VPN`s – promise, pitfall, and policy
Download
Report
Transcript VPN`s – promise, pitfall, and policy
VPN’s – promise, pitfall,
implementation and policy
don murdoch
757 683 4580
odu – isso
dmurdoch < at > odu dot
edu
Agenda
VPN’s defined
Promises
Pitfalls
Implementations
Policies
VPN’s defined
Virtual Private Network
Ensures private, secure communication
between hosts over an insecure medium using
“tunneling”
Usually between geographically separate
locations
Connecting computer is logically directly
connected to a network –has a local address
that it uses to communicate through the tunel
Tunneling defined
Encapsulation
Requires
Put one type of packet inside another
Can put non IP protocols inside of IP
Consistent rules on each side
Both parties must be aware of tunnel for it to work
Tables to keep track of the conversation
Not a panacea
Traffic patterns can be observed even through the
data is likely to be protected
Back to defining VPN’s
Commonly use standardized, well
respected encryption to secure
communications
Two main types of VPNs –
Remote-Access from a client system
Site-to-Site – between two networks
VPN advantages
Control remote access through one perimeter
device
•
•
•
•
•
Close off other avenues of remote access
Devices all obey the same rules
Single access point allows for activate / deactivate accounts
Provide high quality logging of remote access activity
Plug other holes
Avoid excess provisioning costs
Of dedicated lines, not devices ….
Promises
Originally designed as inexpensive alternative
WAN over leased lines
Variety of existing insecure channels exist such as
the commodity Internet
Now mostly used to securely connect
computers and remote sites over the internet
Convenient (somewhat)
Can now communicate securely over insecure
protocols and channels
Promises – an example
Example – it *may* simplify security
Before VPN, complicated to allow access
Assume a simple security policy
Internal IP based access management
An Intranet with site-licensed software
Train all employees to use SSH tunnel
Provide a tunnel support server
After VPN, employees can be offsite and
connect
VPN client is assign an internal IP address
Minimal impact on Intranet servers rules
Pitfalls
Not always easy to use
Home Network
Some client security software wants to reconfigure on the fly
Multiple tunnels can be impossible
May require address changes in order to be implemented
ISP’s avoid static IP address and some don’t allow VPN traffic
Overall support
Client installs can be challenging
Name lookups can be difficult
Mapping to a share or app server requires … ????
Falling in more pits
Expectations of users – the term “VPN”
means different things to different people
Frequently Frustrating Troubleshooting
Interoperability with other Networks/VPNs
can be problematic
Small performance overhead
VPN client bound by network rules
Quagmire
Local network is now subject to any security
issues on the remote client
Microsoft’s source code believed to be stolen by
a game developer w/ a remote control Trojan …
•
•
•
•
Enticed to install a game demo
Trojan alerts controller when on Internet
Trojan takes actions while user connected via VPN
Trojan reports back to controller
The Quicksand of Split Tunneling
Some VPN’s allow clients to send “secured”
data to the VPN gateway while allowing general
network access
Danger is that this process setups two paths –
one to the Commodity Internet and the other to
the site
Access rules often defined on client as a
“network access list”, exposing private site data
and configuration
Implementations
Point to Point Tunneling Protocol
• Data encapsulated into a PPP packets, then GRE packets
sent along.
• Channel for data and for control
IPSec (discussed next)
Secure Shell
• Interactive login w/ port forwarding capability
Secure Socket Layer VPN
Layer 2 Tunneling Protocol
IPSec
Common & preferred connection method today
Can add authentication and / or confidentiality
to the traffic or both
Coexists w/ current IP implementations and
infrastructure components such as routers,
analysis tools, etc.
Can be very complicated to troubleshoot
It’s very nature is designed to prevent
eavesdropping!
Tunnel and Transport
Tunnel
Encapsulates each of the original packet
inside another packet
Transport
Adds an IPSec header to the original packet
Allows for detecting errors or changes in
transit
Does not have to automatically encrypt data
Insures authenticity of the source
Transport illustrated
Original Original
IP
TCP
Header Header
Original
Data
Add IPSec Header – change the “protocol field” in the IP Header, allowing
Systems to interpret the data that follows as IPSec
Mod’d
IP
Header
IPSec
Header
Original
TCP
Header
Original
Data
Tunnel illustrated
Original Original
IP
TCP
Header Header
Original
Data
Add IPSec Header – change the “protocol field” in the IP Header, allowing
Systems to interpret the data that follows as IPSec
Mod’d
IP
Header
IPSec
Header
Original Original
IP
TCP
Header Header
Original
Data
AH
Authentication Header protocol
Offers Authenticity and Integrity w/o encryption
Uses cryptographic hash to verify each packet
Covers entire packet and will not survive NAT
If any part of original message changes, it will be
detected
Prevents IP Spoofing and transmission errors
ESP
Encapsulating Security Protocol
Provides Integrity
Provides Confidentiality
Transport
Tunnel
Encrypts payload of the data
Encrypts original IP header
May cause IP fragmentation
Most likely implementation
ESP builds tunnel
Split tunneling not possible
Shared secret “password”, hopefully a
certificate
Connect to concentrator
Get private IP on the network
Get all access (often dangerous)
Little to no Internet access over the VPN
Most likely (illustrated)
Original Original
IP
TCP
Header Header
Original
Data
Add IPSec Header – change the “protocol field” in the IP Header, allowing
Systems to interpret the data that follows as IPSec
Mod’d
IP
Header
Encrypted original packet
ESP
Header
Original Original
IP
TCP
Header Header
Original
Data
VPN Concentrators
Concentrator is NOT a gateway or firewall
• Many sites implement it parallel to a firewall
Specialized device
Authenticates clients
Only accepts connections from VPN peers
Handles encryption and VPN management
Against local database or through RADIUS or
TACACS+
RADIUS / TACACS+ can (and should) defer to a
centralized LDAP directory
Enforces VPN security policies
Concentrator connections
Steps
Establish username / password / access
restrictions (IP, encryption, Time, source …)
Install client software if necessary
• Win2000 has VPN client software
User defines “VPN Connection” to the site
Makes connection
Now can ONLY talk to the site
Example w/ Cisco VPN client
Implementation Issues
Additive to remote access procedure and
policy
Placement
Require strongest mutual authentication
Just where to these devices go?
System
Appliance, Firewall integration, software
Policies part one
Like every year, APA audits different
things
Missing a “VPN” specific policy w/ rules
Wrote a VPN policy
Wrote a specific access form w/ clear
statements, authorized signature
Needed to change it almost immediately!
Policies part two
Can anyone install the client?
Where can anyone use the client from?
Do you allow home users on their own personal
(non CoVA) PC’s to connect?
What are the minimum client security
requirements?
Who supports what?
Who handles the investigation should an
incident occur?
Who monitors connections and when?
A few more issues …
Do you allow connections back out to the
Internet w/o a proxy? Or at all?
Do you intend on providing “access
groups” or provide general access?
Remember – this is a known, sanctioned
back door into the network from
anywhere..