Confidential communication with tunnels, encryption, VPNs

Synopsis

This exercise implements  several communication channels that are tunneled, encrypted, or both. Four software products are used:

The unencrypted IP-in-IP is included for tutorial value, despite lack of security value. Given such a tunnel, encryption can be added to it. OpenVPN does that. The other two, ssh and stunnel, do not construct tunnels by strict definition. However, they do properly  represent the class of wrapper products that can secure a communication channel between two points by introducing encryption at one and decryption at the other.

Background and recommended reading materials

Project specification

What can go wrong

Questions for you to answer