Title: INFOTECH Seminar Advanced Communication Services ACS, 2006
1INFOTECH Seminar Advanced Communication Services
(ACS), 2006 Mentor Dr. Stephan Rupp
VPN Protocols - Hamachi vs. TLS
Shiqing Fan Institute of Communication Networks
and Computing Engineering University of Stuttgart
2MotivationSecurity the primary aim of all
Virtual Private Networks!
- TLS
- Transport Layer Security
- Is endorsed by many leading financial
institutions for commerce over the Internet. - Hamachi
- A computer networking software
- With lots of attractive features
3Agenda
- Introduction VPN
- SSL/TLS
- Hamachi
- Comparison
- Conclusion Outlook
4Introduction VPN
- Virtual Private Network
- Secure VPNs
- data is encrypted at the edge of the network
- IPsec (IP security), L2TP(Layer 2 Tunneling
Protocol), TLS (Transport Layer Security) - Trusted VPNs
- No encryption, rely on the security of a
providers network - Multi-Protocol Label Switching (MPLS), Layer 2
Forwarding (L2F)
5Agenda
- Introduction VPN
- SSL/TLS
- Hamachi
- Comparison
- Conclusion Outlook
6TLS What is TLS?
- the successor of Secure Sockets Layer 3.0 (SSL)
- provides privacy and data integrity
- authentication and communications privacy
- public key infrastructure (PKI)
- composed of two layers
- TLS Record Protocol
- TLS Handshake Protocol
- Adds security to other protocols
- With reliable connections (TCP)
- Uses public keys certificates
7TLSHandshake Protocol
Server
Client
Connection request
Highest SSL Version, Ciphers Supported, Data
Compression Methods, Session Id 0, Random Data
Acknowledgement
- Functions before the application protocol
transmits or receives any data - Negotiation of an encryption algorithm and
cryptographic keys - After handshake procedure finished, each
operation on the resources has to be authorized
and encrypted
Acknowledgement
A new TCP connection created Handshake starts
Client Hello
Server Hello
Selected SSL Version, Cipher, and Data
Compression Method, Assigned Session Id, Random
Data
Certificate Key exchange Certificate
request Server done
Certificate Key exchange Certificate
verification Change cipher spec Finished
Change cipher spec Finished
Application Communication
8SSL/TLS VPN
- Database - application server - Web server - Web
browser model - No interference with OS kernel wherever possible
- Less configuration complexity
- Any machine is able to connect to the central VPN
- Endpoints trust model is broken
- Man-in-the-middle attacks are possible
SSL/TLS Tunnel
Internet
Web Browser (TLS Embedded)
9Agenda
- Introduction VPN
- SSL/TLS
- Hamachi
- Comparison
- Conclusion Outlook
10HamachiEverything you can do in a LAN, you can
do with Hamachi!
- A centrally-managed zero-configuration VPN
freeware application - Direct links between computers that are both
NATed without requiring NAT reconfiguration - Currently available as a beta version for
Microsoft Windows, Mac OS and Linux - Virtual "LAN parties" for gamers connected across
the Internet - Secure Web services and Web-based applications
Games
Chat
File sharing
FTP
. . .
11Hamachipeer-to-peer connection, client-server
authentication
Client2 with Hamachi installed
Client1 without Hamachi installed
Hamachi Server
Hamachi installation, Request a new IP
A virtual network card is created, server
certificate installed
Assign a new IP, 5...
Hello
Hello
SSL/TLS based authentication
Logon request Auth messages
Auth ok Build up the tunnel
Game starts!
Peer-to-peer UDP connection
12HamachiIs what youre telling us true?
- Using Hamachi is easy, but
- Its not open source, no one knows whats behind
it. - Dose it deliver messages securely as it promised?
- Is there any spyware embedded?
- Hamachi server should also be questioned.
- The only way to prove its security is to open it!
It seems good, but
?
13Agenda
- Introduction VPN
- SSL/TLS
- Hamachi
- Comparison
- Conclusion Outlook
14ComparisonSSL/TLS VPN vs. Hamachi
15Agenda
- Introduction VPN
- SSL/TLS
- Hamachi
- Comparison
- Conclusion Outlook
16Conclusion Outlook
- SSL/TLS VPN
- Suitable for protecting sensitive resources
inside the enterprise - The security of the entire system is only as
strong as the weakest link. If the client is
insecure, the entire system is equally insecure. - Hamachi
- A good choice for small companies (no more than
265 users), and internet game players - Prospect
- Re-build the endpoints trust model for SSL/TLS
VPN - Source opened Hamachi is demanded.
- OpenVPN has a good chance
17Thank you for your attention!