Point-to-Point Tunneling Protocol [PPTP] Team: Invincibles Deepak Tripathi Habibeh Deyhim Karthikeyan Gopal Satish Madiraju Tusshar RakeshNLN.

Slides:



Advertisements
Similar presentations
Point-to-Point Protocol (PPP)
Advertisements

S4C4 PPP. Protocols Point to Point Protocol Link Control Protocol Network Control Program Password Authentication Protocol Challenge Handshake Authentication.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Point-to-Point Protocol
Gursharan Singh Tatla SLIP and PPP 27-Mar
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—5-1 Establishing Serial Point-To-Point Connections Configuring Serial Point-To-Point Encapsulation.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 4 Point to Point Protocol (PPP)
Internet Security CSCE 813 Network Access Layer Security Protocols.
Cryptanalysis of Microsoft’s Point-to-Point Tunneling Protocol 6 Mar Amit Golander.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
Ariel Eizenberg PPP Security Features Ariel Eizenberg
Point to Point Protocol Operation. Point to Point Protocol Protocol Layers of PPP –Physical Layer –Data Link Layer – HDLC derivative –Other protocols.
PPP (Point to Point protocol).  On WAN connection, the protocol depends on the WAN technology and communicating equipment:  Examples:  HDLC –  The.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Remote Networking Architectures
Point-to-Point Protocol (PPP) Security Connecting to remote access servers (RASs) PPP authentication PPP confidentiality Point-to-Point Tunneling Protocol.
Virtual Private Networks
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
PPP (Point to Point Protocol)
CCNA Cisco Certified Network Associate. Point-to-point Protocol (PPP)
Chapter 12 Chapter 12: Remote Access and Virtual Private Networks.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
Wide Area Networks(WANs) Lecture Week 2. Point-to-Point Protocol (PPP) Accessing the WAN.
11 SECURING COMMUNICATIONS Chapter 7. Chapter 7: SECURING COMMUNICATIONS2 CHAPTER OBJECTIVES  Explain how to secure remote connections.  Describe how.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Copyright Kenneth M. Chipps Ph.D. PPP Last Update
Point to Point Protocol
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Point-to-Point Access: PPP PPP Between Routers  Used for Point-to-Point Connections only  Used as data link control (encapsulates network layer.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Examining Network Protocols. Overview Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
4 Semester 4 CHAPTER 4 REVIEW JEOPARDY S2C04 Jeopardy Review.
Wide Area Networks (WAN) Terms that are commonly used by service providers: Customer premises equipment (CPE) Equipment that’s owned by the subscriber.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
1 Types of Point to Point Protocols l SLIP over async –Very simple –IP only –Unreliable - no checksum l HDLC over sync –various proprietary versions –frames.
PPP Configuration.
Point to Point connections
Point-Point Protocol (PPP) by William F. Widulski.
Point-to-Point Protocol (PPP)
Instructor Materials Chapter 2: Point-to-Point Connections
PPP Protocol.
PPP Protocol.
Microsoft Windows NT 4.0 Authentication Protocols
Lesson 6 Point to Point Protocol
Instructor Materials Chapter 2: Point-to-Point Connections
PPP – Point to Point Protocol
PPP PROTOCOL The First semester
IPSec VPN Chapter 13 of Malik.
Examining Network Protocols
Chapter 2: Point-to-Point Connections
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP)
Chapter 12: Remote Access and Virtual Private Networks
Point-to-Point Protocol (PPP)
PPP Protocol.
Presentation transcript:

Point-to-Point Tunneling Protocol [PPTP] Team: Invincibles Deepak Tripathi Habibeh Deyhim Karthikeyan Gopal Satish Madiraju Tusshar RakeshNLN

Agenda Overview PPTP Connections PPTP Architecture PPTP Underlying Technology PPP Architechure PPTP Security

PPTP ? PPTP - enables secure data transfers between a remote client and an enterprise server by creating a VPN across an IP-based internetwork Success of PPTP The use of PSTNs (Public Switched Telephone Networks). Support to Non-IP protocols.

PPTP Connections For Remote Access: PPTP Client connects to the ISP using Dial Up Networking PPTP then creates a tunnel between the VPN client and VPN server. For LAN internetworking: It does not require the ISP connection phase so the tunnel could be directly created.

PPTP Architecture PPTP employs three processes to secure PPTP-based communication over unsecured media PPP-based connection establishment PPTP Connection control PPTP tunneling and data transfer

PPTP Connection Control

Common PPTP control messages NameDescription Start-Control-Connection-RequestRequest from the PPTP client to establish control connection. Start-Control-Connection-ReplyReply from the PPTP server to the client. Outgoing-Call-RequestRequest from the PPTP client to the server to establish a PPTP tunnel Outgoing-Call-ReplyResponse from the PPTP server to the client Echo-RequestKeep-alive mechanism from either server or client. Echo-ReplyResponse to the Echo-Request message. Stop-Control-Connection-RequestRequest Message from the PPTP client or server notifying the other end of the termination of control connection. Stop-Control-Connection-ReplyReply Response from the opposite end.

PPTP Data Tunneling and Processing Recipient end Sender end

Underlying Technology PPTP is based on PPP Operates at layer 2 of OSI Advantages: Can operate any DTE or DCE including EIA/TIA-232-C and ITUV.3 Does not restrict transmission rates Requirement: Availability of a duplex connection Synchronous Asynchronous

PPP architecture PPP standards-based protocol. PPP's frame format is based on the HDLC PPP can negotiate link options dynamically support multiple Layer 3 protocols, such as IP, IPX, and AppleTalk.

PPP architecture - LCP PPP defines the Link Control Protocol (LCP). The job of the LCP Establish, configure, and test the data-link connection. Callback Data compression Multilink PAP authentication CHAP authentication

LCP Authentication PAP vs. CHAP PAP(password authentication protocol) Remote host is in control of login requests. (Trial and error attack) Password is sent in clear text

LCP Authentication PAP vs. CHAP CHAP(challenge handshake authentication protocol) Access servers is in control of login attempts Password is not transmitted in clear text

CHAP Operation

PPP architecture – NCP Link partners exchange NCP packets to establish and configure different network-layer protocols including IP, IPX, and AppleTalk. Each Layer 3 protocol has its own NCP. The NCP can build up and tear down multiple Layer 3 protocol sessions over a single data link.

PPTP Security Data Encryption Data Authentication Packet Filtering Firewalls & Routers

Encryption Microsoft Point to Point Encryption RSA RC4 Algorithm with 40 or 128 Bit key XOR Attack Bit Flipping Attack

Authentication Methods Clear Text password LANMAN Hash NT Encryption Hash Challenge/Response MSCHAP

LAN Manager Hash Password Convert to uppercase Divide into two 7 character strings Encrypt a fixed constant with a string Merge both 8 byte strings 16 byte hashed string 14 Byte String

NT Encryption Hash Password Hash using MD4 16 Byte hash Unicode

MSCHAP Client requests login challenge Server sends 8 byte random challenge Client calculates LANMAN hash or NT hash Partitions the key into three keys Each key encrypts the challenge Three keys are merged and sent as response

P0P0 P1P1 P2P2 P3P3 P4P4 P5P5 P6P6 P7P7 P8P8 P9P9 P 10 P 11 P 12 P 13 H0H0 H1H1 H2H2 H3H3 H4H4 H5H5 H6H6 H7H7 H8H8 H9H9 H 10 H 11 H 12 H 13 H 15 H 14 K0K0 K1K1 K2K2 K3K3 K4K4 K5K5 K6K6 K7K7 K8K8 K9K9 K 10 K 11 K 12 K 13 R0R0 R1R1 R2R2 R3R3 R4R4 R5R5 R6R6 R7R7 K 15 K R8R8 R9R9 R 10 R 11 R 12 R 13 R 15 R 14 R 16 R 17 R 18 R 19 R 20 R 21 R 23 R 22 Secret Password: LM hash of the password: 3 DES keys derived: Challenge response: 3 DES encryptions of 8-byte challenge: DES MSCHAP…

Packet Filtering & Firewalls Packet filtering allows a server to route packets to only authenticated clients Firewalls filter the traffic on the basis of ACL ( Access Control List )

Cakewalk! AsLEAP

No Such Thing As Free Lunch! PPTP is weaker option, security wise, IPSec, L2TP are more secure PPTP is platform dependent Requires extensive configuration

References IPSec VPN DesignBy Vijay Bollapragada, ISBN-13: Vijay Bollapragada