Implementing an SSL-Based Network? 31
A Nominal Coward asks: "I've been doing some research into making my communications more secure, everything from email to news, from IRC to www. Most of the information I've found repeats one suggestion, 'tunnel your connections over SSL.' Yet while everyone claims this is the best thing to do, no one seems to explain how. I haven't been able to find a faq, howto, or demonstration of how to set this up properly; just lots of people saying 'SSL is good.' What am I missing? I've downloaded and installed stunnel, a free (speech & beer) SSL tunneling proxy, but - don't laugh - now what? All I've managed to do is make an SSL connection to an IRC server a friend set up specifically for that purpose. Where do I go from here in order to secure my other connections, like mail, news, and web? Do I have to subscribe with providers who explicitly provide SSL access, if so, which are recommended? I would appreciate advice from others who have managed to get this working."
Why SSL? (Score:1, Informative)
Yes, you need something at both ends (Score:5, Insightful)
For mail, some providers offer pops (that is, secure POP3), but you'll have to ask around to know which ones do. Another way to go is Web mail: those packages usually allow https connections. But don't forget that with both these tools, your mail is only secure between you and your ISP: the SMTP protocol your provider's server use to deliver it to other servers is not encrypted. If you really want one end to the other secure mail (as in: nobody will be able to read it unless they are the intended receiver or they're the NSA or CIA), then use PGP, GPG or any other good mail encryption package. Then it'll reach your recipient in a unreadable format. But all your recipients must have a public key, else you won't be able to encrypt it in the first place (so for helpdesks, mailing-lists, etc. it won't work).
For news, www, etc., do you intend to encrypt what you receive (content)? What you receive (URL)? What you send (even if it ends up on a public nntp server)? For some of those, it won't work because you'd want every connection to be encrypted, period. Normal web servers essentially serving "free" info don't need that, and there's some overhead if you encrypt everything. So it won't be put in practice.
Usually people use stunnel for, eg, remote X sessions, where you don't want other people to spy what you're doing. A couple apps also use ssh to do the same (cvs). But in each case, both ends of the communication must be properly set up to communicate through an encrypted layer.
IPsec (as mentionned in another post) is also good, but as soon as your packets leave the other IPsec end (as in, leave the corporate firewall), your communication will again be very plain to read.
It's tricky, and time consuming (Score:2)
confusing your apples and oranges (Score:4, Insightful)
Specifically, you could use a tunnel (stunnel, ssh), or you can use applications that directly support SSL. Setting up the applications takes a bit of research since it hasn't been standardized yet, but it's not too hard once you figure out where the documentation has been hidden. (Sometimes in the source code. *grrr*.) Setting up a tunnel is probably a bit easier, but it requires that the server explicitly provide a tunnel.
The benefits of a tunnel is that it provides a "one size fits all" solution - if you can do it for one application, you can do it for others. More importantly, you can use it with applications that don't yet support SSL directly.
The benefits of direct SSL support is that the clients can almost always verify the identity of the server (it is possible to set up a server so it doesn't require an X.509 certificate, but it's much more common for the server to require one). Optionally, the server can require that clients provide a certificate to identify themselves.
If you control the server, the choice may come down to authentication and identity. If you don't care who connects, or who they connect to, e.g., because you'll be using (username,password) to log in, you should probably go with a tunnel. If you need to establish identity, or want to use a "login-less" mechanism, you should probably go with direct SSL and possibly require client certs.
Re:confusing your apples and oranges (Score:1)
Visit here [openssl.org] or man openssl for more information on creating and managing certificates.
Sorry, no cigar, Ballmer (Score:1)
Yeah, here's an idea. (Score:3, Interesting)
Re:Yeah, here's an idea. (Score:3, Insightful)
Re:Yeah, here's an idea. (Score:2)
I agree that a VPN is the right answer for site-to-site links, but I think that for small-time folks, tunnelling could be a useful tool, provided the implementation correctly re-assembles the packets on the other end. Wide scale usage? Hell no.
Thanks for the clarification (and to the person below your post who replied as well...)
Re:Yeah, here's an idea. (Score:2)
Re:Yeah, here's an idea. (Score:3, Insightful)
A talk was given at the USENIX conference last week in California in which the throughput performance of SSL/TLS was compared to that of IPsec. IPsec won easily in all cases.
Personally, I prefer IPsec since it can be used to encrypt and authenticate all IP layer traffic. If you're tunneling services over SSL, you're still leaking information to an eavesdropper (i.e. "I know you transferred 200 kB of mail via your tunneled pop3 connection"). With IPsec, it becomes difficult to differentiate between higher level protocols. UDP over IPsec doesn't look any different than TCP.
IPsec is also nice because it's starting to gain widespread industry acceptance. Setting it up on the free Unixes is very easy. Windows 2000 and XP come with it as a standard feature. I don't know if MacOS X 10.1 comes with it, but the forthcoming 10.2 release (Jaguar) includes it.
noah
Depending on your requirements... (Score:2)
I certainly don't have the option of using IPsec in this case, but downloading an sftp-capable client to connect to ftp via stunnel is possible.
As always, ymmv, depends on what you want to do.
Not the whole story... (Score:1)
Thats when you need a tunnel. And yes, you can use IPSEC for this too (smoothwall linux does not come with local IPSEC out of the box, but creating an IPSEC tunnel using FreeSWAN in smoothie is like falling off a log)
Re:Not the whole story... (Score:2)
Re:Yeah, here's an idea. (Score:2)
Most networks which use IPSec as a VPN solution use dedicated IPSec/LLTP tunnels, and this technique is actually recommended by the National Security Agency (see their guide to implimenting a secure Windows 2000 network architecture).
IPSec is implimented (as its name implies) at the IP level, so the machines on both sides of the tunnel need to support it. But beyond, that, it is transparent to the ends of the connection, so the applications need not be configured specially to support it. Again, usually, the way that this works is that a computer sends encrypted information to an IPSec gateway which then unencrypts it and sends it its destination. However, it should be noted that when IP v6 becomes more common, the strategy will probably shift away from tunnelling.
Re:Yeah, here's an idea. (Score:2)
Small doc on using stunnel to proxy your own http (Score:3, Interesting)
This might help a bit if you're already looking toward stunnel but are unsure of how everything links together.
http://www.ptudor.net/~ptudor/stun-proxy.html [ptudor.net]
Building Linux VPNs book may help (Score:3, Informative)
They include SSH, SSL, IPSec, and other approaches, and don't waste time explaining TCP/IP.
Helevius
If you have shell access to the host, use ssh (Score:1)
ssh -X will forward X11 connections. You can also forward ports over the ssh connection:
ssh -L 143:server:143 -L 25:server:25 user@server
Then you can set your mail client to use localhost as the server and everything goes through the tunnel (143 is IMAP, 25 is SMTP). Note you have to run the above example as root, since it forwards remote ports to local privleged ports (<1024). If you don't want to do it as root, forward to local ports > 1024. This isn't the perfect solution in most cases, but it offers one option.
Re: (Score:2, Interesting)
PPP over SSL (Score:3, Interesting)
The popular opinion would be that you might be better off using IPSEC.
However to my unenlightened eyes IPSEC seems more complicated than SSL and so more likely to have security problems. E.g. like SSH- complex, and thus many security problems.
That said, if you want encryption from every point to every point then go for IPSEC.
IPSEC performance should be better than PPP over SSL.
Unfortunately, whilst SSL just requires a TCP connection, IPSEC needs UDP.
Cheerio,
Link.
Yes, use a VPN. Maybe not IPSEC (Score:3, Funny)
Also, I hear OpenVPN [sourceforge.net] is good.
Stunnel, SSH, etc... (Score:2, Insightful)
IPSec is usually used for connect LAN's across the internet because it can encrypt all traffic. The one puzzling thing I've found about IPSec is that once its run, it takes over the the IP, that is you can't run regular IP and IPSec at the same time. This part confused me, as it seemed to indicate that I can't run an open HTTP server on port 80 with accessability to the outside world. Now, I'm sure there's a way around this, I just wasn't able to find it before I realized that stunnel would fit my needs.
Stunnel (found here) [stunnel.org] is able to encrypt (using SSL) and network connection, so lets say you want to use it to secure POP email, you can use the POPS port(which escapes me now) and have STUNNEL sit there and redirect connections to the POP port, then you can turn off outside access to POP through your firewall, and low and behold you have POPS accessable to major e-mail clients without needing the functionality built into the e-mail server. You can do this with anything, and yes the same thing can be accomplished with SSH, but the one thing is that you need to log into SSH first, because it tunnels all traffic through port 22. Now this can be a good thing too, you can close all the ports except for port 22, and require everyone who wants access to your system to log in using a private key. The configuration is a pain because you'll have to configure each users Putty or other client to forward the connections. Its best use, I think is for tunneling windows clients like PCAnywhere throughout your enterprise and passed the firewall. As for News? I've never heard of NNTPS, but I wouldn't be surprised if its the the same. For web, that's simple, just go get yourself a certificate and follow the openssl instructions. You can even sign your own if you don't want to spend on a Verisign one.
Re:Stunnel, SSH, etc... (Score:1)
When using IPSec you route target networks, which can be class As all the way down to a single host (x.x.x.x/32).
All traffic between me and certain other LANs are encrypted via IPSec, but yet I still run a web, mail and imap server that are accessible to the general Internet population.