mercredi 2 décembre 2009

Welcome to the Tunneler !

Hello and welcome to this new blog, which will explain to you the dark secrets of network tunneling. I decided to write this blog to share my experience on this subject, which is a bit complex, and gather information which is not always easy to find. Enjoy !

If you don't know at all what "network tunneling" means, you may have reached this page my mistake ;-) In a nutshell, a "tunnel" is, as the image suggests, a hidden communication channel on the internet, established between two points (the ends of the tunnel).
A well known example of tunnels are VPNs (Virtual Private Networks), which allow to simulate a private network on a public network (internet), with a good level of security. VPNs are typically used by corporations which are spread over multiple sites, and use internet to interconnect the private networks of each site. It also enable staffs to work remotely from any computer connected to the internet, and join the private network of the company.
Another example is "IPv6 over IPv4" tunneling, which consists in using a standard IPv4 network (most of the internet infrastructure still uses IPv4...) to transport IPv6 packets between two IPv6 networks.
And a last example is "IP over DNS" tunneling, which I will explain in details in this blog. IP over DNS tunneling consists in using the DNS protocol as a communication channel, for instance to connect to the internet from any WiFi hotspot (disclaimer: this may be illegal, so do it at your own risk!)

Aucun commentaire:

Enregistrer un commentaire