HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 5.76 Use of suitable tunnel protocols for RAS communication

S 5.76 Use of suitable tunnel protocols for RAS communication

Initiation responsibility: Head of IT Section, IT Security Management Team

Implementation responsibility: Administrator

Remote access to a LAN is effected through a data link which is generally shared with external third parties. Thus, for example, direct dial-in entails use of the network of the telecommunications provider. If the connection is established over the Internet, then the data is forwarded over the networks of the Internet service providers involved (and possibly their partners). Since logging on of the RAS client to a LAN is effected over a RAS connection, the network path used for data transmission must be protected so that the security of the data (confidentiality, integrity, authenticity) is safeguarded. This protection is achieved through encryption and digital signing of the data packets exchanged after the communications partners have been authenticated (see also S 4.34 Using encryption, checksums or digital signatures). In the RAS environment, various procedures and mechanisms for protecting the communications link (e.g. tunnelling, see below) have been developed.

The choice of which procedure to use to protect a RAS connection depends on various factors such as:

In general, the following applies:

The security mechanisms are based on different cryptographic procedures. Safeguard S 3.23 contains a brief introduction to basic cryptographic concepts.

Encryption of protocol connections: tunnelling

If an encrypted data connection is established between two communications partners, then this connection constitutes a "secure channel". Any data can be securely transmitted over this channel with the underlying communications protocol (e.g. IP). If the data transmitted is in the form of data packets of a communications protocol, then the term "tunnel" is used also. The protocol which is used to encrypt the data, transmit it through the tunnel and manage the connection is also referred to as tunnel protocol. With tunnel protocols distinctions can be made as to

The tunnel protocol is essentially responsible for

In the RAS environment, the following tunnel protocols have been established:

The protocols possess the characteristics summarised in the following table.

Tunnel protocol Layer Transported protocols Required underlying protocol Number of tunnels supported Tunnel authentication
PPTP 2 IP, IPX, NetBEUI IP 1 No
L2TP 2 IP, IPX, NetBEUI IP, X.25, Frame Relay, ATM Several Yes
IPsec 3 IP IP 1 Yes

All the protocols can establish secure connections to a LAN over an insecure switched network through the use of cryptographic procedures, thus protecting the confidentiality and integrity of the data. Depending on the particular protocol, it is possible to establish one or more tunnel connections.

Tunnelling at Layer 2: PPTP and L2TP

The Layer 2 tunnel protocols can tunnel both the most commonly used protocols, but differ as to over which underlying protocols tunnelling is possible: PPTP can only be transmitted over an IP-based network, whereas L2TP can also be transmitted over various WAN protocols and hence offers greater flexibility. The chart below shows how packets in an application are assembled by PPTP over a PPP connection. As can be seen from the table above, several independent tunnels (e.g. with different levels of quality assurance) can be generated with the more recent L2TP protocol. During user identification and encryption the security mechanisms of the underlining PPP connection make themselves felt under both protocols.


Figure: Assembly of packets of application data with the PPTP protocol

Security mechanisms of the PPP protocol

  1. User authentication
  1. Data encryption and key management

Tunnelling at Layer 3: IPsec

Whereas the Layer 2 protocols make use of the security mechanisms of the underlying PPP protocol, with the IPsec Layer 3 specification separate security procedures and mechanisms are specified. One limitation of IPsec is the fact that only IP-based communication is supported. However, in most cases this is not a serious disadvantage as today most operating systems and applications are able to utilise IP-based communication.

As regards security requirements, the situation regarding IPsec is as follows:

When choosing the RAS hardware and software to be used, care should be taken to ensure that as many different, established encryption procedures are supported as possible. This will increase the probability that a suitable procedure can be negotiated between client and server.

Examples

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
October 2000
home