Network Tunneling – The Concept, the Applications Atishay Jain, 10783017 BE 3rd Year, Thapar University.
Atishay Jain,Network Tunneling
1
Contents 1
Introduction – The What?
2
A little basics – The How?
3
Applications – The Positives !
4
Misuse – The Negatives !
5
Conclusion – That Does it ! Atishay Jain,Network Tunneling
2
Introduction – What it is? v Some terms, you might be interested in – Proxy(URL Translation), Tunnel(Ultrasurf), Work at Home, Virtual Private Networks, etc…
“A tunnel provides a route for moving from one of its ends to another, hiding details of the route in between”
Atishay Jain,Network Tunneling
3
Intro – contd… vFormal Definition: “The term tunneling protocol is used to describe when one network protocol called the payload protocol is encapsulated within a different delivery protocol” Atishay Jain,Network Tunneling
4
The Basics – the How? L2 for delivery
Layer 2 Tunneled in L3
Layer 3 Goes to L3
Layer 3 A normal packet
Layer 4
Atishay Jain,Network Tunneling
5
Types Popular Types
HTTP Encapsulation
SSH Encapsulation This tunneling involves encapsulation into the SSH protocol – for obvious reasons security.
Others: L2 Encapsulation, IPv6 to IPv4, Proprietary Protocols, etc…
Plugging within a HTTP packet can be for various reasons – HTTP is most used, normally accessible - I hope you get an idea malicious as well as non-malicious …
Atishay Jain,Network Tunneling
6
SSH Port Forwarding
Atishay Jain,Network Tunneling
7
HTTP & HTTPS
vHTTP inside HTTP, the most popular…
Atishay Jain,Network Tunneling
8
Terms v Proxy and URL Translation. v SOCK 4/5. v Tunnel Broker – RFC 3053 v Tunneling Software
Atishay Jain,Network Tunneling
9
Applications – the Positives ! Work at Home Secure Transfer
IPv6 in IPv4 Prepare an IPv6 packet. •Encrypt it in IPv4 packet with the address of a translation server. •Cross the old IPv4 routers •Decapsulate. •
Encapsulate information in primitive protocol •Encapsulate in a secure protocol •Send •Decapsulate •
Tunneling
VPN
Atishay Jain,Network Tunneling
10
VPN & Work at Home Concept
Atishay Jain,Network Tunneling
11
Misuse – The Negatives ! vAccessing Blocked Material …..
Atishay Jain,Network Tunneling
12
Conclusion – That Does it ! vGood and Bad is of each technology… vTunneling has changed the way we live… vPreventing misuse is next to impossible, but I think we would never want internet to get lost over these issues.
Atishay Jain,Network Tunneling
13
Thank You ! Atishay Jain 10783017
Atishay Jain,Network Tunneling
14