[email protected] (Finch, Steve) writes:
> Most VPNs do not encrypt the connection from endpoint to endpoint, which
> is what is PCI requires. The VPN would need to start on the mainframe
> and go all the way to the PC. Most VPN run on a appliance (server), a
> hop away from the mainframe. The "last hop' blows' the PCI 

original VPN introduced in gateway committee meeting at Fall '94 IETF
(internet standards) meeting was gateway-to-gateway (or at least
router-to-router) encryption; basically support for something like
branch office to tunnel (encrypted) "intranet" connection through the
internet (eliminating requiring dedicated line).

Later VPN technology was introduced for individual PCs ... to tunnel
(encrypted) remote (home, travelling, road warrier, etc) corporate work
through the internet. This eliminated corporations requiring their own
private dial-up modem pools (caveat, some corporations opened up remote
internet access ... w/o actually requiring encrypted traffic through
through the internet).

One of the early versions of this was in the mid-90s regarding online
(dialup) home banking moving to the internet ... a big justification was
eliminating large racks of dialup modems at the financial institutions
supporting proprietary dial-up operations (also eliminating lots of
trouble calls from clients regarding the mechanics of PC operating
system and drivers supporting serial port modems).

Some of these "PC" implementations were not quite end-to-end
... encryption originating at the PC through the internet to some
network box at the institutional end, which handles decryption
... before forwarding to destination mainframe/server.

A well known attack vector, even by the late 90s, for remote PC VPNs
(even when encrypted end-to-end) ... were PC zombies ... since they had
to have a valid internet connection in order to create the VPN
(encrypted) "tunnel" ... a zombie infection on the PC could act as
gateway ... forwarding attack traffic coming in via the internet
connection and back out through the VPN tunnel, into the corporate
intranet.

Some number of VPN software products (for remote PCs) tend to also be
packaged with software that attempts to counter such exploits
(especially those PC VPN products targeted at the corporate business
market).

-- 
40+yrs virtualization experience (since Jan68), online at home since Mar1970

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to