Virtual Private Networking Secure your network. 4389KB Mar 29 2010 05:04:06 AM
There are a few drawbacks to consider when deciding whether to provide end users with remote VPN access. The first is the integrity of the remote workstation. With penetration tools such as L0pht’s
Netcat and the Cult of the Dead Cow’s Back Orifice freely available on the Internet, it is entirely possible that the remote workstation can become compromised. Most ISPs do not provide any type of
firewall for dial-in users. This means that dialed-in systems are wide open to attack. The remote client could be infiltrated by an attacker, who could then use the VPN tunnel to attack internal
resources.
The other drawback is more theoretical. Allowing VPN access into your network requires that you punch another hole through your firewall. Every open hole gives attackers that much more room to
squirm their way in. For example, NT users who relied on PPTP to provide safe encrypted access to their network were caught off guard when a vulnerability was found with the PPTP service running
on the NT server. By sending the PPTP server a single PPTP start session request with an invalid packet length value, an attacker could make the server core dump and crash. This would bring down
the PPTP server, along with any other service running on that system.
System Capacity Checklist
If you will be providing client VPN access to your network, keep a sharp eye on system capacity. Here are some questions you should ask yourself:
• How many concurrent users will there be? More users means you need more capacity. • When will VPN clients connect remotely to your network? If most remote VPN access
will take place during normal business hours, a faster Internet link and faster hardware may be required.
• What services will the clients be accessing? If remote VPN access will be for bandwidth- intensive applications like file sharing, a faster Internet link and faster hardware may be
required, as well. • What kind of encryption do you plan to use? If remote VPN access will be using a large
key algorithm, such as TripleDES, then faster encryption hardware may be required.
Dedicated WAN Link Replacement
As you saw in Figure 10.1, a VPN can be used to connect two geographically separate networks over the Internet. This is most advantageous when the two sites are separated by large distances, as when
your organization has one office in Germany and another in New York. Instead of having to pay for a dedicated circuit halfway around the world, each site would only be required to connect to a local
ISP. The Internet could then be used as a backbone to connect these two networks.
A VPN connection may even be advantageous when two sites are relatively close to one another. For
Consider the network drawing in Figure 10.2. There is an internal network protected by a firewall. There is also a DMZ segment which holds your Web server and SMTP relay. Additionally, you have
an extra network card in the firewall for managing security to a number of dedicated T1 lines. The T1 circuits connect you to multiple business partners and are used so that sensitive information does not
cross the Internet. This sensitive information may be transmitted via e-mail or by FTP.
FIGURE 10.2 A network using dedicated links to safeguard sensitive information
While this setup may appear pretty straightforward on the surface, it could potentially run into a number of problems. The first is routing. Your firewall would need to be programmed with the
routing information for each of these remote networks. Otherwise, your firewall would simply refer to its default route setting and send this traffic out to the Internet. While these routing entries can be
set in advance, how will you be updated if one of the remote networks makes a routing or subnet change? While you could use RIP, you have already seen in Chapter 3 that this is a very insecure
routing protocol. Open Shortest Path First OSPF would be a better choice, but depending on the equipment at the other end of the link, you may not have the option of running OSPF.
You may also run into IP address issues. What if one of the remote networks is using NAT with private address space? If you perform a DNS lookup on one of these systems, you will receive the
public IP address, not the private. This means that you may have additional routing issues or you may be required to run DNS entries for these systems locally. Also, what if two or more of the remote
networks are using the same private address space? You now may be forced to run NAT on the router at your end of the connection just so your hosts can distinguish between the two networks.
There is also a liability issue here. What if an attacker located at one of your remote business partners launches an attack against one of the other remote business partners? You have now provided the
medium required for this attack to take place. Even if you can legally defend yourself, this would certainly cause a lot of embarrassment and strain your business relationships.
Replacing your dedicated business partner connections with VPNs would resolve each of these problems. As long as you can insure the integrity of the data stream, administering multiple VPNs
would be far simpler than managing multiple dedicated circuits.
As with remote client access, you must open a hole through your firewall in order to permit VPN traffic. While strong authentication will dramatically decrease the chances that an attacker will be
Selecting a VPN Product
When deciding which VPN product to use, you should look for several features:
• Strong authentication • Adequate encryption
• Adherence to standards
Of course, this assumes that you have a choice when selecting a VPN product. If you are setting up a VPN in order to connect to a specific site, your options may be limited. For example, Novell’s
firewall product BorderManager supports VPN connectivity. The problem is that the VPN is proprietary. This means that the only way to create a VPN with a BorderManager firewall is to place
another BorderManager firewall at the other end of the VPN tunnel. If you are setting up a VPN in order to communicate with a specific remote network, find out what VPN package that network is
using. Then you can determine what your product options are.
Previous Table of Contents Next
Copyr ight © Sybex, I nc.
Strong Authentication
Without strong authentication, you have no way to determine if the system at the other end of the VPN tunnel is who you think it is. Diffie-Hellman, discussed in Chapter 9, is the authentication
method of choice when validating the tunnel end points. It allows a shared secret to be created through the exchange of public keys. This removes the need to exchange secret information through
some alternative means.
If you are not using a known and trusted certificate authority when exchanging public keys over the Internet, verify the key values through some other means, such as a phone call or fax.
Adequate Encryption
Note that the word “adequate”—not “strong”—appears in the title of this section. You should determine what level of protection you actually require before selecting a method of encryption. For
example, if you will be exchanging interesting but not necessarily private information over the Internet, 40–56-bit DES encryption may be more than sufficient. If you will be moving financial data
or equally valuable information, stick with something stronger, like Triple DES.
The reason you want to choose the right level of encryption is performance. The stronger the encryption algorithm you use, the larger the delay that will be introduced from the encryption and
decryption processes. For example, two networks connected to the Internet via 56K circuits which are using Triple DES may not be able to pass traffic fast enough in order to prevent application timeouts.
While it is always better to err on the side of caution by using a larger key, give some thought to what size key you actually need before assuming bigger is always better.
The type of key you use will also affect performance. Secret key encryption, such as DES, is popular with VPNs because it is fast. Publicprivate encryption schemes, such as RSA, can be 10 to 100 times
slower than secret key algorithms which use the same size key. This is because key management with a publicprivate scheme requires more processor time. Many VPN products will use a publicprivate
key algorithm in order to initially exchange the secret key, but then use secret key encryption for all future communications.
Use the brute force attack time estimates discussed in Chapter 9 as a guide in determining what size encryption key to use with your VPN.
You saw in Chapter 9 why it is important to stick with encryption schemes that have survived public scrutiny. The same holds true when selecting a method of encryption for your VPN. Stick with an
algorithm that has stood the test of time and has no significant vulnerabilities. For example, the only real deficiency found with DES is the small key size used in the original version. This can easily be
rectified by using Triple DES, which increases the number of keys that are used.
You should also make sure that the VPN product is compatible with other VPN solutions. As mentioned earlier in this section, Novell BorderManager is only capable of creating VPN connections
with other BorderManager systems. This severely limits the product selection at the other end of the tunnel. If you are using BorderManager as a firewalling solution and later need to create a VPN to a
remote business partner, you may find yourself purchasing a separate solution in order to fulfill this need.
VPN Product Options
There are a number of options available to you when you are selecting what kind of device to use for a VPN connection. These options fall into three categories:
• Firewall-based VPN • Router-based VPN
• Dedicated software or hardware
The option you choose will depend on your requirements, as well as on the equipment you have already purchased.
Firewall-Based VPN
The most popular VPN solution is firewall integration. Since you will probably want to place a firewall on your network perimeter, anyway, it is a natural extension to let this device support your
VPN connections, as well. This provides a central point of management as well as direct cohesion between your firewall security policy and the traffic you wish to let through your end of the tunnel.
The only drawback is performance. If you have a busy Internet circuit, and you want to use multiple VPNs with strong encryption on all of them, consolidating all of these services on a single box may
overload the system. While this will probably not be an issue for the average installation, you should keep scale and performance in mind while you are deciding where to terminate your VPN tunnel.
Some firewalls, such as FireWall-1, do support encryption cards in order to reduce processor load. The encryption card fits in a standard PCI expansion slot and takes care of all traffic encryption and
decryption. In order to use one of these cards, however, you must make sure that all of your PCI slots are not currently being used by network cards.
Router-Based VPN
The only real drawback to a router-based VPN solution is security. Typically but not always, routers are extremely poor at providing perimeter security compared to the average firewall. It is
possible that an attacker may be able to spoof traffic past the router which the firewall will interpret as originating from the other side of the VPN tunnel. This means that the attacker may be able to gain
access to services that are typically not visible from other locations on the Internet.
Previous Table of Contents Next
Copyr ight © Sybex, I nc.
Dedicated Hardware or Software
If you have already purchased a firewall and router and neither supports VPN ability, all is not lost. You can still go with a hardware or software solution that is dedicated to creating VPN connections.
For example DEC’s AltaVista Tunnel is an excellent product which supports tunnels to remote networks and remote-user VPNs. Since this in an independent product, it will work with any existing
firewall.
The biggest drawback to a dedicated solution is an additional point of administration and security management. If the device is located outside the firewall, you have the same spoofing issues that you
had with the router solution. If you locate the device inside the firewall, you may not be able to manage access using your firewall security policy. Most VPN solutions encrypt the original packet in
its entirety. This means that the IP header information is no longer available to the firewall in order to make traffic control decisions. All traffic passing from one end of the tunnel to the other would use
the same encapsulating packet headers. This means that the firewall will not be able to distinguish between an SMTP and a Telnet session encapsulated within the tunnel. You must rely on the
dedicated VPN device to provide tools to control the type of traffic you wish to let through your end of the tunnel.
VPN Alternatives
Not every remote-access solution requires a fully functional VPN. Some applications already provide strong encryption and authentication. For example, if you are a Lotus Notes user, your Notes ID file
is actually your private encryption key. This key can be used to create a digital certificate, which, along with password authentication, is used to insure that you are in fact who you claim to be.
Lotus Notes will also encrypt information that it transmits along the network. From the Lotus Notes client main menu, you can select File Tools User Preferences Ports to produce the User
Preferences screen shown in Figure 10.3. By selecting the Encrypt network data check box, you can optionally encrypt all data transmitted through the highlighted communication port. In Figure 10.3,
all TCPIP traffic will be encrypted.
FIGURE 10.3 The Lotus Notes User Preferences screen
If your remote network access will be limited to Lotus Notes replication, you could simply open up a port through your firewall and allow Lotus Notes to take care of all authentication and encryption for
you. If you do not want to leave the Lotus Notes server openly exposed to the Internet, you could
Lotus Notes uses TCP port 1352 for all client-to-server and server-to-server communications.
Quite a few products provide their own authentication and encryption. Some even allow access to additional network resources. For example, Citrix’s WinFrame and MetaFrame products provide
terminal server capability based on the Windows NT operating system. They also support decent authentication and encryption. This means that users on the Internet can use a Citrix client in order to
access the Citrix server through an encrypted session. Once connected to the server, users can access any internal applications to which the system administrator has granted them access.
The biggest drawback to these alternate solutions is that they require special software to be run on the client in order to initiate the connection. You no longer have the service independence of a true VPN
solution. This is changing, however, as vendors like Citrix are working to make their products more universally accessible. For example, the latest versions of Win-Frame and MetaFrame no longer
require the use of a specialized client. You can now use an optional Web browser plug-in which supports the latest versions of Netscape and Internet Explorer.
A browser plug-in makes an excellent remote solution: a network administrator simply needs to make the plug-in software and configuration file available via a Web server. Remote users can then
download the required software about 300KB and connect to the Citrix server using their favorite Web browser.
Setting up a VPN
Let’s return to the FireWall-1 product we discussed in Chapter 7 in order to walk through the configuration of a VPN between two remote networks. While we will specifically be discussing
FireWall-1, many of the steps required to set up the VPN are similar to other products’ setups. The goal is to give you a firm understanding of what is involved in the configuration process, not to
endorse one product over another.
As mentioned in Chapter 7, FireWall-1 supports a number of VPN options. These include SKIP, IPSEC, and a FireWall-1 proprietary algorithm. In our example, we will be working with SKIP since
it provides better authentication than IPSEC and is an accepted standard. It also supports full tunneling, which allows SKIP to be used in a private address space environment.
Preparing the Firewall
If you are unfamiliar with FireWall-1, please review Chapter 7, which covers how to install and configure the product.
This section assumes that you have a working firewall which is capable of providing controlled Internet access. In the course of this procedure, you will notice that the firewall policy has a minimal
amount of rules. This has been done solely for clarity in our examples. Your rule set will vary and should include all required policies.
Place encryption rules at the top of the Policy Editor so they will be processed first.
You need to be running FireWall-1 version 3.0b with additional support for VPNs and DES encryption. The base version of FireWall-1 does not include these features; you must pay extra for
them. If you are unsure which version you have purchased, go to the
\FW1\BIN
directory and type fw printlic.
The output from this command should appear similar to Figure 10.4. The figure shows only an evaluation license, so yours will appear slightly different. Specifically, you are looking for the SKIP
and DES options. Once you have verified these options, you are ready to create your VPN.
FIGURE 10.4 The SKIP and DES options are required for your VPN configuration.
Our VPN Diagram
Figure 10.5 shows a network drawing of the VPN you will create. The figure shows two remote network sites. One is behind a firewall named HOLNT200 and the other is behind a firewall named
Witchvox. Behind HOLNT200 is an FTP server that holds files containing financial information. The goal is to set up a secure tunnel so that clients on the other side of Witchvox can retrieve the financial
files in a secure manner. Since FTP transmits all data in the clear, you want to use a VPN to insure that your financial information is not compromised.
Configure your VPN by defining encryption domains for each end of the VPN tunnel. This identifies which remote networks the firewall will exchange encrypted traffic with. For example, you will
configure the firewall Witchvox to encrypt any traffic headed for the
192.168.1.0
network. Conversely, you will also instruct Witchvox to decrypt all traffic received from the
192.168.1.0
network. HOLNT200 will be configured in a similar manner, except the remote encryption domain is defined
as
192.168.3.0
.
Your first step is to make sure all required network objects are created. Each firewall will need to have the following objects:
• A network object or group for the local encryption domain • A network object or group for the remote encryption domain
• A workstation object for itself • A workstation object for the remote firewall
FIGURE 10.5 An example of a VPN
Previous Table of Contents Next
Copyr ight © Sybex, I nc.
Defining Network Objects
If you do not have a local network object defined, you will need to define one now. This can be accomplished from the Security Policy Editor main menu by selecting Manage Network Objects
New Network. This will produce the Network Properties screen shown in Figure 10.6. Give this object a name and assign a valid subnet address and mask. Notice that this configuration is being
performed on Witchvox, so the Location of the
192.168.3.0
network object is identified as Internal. Click OK to save this entry.
FIGURE 10.6 The Network Properties screen
If you have multiple network segments, define each of them now. Once you have defined all of your network objects, you will also need to create a group object and place each of these network objects
inside of it. Later on you will need to define an encryption domain. When identifying the domain, you will only be allowed to specify one object. If you need to identify multiple network segments,
you can do this by specifying the group of your network objects.
Once you have identified your internal subnets, you must also identify the subnets at the remote encryption domain. Do this by creating additional network objects, just as you did for your local
segments. The only difference is that the Location of the object must be defined as External, as shown in Figure 10.7. In Figure 10.7 we are still configuring the Witchvox firewall, so the
192.168.1.0
object is part of the remote network. This is why it is identified as being external to the firewall.
You may also wish to assign the remote subnets a unique color so you do not confuse them with your local objects.
Defining the Firewalls
You now need to configure the firewall objects. If you have not done so already, create a network object for the firewall by selecting Manage Network Objects New Workstation from the
Security Policy main menu. In Figure 10.8 you are still configuring the Witchvox firewall and creating a workstation object which will represent itself. Notice that the configuration uses the IP
address from the external NIC on the firewall and that the Location is identified as Internal.
FIGURE 10.7 Remote subnets need to be defined as External.
FIGURE 10.8 The General tab for the Witchvox firewall object
Next click the Encryption tab to define your local encryption domain and select a method of encryption. This is shown in Figure 10.9. Notice that Other is selected under Encryption Domain and
the local network object specified. Also notice that SKIP has been selected in the Encryption Methods Defined.
Once you have selected SKIP encryption, click the Edit button. This will produce the SKIP Properties window shown in Figure 10.10. Notice that there is no key information recorded in this tab. You will
need to generate a new certificate authority key in order to authenticate with remote systems. In this configuration, Local is identified as the certificate authority. If you wanted to indicate a different
system, you would select Remote and choose a predefined object for the certificate authority.
FIGURE 10.9 The Encryption tab for the Witchvox firewall object
FIGURE 10.10 The CA Key tab of SKIP Properties
Click the Generate button to create a new certificate authority key CA key for this system. This produces a dialog box warning you that you are about to change your SKIP management key. If you
already had VPN connections with other sites, this would mean that they would have to manually fetch the new key. Since this is a new configuration, changing keys is not an issue. Click Yes to
continue.
Clicking Yes will produce a new dialog box informing you that a new management key is being generated. Depending on the processor speed of your system, this could take a few seconds or as long
as a minute. Figure 10.11 shows the CA Key tab after key generation. These keys are unique to this specific system. The keys you generate should have different values.
FIGURE 10.11 The CA Key tab after key generation
Once the certificate authority keys are generated, select the DH Key tab to generate a new Diffie- Hellman key. This tab resembles the CA Key tab. Click the Generate button to create a new Diffie-
Hellman key. Once key generation is complete, your screen should appear similar to Figure 10.12.
Like the certificate authority keys, your Diffie-Hellman key will be unique to your system, so you will not receive an identical key string to the one shown in the figure.
Once you have finished, click the Write button to save this key, then click OK.
FIGURE 10.12 The DH Key tab for SKIP Properties
Now that you have configured an object for your local firewall, you also need to define an object for the firewall at the other end of the VPN tunnel. This is shown in Figure 10.13. You are still working
on Witchvox, but you are defining an object for the firewall HOLNT200. Notice that the system is being associated with its external IP address and that the Location is identified as External.
FIGURE 10.13 General properties for the HOLNT200 firewall object
Once the General tab is filled out, click OK to save. You will not be working with the Encryption tab
Configuring the Remote Firewall
Now that you have defined the required objects on Witchvox, you also need to define these objects on HOLNT200. The process is identical to the steps you have taken so far, with the following
exceptions:
• The
192.168.1.0
subnet will be defined as Internal, not External.
• The
192.168.3.0
subnet will be defined as External, not Internal.
• The HOLNT200 firewall will be defined as Internal, not External. • Keys will be generated for the HOLNT200 object, not Witchvox.
• Witchvox will be defined as External, not Internal.
Once these objects are created, install them on HOLNT200 by selecting Policy Install from HOLNT200’s Security Policy main menu.
Exchanging Keys
In order to exchange keys, go back to the Witchvox firewall and edit the object you created for HOLNT200. When the Workstation Properties screen for HOLNT200 appears, select the Encryption
tab. Under the Encryption Domain option, associate the object you create for the
192.168.1.0
network the remote network which sits behind HOLNT200. You should also select SKIP under Encryption
Methods Defined. Your dialog box should appear similar to Figure 10.14.
FIGURE 10.14 Encryption properties for the remote firewall HOLNT200
When you click the Edit button in order to manage your SKIPfirewall properties, you will notice the screen looks a little different from this same screen on the Witchvox object. This is shown in Figure
10.15. Instead of the certificate authority being defined as a local system, Remote is selected, with the HOLNT200 object selected as the remote system. The Generate button is also missing and has been
replaced with a button labeled Get. This is because you will not be generating a new key, but fetching it from HOLNT200.
Click the Get button now to retrieve the remote certificate. This will produce a dialog box that warns that you are fetching the keys for HOLNT200 without authentication, in order to certify that it is
actually HOLNT200 who is sending you the keys. This is normal: this is the first key exchange
FIGURE 10.15 The CA Key tab for HOLNT200’s SKIP Properties
You are also informed that you should manually verify the key values. You can do this by calling the remote firewall administrator and reading off the key values you have received. They should match
the key values generated for their local firewall object. In our example, you could verify that the correct keys were received by going to the HOLNT200 firewall, editing the HOLNT200 object, and
checking the SKIP properties under the Encryption tab.
Once you have retrieved the certificate authority keys, click the DH Key tab to fetch the Diffie- Hellman key. As on the CA Key tab, the Generate button has been replaced with a Get button. Click
the Get button now in order to fetch the key from the remote firewall. Your screen should appear similar to Figure 10.16. As with the certificate authority key, you should manually validate the key
value by calling the remote firewall administrator. Click the Write button and then click OK to save the changes you have made to this object.
FIGURE 10.16 The DH Key tab for HOLNT200’s SKIP Properties
Previous Table of Contents Next
Copyr ight © Sybex, I nc.
Fetching Keys on the Remote Firewall
Witchvox now has all the key information it needs from HOLNT200. You must now go to the HOLNT200 firewall and edit the Witchvox object so that HOLNT200 can fetch the key information
it requires, as well. The process is identical to what you’ve done, except that the Encryption Domain defined under the Encryption tab on Witchvox must indicate the subnet
192.168.3.0
the subnet sitting behind Witchvox. The rest of the steps are identical. Once HOLNT200 fetches the keys it needs you
should manually verify them, as well.
Modifying the Security Policy
You have created all of your required network objects and exchanged keys; now you must define a set of policy rules so that the firewall knows when to use your VPN. This is done by creating a new
rule at the top of the Policy Editor and adding both the local and remote networks to the Source and Destination columns. Under the Services column, you can leave the default of Any which will
encrypt all traffic between the two encryption domains or you can select to only encrypt certain services. In the Action column, right-click within the box and select Encrypt. Your rules should now
appear similar to row 1 in Figure 10.17.
Both the local and the remote encryption domains should appear in the Source and Destination columns.
Now you need to define the encryption properties for this specific VPN. This is done by again right- clicking in the Action box, only this time you need to select Edit Properties. This will produce the
Encryption Properties window shown in Figure 10.18. Since FireWall-1 supports multiple forms of encryption, it is possible to use different forms of encryption on multiple VPNs. This is why you
must specify the type of encryption you wish to use for this VPN tunnel.
FIGURE 10.17 Defining the rules about which traffic should be encrypted
FIGURE 10.18 The Encryption Properties window
In the Encryption Properties windows, select SKIP and click the Edit button. This will produce the SKIP Properties window shown in Figure 10.19. You are allowed to set the following options:
• Kij Algorithm This selects the method of encryption to use when the systems exchange Crypt and MAC keys.
• Crypt Algorithm This selects the method of encryption to use when encrypting and decrypting data.
• MAC Algorithm This selects the method of encryption to use for authenticating the system at the remote end of the VPN tunnel.
• Allowed Peer Gateway This specifies who is allowed to initiate a VPN transmission. If Any is selected, then either firewall associated with each encryption domain is allowed to
transmit encrypted data. If a specific system is indicated, then you will need two separate rules in the Security Policy Editor.
• NSID This selects how the name space IDs are derived. Selecting None includes the NSID information within the encapsulation header.
• IPSEC Options One or both of these options must be selected if SKIP is used with IPSEC. The ESP option selects encryption, and the AH option selects authentication.
FIGURE 10.19 The SKIP Properties window
Once you have defined your SKIP options for this specific VPN connection, click OK twice to save any changes. This should return you to the Security Policy main screen. Now you must install your
policy changes in order to make them active. Do this by selecting Policy Install from the Security Policy main menu. This completes all the required changes to Witchvox in order to setup your VPN
connection.
Modifying the Security Policy on the Remote Firewall
You also need to modify the security policy and SKIP properties on HOLNT200. Follow the exact steps used to configure Witchvox. The policy rules should appear identical to Figure 10.17. You also
want to make sure that you select the same options under SKIP properties. Once your policy changes are complete on HOLNT200, you must install the policy to make your changes active.
The setup of your VPN should now be complete. All that is left is to test the VPN in order to verify that it is functioning properly. This is accomplished by initiating an FTP session from the
192.168.3.0
network behind Witchvox to the FTP server located behind HOLNT200. If you check the firewall log on Witchvox, you should see an outbound session similar to Figure 10.20. Log entry No. 1 shows an
FTP session coming from
192.168.3.10
which is going to
192.168.1.10
, which is the IP address of the remote FTP server. Notice that the log indicates that the traffic is being encrypted.
FIGURE 10.20 The FTP log entry on Witchvox
So you know that your FTP session was transmitted successfully. You also need to check the firewall log on HOLNT200 in order to insure that the transmission was received properly. This is shown in
Figure 10.21. Notice that the log indicates that the firewall had to decrypt this traffic. You may also notice that since the firewall knows the true name of the FTP server LAB31, it has substituted this
name for the destination IP address.
FIGURE 10.21 The FTP log entry on HOLNT200
Verifying the Data Stream
While all of this looks correct, the true test is to break out a network analyzer and decode the traffic being transmitted by the firewalls. While the log entries claim that the traffic is being encrypted and
decrypted, it never hurts to check. A network analyzer will show you the contents of the packets being transmitted. If you can read the financial information within the data stream, you know you
have a problem.
Figure 10.22 shows a packet decode of the FTP session before it is encrypted by the firewall. Notice that you can clearly distinguish that this is an FTP session. You can also identify the IP addresses of
the systems carrying on this conversation. If you review the information in the bottom window, you can even see the data being transferred, which appears to be credit card information.
FIGURE 10.22 The data stream before it is encrypted
Figure 10.23 shows the same data stream, but from outside the firewall. This is what an attacker would see who was trying to capture data traveling along the VPN. Notice that the transport protocol
FIGURE 10.23 The data stream after it is encrypted
If you look at the middle window, you will see that the source and destination IP addresses are that of HOLNT200 and Witchvox, respectively. You do not see the true source and destination IP addresses
of the data stream. This, combined with hiding the transport and service within the encrypted packet, helps to keep any one data transmission from looking more interesting to an attacker than any other.
In fact, there is no certain method of verifying that all this captured traffic is from a single session. Each packet listed in the top window may be from different communication sessions that are taking
place simultaneously. In order to find the FTP session, an attacker may be forced to decrypt hundreds or even thousands of packets.
The real test is the bottom window. Note that your data is now scrambled into ciphertext and is no longer readable. This prevents an attacker from being able to read the enclosed data, as you could in
Figure 10.22. In order to get to this information, an attacker would need to identify which packets contain the financial information and decrypt them with a brute force attack.
Given these two packet traces, it is safe to say that your VPN is functioning properly and encrypting the data that flows between the two encryption domains.
Summary
In this chapter we defined the term virtual private networking and discussed when it is beneficial to use a VPN. We also covered what you should look for in a VPN product and what your options are
for deployment. Finally, we walked through the configuration of a VPN between two firewalls and looked at the effect it had on the passing data stream.
In the next chapter, you will look at viruses and how you can go about keeping these little pieces of destructive code off your network.
Previous Table of Contents Next
Copyr ight © Sybex, I nc.