Sem: Formatierung der Referenzen verbessert

This commit is contained in:
Jim Martens 2014-12-14 12:14:39 +01:00
parent 97eafc7ac0
commit 3fd885e356
2 changed files with 69 additions and 85 deletions

View File

@ -196,7 +196,7 @@ Ein Hauptziel von VPNs ist die sichere Kommunikation zwischen zwei privaten Netz
Aus was setzt sich die Sicherheit jedoch zusammen? Zur Sicherheit gehören einerseits die Schutzziele in der IT-Sicherheit: Vertraulichkeit, Integrität, Verfügbarkeit. Andererseits gehören aber auch das Vorhandensein von Sicherheitslücken zur Sicherheit. Denn was nutzt ein theoretisch sicheres Verfahren, wenn es in der Implementation reihenweise Sicherheitslücken gibt?
Allerdings ist es nicht wirklich gangbar IPSec und OpenVPN anhand von Sicherheitslücken zu vergleichen, denn während IPSec ein Standard ist\cite{Kent2005}, handelt es sich bei OpenVPN um eine konkrete Implementation eines SSL/TLS-basierten VPNs\cite{Kotuliak2011}. Daher haben wir uns dagegen entschieden Sicherheitslücken in den Vergleich mit einzubeziehen.
Allerdings ist es nicht wirklich gangbar IPSec und OpenVPN anhand von Sicherheitslücken zu vergleichen, denn während IPSec ein Standard ist\cite{RFC4301}, handelt es sich bei OpenVPN um eine konkrete Implementation eines SSL/TLS-basierten VPNs\cite{Kotuliak2011}. Daher haben wir uns dagegen entschieden Sicherheitslücken in den Vergleich mit einzubeziehen.
Allerdings sind wir damit noch nicht am Ende unserer Kriterien angelangt. Aus dem Schutzziel der Verfügbarkeit lässt sich die Performance als Kriterium ableiten. Schließlich interessiert es neben der Sicherheit auch, wie schnell die Nachrichten von A nach B kommen. Was konkrete Werte bei einem Performancevergleich angeht, verweisen wir auf einen solchen Vergleich von 2011, welcher im Rahmen der ICETA Konferenz von Kotuliak\cite{Kotuliak2011} unternommen wurde.

View File

@ -15,6 +15,30 @@
Timestamp = {2014.10.24}
}
@Techreport{RFC1825,
Title = {Security {Architecture} for the {Internet} {Protocol}},
Author = {Atkinson, R.},
Institution = {IETF},
Year = {1995},
Type = {RFC},
Organization = {BBN Technologies},
Owner = {jim},
Timestamp = {2014.12.13}
}
@Techreport{RFC2401,
Title = {Security {Architecture} for the {Internet} {Protocol}},
Author = {Atkinson, R. and Kent, S.},
Institution = {IETF},
Year = {1998},
Type = {RFC},
Organization = {BBN Technologies},
Owner = {jim},
Timestamp = {2014.12.13}
}
@Inproceedings{Berger2006,
Title = {Analysis of {C}urrent {VPN} {T}echnologies},
Author = {Berger, Thomas},
@ -129,6 +153,18 @@
Timestamp = {2014.10.18}
}
@Techreport{RFC5996,
Title = {Internet {K}ey {E}xchange {P}rotocol {V}ersion 2 ({IKE}v2)},
Author = {Eronen, P. and Kaufman, C. and Nir, Y. and Hoffman, P.},
Institution = {IETF},
Year = {2010},
Type = {RFC},
Organization = {Microsoft and VPN Consortium and Check Point and Independent},
Owner = {jim},
Timestamp = {2014.12.13}
}
@Techreport{Ferguson2000,
Title = {A {C}ryptographic {E}valuation of {IP}sec},
Author = {Ferguson, Niels and Schneider, Bruce},
@ -304,21 +340,9 @@
Timestamp = {2013.11.17}
}
@Techreport{Kent2005,
Title = {Security {Architecture} for the {Internet} {Protocol}},
Author = {Kent, S. and Seo, K.},
Institution = {IETF},
Year = {2005},
Type = {RFC},
Organization = {BBN Technologies},
Owner = {jim},
Timestamp = {2014.10.24}
}
@Techreport{RFC1825,
Title = {Security {Architecture} for the {Internet} {Protocol}},
Author = {Atkinson, R.},
@Techreport{RFC4302,
Title = {{IP} {A}uthentication {H}eader},
Author = {Kent, S.},
Institution = {IETF},
Year = {2005},
Type = {RFC},
@ -328,11 +352,11 @@
Timestamp = {2014.12.13}
}
@Techreport{RFC2401,
Title = {Security {Architecture} for the {Internet} {Protocol}},
Author = {Kent, S. and Aktinson, R.},
@Techreport{RFC4303,
Title = {{IP} {E}ncapsulating {P}ayload (ESP)},
Author = {Kent, S.},
Institution = {IETF},
Year = {1998},
Year = {2005},
Type = {RFC},
Organization = {BBN Technologies},
@ -352,66 +376,6 @@
Timestamp = {2014.12.13}
}
@Techreport{RFC4302,
Title = {IP Authentication Header},
Author = {Kent, S.},
Institution = {IETF},
Year = {2005},
Type = {RFC},
Organization = {BBN Technologies},
Owner = {jim},
Timestamp = {2014.12.13}
}
@Techreport{RFC4303,
Title = {IP Encapsulating Payload (ESP)},
Author = {Kent, S.},
Institution = {IETF},
Year = {2005},
Type = {RFC},
Organization = {BBN Technologies},
Owner = {jim},
Timestamp = {2014.12.13}
}
@Techreport{RFC7321,
Title = {Cryptographic Algorithm Implementation Requirements and Usage Guidance},
Author = {McGrew, D. and Hoffman, P.},
Institution = {IETF},
Year = {2014},
Type = {RFC},
Organization = {Cisco Systems and VPN Consortium},
Owner = {jim},
Timestamp = {2014.12.13}
}
@Techreport{RFC5996,
Title = {Internet Key Exchange Protocol Version 2 (IKEv2)},
Author = {Kaufman C. and Hoffman, P. and Nir, Y. and Eronen, P.},
Institution = {IETF},
Year = {2010},
Type = {RFC},
Organization = {Microsoft and VPN Consortium and Check Point and Independent},
Owner = {jim},
Timestamp = {2014.12.13}
}
@Techreport{RFC4307,
Title = {Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2)},
Author = {Schiller, J.},
Institution = {IETF},
Year = {2005},
Type = {RFC},
Organization = {Massachusetts Instutute of Technology},
Owner = {jim},
Timestamp = {2014.12.13}
}
@Conference{Kessler1997,
Title = {Automatic Detection of Text Genre},
Author = {Kessler, Brett and Nunberg, Geoffrey and Schuetze, Hinrich},
@ -445,10 +409,7 @@
Organization = {IEEE},
Pages = {217--221},
Abstract = {IPSec is faster than OpenVPN with the same setup and cipher.
Details: IPSec AES > OpenVPN AES IPSec Blowfish > OpenVPN Blowfish IPSec 3DES < OpenVPN 3DES
3DES is a cipher of the past and should not be used anymore. AES and Blowfish have similar results under IPSec and OpenVPN. AES is standardized and has more support than Blowfish.
IPSec however is far more complex and difficult to set up while setting up OpenVPN is child's play.},
Abstract = {IPSec is faster than OpenVPN with the same setup and cipher. Details: IPSec AES > OpenVPN AES IPSec Blowfish > OpenVPN Blowfish IPSec 3DES < OpenVPN 3DES 3DES is a cipher of the past and should not be used anymore. AES and Blowfish have similar results under IPSec and OpenVPN. AES is standardized and has more support than Blowfish. IPSec however is far more complex and difficult to set up while setting up OpenVPN is child's play.},
Owner = {jim},
Timestamp = {2014.11.28}
}
@ -476,6 +437,18 @@ IPSec however is far more complex and difficult to set up while setting up OpenV
Timestamp = {2014.10.26}
}
@Techreport{RFC7321,
Title = {Cryptographic {A}lgorithm {I}mplementation {R}equirements and {U}sage {G}uidance for {E}ncapsulating {S}ecurity {P}ayload ({ESP}) and {A}uthentication {H}eader ({AH})},
Author = {McGrew, D. and Hoffman, P.},
Institution = {IETF},
Year = {2014},
Type = {RFC},
Organization = {Cisco Systems and VPN Consortium},
Owner = {jim},
Timestamp = {2014.12.13}
}
@Techreport{Paskin2001,
Title = {Cubic-time Parsing and Learning Algorithms for Grammatical Bigram Models},
Author = {Paskin, Mark A.},
@ -544,6 +517,18 @@ IPSec however is far more complex and difficult to set up while setting up OpenV
Timestamp = {2013.10.24}
}
@Techreport{RFC4307,
Title = {Cryptographic algorithms for use in the {I}nternet {K}ey {E}xchange version 2 ({IKE}v2)},
Author = {Schiller, J.},
Institution = {IETF},
Year = {2005},
Type = {RFC},
Organization = {Massachusetts Instutute of Technology},
Owner = {jim},
Timestamp = {2014.12.13}
}
@Inproceedings{Scott1921,
Title = {The Conference of 1907},
Author = {Scott, James Brown},
@ -601,7 +586,6 @@ IPSec however is far more complex and difficult to set up while setting up OpenV
Pages = {548--551},
Abstract = {SSL/TLS VPN is the better choice for remote access to a private network, while IPSec is better for the connection between two fixed endpoints.
With IPSec the data is transported unencrypted between the application and the VPN start point and from the VPN end point to the application. In a remote access example, all the data would be readable from inside the target network. Furthermore an attacker only needs access to the client computer and can then use the connection, without being authenticated. With SSL VPN the encryption is application to application and the authentication and authorization happens for each connection. Access to a connection is unequally more difficult than access to a computer.},
Owner = {jim},
Timestamp = {2014.12.13}