Intel To Invest In Linux PC Vendor VA Research
Sunday February 28 1:42 PM ET
By Therese Poletti

SAN FRANCISCO (Reuters) - VA Research Inc., a developer of Intel-based PCs,
servers and workstations running the increasingly popular Linux operating
system, is expected to announce Monday that it will receive an investment
from chip giant Intel Corp. (Nasdaq:INTC - news), according to industry
sources.

The investment, which will also include some venture capitalists, is
Intel's second in a Linux-related startup company. The announcement will be
made the day before Linux World -- the first big trade show devoted to
Linux -- begins.

Linux is an alternative version of the UNIX operating system which runs on
Intel-based systems and on other computer architectures such as Compaq
Computer Corp. (NYSE:CPQ - news)'s Alpha chip. Developed by Finnish
programmer Linus Torvalds in 1991, the software is maintained by a group of
far-flung programmers and given away over the Internet.

While the number of Linux users is still small compared to Windows, the
momentum for Linux has been gaining steam in recent months, as more and
more computer makers have said they will offer Linux on their hardware,
including International Business Machines Corp. (NYSE:IBM - news)

Late last year, Intel, Netscape Communications Corp. (Nasdaq:NSCP - news)
and two venture capital firms invested in Red Hat Inc., a distributor of
Linux which charges to distribute and support Linux software, which mostly
runs on computer servers.

VA Research, based in Mountain View, Calif., was founded in 1993 to provide
Linux-based hardware, software, service and support. Its co-founder, Larry
Augustin founded the company while he was an electrical engineering
graduate student at Stanford University.

Venture capital firm Sequoia Capital of Menlo Park, Calif. is already an
investor in VA Research.

``I can't confirm or deny anything,'' said Augustin, when asked about
Intel's investment. An Intel spokesman in Santa Clara, Calif., declined to
comment.

With its investment in Red Hat, based in Research Triangle Park, N.C., and
now with VA Research, Intel is continuing its strategy of ensuring that its
processors run on all major software environments, including versions of
the UNIX operating system, which was designed for multi-user networked
computing.


From Owner-HyperNews@dept102.it-ias.depaul.edu Sun Feb 28 14:23:13 1999
X-Coding-System: undecided-unix
Date: Sun, 28 Feb 1999 15:02:30 GMT
X-Authentication-Warning: dept102.it-ias.depaul.edu: nobody set sender to Owner-
HyperNews@hermes.depaul.edu using -f
To: HyperNews@dept102.it-ias.depaul.edu
From: kdoshi@shrike.depaul.edu (Kishore Doshi)
X-Hn-Forum: Foundations of Distributed Systems
X-Hn-Re: Virtual Private Networks (Clark Elliott)
Subject: More: VPN Implementation at Protocol Leve
X-Hn-Url: http://hermes.depaul.edu/HyperNews/get/w99/ds-420/58/6.html
Precedence: list
Newsgroups: /HyperNews/get/w99/ds-420.html

HyperNews notification of new message. See:
http://hermes.depaul.edu/HyperNews/get/w99/ds-420/58/6.html

Links:
Information for this posting comes from the following source:
http://technet.microsoft.com/cdonline/content/complete/boes/bo/winntas/prodfact/
vpnovw.htm
This VPN overview from Microsoft is full of detailed information, registration f
or Technet is free like MSDN

Other sources to look at:
http://www.ietf.org/internet-drafts/draft-ietf-pppext-pptp-08.txt - Draft of PPT
P protocol by MSFT, ASCEND, 3Com/USR
and others

--------------------------------------------------------------

>From the prior postings to this question, we know that:
1. VPN's are a possible solutions to allow company employees to connect
to the
LAN through the internet instead of through direct dial-up connections t
hat become
expensive for the company to maintain

2. A VPN in it's simplest form is essentially a remote client communicat
ing
with a private network through any intermediate public or private net
work

3. A viable VPN solution must provide the following characteristics:
User authentication
Assign client addresses
Data Encryption

--------------------------------------------------------------

Let's build on this a little by looking at the key concept behind implementing a
VPN, tunneling. Then we will look
at the protocol many of the tunneling solutions are built on, PPP(Point to Point
Protocol)

The basic method(protocol) for sending packets back and forth over any intermedi
ate network is called tunneling. The
procedure is that on the originating end, the packets or frames(usually PPP fram
es) have an additional header added
to them, unique to the tunneling protocol. This special tunneling header that co
ntains additional information to
push the packet/frame through the intermediate network to the other end of the t
unnel. The packet/frame is
encapsulated with the tunneling header, and then wrapped with a header for whate
ver protocol is being used over the
intermediate network: IP, ATM, and so on. The packet is then sent over the inter
mediate network. Once the packet
reaches the other end of the tunnel it is unencapsulated(the tunneling header is
removed) and the PPP frame
continues on to the proper location.

A good tunneling solution needs to support multiple protocols. While the interme
diate network the majority of
corporations will try to use is the internet, there could be other possibilities
for intermediate networks that use
protocols other than IP. For example, say a company has two divisions doing sepa
rate work and would like to keep
them on separate networks connected by a VPN. Let's say the internal intermediat
e network they use implemets ATM
instead of IP. Now at the same time they want to allow employees to access the n
etworks from home through the
internet(IP). The same tunneling protocol now needs to be able to work for both
ATM and IP.

The basic procedure for data exchange through a tunnel is summarized by this exa
mple:
Let's say we have a packet that we want to send from our network to a remote cli
ent, let's say our internal network
is using IP so we have an IP packet.

1. The remote access server on the network takes this network packet and creates
a PPP frame out of it. The protocol
for making this PPP frame(described below) takes care of user authentication, ad
dressing and encryption. So by
building the tunneling protocol on top of PPP we inherit the necessary character
istics of a viable VPN solution for
free.
2. Next the PPP frame is encapsulated with the tunneling protocol header
3. Then the encapsulated PPP frame is wrapped up in the protocol of the intermed
iate network(IP, ATM, IPX and so on)
and sent into the tunnel.
4. The packet is recieved on the other end, the tunneling protocol header is rem
oved(unencapsulated) and the packet
is forwarded to it's final destination as described by the PPP frame.

Tunneling protocols such as PPTP(Point to Point Tunneling Protocol) and L2TP(Lay
er 2 Tunneling Protocol) are built
on PPP for the simple reason that they can inherit many of the required features
of a VPN solution from it. PPP
provides the tunneling solution with the following features:

1. User Authentication
2. Dynamic Addressing
3. Data Compression and Encryption

plus more that are not mentioned here.

--------------------------------------------------------------

Since many specific tunneling solutions encapsulate - PPP(Point to Point Protoco
l) - what is it and how is it part
of tunneling?

The protocol defines the following sequence to create a remote connection to the
network.

The first phase uses Link Control Protocol to establishing the physical connecti
on between the remote user and the
network. Here the network control protocols are setup(IP, IPX, ATM and so on)

With the link established the user must authenticate themselves to the remote se
rver that will give them access to
the network. Microsoft remote access server for Windows NT networks uses a modif
ied a challenge handshake protocol
for authentication. What does this this mean? In it's simplist form, the challen
ge handshake protocol is as follows,
the remote server sends a arbitrary "challenge string" to the client. The remote
client takes the users entry for
the password and a propritary hashing algorithm to encrypt the challenge string.
It then sends the encrypted
challenge string, the session ID, user ID and the passwork back to the server. S
ince the server knows the users
password it can decrypt the challenge string of the user with the proper passwor
d. If the decrypted version of the
challenge string is the same as the original, then the server accepts the connec
tion. The server never directly
checks the password. Throught the course of the session the server will send rep
eated challenges to the remote
client at random intervals to protect against somebody impersonating an authenti
cated user.

The remote server collects all this authentication information and passes it on
to a central authentication server
for the Windows NT network, this is usually the primary domain controller. With
authentication complete, the
networking protocols are now invoked. The remote client is given an address so t
hat it can be identified on the
network. At this time the data compression and data encryption schemes are setup
also.

With the setup complete, we now have a PPP frame for the remote connection. This
frame is wrapped by the tunneling
header, compressed and encrypted by the procedures agreed when the tunnel was cr
eated. At this point the
encapsulation is complete and the packet is ready to be wrapped up and sent over
the intermediate network

--------------------------------------------------------------

Kishore J Doshi - DS420 Thursday section


From MAILER-DAEMON@cs.depaul.edu Mon Mar 1 12:53:55 1999