VPN construction with independence of client environment 25 January 25 January 2007 Shin Takeuchi (University of Tsukuba)

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
Module 5: Configuring Access for Remote Clients and Networks.
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
October 22, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint, Part II SOEN321-Information-Systems Security.
Virtual Private Networks and IPSec
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
K. Salah1 Security Protocols in the Internet IPSec.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 12 Module 12 Virtual Private Networks  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Secure Socket Layer (SSL)
Chapter 13 – Network Security
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Module 5: Configuring Access for Remote Clients and Networks.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Code : STM#530 Samsung Electronics Co., Ltd. OfficeServ7400 Security Introduction Distribution EnglishED01.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Network Access for Remote Users Dr John S. Graham ULCC
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Virtual Private Networks and IPSec
IPSec Detailed Description and VPN
Virtual Private Networks
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networks
Chapter 18 IP Security  IP Security (IPSec)
IPSec VPN Chapter 13 of Malik.
CIT 480: Securing Computer Systems
SoftEther VPN 報告者:蘇己盛 日期:2014/07/01.
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Virtual Private Networks (VPNs)
Cengage Learning: Computer Networking from LANs to WANs
Presentation transcript:

VPN construction with independence of client environment 25 January 25 January 2007 Shin Takeuchi (University of Tsukuba)

University of Tsukuba 2 Agenda 1.VPN ~Site-to-Site connection~ ~Remote-to-Site connection~ IP security protocol SSL-VPN 2.Solution 3.Experiment 4.Implementation 5.Conclusion

University of Tsukuba 3 VPN

4 Internet VPN Site ASite B  We typically use “IPsec” in Site-to-Site VPN connection Many devices support “IPsec” VPN ~ Site-to-Site connection~

University of Tsukuba 5 Internet VPN ~Remote-to-Site connection~ VPN SiteRemote User  We usually use “SSL-VPN” in Remote Access PPTP is also common

University of Tsukuba 6 IP security protocol ( IPsec ) ( 1/3 ) IP Header ESP Header ESP Auth ESP Trailer Original IP packet TCP Header ESP Header ESP Auth ESP Trailer TCP Header IP Header AH Header TCP Header payload IP Header TCP Header IP Header Tunnel IP Header AH Header TCP Header IP Header Transport Tunnel ESP AH ESP AH Tunnel IP Header payload

University of Tsukuba 7 payload IPsec ( 2/3 ) ~Authentication~ IP Header ESP Header ESP Auth ESP Trailer TCP Header ESP Header ESP Auth ESP Trailer TCP Header IP Header AH Header TCP Header IP Header TCP Header IP Header Tunnel IP Header AH Header TCP Header IP Header Transport Tunnel ESP AH ESP AH Tunnel IP Header authentication Original IP packet payload authentication

University of Tsukuba 8 IPsec ( 3/3 ) ~Encryption~ IP Header ESP Header ESP Auth ESP Trailer TCP Header ESP Header ESP Auth ESP Trailer TCP Header IP Header AH Header TCP Header IP Header TCP Header IP Header Tunnel IP Header AH Header TCP Header IP Header Transport Tunnel ESP AH ESP AH Tunnel IP Header Original IP packet payload encryption

University of Tsukuba 9 SSL-VPN ( 1/3 ) IP Header Record Header TCP Header Reverse Proxy MAC IP Header Record Header TCP Header MAC IP Header TCP Header IP Header Record Header TCP Header MAC IP Header TCP Header Ethernet Header CRC Port Forwarding L2-Tunneling IP Header TCP Header Original IP packet payload

University of Tsukuba 10 SSL-VPN ( 2/3 ) ~Authentication~ IP Header Record Header TCP Header Reverse Proxy MAC IP Header Record Header TCP Header MAC IP Header TCP Header IP Header Record Header TCP Header MAC IP Header TCP Header Ethernet Header CRC Port Forwarding L2-Tunneling Original IP packet IP Header TCP Header payload authentication

University of Tsukuba 11 SSL-VPN ( 3/3 ) ~Encryption~ IP Header Record Header TCP Header Reverse Proxy MAC IP Header Record Header TCP Header MAC IP Header TCP Header IP Header Record Header TCP Header MAC IP Header TCP Header Ethernet Header CRC Port Forwarding L2-Tunneling Original IP packet IP Header TCP Header payload encryption

University of Tsukuba 12 Motivation  Setup difficulty It is bothering for common users to make VPN configuration  Must be “Static” Each endpoint requires “Static” IP address Site-to-Site : “Static”- “Static”, Remote-to-Site : “Dynamic”-“Static” more “Simplicity” more “Flexibility”

University of Tsukuba 13 Idea  Implement application Simple VPN configuration for clients “Dynamic” – “Dynamic” connection Which protocol should we use ? Introduce the “VPN-Management-Server” VPN-Management-Server handles bothering procedure

University of Tsukuba 14 Experiment

University of Tsukuba 15 Experiment with selection of protocol  Criterion Connectivity (connect or disconnect)  Target IPsec V.S. SSL-VPN  Experimental Network University of Tsukuba campus network (Univ. Tsukuba) Tsukuba WAN Kyushu GigaPOP Project (QGPOP) Network Organization for Research and Technology in Hokkaido (NORTH) Japan Science and Technology Agency (JST) Commercial Internet Service Provider (ISP)

University of Tsukuba 16 Result of the Experiment Endpoint BIPsec Endpoint AUniv. TsukubaTsukuba WANQGPOPNORTHJSTISP Univ. Tsukuba×××××× Tsukuba WAN×○○○×○ QGPOP×○ ‐‐ × ‐ NORTH×○ ‐‐‐‐ JST××× ‐‐‐ ISP×○ ‐‐‐‐ Endpoint BSSL-VPN Endpoint AUniv. TsukubaTsukuba WANQGPOPNORTHJSTISP Univ. Tsukuba○○○○○○ Tsukuba WAN○○○○○○ QGPOP○○ ‐‐ ○○ NORTH○○ ‐‐‐‐ JST○○○ ‐‐ ○ ISP○○○ ‐ ○ ‐ ○:connect, ×: disconnect, - : none SSL-VPN is more suitable than IPsec !

University of Tsukuba 17 Implementation

University of Tsukuba 18 Implementation of proposal system  Environments OS : Windows Language : C++ Library : openssl-0.9.8c USB token : iKey 1000  Features When we insert the USB token into a PC, VPN is established  Example Sharing data in a meeting

University of Tsukuba 19 SSL connection SSL authentication (Client IP address) Request Send Register Request Verify Client’s Certificate Verify Server’s Certificate (IP address) included in IP Header ( source IP address ) included in application data ( IP address ) Check ・ ( source IP address ) ・ ( IP address ) ClientVPN-Management-Server ・ Client Certificate Serial Number ・ IP Classification Information Procedure sequence

Repository Registry VPN module Certification issue VPN-management Server SSL AuthVPN-Server Client SSL connect Client information ・ Client Certification Serial Number ・ Header IP ・ Payload IP ・ IP Classification Information (Global IP, Private IP) Auth info ・ CA Private / Public key ・ Server Private / Public key SSL Auth IC chip USB-token : iKey storage Reference VPN module create encryption algoVirtual IP access point IPConnect Port communication protocol Client Environment judge IP address VPN connection Virtual IF creation packet routing tun / tap device send packet Payload IP address Header IP address ( Global IP,Private IP ) Payload IP address Registry Reference ・ CA Public key ・ Client Private / Public key Client application program

University of Tsukuba 21 Conclusion

University of Tsukuba 22 Conclusion  VPN IPsec and SSL-VPN  Focus on the following problems Setup difficulty Must be “Static” IP  My application Simple VPN configuration for clients Enable “Dynamic – Dynamic” connection

University of Tsukuba 23 Thank you ! I appreciate network supports of Prof. Okamura (Kyushu Univ.). Thanks go to Prof. Kasahara for this session arrangements. Thanks also to Prof. Okamoto, Researchers Dr. Oyama and Dr. Inomata for their supports and guidelines.

University of Tsukuba 24 VPN-Server’s module Send Run VPN-Server process Accept VPN-Client connection Configure VPN-Server’s configuration Case 1. ( source IP address ) matches to ( IP address ) ClientVPN-Management-Server Case 1

University of Tsukuba 25 VPN-Client’s module Send Run VPN-Client process Connect VPN-Server Configure VPN-Client’s configuration Case 2. ( source IP address ) doesn’t matches to ( IP address ) There is VPN-Server in the client and ClientVPN-Management-Server Case 2

University of Tsukuba 26 VPN-Client’s module Send Run VPN-Client process Connect VPN-Server (VPN-Management Server) Configure VPN-Client’s configuration Case 3. ( source IP address ) doesn’t matches to ( IP address ) and Run VPN-Server process Accept VPN-Client connection All clients are VPN-Client VPN Connection VPN connection establish ClientVPN-Management-Server Case 3

University of Tsukuba 27 What is USB Token ?  USB with protecting field and IC chip Smartcard + Card reader specifications X.509 Authentication memory1024 bit RSA (software) MD5 hash algorithm (hardware) 8K memory 、( iKey K memory ) 64-bit Serial NumberPKCS #11 middleware (v2.01) 1.5 MbpsThree security levels of file access 2-hierarchical directory4KB write run time : 3(s) Software IPSec/IKERADIUS PPTPOutlook Express NetscapeInternet Explore