Secure VPNs for Trusted Computing Environments

نویسندگان

  • Steffen Schulz
  • Ahmad-Reza Sadeghi
چکیده

Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restrictions on all VPN endpoints to protect the perimeter of the VPN. However, enforcement of such restrictions becomes difficult if these endpoints are personal computers used for remote VPN access. Commonly employed measures like anti-virus or software agents fail to defend against unanticipated attacks. The Trusted Computing Group invested significant work into platforms that are capable of secure integrity reporting. However, trusted boot and remote attestation also require a redesign of critical software components to achieve their full potential. In this work, we design and implement a VPN architecture for trusted platforms. We solve the conflict between security and flexibility by implementing a selfcontained VPN service that resides in an isolated area, outside the operating system environment visible to the user. We develop a hardened version of the IPsec architecture and protocols by addressing known security issues and reducing the overall complexity of IPsec and IKEv2. The resulting prototype provides access control and secure channels for arbitrary local compartments and is also compatible with typical IPsec configurations. We expect our focus on security and reduced complexity to result in much more stable and thus also more trustworthy software.

منابع مشابه

On the Design and Implementation of Structured P2P VPNs

Centralized Virtual Private Networks (VPNs) when used in distributed systems have performance constraints as all traffic must traverse through a central server. In recent years, there has been a paradigm shift towards the use of P2P in VPNs to alleviate pressure placed upon the central server by allowing participants to communicate directly with each other, relegating the server to handling ses...

متن کامل

Secure Hypervisors

Nowadays, more and more companies tend to use virtual machines instead of physically separated machines as platform for their IT services. This reduces the hardware costs and also simplifies the management of the IT infrastructure. However, virtualized environments do, in contrast to popular belief, not necessarily increase the security of a system. Actually, virtualized environments face the s...

متن کامل

Trends and Directions in Trusted Computing: Models, Architectures and Technologies

Until recently, all the security measures have addressed servers or networks while clients or network endpoints have missed the required security concerns relatively. Most of the mechanisms safeguarding endpoints (clients) are software based. Making endpoints survive in open and reasonably exposed environments-like internet-demand that client security should stand by a tried and true dependence...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Modeling TCG-Based Secure Systems with Colored Petri Nets

With the rapid progresses in trusted computing related research and application, many trusted computing based security mechanisms have been proposed to defend against threats in open, dynamic and distributed environments. These mechanisms are supposed to serve as the security foundations in the underlying systems. However, the correctness of these security mechanisms still require further exami...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

متن کامل
عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009