throbber
Tutorial:Internet
`
`Understanding VPNs
`And PPTP
`
`A Virtual Private Network is an efficient and cost-effective way to set up a WAN
`by using the Internet for the long-distance communications.
`
`By Kevin Townsend
`
`If you manage anything more than
`
`the smallest of LANs, the question
`is probably not so much “Do I need
`a VPN?” as “How soon should I imple-
`ment one?”.
`The business world is marching in-
`exorably towards a paradigm that de-
`mands VPN (Virtual Private Network)
`technology. Telecommuting and e-
`commerce are growing and inevitable.
`And virtual private networks are the
`ideal solution for such a world.
`
`Definition
`So what exactly is a VPN? There are
`several answers to this question. Pri-
`marily, there are two types: voice-car-
`rying and data-carrying.
`Voice VPNs developed with the ad-
`vent of increased telecommunications
`liberalization. They serve to simulate a
`private network at a considerably
`lower cost
`than the basic public
`switched network. They started pri-
`marily in the USA, but have become
`global over the last few years. Sprint,
`AT&T, Global One
`and Uni-
`world/World Partners are example
`providers.
`There are several variants of data-
`carrying VPNs. One occurs when the
`entire network requirements are out-
`sourced, probably to a carrier. A sec-
`ond variation occurs where two or
`more LANs are linked together using
`the Internet as the connecting medium.
`This would require the use of intranet
`technology at the two LAN sites, to-
`gether with firewalls between each site
`and the Internet itself.
`While this approach has some ad-
`vantages, it is static. If you are not con-
`nected to one or other of the LANs,
`then you are not connected to the VPN.
`
`furthermore operates best only
`It
`where the intranet technology (use of
`Web browsers, Internet email and so
`on) is strongly woven into the opera-
`tional organization of the company.
`It is the third variant data-carrying
`VPN with which this article is primar-
`ily concerned. This is dial-up connec-
`tion from a remote user
`to the
`corporate LAN across the Internet. Its
`primary advantage over other data
`VPN variants is its flexibility. New us-
`ers can be added, and existing users are
`not tied to any specific geographic lo-
`cation.
`So that’s the basis for what follows:
`point-to-point VPNs using the Internet
`as the transmission medium. I shall be
`considering the arguments in favour of
`implementing such a VPN, the re-
`quirements for a successful VPN, and
`how the various elements work and
`should be combined.
`
`Why Do It?
`There are many reasons for imple-
`menting such a VPN. Fundamentally,
`the nature of business is changing. The
`notion of the office as a geographic and
`essential central location for all work-
`ers is shifting. More and more people
`are using computers to work from
`home, from customer sites, from hotel
`rooms, from the car or train or plane
`etc. It has been estimated by AT&T, for
`example, that home working can pro-
`vide up to 45% productivity gains.
`But what hasn’t changed is that the
`central office remains the primary lo-
`cation of corporate data. To work to
`full capacity from remote locations we
`consequently need to network our re-
`mote PCs and the central server, and
`this needs to be done as easily, as tran-
`
`sparently and as economically as pos-
`sible.
`Technically, this has long been pos-
`sible but costly. You could dial into
`your office computers from almost
`anywhere in the world. But leased
`lines are costly and fixed, and the cost
`of long-distance PSTN calls can rap-
`idly become excessive. And, of course,
`the vast banks of necessary modems
`are both costly and potential bottle-
`necks (not to mention security risks).
`The primary argument given for
`implementing a VPN is thus usually
`cost. Vast savings (the usually quoted
`figures are between 40% and 50%) can
`be made by switching from PSTN dial-
`up with its high costs to the usually
`local charge for connecting to the In-
`ternet.
`All you need are the right tools for
`a VPN and an Internet Service
`Provider (ISP) able to support VPNs
`and offer global roaming (ie, with local
`access numbers in the same parts of the
`world as your callers).
`Cost is not the only argument - pro-
`ductivity is another. It is generally con-
`sidered that users are more productive
`when working from home, or at least
`away from the main office. There are
`fewer social interruptions from work-
`mates, and no loss of time spent com-
`muting. But this requires turning the
`user’s local environment, whether it be
`the home, a customer site, a hotel room
`or all three, into a virtual office. And
`this can only realistically be done by
`connecting the PC to the corporate net-
`work in as transparent a way as possi-
`ble. That is, with a VPN. Without
`access to the central data, the type of
`work that the remote user can perform
`is limited.
`There are other potential benefits
`
`Issue 97 (July 1998) Page 9
`
`PC Network Advisor
`
`File: T1807.1
`
`Ex. 1016
`Apple v. MPH Techs. Oy
`IPR2019-00821
`
`

`

`Tutorial:Internet
`
`too. E-commerce will drive the world’s
`economy in the next millennium - and
`it is already a force to be reckoned with.
`There seems little point in simply using
`your Web site to advertise your wares
`when it can also be used to actively sell
`them. And if you’re selling goods over
`the Internet, perhaps you should also
`be buying them. And if your company
`is big enough, and your products and
`needs are multifarious and repetitive,
`then perhaps you should be allowing
`both your major customers and suppli-
`ers to order from and supply to your
`stock systems. It makes a lot of sense.
`It would be efficient and excellent for
`good customer relations. This is best
`done via a virtual private network,
`where major suppliers and customers
`(and partners and contractors) can di-
`rectly access their accounts on your
`systems (suitably secured, of course).
`So there is little doubt that the argu-
`ments in favour of implementing a
`VPN are growing. If they are not yet
`overwhelming, they soon will be.
`
`How To Do It
`The Internet is the obvious choice of
`transmission medium because of its
`universal availability. This is where
`global roaming comes in. If your ISP’s
`only access point is in Sydney and
`you’re visiting California, you are still
`faced with long-distance telephone
`
`Figure 1 - The structure
`of the IP datagram.
`
`charges whenever you connect. Unless
`your ISP offers global roaming (or, like
`AOL and CompuServe, has access
`points all over the world).
`Global roaming is a new concept,
`and as such you may have heard of it
`under a different name (some people
`simply call it “roaming service”). The
`two primary providers are iPass
`(http://www.ipass.com) and Aim-
`quest’s Global Reach Internet Connec-
`tion (http://www.aimquest.com). A
`description of the iPass service will
`show how it works and its value to the
`VPN.
`The iPass system is actually a net-
`work of ISPs. Provided that your own
`ISP delivers the iPass service, you can
`access the Internet via the nearest point
`of presence of any other iPass ISP any-
`where in the world. For example, an
`Australian user visiting the UK would
`be able to use a UK ISP offering local
`call dial-up to get on to the Internet and
`thence to his own ISP to collect or send
`any email. The cost would simply be
`the local call charge plus any charge
`levied for the service by his Australian
`ISP. It would undoubtedly be cheaper
`than dialling Australia from the UK.
`The iPass system itself claims to
`have more than 2500 Points Of Pres-
`ence (POPs) in more than 150 different
`countries - and this number is increas-
`ing all the time. The service is transpar-
`ent. You can use any platform, and can
`use the browser and email system of
`your own choice. Your ISP or company
`provides you with the iPass Dial Wiz-
`ard or the Microsoft Connection Man-
`ager to install on your laptop. This is a
`simple client software tool that con-
`tains an international phone book of
`iPass access numbers.
`From anywhere in the world, you
`need just point and click with the iPass
`client software to connect to a local
`Internet access number. You would
`then log in with the same userid and
`password that you usually use, but in-
`cluding your domain name after your
`userid (eg, yourname@yourdomain).
`The local ISP recognises that you are an
`“alien” and forwards your user name
`and password (encrypted)
`to your
`own ISP. Provided that everything is
`correct, you are then logged on to your
`own ISP account.
`It is relatively easy to see that this
`
`process requires very little adaptation
`to provide roaming access to your own
`virtual private network. In principle,
`you simply need to connect your own
`corporate network to the Internet.
`Then, when working from home or
`travelling, you use a local ISP to pro-
`vide access to the Internet and from
`there to your corporate Net. This can
`be done with tunnelling.
`
`Tunnelling
`Tunnelling, also known as encapsu-
`lation, is not a new technology. It is the
`process of encapsulating or enclosing
`one type of data packet (as used by
`your own LANs) inside the packet of
`another protocol, in this case TCP/IP
`as used by the Internet. Once the data
`has been enclosed within TCP/IP, it
`can be transmitted across the Internet.
`But encapsulation is not all that is
`needed for a VPN. You also need user
`authentication to ensure that only au-
`thorised users can log onto your pri-
`vate network, and encryption to
`ensure the privacy of your data across
`the Internet. There are many proprie-
`tary products that can help you
`achieve this. Some use their own tech-
`nologies, but the two standards are Mi-
`crosoft’s PPTP (Point-to-Point Tunne-
`lling Protocol) and Microsoft/Cisco’s
`L2TP (Layer 2 Tunnelling Protocol).
`PPTP is an extension of the remote
`access Point-to-Point Protocol (PPP -
`which is defined and documented by
`the Internet Engineering Task Force in
`RFC 1171). PPTP technology encapsu-
`lates PPP packets into IP datagrams for
`transmission over TCP/IP-based net-
`works. It is packaged with NT 4 server
`and workstation, and also within
`Win95’s Dial Up Networking - so it has
`the advantage of being widely avail-
`able.
`Data is transmitted in IP datagrams
`containing PPP packets. The IP data-
`gram is created using a modified ver-
`sion
`of
`the Generic
`Routing
`Encapsulation (GRE) protocol (GRE is
`defined in RFC 1701 and 1702). The
`structure of the IP datagram is shown
`in Figure 1.
`Three systems would be involved in
`such a point-to-point VPN: the client,
`an ISP (for the Internet), and an In-
`ternet server on your private network.
`
`File: T1807.2
`
`PC Network Advisor
`
`Issue 97 (July 1998) Page 10
`
`

`

`Tutorial:Internet
`
`VPNs And PPTP
`
`For the sake of this example, the client
`could be a remote NT or Win95 work-
`station, while the ISP would be your
`chosen ISP (or indeed any local iPass
`ISP if you have implemented global
`roaming and your local ISP doesn’t
`have international numbers).
`Needless to say, the client must
`have PPTP installed, a modem, and the
`ISP connection. The first stage in con-
`necting the client to your server is mo-
`dem dial-up to the ISP using the PPP
`protocol. The second stage is a VPN
`connection using PPTP, over the mo-
`dem and through the ISP. The second
`connection requires the first connec-
`tion because the tunnel between the
`VPN devices is established using the
`modem and PPP connections to the
`Internet.
`The exception to this two-step proc-
`ess is using PPTP to create a VPN be-
`tween
`computers
`physically
`connected to a LAN. In this scenario
`the client is already connected to a net-
`work and only uses Dial-Up Network-
`ing with a VPN device to create the
`connection to a PPTP server on the
`LAN. You would use this approach if
`you were providing direct access for a
`remote but static user to your private
`intranet.
`The overall process is thus three-
`fold. The PPTP client uses PPP to con-
`nect to an ISP on the Internet and
`encrypt the data packets (we’ll come
`back to the encryption later). Using this
`connection, the PPTP protocol then es-
`tablishes a control connection to a
`PPTP server on the Internet (that is,
`your private network’s Internet serv-
`er). This is the PPTP Tunnel. The client
`then creates IP datagrams containing
`encrypted PPP packets and sends
`them through the PPTP Tunnel to the
`PPTP server. This server disassembles
`the IP datagrams and decrypts the PPP
`packets, and then routes the decrypted
`packet to its destination.
`
`PPTP Security
`A PPTP VPN is generally from
`Win95 or NT Workstation to NT Serv-
`er. Consequently, it can and does use
`the authentication and encryption se-
`curity available to computers running
`RAS under NT Server 4. PPTP can also
`protect the PPTP server and private
`network by ignoring all but PPTP traf-
`fic.
`An initial dial-in authentication will
`probably be required by the ISP net-
`work access server. This is an addi-
`tional
`level
`of
`security
`(often
`RADIUS-based, and probably a user-
`name and password) that is not part of
`PPTP. It will not be required if you are
`directly accessing a private intranet.
`Your PPTP server is a gateway to
`your network. It will consequently re-
`quire the standard NT-based logon
`procedures. The client must therefore
`provide a correct username and pass-
`word. In theory, then, a remote access
`logon using a client running under NT
`or Win95 is as secure as logging on
`from a PC directly connected to your
`LAN. Authentication of remote PPTP
`clients is done by using the same PPP
`authentication methods used for any
`RAS client dialling directly into an NT
`server: it fully supports CHAP (Chal-
`lenge Handshake Authentication Pro-
`tocol), which uses the MD4 hash as
`well as earlier LAN Manager methods.
`Following successful authentica-
`tion, all access to the private LAN con-
`tinues
`to use
`existing NT-based
`security structures. Access to resources
`on drives or to other network resources
`requires the proper permissions, just
`as if you were connected directly to the
`LAN.
`For data encryption, PPTP uses the
`RAS “shared-secret” encryption proc-
`ess. It is referred to as shared-secret
`because both ends of the connection
`share the encryption key. Under Mi-
`
`“If you send a PPTP start session request
`with an invalid packet length in the PPTP
`packet header, it will crash an NT box.”
`
`crosoft’s implementation of RAS, the
`shared secret is the user password.
`PPTP uses the PPP encryption and
`PPP compression schemes. The CCP
`(Compression Control Protocol)
`is
`used to negotiate the encryption used.
`The username and password is known
`to the server and supplied by the client.
`An encryption key is generated using
`a hash of the password stored on both
`the client and server. The RSA RC4
`standard is used to create this 40-bit
`(128-bit inside the US and Canada is
`available) session key based on the cli-
`ent password. This key is then used to
`encrypt and decrypt all data ex-
`changed between the PPTP client and
`server.
`Network security against intruders
`can be enhanced by enabling PPTP fil-
`tering on the PPTP server. When PPTP
`filtering is enabled, the PPTP server on
`the private network accepts and routes
`only PPTP packets. This prevents all
`other packet types from entering the
`network.
`
`Weaknesses Of PPTP
`We can thus see that a PPTP-based
`VPN provides the three necessary ba-
`sics: the tunnel, user authentication
`and data encryption. It is not, however,
`without its own problems. The first
`and most obvious is that encryption is
`limited to 40 bits outside the USA - and
`this is known to be insecure. Secondly,
`all Microsoft software is coming under
`intensive scrutiny for
`flaws and
`“hacker” exploits. One has already
`been found and published on the In-
`ternet.
`NT 4.0 with SP3 and RAS PPTP is
`vulnerable to a denial of service attack.
`If you send a PPTP start session request
`with an invalid packet length in the
`PPTP packet header, it will crash an
`NT box and cause the NT server to do
`a core dump. [You’ll find the patch for
`this on your CD - Ed.]It is generally
`expected that more flaws will be
`found.
`A third problem can be found in the
`lack of any inherent key management
`within PPTP itself. The encryption is
`based on a “shared secret”; that is, both
`ends of the tunnel must know the en-
`cryption key (username and pass-
`word). Since this is used for every
`
`Issue 97 (July 1998) Page 11
`
`PC Network Advisor
`
`File: T1807.3
`
`

`

`Tutorial:Internet
`
`“Good password management demands
`that users’ passwords are regularly
`changed. This in itself can cause
`administrative problems.”
`
`connection, if the key is stolen or bro-
`ken it is compromised for all future
`transmissions.
`Good password management de-
`mands that users’ passwords are regu-
`larly changed. This in itself can cause
`administrative problems. However, if
`the VPN includes hundreds of differ-
`ent users, you will not only need to
`manage regular password changes,
`but will need to find some way of se-
`curely ensuring that both ends of the
`tunnel are aware of changes to the
`shared secret.
`Finally, of course, PPTP will lock
`you into Microsoft Windows until a
`Unix implementation of PPTP is made
`available.
`
`Alternatives
`If the above warnings turn you off
`the idea, the primary alternative is
`L2TP (others include Mobile IP and
`SOCKS). L2TP is actually a conver-
`gence or combination of elements of
`Cisco’s earlier L2F protocol with PPTP.
`In this sense, L2TP can be viewed as the
`successor to PPTP.
`While PPTP is also an extension to
`PPP, L2TP is designed to tunnel the
`link level of higher level protocols over
`the Internet. Specifically, it is designed
`to tunnel PPP and SLIP sessions. One
`problem, however, is that an ISP must
`have L2TP-enabled hardware at each
`of its POPs in order for customers to
`take advantage of it, a problem for ISPs
`that is similar in nature and scale to
`deploying new 56 Kbits/sec modem
`support.
`Another alternative would clearly
`be to implement a proprietary VPN
`from one of the leading VPN suppliers.
`This would have at least three strong
`advantages: it would reduce your de-
`velopment workload; it could provide
`
`stronger encryption than you would
`get using, say, PPTP outside of the
`USA; and it could include its own key
`management facilities. There are, how-
`ever, dangers to this approach. You
`should, as always, avoid any supplier
`that supports only its own proprietary
`technologies. This is particularly rele-
`vant given that there are three primary
`protocols (PPTP/L2TP and IPsec) that
`are supported by Microsoft and the
`Internet Engineering Task Force re-
`spectively.
`The universality of Microsoft and
`the importance of the IETF effectively
`guarantee that these protocols will
`dominate. And as support for the pro-
`tocols is increasingly built into operat-
`ing systems, it is likely that users will
`more and more develop their own
`VPN implementations. There must,
`therefore, be a question mark over the
`future of the market for VPN manufac-
`turers - and you must be sure that you
`do not lock yourself into a costly mis-
`take.
`Having just mentioned IPsec for the
`first time, a brief explanation is called
`for. IP Security (IPsec) is the proposed
`IETF standard for IP security. It defines
`a set of standard security protocols that
`authenticate TCP/IP connections. It
`specifies encryption and authentica-
`tion, but
`it does not
`include any
`method of access control other than
`packet filtering.
`The goal of the IPsec protocol suite
`is to provide Layer 3 secure tunnelled
`transport of IP packets. Essentially, it
`takes private IP packets, performs data
`security functions such as encryption,
`authentication and integrity,
`then
`wraps these secured packets in other
`IP packets for transport across the Net.
`Key management
`functions will
`also be a part of the IPsec protocol
`suite: Simple Key Management for In-
`
`ternet Protocol (SKIP) and Internet Se-
`curity Association Key Management
`Protocol (ISAKMP).
`The IETF has already issued five
`foundational requests for comments
`on the IPsec protocols - RFCs 1825 to
`1829. An interesting note is that if IPv6
`succeeds in replacing IPv4, IPsec will
`be the automatic Internet VPN stand-
`ard since it is integrated into the IPv6
`specifications.
`
`Conclusion
`So, to go back to the initial question:
`how soon should I implement a VPN?
`The answer is probably “As soon as I
`can develop one that is compatible
`with, and can evolve into, an IPv6 IPsec
`virtual private network”.
`If all this sounds appealing, the next
`step is to talk to your ISP (and a selec-
`tion of other local ones) and find out
`about the VPN services on offer.
`
`Note: You will find some additional
`relevant documents on this month’s
`CD, including a paper from a pair of
`researchers who claim to have found
`some security weaknesses in Mi-
`crosoft’s implementation of PPTP.
`
`PCNA
`
`The Author
`Kevin Townsend is a freelance
`writer, and editor of Information
`Security Bulletin. Educated at Ox-
`ford University, and a member of
`the
`ITSEC Industry Working
`Group, he specialises in informa-
`tion security matters. You can
`email him as kevin@oakworth.de-
`mon.co.uk.
`
`File: T1807.4
`
`PC Network Advisor
`
`Issue 97 (July 1998) Page 12
`
`

`

`New Reviews from Tech Support Alert
`
`
`
`Anti-Trojan Software Reviews
`A detailed review of six of the best anti trojan software programs. Two products
`were impressive with a clear gap between these and other contenders in their
`ability to detect and remove dangerous modern trojans.
`
`Inkjet Printer Cartridge Suppliers
`Everyone gets inundated by hundreds of ads for inkjet printer cartridges, all
`claiming to be the cheapest or best. But which vendor do you believe? Our
`editors decided to put them to the test by anonymously buying printer cartridges
`and testing them in our office inkjet printers. Many suppliers disappointed but we
`came up with several web sites that offer good quality cheap inkjet cartridges
`with impressive customer service.
`
`Windows Backup Software
`In this review we looked at 18 different backup software products for home or
`SOHO use. In the end we could only recommend six though only two were good
`enough to get our “Editor’s Choice” award
`
`The 46 Best Freeware Programs
`There are many free utilities that perform as well or better than expensive
`commercial products. Our Editor Ian Richards picks out his selection of the very
`best freeware programs and he comes up with some real gems.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Tech Support Alert
`http://www.techsupportalert.com
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket