56
P2P 應應應應應應 Private P2P 應應應應 2010 All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission. 應應應應應應應應應應應應應應應應應應應應應應應 應應應 應應應應應應應應應

P2P 應用服務課程 Private P2P 服務簡介 2010 All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted

  • View
    216

  • Download
    1

Embed Size (px)

Citation preview

  • Slide 1
  • P2P Private P2P 2010 All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission.
  • Slide 2
  • (Private Network) P2P P2P (Private P2P Network) P2P (Anonymous P2P Communication) 2
  • Slide 3
  • (Private Network) P2P P2P (Private P2P Network) P2P (Anonymous P2P Communication) 3
  • Slide 4
  • (Private Network) Digital Data Network Leased Line (DDN) Virtual Private Network (VPN) 4
  • Slide 5
  • - DDN DDN (Digital Data Network Leased Line) 5
  • Slide 6
  • DDN 6
  • Slide 7
  • DDN 7 64K128K~512K768K~2048K ( ) 45M155M622M2.5G 3,6004,60012,700 042,40071,280213,800555,880 >0~3~10~20~30149,500306,800920,5002,393,300 3,6004,60014,000 046,00079,200237,600617,760 >0~3~10~20~30165,000340,1001,022,8002,659,280 ( ) 450 1,462 8,70019,14057,420- ( ) http://www.cht.com.tw/BusinessCat.php?Module=Fee,Describe&CatID=360&PageID=792
  • Slide 8
  • VPN (1) (Virtual Private Network, VPN): ( ) 8
  • Slide 9
  • VPN (2) Integrity Authentication Nonrepudiation Confidentiality 9
  • Slide 10
  • VPN (3) Hash 10 Private peer-to-peer (P2P) ~!@#$%^&*()_+~!@#$
  • Slide 11
  • IPSec VPN IPSec 3 ISAKMP(Internet Security Association and Key Management Protocol) IKE(Internet Key Exchange ): (secret key) AH(Authentication Header): (integrity check) ESP(Encapsulating Security Payload): (data encryption) (integrity check)
  • Slide 12
  • ISAKMP SA Establishment 12 From: http://docs.hp.com/en/J4256-90003/ch01s04.html ISAKMP Phase One (Main Mode, MM) Negotiate and establish an ISAKMP SA, a secure communication channel for further communication by generating a Diffe-Hellman shared value as the base for a symmetric (shared) key. Verify the remote system's identity (primary authentication) ISAKMP Phase Two (Quick Mode, QM) Negotiate two SAs for IPSec transforms (AH or ESP): one for inbound and one for outbound traffic.
  • Slide 13
  • Diffie-Hellman Key Generation 13 From: http://docs.hp.com/en/J4256-90003/ch01s04.html
  • Slide 14
  • Primary Authentication Preshared keys: A preshared key is manually configured on both systems and is used for authentication only. Digital Signatures: Digital signatures are based on security certificates, and are managed using a Public Key Infrastructure (PKI) consisting of CAs (Certificate Authorities). 14 From: http://docs.hp.com/en/J4256-90003/ch01s04.html
  • Slide 15
  • AH Symmetric Key Authentication 15 http://docs.hp.com/en/J4256-90003/ch01s02.html?btnPrev=%AB%A0prev
  • Slide 16
  • ESP Symmetric Key Cryptosystem 16 http://docs.hp.com/en/J4256-90003/ch01s03.html?btnPrev=%AB%A0prev
  • Slide 17
  • ESP Illustration 17 From: http://msdn.microsoft.com/zh-tw/magazine/ee412260.aspx
  • Slide 18
  • (Private Network) P2P P2P (Private P2P Network) P2P (Anonymous P2P Communication) 18
  • Slide 19
  • P2P P2P P2P P2P 19
  • Slide 20
  • P2P File Sharing P2P 20
  • Slide 21
  • P2P 21
  • Slide 22
  • P2P 22
  • Slide 23
  • P2P P2P P2P 23
  • Slide 24
  • P2P 24
  • Slide 25
  • P2P P2P 25
  • Slide 26
  • P2P Winny Winny 1652 2005 26
  • Slide 27
  • P3P 2009 P2P P3P ICO 27
  • Slide 28
  • P3P 2010 5 10 25 28
  • Slide 29
  • (Private Network) P2P P2P (Private P2P Network) P2P (Anonymous P2P Communication) 29
  • Slide 30
  • P2P (1) Private P2P Networks (network overlay) (physical link) (logical link) 30
  • Slide 31
  • P2P (2) P2P Free Rider 31
  • Slide 32
  • P2P (3) 32 Network P2PClient/Server PublicPrivate Group basedF2F
  • Slide 33
  • P2P -- P2P VPN 33
  • Slide 34
  • P2P VPN P2P VPN (Centralized) (Decentralized) (Structured) (Unstructured) 34
  • Slide 35
  • (Centralized) VPN P2P VPN P2P Hamachi GBridge Wippien 35 Peer to peer Relayed
  • Slide 36
  • (Decentralized) P2P VPN P2P overlay P2P (Structured) (Unstructured) 36
  • Slide 37
  • (Structured) IPOP (IP over P2P) 37 Mike John
  • Slide 38
  • (Unstructured) N2N P2PVPN 38
  • Slide 39
  • (Private Network) P2P P2P (Private P2P Network) P2P (Anonymous P2P Communication) 39
  • Slide 40
  • P2P Anonymous P2P ? P2P P2P P2P IP 40 P2P P2P IP = 140.118.X.X IP = 114.46.X.X
  • Slide 41
  • P2P P2P (Anonymous Browsing) (File-Sharing) (E-mail) (Remote login) (Instant Messaging) 41
  • Slide 42
  • P2P P2P P2P (File Sharing) Freenet GNUnet ANts P2P iMule Vuze Perfect Dark Share 42 1. P2P 2. 3.
  • Slide 43
  • P2P (Cont.) JAP Tor I2P 43 1. 2. 3. P2P P2P
  • Slide 44
  • Freenet 44 P2P http://freenetproject.org/
  • Slide 45
  • iMule 45 P2P http://contentdb.emule-project.net/view.php?pid=1719
  • Slide 46
  • Vuze 46 P2P http://en.wikipedia.org/wiki/Vuze
  • Slide 47
  • JAP P2P 47 http://anon.inf.tu-dresden.de/screenshot_en.html
  • Slide 48
  • Tor P2P 48 http://www.torproject.org/index.html
  • Slide 49
  • Unimessage-based Split message-based Replicated message-based 49 P2P
  • Slide 50
  • Unimessage-based A.Fundamental: (onion routing) ( Tor) B.Probability-Based: ( Crowds) C.Mimic Traffic-Enhanced: ( Tarzan) 50 P2P Destination A. B. C.
  • Slide 51
  • 51 P2P From: R. Y. Xiao, Survey on anonymity in unstructured peer- to-peer systems, Journal of Computer Science and Technology, 2008.
  • Slide 52
  • Split message-based (secret sharing) ( Free Haven) 52 P2P Message (request or file)
  • Slide 53
  • (publish anonymity) 53 P2P
  • Slide 54
  • Replicated message-based P 5 (Peer-to-Peer Personal Privacy Protocol) (Broadcast) (Multicast) 54 P2P
  • Slide 55
  • (Sending anonymity) 55 P2P
  • Slide 56
  • 56 Questions?? Thanks for Your Listening!