Re: RFC: p&p ipsec without authentication

Andrew McGregor (andrew@indranet.co.nz)
Tue, 17 Dec 2002 01:06:58 +1300


NAT traversal can be done, in some (limited) cases even without the
cooperation of the NAT (although someone on the inside must cooperate).
Firewalls do be a problem. I think the best thing here is if you use this
kind of thing outside the firewall; I always build networks, even LANs,
with the crown jewels behind a firewall from the workstations, especially
if they run Windows. Authenticated IPSEC is a nice way to find out if we
can to some extent trust them, although it costs cycles.

As for compatibility, there are three ways to do it presently in the IETF
process (HIP, IKEv2 and FreeSWAN opportunistic mode), and two of them have
running code on multiple platforms.

Andrew

--On Monday, December 16, 2002 09:20:27 +0000 "Henning P. Schmiedehausen"
<hps@intermeta.de> wrote:

> Rik van Riel <riel@conectiva.com.br> writes:
>
>> Hi,
>
>> I've got a crazy idea. I know it's not secure, but I think it'll
>> add some security against certain attacks, while being non-effective
>> against some others.
>
> While the idea itself is nice, it would allow many attackers on your
> host to "dive" under IDS systems or avoid stateful firewalls which do
> protocol verification. And IDS system is "a three letter acronym
> listening on your traffic". And you want to avoid that. =:-)
>
> It won't traverse many firewalls either (because they won't let IPSEC
> pass) and you might get in trouble with NAT and protocols that need
> NAT fixup.
>
> And you basically divide the Internet into "Linux <-> Linux" and "the
> rest". :-)
>
> Regards
> Henning

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/