Skip to main content

Design of a VPN Software Solution Integrating TCP and UDP Services

  • Conference paper
  • First Online:
Infrastructure Security (InfraSec 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2437))

Included in the following conference series:

  • 781 Accesses

Abstract

The main aims of Virtual Private Network (VPN) are to isolate a distributed network from outsiders, as well as to protect the confidentiality and integrity of sensitive information traversing a non-trusted network such as the Internet. However, some problems arise when security is considered as the unique problem because VPN users suffer from restrictions in their access to the network. They are not free to use traditional Internet services such as electronic mail exchange with non-VPN users, and to access Web and FTP servers external to the organization. This paper presents a new solution that allows the open use of traditional network services running over TCP and UDP layers, while maintaining strong security features. The new scheme works at the TCP/IP transport layer and does not require the addition of new hardware because it is a totally software solution. As a consequence, the application is totally portable. Moreover, and because of its implementation at the transport layer, there is no need to modify any traditional communication applications previously installed in the network system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atkinson, R. Security Architecture for the Internet Protocol. RFC 1825, August 1995.

    Google Scholar 

  2. Black, U. Frame-Relay: Specifications and Implementations, McGraw-Hill, 1994.

    Google Scholar 

  3. Davila, J., Lopez, J., Peralta, R. Implementation of Virtual Private Networks at the Transport Layer, Second International Information Security Workshop (ISW’99), LNCS 1729, November 1999, pp. 85–102

    Google Scholar 

  4. Dierks, T., Allern, C. The TLS Protocol Version 1.0. RFC2246, January 1999.

    Google Scholar 

  5. Harbison, R. Frame-Relay: Technology for our Time, LAN Technology, December 1992.

    Google Scholar 

  6. Horowitz, M., Lunt, S. FTP Security Extensions. RFC 2228, October 1997.

    Google Scholar 

  7. Lai, X.; Massey, J. Hash Functions Based on Block Ciphers. Advances in Cryptology. EUROCRYPT’ 92, Springer-Verlag, 1992, pp. 55–70.

    Google Scholar 

  8. Linn, J. Privacy Enhancement for Internet Electronic Mail: Part I-Message Encipherment and Authentication Procedures. RFC 989, February 1987.

    Google Scholar 

  9. Microsoft Corporation. The Private Communication Technology, 1997.

    Google Scholar 

  10. National Bureau of Standards. Data Encryption Standard. U.S. Department of Commerce, FIPS pub. 46, January 1977.

    Google Scholar 

  11. National Institute of Standards and Technology, NIST FIPS PUB 180. Secure Hash Standard. U.S. Department of Commerce, May 1993.

    Google Scholar 

  12. Netscape Communications. SSL 3.0 Specification.

    Google Scholar 

  13. Ramsdell, B. “S/MIME Version 3.1 Message Specification”, Internet Draft, February 2002.

    Google Scholar 

  14. Rivest, R. The MD5 Message Digest Algorithm. RFC 1321, April 1992.

    Google Scholar 

  15. Rivest, R. “The RC4 Encryption Algorithm”, RSA Data Security, Mar 1992.

    Google Scholar 

  16. Schiffman, A., Rescorla, E. The Secure Hypertext Transfer Protocol. Internet Draft, June 1998.

    Google Scholar 

  17. Schneier, B. Description of a NewVariable-Lenght Key, 64-Bit Block Cipher (Blow-fish). Fast Security Workshop Proceedings, Springer-Verlag, 1994, pp. 191–204.

    Google Scholar 

  18. Zimmermann, P.R. The Official PGP User’s Guide. MIT Press, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lopez, J., Montenegro, J.A., Roman, R., Davila, J. (2002). Design of a VPN Software Solution Integrating TCP and UDP Services. In: Davida, G., Frankel, Y., Rees, O. (eds) Infrastructure Security. InfraSec 2002. Lecture Notes in Computer Science, vol 2437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45831-X_23

Download citation

  • DOI: https://doi.org/10.1007/3-540-45831-X_23

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44309-4

  • Online ISBN: 978-3-540-45831-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics