Attacks Against VPNs


VPNs are remarkable tools for enhancing security, but they are not a panacea. Like all technology, VPNs are vulnerable to exploits by hackers. Here we divide the attacks into client-side (for example, the remote user ), and server-side (for example, the enterprise network). However, this distinction is merely a simplification for the purpose of this chapter. In reality, the same exploits also apply to other VPN configurations, such as server-to-server.

Client Attacks

Remote clients are the Achilles heel of VPN security. Imagine spending millions of dollars to purchase the finest firewalls and IDS systems for your enterprise network. Next, you painstakingly set up VPN access for employees to obtain wireless access. However, suppose a hacker targets and then backdoors an employee's PDA. The hacker has now easily bypassed your fortifications.

Worse, he now has a fully encrypted tunnel into the heart of your corporate network. Because VPNs tunnel, they automatically bypass most of your perimeter defenses. In addition, because VPNs encrypt their tunnels, you might have foiled your own signature-based IDS systems. The hacker has turned your own weapons against you, and now has the keys to the kingdom. Suddenly, all the IT department's effort and money is flushed down the toilet . For this reason, user education is key in maintaining the integrity of your VPN.

Server Attacks

VPN servers are vulnerable to the same attacks from which all networked machines suffer. This includes attacks ranging from denial-of-service, session hijacking, and even buffer overflows.

In addition, because of ludicrous export restrictions on cryptography, VPNs might also be vulnerable to cryptographic attacks. For example, if your VPN is deployed worldwide, U.S. law might prohibit you from exporting the strong version of cryptography to your foreign subsidiaries. Theoretically, when you interface VPNs of varying cryptographic strength, you introduce weaknesses. A chain is only as strong as the weakest link. For example, it might not help to use 128-bit encryption if your enterprise allows full access from remote machines that are limited to 40-bit encryption.



Maximum Wireless Security
Maximum Wireless Security
ISBN: 0672324881
EAN: 2147483647
Year: 2002
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net