slides31 Flashcards
opportunistic encryption
IPSec can be used to set up secure point-to-point links (see VPNs, later), but can also be used to secure and authenticate individual connections when the other end supports it
how key agreed
This key can be
• pre-agreed (manual keying)
• negotiated by IKE
IKE can itself use a pre-agreed key to deliver the ESP/AH key, or use a public-key certificate mechanism
wat layer does ipsec b long 2
is directly inside the IP layer (optional headers), so UDP and TCP are easily layered transparently on top, boi
WireGuard
WireGuard is an open-source software application and protocol that implements virtual private network (VPN) techniques to create secure point-to-point connections in routed or bridged configurations. It is run as a module inside the Linux kernel and aims for better performance than the IPsec and OpenVPN tunneling protocols.[2]
Point-to-Point Tunneling Protocol capabilities
• tunnels IP over PPP over the Generic Routing Encapsulation protocol (GRE) over IP and sends connection control messages over a separate TCP connection
• layers only over IP
• can encapsulate other protocols such as IPX (Internetwork Packet Exchange, Novell) and NetBIOS/NetBEUI (Network BIOS, NetBIOS Extended User Interface, Microsoft)
• uses PPP for authentication
• can use Microsoft Point-to-Point Encryption (MPPE) for
privacy when combined with MS-CHAP authentication
• is simple to set up
Generic problems of VPNs
Generic problems of VPNs include
• there is encryption and authentication header overhead in every packet: this may cause extra packets or extra fragmentation
• there is overhead in the the time taken to encrypt or authenticate the packets
• some routers or ISPs make decisions based on the type of traffic (e.g., video or HTTP): encryption hides this and makes efficient routing harder
• some ISPs like to charge more for, or manage certain kinds of traffic (e.g., bittorrent and video) and this hides the kind of traffic. So some ISPs have blanket bans on VPNs
• in VPNs speed is secondary to security, but people will not use them if they are too slow
who read ur history
To access what’s stored on your phone, police use mobile forensics software called Cellebrite, which can pull all types of data that you may not even know is lingering in the dark corners of your device’s memory. And similar tools exist for PCs as well, giving law enforcement some CSI: Cyber-level capabilities.