Does anybody have any thoughts on this, am I blissfully unaware, is
there some truth behind this?
Thanks
Steven
1. Using pre-shared secrets -- these are often not strong enough or changed
often enough. It's all good and well to enforce a password policy for users
detailing complexity, history, length and expiry, but very often VPN tunnels
use the same weak pre-shared secret for years and years on end.
2. Pre-shared secrets are often exchanged via email between firewall techies
of different organisations. In addition to disclosing weak pre-shared keys
via an insecure medium, often email is archived insecurely (.pst files on
desktops) or during numerous emails that travel up and down between firewall
techies who troubleshoot the tunnels. I have lost track of the numerous
occasions that I have seen inadvertently disclosed "secrets" by just
scrolling through the email history of an escalated problem.
Not all organisations have proper PKI infrastructures, so Shared "Secrets"
are most often used. In addition, not all firewall techies understand or
know how to use PGP or even GNUPG and those that do, can't be bothered
because they sometimes have to coach the person on the other side of the
tunnel, who speaks a foreign language and is in a different timezone.
So I wouldn't say that VPN tunnels are insecure, but that the key management
surrounding them is an issue.
Thanks
Steven
No virus found in this incoming message.
Checked by AVG Free Edition.
Version: 7.5.472 / Virus Database: 269.8.9/834 - Release Date: 2007/06/05
14:38
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.5.472 / Virus Database: 269.8.9/834 - Release Date: 2007/06/05
14:38
As far as the cliam goes that somebody like IS, SAIX or UUnet have
weak VPN's.... that is a very bold claim to make. The big backbones
segregate networks via switching mechanisms such as Frame Relay or
ATM, and on top of that they do IPSec or related VPN end-to-end..
Would be interesting to see why he makes that statement though, since
he may know things we don't...
Thanks
Steven
It depends on how secure the system is that you have set up.
> Now I understand that the
> level of security will differ depending on your particular setup.
You've just made a very good discovery about life the universe and Security ;^)
> However I guy I know who runs a rather large ISP claims that under the
> current SA infrastructure VPN's are simply not secure at all.
Again, it depends on what your definition and their definitions of
security entails.
> Does anybody have any thoughts on this, am I blissfully unaware, is
> there some truth behind this?
Yes.
All the MPLS based networks place the onus squarely on the provider to
ensure the security. Decide yourself about that risk and trust w.r.t.
their personel etc.
Something else, MPLS doesn't encrypt at all, and only segregates, so
it can very easily be capturer by govermetn agencies once the provider
have been informed about the need to capture the data.
In short:
(1) make sure you know the needs and security requirements of your clients
(2) make sure you know and understand the security (or lack there of)
provided by the provider
(3) Only then can you design a proper/secure network ;)
--
Hendrik Visage