModified by :Ahmad Al Ghoul
PPhiladelphia University
FFaculty Of Administrative & Financial Sciences
BBusiness Networking & System Management Department
RRoom Number 32406
EE-mail Address: [email protected]
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
1
Contents











Relation to SSL & SSH
Virtual Private Network
Three Types of VPNs
The Concept of Tunneling
General IPTunneling
Look at the stack
GRE & PPTP
Generic Routing Encapsulation
PPTP
Ipsec
Encapsulating Security Payload
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
2
Relation to SSL & SSH
 Recall SSL is the secure socket layer
– It provides an encrypted and authenticated TCP
connection between a client and a server.
– It does not hide your network because you still
use standard IP visible to all.
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
3
Virtual Private Network
 Why?
– Institutions are distribted
– They need to protect
themselves
– Old Days
• Buy your own phone lines
and build a physically
private network.
– VPN
• Use the internet as a
“carrier” of your private
traffic.
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
4
Three Types of VPNs
 Remote access
– A company uses a dial-up system to allow remote
workers to connect and establish secure connections to
the company network
 Site-to-site
– Intranet
• Connect two different, but remote LANS to form a single
network
– Extranet
• Two different companies want to establish a private connection
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
5
Reasons and Requirements
 Typical Reasons for wanting a VPN
–
–
–
–
–
–
–
Extend geographic connectivity
Improve security
Reduce operational costs versus traditional WAN
Improve productivity
Simplify network topology
Provide global networking opportunities
Provide telecommuter support
 Requirements for a Good VPN
–
–
–
–
–
Security
Reliability
Scalability
Network management
Policy management
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
6
The Concept of Tunneling
 tunneling - the process of placing an entire packet
within another packet and sending it over a
network.
 Tunneling requires three different protocols:
– Carrier protocol: The protocol used by the network
that the information is traveling over
– Encapsulating protocol: The protocol (GRE, IPSec,
L2F, PPTP, L2TP) that is wrapped around the original
data
– Passenger protocol: The original data (IPX, NetBeui,
IP) being carried
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
7
Tunneling
 Key idea: allow packets to move from one point to
another point without being directly touched by
internet routers
1. Passenger packet goes to gateway
3. Internet (carrier protocol)
2. Gateway wraps passenger with
Encapsulation protocol
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
4. Passenger
unwrapped and
sent on its way
8
General IPTunneling
124.32.45.3
Network 1
R1
121.101.27.42
Internet
R1
Network 2
Host
10.0.2.22
Host
10.0.1.15
To: 121.101.27.42
From: 124.32.45.3
To: 10.0.2.22
From: 10.0.1.15
To: 10.0.2.22
From: 10.0.1.15
To: 10.0.2.22
From: 10.0.1.15
IP payload
IP payload
IP Payload
IP payload
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
9
Look at the stack

application
TCP
Tunneling can layer a complete stack
and address space on top of the
existing one!
– Almost exactly what we did with
our XKernel which was tunneled
over the regular IP stack.
– For Site-to-Site use
• Generic Routing
Encapsulation (GRE)
• IPsec
– For remote access
• PPTP (point-to-point
tunneling protocol)
• L2TP (layer 2 tunneling
protocol)
Network Security
Philadelphia
Universityl
IP
encrypt
IPsec
GRE
IP
Ethernet or PPP or …
Ahmad Al-Ghoul 2010-2011
10
GRE & PPTP
 GRE
– Very simple encapsulation frame that tells you
what type of thing is encapsulated, a sequence
number and an ack number.
 PPTP
– Protocol that allows PPP packets to be
encapsulated within Internet Protocol (IP)
packets and forwarded over any IP network,
including the Internet itself.
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
11
Generic Routing Encapsulation
 Runs over IP at port 47.
 It is a protocol for wrapping other protocols.
Protocol Family
Reserved
SNA
OSI network layer
XNS
IP
0800
Chaos
Frame Relay ARP
VINES
DECnet (Phase IV)
Transparent Ethernet Bridging
Raw Frame Relay
Apollo Domain
Ethertalk (Appletalk)
Novell IPX 8137 RFC
TCP/IP compression
IP Autonomous Systems
Network Security
Philadelphia
Universityl
protocol type
0000
0004
00FE
0600
0804
0808
0BAD
6003
6558
6559
8019
809B
1144
876B
876C
protocol
checksum
Ahmad Al-Ghoul 2010-2011
offset
key
Sequence number
Routing information
data
12
PPTP
 For a dial-up client
– First establish a PPP connection to the server
– Set up a TCP connection on port 1723 for
control messages
• Session management command-replies
• Handles calls and keep-alive messages
– Over the PPP one runs IP and TCP.
 In other cases use existing IP level.
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
13
PPTP data packets
 The carrier network delivers GRE packets
– Sliding window used to provide flow control
 GRE packet contains a PPP packet.
 PPP has an encryption protocol that is used to encrypt the
contents of each frame.
 The content frame is the tunneled IP packet.
Carrier IP packet
GRE packet
PPP packet
IP packet
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
14
IPsec
 A General Framework for IP security
– NOTE: SSL is at the TCP level
– IPSec is designed to be at the IP level
 Two Components
– Two protocols for security
• A header for authentication (AH)
• A header for secure encapsulation (ESP)
– Internet Security Assoc. and Key Mgmt Protocl
 A Security Association (SA) is a one way connection
between two hosts/routers that is based on a choice of
AH/ESP and Key protocol.
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
15
IPSec Authentication
NextHdr
Payload length
reserved
SPI ( security paramenter index – identifies the sec. Assoc.)
Sequence no
Authentication Data
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
16
IPSec Authentication
NOTE:
The authentication data is the cryptographic signature of
this packet. It is not authentication of source identity
 NextHdr is a pointer to the end of this packet.
 SPI is an identifier which in combination with the
IP address of the packet completely identifies the
secruity association.
 Sequence number prevents “replay attacks”
Network Security
Philadelphia
Universityl
Ahmad Al-Ghoul 2010-2011
17
Encapsulating Security Payload
 This follows IP header (both v4 and v6) and before the encripted
payload.
– The payload data is often part of an “initialization vector” for the
encrypted payload that follows
 provides
– confidentiality (encryption), data origin authentication, integrity,
optional anti-replay service
SPI ( security paramenter index – identifies the sec. Assoc.)
Sequence no
Up to 256 bytes of Playload data (Initialization Vector)
Pad length NextHdr
Network Security
Philadelphia
Universityl
Authentication Data
Ahmad Al-Ghoul 2010-2011
18