SlideShare una empresa de Scribd logo
1 de 65
The User-Space VPN and OpenVPN Understanding the User-Space VPN – History, Conceptual Foundations, and Practical Usage – By James Yonan  Copyright © James Yonan 2003
What is a VPN and how is it different from other security software? ,[object Object],[object Object],[object Object]
The Wide area network before VPNs ,[object Object],[object Object],[object Object]
A brief history of VPNs ,[object Object],[object Object],[object Object],[object Object]
IPSec problems ,[object Object],[object Object],[object Object],[object Object]
The rise of SSL and user-space VPNs. ,[object Object],[object Object],[object Object],[object Object]
Linux and virtual network interfaces ,[object Object],[object Object],[object Object]
What is a tun interface? ,[object Object],[object Object],[object Object],[object Object]
How is a tun interface used to build a VPN? ,[object Object],[object Object],[object Object],[object Object],[object Object]
How is a tun interface used to build a VPN (continued)? ,[object Object],[object Object],[object Object]
Adding security to the VPN ,[object Object],[object Object]
Problems with using SSH to build a VPN ,[object Object],[object Object],[object Object],[object Object],[object Object]
Reliable and Unreliable protocols ,[object Object],[object Object],[object Object],[object Object]
Encapsulating Protocols ,[object Object],[object Object],[object Object]
Encapsulating TCP in TCP – the problem ,[object Object],[object Object],[object Object]
Fixing the problem ,[object Object],[object Object]
Why is UDP better for encapsulating IP? ,[object Object],[object Object],[object Object]
VPNs and UDP ,[object Object],[object Object],[object Object]
The VPN is invisible to applications tunneling over it. ,[object Object],[object Object],[object Object]
Enter OpenVPN ,[object Object],[object Object],[object Object]
User-space Tun/Tap vs. IPSec ,[object Object],[object Object],[object Object],[object Object]
IPSec in a nutshell ,[object Object],[object Object],[object Object]
IPSec limitations ,[object Object],[object Object],[object Object],[object Object]
IPSec limitations (continued) ,[object Object],[object Object],[object Object],[object Object]
The “Two Minds” of IPSec -- N. Ferguson and B. Schneier ,[object Object]
How does a VPN achieve security? ,[object Object],[object Object],[object Object]
Active Attacks ,[object Object],[object Object]
Active attacks are thwarted through the use of  authentication ,[object Object],[object Object],[object Object]
HMAC isn’t a 100% solution against active attacks. ,[object Object],[object Object],[object Object]
Replay Attacks ,[object Object],[object Object],[object Object]
Replay attacks, continued ,[object Object],[object Object],[object Object]
Replay attacks, continued. ,[object Object],[object Object],[object Object]
Known plaintext attacks. ,[object Object],[object Object]
Known plaintext attacks (continued). ,[object Object],[object Object],[object Object]
This would be impossible (I hope) in 2003. ,[object Object],[object Object],[object Object]
OpenVPN and Cryptography ,[object Object],[object Object],[object Object],[object Object]
OpenVPN and keying ,[object Object],[object Object],[object Object],[object Object]
Authentication only leads into a bigger problem – key management. ,[object Object],[object Object]
Enter public key cryptography. ,[object Object]
Public Key cryptography is really about the problem of authentication ,[object Object],[object Object]
Public Key technology solves the key sharing problem. ,[object Object],[object Object]
Public key cryptography. ,[object Object],[object Object],[object Object],[object Object],[object Object]
Public key cryptography and authentication. ,[object Object],[object Object],[object Object]
Enter the Certificate. ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Certificate Authority. ,[object Object],[object Object],[object Object],[object Object]
CAs Continued… ,[object Object],[object Object],[object Object],[object Object]
Cryptography conclusion ,[object Object],[object Object],[object Object]
OpenVPN Features ,[object Object],[object Object],[object Object],[object Object],[object Object]
OpenVPN Features, continued. ,[object Object],[object Object]
OpenVPN’s 3 tier security model ,[object Object],[object Object],[object Object]
OpenVPN’s 3 tier security model (continued) ,[object Object],[object Object]
OpenVPN’s 3 tier security model (continued) ,[object Object],[object Object],[object Object]
VPNs and Networking ,[object Object],[object Object],[object Object]
Bridging vs. Routing in the VPN context  ,[object Object],[object Object]
Bridging Advantages ,[object Object],[object Object],[object Object],[object Object]
Bridging Disadvantages  ,[object Object]
Routing Advantages ,[object Object],[object Object]
Routing Disadvantages ,[object Object],[object Object],[object Object],[object Object]
The nuts and bolt of bridging (1) ,[object Object],[object Object],[object Object]
The nuts and bolt of bridging (2) ,[object Object],[object Object],[object Object]
VPNs and firewalling ,[object Object],[object Object],[object Object]
VPNs and firewalling (continued). ,[object Object],[object Object],[object Object]
Future directions -- OpenVPN 2.0 ,[object Object],[object Object],[object Object]
Future directions -- OpenVPN 2.0 (continued) ,[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET Journal
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkOsp Dev
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)Devolutions
 
An introduction into ip networking
An introduction into ip networkingAn introduction into ip networking
An introduction into ip networkinggthomsontd
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)sonangrai
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkashishrocks23
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)sonalikasingh15
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network mainKanika Gupta
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSOHIL SUNDARAM
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkHASHIR RAZA
 
Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Rajendra Dangwal
 

La actualidad más candente (20)

IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN
VPNVPN
VPN
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
An introduction into ip networking
An introduction into ip networkingAn introduction into ip networking
An introduction into ip networking
 
WPA/WPA2 TKIP Exploit
WPA/WPA2 TKIP ExploitWPA/WPA2 TKIP Exploit
WPA/WPA2 TKIP Exploit
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Vpn rsvp
Vpn rsvpVpn rsvp
Vpn rsvp
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)
 

Destacado (7)

Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
 
Vpn 2
Vpn 2Vpn 2
Vpn 2
 
Vpn 3
Vpn 3Vpn 3
Vpn 3
 
hnd_brand_brand_inventory_2016
hnd_brand_brand_inventory_2016hnd_brand_brand_inventory_2016
hnd_brand_brand_inventory_2016
 
Vp ns
Vp nsVp ns
Vp ns
 
AfriRen Teaser Feb2011
AfriRen Teaser Feb2011AfriRen Teaser Feb2011
AfriRen Teaser Feb2011
 
Doc6 mpls vpn-ppt
Doc6 mpls vpn-pptDoc6 mpls vpn-ppt
Doc6 mpls vpn-ppt
 

Similar a Blug talk

Network Security
Network SecurityNetwork Security
Network SecurityJaya sudha
 
ITERA Paper - IPSec L2TP Vulnerability
ITERA Paper - IPSec L2TP VulnerabilityITERA Paper - IPSec L2TP Vulnerability
ITERA Paper - IPSec L2TP VulnerabilityKunal Sharma
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdfVograce
 
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdfKdpKumar
 
Stay Anonymous and Protected.pdf
Stay Anonymous and Protected.pdfStay Anonymous and Protected.pdf
Stay Anonymous and Protected.pdfTEWMAGAZINE
 
Site to-multi site open vpn solution with mysql db
Site to-multi site open vpn solution with mysql dbSite to-multi site open vpn solution with mysql db
Site to-multi site open vpn solution with mysql dbChanaka Lasantha
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdfssusera1b6c7
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptxkarthikvcyber
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital SecurityLindsey Jones
 
Network Project Report
Network Project ReportNetwork Project Report
Network Project ReportTiffany Graham
 
What Technology Lies Behind VPN
What Technology Lies Behind VPNWhat Technology Lies Behind VPN
What Technology Lies Behind VPNSovello Hildebrand
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 

Similar a Blug talk (20)

Vpn
VpnVpn
Vpn
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Katuwal_Arun_flex_get_vpn.pdf
Katuwal_Arun_flex_get_vpn.pdfKatuwal_Arun_flex_get_vpn.pdf
Katuwal_Arun_flex_get_vpn.pdf
 
V P N
V P NV P N
V P N
 
Network Security
Network SecurityNetwork Security
Network Security
 
ITERA Paper - IPSec L2TP Vulnerability
ITERA Paper - IPSec L2TP VulnerabilityITERA Paper - IPSec L2TP Vulnerability
ITERA Paper - IPSec L2TP Vulnerability
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
 
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
10 Protocols of VPN IPSec, PPTP, L2TP, MPLS etc. ⋆ IPCisco.pdf
 
Stay Anonymous and Protected.pdf
Stay Anonymous and Protected.pdfStay Anonymous and Protected.pdf
Stay Anonymous and Protected.pdf
 
Site to-multi site open vpn solution with mysql db
Site to-multi site open vpn solution with mysql dbSite to-multi site open vpn solution with mysql db
Site to-multi site open vpn solution with mysql db
 
Ip sec
Ip secIp sec
Ip sec
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
Vpn
VpnVpn
Vpn
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
Network Project Report
Network Project ReportNetwork Project Report
Network Project Report
 
What Technology Lies Behind VPN
What Technology Lies Behind VPNWhat Technology Lies Behind VPN
What Technology Lies Behind VPN
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 

Más de Swarup Kumar Mall (12)

Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
Vpn 3 13_07
Vpn 3 13_07Vpn 3 13_07
Vpn 3 13_07
 
Vpn
VpnVpn
Vpn
 
Doc c26 c9d9e63c44cba392505b49890b5af_1285830910188_156
Doc c26 c9d9e63c44cba392505b49890b5af_1285830910188_156Doc c26 c9d9e63c44cba392505b49890b5af_1285830910188_156
Doc c26 c9d9e63c44cba392505b49890b5af_1285830910188_156
 
D l table
D l tableD l table
D l table
 
Cheap vpn
Cheap vpnCheap vpn
Cheap vpn
 
Btech. 1st year_new_syllabus_final__2008_bput_
Btech. 1st year_new_syllabus_final__2008_bput_Btech. 1st year_new_syllabus_final__2008_bput_
Btech. 1st year_new_syllabus_final__2008_bput_
 
Allaboutvpn
AllaboutvpnAllaboutvpn
Allaboutvpn
 
2008 cse
2008 cse2008 cse
2008 cse
 
2008 cse copy
2008 cse   copy2008 cse   copy
2008 cse copy
 
4 vpn s
4 vpn s4 vpn s
4 vpn s
 
VPN
VPNVPN
VPN
 

Blug talk

  • 1. The User-Space VPN and OpenVPN Understanding the User-Space VPN – History, Conceptual Foundations, and Practical Usage – By James Yonan Copyright © James Yonan 2003
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.