Internet Application: Openlaszlo
Internet Application: Openlaszlo
Transit Security
Currently, there are no systems in wide use that will keep
data secure as it transits a public network. Several methods
are available to encrypt traffic between a few coordinated
sites. Unfortunately, none of the current solutions scale
particularly well. Two general approaches dominate this
area:
Virtual Private Networks: This is the concept of creating
a private network by using TCP/IP to provide the lower
levels of a second TCP/IP stack. This can be a confusing
concept, and is best understood by comparing it to the way
TCP/IP is normally implemented. In a nutshell, IP traffic is
sent across various forms of physical networks. Each
system that connects to the physical network implements a
standard for sending IP messages across that link.
Standards for IP transmission across various types of links
exist, the most common are for Ethernet and Point to Point
links (PPP and SLIP). Once an IP packet is received, it is
passed up to higher layers of the TCP/IP stack as
appropriate (UDP, TCP and eventually the application).
When a virtual private network is implemented, the lowest
levels of the TCP/IP protocol are implemented using an
existing TCP/IP connection. There are a number of ways to
accomplish this which tradeoff between abstraction and
efficiency. The advantage this gives you in terms of secure
data transfer is only a single step further away. Because a
VPN gives you complete control over the physical layer, it
is entirely within the network designers power to encrypt
the connection at the physical (virtual) layer. By doing this,
all traffic of any sort over the VPN will be encrypted,
whether it be at the application layer (such as Mail or
News) or at the lowest layers of the stack (IP, ICMP). The
primary advantages of VPNs are: they allow private
address space (you can have more machines on a network),
and they allow the packet encryption/translation overhead
to be done on dedicated systems, decreasing the load placed
on production machines.
Packet Level Encryption: Another approach is to encrypt
traffic at a higher layer in the TCP/IP stack. Several
methods exist for the secure authentication and encryption
of telnet and rlogin sessions (Kerberos, S/Key and
DESlogin) which are examples of encryption at the highest
level of the stack (the application layer). The advantages to
encrypting traffic at the higher layer are that the processor
overhead of dealing with a VPN is eliminated, inter-
operability with current applications is not affected, and it
is much easier to compile a client program that supports
application layer encryption than to build a VPN. It is
possible to encrypt traffic at essentially any of the layers in
the IP stack. Particularly promising is encryption that is
done at the TCP level which provides fairly transparent
encryption to most network applications.
It is important to note that both of these methods can have
performance impacts on the hosts that implement the
protocols, and on the networks which connect those hosts.
The relatively simple act of encapsulating or converting a
packet into a new form requires CPU-time and uses
additional network capacity. Encryption can be a very
CPU-intensive process and encrypted packets may need to
be padded to uniform length to guarantee the robustness of
some algorithms. Further, both methods have impacts on
other areas (security related and otherwise- such as address
allocation, fault tolerance and load balancing) that need to
be considered before any choice is made as to which is best
for a particular case.
Traffic Regulation
The most common form of network security on the Internet
today is to closely regulate which types of packets can
move between networks. If a packet which may do
something malicious to a remote host never gets there, the
remote host will be unaffected. Traffic regulation provides
this screen between hosts and remote sites. This typically
happens at three basic areas of the network: routers,
firewalls and hosts. Each provides similar service at
different points in the network. In fact the line between
them is somewhat ill-defined and arbitrary. In this article, I
will use the following definitions:
Conclusion
There are two basic types of network security, transit
security and traffic regulation, which when combined can
help guarantee that the right information is securely
delivered to the right place. It should be apparent that there
is also a need for ensuring that the hosts that receive the
information will properly process it, this raises the entire
specter of host security: a wide area which varies
tremendously for each type of system. With the growth in
business use of the Internet, network security is rapidly
becoming crucial to the development of the Internet. Soon,
security will be an integral part of our day to day use of the
Internet and other networks.