SSL web traffic privacy?

thedramathedrama Member Posts: 291 ■□□□□□□□□□
Im curious about how much different the SSL connection than IPSec VPN -in terms of privacy, identification of your location and IP address. For instance, once i type URL with https (assuming supporting secure session) such as facebook. 1) Are my location and IP address still being identified? 2) Is the data leaving my private network being seen by ISP or malicious users?3) What kind of address is assigned to me during that session? (private or public)
Monster PC specs(Packard Bell VR46) : Intel Celeron Dual-Core 1.2 GHz CPU , 4096 MB DDR3 RAM, Intel Media Graphics (R) 4 Family with IntelGMA 4500 M HD graphics. :lol:

5 year-old laptop PC specs(Toshiba Satellite A210) : AMD Athlon 64 x2 1.9 GHz CPU, ATI Radeon X1200 128 MB Video Memory graphics card, 3072 MB 667 Mhz DDR2 RAM. (1 stick 2 gigabytes and 1 stick 1 gigabytes)


Comments

  • paul78paul78 Member Posts: 3,016 ■■■■■■■■■■
    If you mean that if using SSL vs IPsec will mask your Internet presence, neither will actually do that. Your public Internet IP will be in the source header of the IP packets. So the various ISP's and destination server can discover your location (at least the location of the public IP) using ip geolocation services like Quova. But the contents of the packets are encrypted so the confidentially of the data is ensured.

    In some companies that have a need to inspect SSL traffic, the SSL can be decrypted using SSL inteception techniques - for example using Cisco Bluecoat Proxy devices but in that scenario, the company would also control the devices originating the traffic.
  • RobertKaucherRobertKaucher Member Posts: 4,299 ■■■■■■■■■■
    First you should know how IP, TCP, and DNS work before you can get your mind around how TLS (SSL) works. If you are up to speed on those protocols, please look at these articles.

    An Introduction to Transport Layer Security

    How TLS/SSL Works: Logon and Authentication

    RFC 5246 - The Transport Layer Security (TLS) Protocol Version 1.2


    Also see Episode #195 of Security Now.
  • RobertKaucherRobertKaucher Member Posts: 4,299 ■■■■■■■■■■
    thedrama wrote: »
    1) Are my location and IP address still being identified?
    Regardless of the encryption scheme your address must always be identified or there would be know way for the other system to know how to return data to you. If you consider WPA, used on most consumer and enterprise wireless networks, the Ethernet addresses of the systems are transmitted completely in clear text or there would be no way for the two systems to send the encrypted data back and forth.
    thedrama wrote: »
    2) Is the data leaving my private network being seen by ISP or malicious users?
    No. There are only special instances when this can happen. One such case is called a "man-in-the-middle attack.
    Man-in-the-middle attack - Wikipedia, the free encyclopedia
    another case is SSL Termination (which is really just a "legitimate" MITM scenario).
    thedrama wrote: »
    3) What kind of address is assigned to me during that session? (private or public)
    For the encrypted VPN traffic you still have the same public IP address that you had at the start of the session. In order to be able to access to the resources on the VPN network you will be assigned a local IP address via a "virtual network adapter". In addition to the material I suggested above you should also Google "how VPNs work".
  • quinnyflyquinnyfly Member Posts: 243 ■■■□□□□□□□
    You could say, it's almost like the post office having no address to send you mail, the TCP header fields always identify the host regardless of what type of encryption technique is used. That is the basis of TCP/IP, to route and communicate packets over the internet.

    I agree with Paul78, you really need to get a firm grasp of TCP before learning anything about SSL, IPsec and VPNs. Also learn a little about IP spoofing, this is another instance where MITM (man-in-the-middle) and connection hijacking attacks occur when an attacker will spoof the TCP headers and logically assume an identity of a host. SSL and TLS are not 100% secure, IPsec uses several protocols that are slightly different to SSL, either way, they all still encrypt and encapsulate packets before being sent, but this does not thwart man-in-the-middle attacks and IP spoofing.
    The Wings of Technology
  • RobertKaucherRobertKaucher Member Posts: 4,299 ■■■■■■■■■■
    quinnyfly wrote: »
    .... they all still encrypt and encapsulate packets before being sent, but this does not thwart man-in-the-middle attacks and IP spoofing.

    How does IP Spoofing apply?
Sign In or Register to comment.