CSEC 701 VPN

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/45

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

46 Terms

1
New cards

VPN

an encrypted connection between private networks over a public network such as the internet (tunnel )

2
New cards

IPSec

a protocol suite developed by the IETF for securing IP communications by authenticating and encrypting each IP packet (used to deploy VPN)

3
New cards

IPSec benefits

network level peer authentication, data origin authenticity, data integrity, data confidentiality, replay protection

4
New cards

Where is IPSec in the stack

in network layer, is transparent to applications, header increases IP packet size beyond original MTU

5
New cards

IPSec headers

contains information on the VPN link and the packet, network layer protocol on top of another network layer protocol(IP), includes AH & ESP

6
New cards

IPSec modes

methods of transportation of user data, transport vs tunnel mode

7
New cards

IPSec IKE

mutual authentication, establish shared symmetric key, two phases

8
New cards

authentication header AH

data integrity, origin authentication, anti-replay (with sequence number), NO encryption

9
New cards

data integrity

no modification of data in transit, integrity check value (ICV) via HMAC, protects everything beyond IP header and some fields of IP header

10
New cards

origin authentication 

ensures packets definitely came from the peer

11
New cards

encapsulated security payload ESP

Encryption, confidentiality, integrity, with optional authentication (it does AH’s job)

12
New cards

confidentiality

all of the data and info above the network layer is encrypted

13
New cards

integrity

protects everything beyond IP header

14
New cards

authentication

make sure packet came from peer and not attacker by using a shared secret key (keyed hash)

15
New cards

keyed hash

uses MD5 and SHA-1

16
New cards

anti-replay protection

sequence number and sliding window

17
New cards

sequence number (32-bit)

if sequence number hits 2³², the system must rekey (no reuse)

18
New cards

sliding window 

packets are accepted when its sequence number falls within a window of sequence numbers, and MAC is ok

19
New cards

transport mode

encapsulates only the payload of the IP packets, leaving the header untouched; authenticates two connected computers, has an option to encrypt data transfer , between TWO hosts (1 IP header, then TCP/UDP header), end-to-end security between hosts, MORE efficient 

20
New cards

tunnel mode

encapsulates both the payload and the header, between VPN gateways, has an option to encrypt data transfer, applied to an IP tunnel (outer and inner), site-to-site, IPsec server at each site, no security within local networks

21
New cards

outer IP header

IPSec processing destination

22
New cards

inner IP header

ultimate packet destination

23
New cards

IKE

Ipsec protocol that produces security keys and other protocols, mutual authentication + session key establishment; hybrid protocol, works on UDP port 500

24
New cards

ISAKMP

established cryptographic keys and security associates 

25
New cards

oakley

a key agreement protocol, which uses DH algorithm to create master key, and a key that is specific to each session, uses nonces to protect against replay attacks

26
New cards

DH vulnerable to DoS attack

attacker, spoofing multiple source addresses, gets victims to do numerous Dh exponentiations, clogging the victim

27
New cards

cookie

first perform cookie exchange before exponentiating, A sends B some random data and B retruns it, similarly B sends A random data and A retruns it, if ACK comes back then perform exponentiation 

28
New cards

IKE phase 1

secure, mututally authenticated connection is established, creates session keys for encrypting IKE phase 2 messages, establishes IKE SA (expensive)

29
New cards

IKE phase 2

the security services and details for an SA are negotiated, can occur multiple times, establishes IPsec SA (simple)

30
New cards

SA lifetime

for good security, SA and keys should be changed periodically 

31
New cards

lifetime type

measures in number of bytes transmitted or amount of time

32
New cards

SA unit of measure

kilobytes or seconds

33
New cards

what happens when SA time expires 

Ipsec recognizes the upcoming expiration and reestablish new SA in advance to avoid disruption 

34
New cards

openVPN

creates secure point-to-point or site-to-site connections, authentication with pre-shared secret keys, certifications or passwords; encryption using OpenSSL and TLS protocol

35
New cards

wireguard

free and open source software applications and communication protocol to create secure tunnel

36
New cards

SSL

uses X.509 digital certificates for authentication, there is no trust hierarchy so browers are preloaded with certificates of trusted CAs, pop-up window of unauthorized sugnature 

37
New cards

SSL architecture

SSL handshake protocol, SSL change cipher spec protocol, SSL alert protocol, applications; then SSL record protocl; TCP; IP

38
New cards

SSL handshake protocol

initializes communication between client and server, needs symmetric keys (MAC, encryption, and IV at record layer), negotiates the protocols to be used for authentication and encryption (28 byte pre- and master secret)

39
New cards

SSL change cipher spec protocol

initializes secure communication  

40
New cards

SSL alert protocol

error notifications

41
New cards

SSL record protocol

fragmentation, compression, MAC, encryption

42
New cards

SSL client hello message

client_version, client_random, session_id, cipher_suites

43
New cards

SSL server hello message

server_version, server_random, session_id, cipher_suite

44
New cards

cipher suite

= key exchange algorithm + cipherSpec

45
New cards

key exchange method

RSA, fixed DH, ephemeral DH, anonymous DH, fortezza

46
New cards

cipher suite names

2 bytes, human readable names by concatenation of choices