VPN-Implementation Using UBUNTU OS and OpenVPN and Hamachi in client-server environment. By Ruphin Byamungu, Kusinza United States International University-Nairobi.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
M2M Gateway Features Jari Lahti, CTO
NetComm Wireless VPN Functionality Feature Spotlight.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Course 201 – Administration, Content Inspection and SSL VPN
Configuring Routing and Remote Access(RRAS) and Wireless Networking
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Secure Socket Layer (SSL)
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. IEEE 802.1x An internet standard created to perform authentication services for remote access to a central LAN. An internet standard.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Integrating and Troubleshooting Citrix Access Gateway.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Version of document: 1.01 Software Version CBox: v3.7.1 Hardware Version CBox: C5 Remote Access Configuration Service Operator Language: English.
Computer and Network Security
Virtual Private Network Access for Remote Networks
Getting Connected to NGS while on the Road…
Module 4: Configuring Site to Site VPN with Pre-shared keys
Chapter 5 Network Security Protocols in Practice Part I
Ssh: secure shell.
Microsoft Windows NT 4.0 Authentication Protocols
Tutorial on Creating Certificates SSH Kerberos
ECE 544: Middlebox lab Abhigyan Sharma.
Virtual Private Networks
Configuring and Troubleshooting Routing and Remote Access
CSCE 715: Network Systems Security
BINF 711 Amr El Mougy Sherif Ismail
Virtual Private Networks (VPN)
IPSec VPN Chapter 13 of Malik.
CIT 480: Securing Computer Systems
Understand Networking Services
Tutorial on Creating Certificates SSH Kerberos
SoftEther VPN 報告者:蘇己盛 日期:2014/07/01.
Using SSL – Secure Socket Layer
IIS.
Server-to-Client Remote Access and DirectAccess
Goals Introduce the Windows Server 2003 family of operating systems
Getting Connected to NGS while on the Road…
The University of Adelaide, School of Computer Science
The Secure Sockets Layer (SSL) Protocol
Install AD Certificate Services
Chapter 10: Advanced Cisco Adaptive Security Appliance
Advanced Computer Networks
WireGuard zswu.
Virtual Private Network zswu
Topic 12: Virtual Private Networks
VNet and Cross-Premises Connectivity
Presentation transcript:

Using UBUNTU OS and OpenVPN and Hamachi in Server –Client environment. By Ruphin Byamungu, Kusinza United States International University-Nairobi

OpenVPN is an open-source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses a custom security protocol [9] that utilizes SSL/TLS for key exchange. It is capable of traversing network address translators (NATs) and Firewalls - wikipediaopen-sourcevirtual private network [9]SSL/TLSnetwork address translators

Update server’s package $ sudo apt –get update Install easy –rsa package $ sudo apt –get install openvpn easy –rsa

OpenVPN is an TLS/SSL VPN – it utilizes certificates to encrypt traffic between server and clients Copy the easy-rsa template to home directory $ make-cadir ~/openvpn-ca Move to newly created directory $ cd ~/openvpn-ca

To do this open the vars file and edit it $ nano vars Edit the highlighted values to whatever you prefer Also edit the KEY_NAME value to “server”

One must be in CA directory and then source the vars file $ cd ~/openvpn-ca $ source vars Then build the root CA $./build –ca ( This initiates the process of building CA)

In this step server certificate and key pairs as well as some additional files used during encryption are generated. (a 2048 bit RSA Private Key is generated and written to “Server.key”) A notification is given indicating the time frame for the certificate validation – in this case it is until 2027

The process can be done both on the client machine and then signed by the server/CA for security reasons, it is also possible to generate the signed key on the server A single client key can be generated if there is only one client, but the generation process can be repeated as many times as there are clients

Configure the OpenVPN Service Adjust the Server Networking Configuratuion Allow IP Forwarding Adjust UFW rules to Masquerade Client Connections Open the OpenVPN Port – allow 1194/udp, Open SSH

Start and Enable the OpenVPN Service Create Client Configuration Infrastructure Create the Client Config Directory Structure Create a base Configuration Create a Configuration Generation Script

Generate Client Configurations Transfer Configration to Clients Devices – PC, mobile device Install the Client Configuration Windows Linux

LogMeIn Hamachi is a virtual private network (VPN) application that is capable of establishing direct links between computers that are behind NAT firewalls without requiring reconfiguration.virtual private networkNAT It establishes a connection over the Internet that emulates the connection that would exist if the computers were connected over a local area network. - Wikipedealocal area network

LogMeIn Hamachi's security is end-to-end: two Hamachi nodes exchange information with each other after mutual authentication and session key agreement. While node-to-node traffic (that is, regular VPN flow) typically bypasses LogMeIn's servers and is sent directly from one point to the other, even traffic that has to be relayed through a server is secured and encrypted at the endpoints.

The LogMeIn servers authenticate Hamachi nodes using an RSA keypair. To log in, the node submits its Hamachi identifier and uses its private key to sign the server's challenge. The server verifies the signature and this authenticates the client. When the node connects to the server, it announces which key it expects the server to have. If the server has the requested key, the login sequence commences.

When any two entities exchange data with each other, a key exchange protocol takes place in conjunction with the obligatory authentication phase. The key exchange protocol is Diffie-Hellman with the 2048-bit MODP group as defined in RFC Once a session key has been established, the AES-256-CBC cipher is used for data encryption and decryption with ESP- style padding as defined in RFC Packets are authenticated with the HMAC-SHA-1-96 (RFC 2404)