I've always had trouble with FreeS/WAN breaking at kernel upgrades, but now that 2.6 is coming we're getting native IPsec support (albeit FreeS/WAN seems to claim Opportunistic Encryption won't be supported?). We seem to have a curious situation here. The majority of systems out there now support IPsec (NT/Win2K/XP; OS X), but there's very little interoperability. Particularly, there is no support for ad hoc encryption as default, without going through a lot of jumping through hoops (why should I be required to be able to publish DNS records just to have an encryption link?). Are there technical reasons for this situation? If yes, what is required to enable IPsec default interoperability at least with open source OSses? -- Eugen* Leitl <a href="http://leitl.org">leitl</a> ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
also sprach Eugen Leitl <eugen@leitl.org> [2003.10.09.1129 +0200]:
Are there technical reasons for this situation? If yes, what is required to enable IPsec default interoperability at least with open source OSses?
A curious idea that I've been paying some attention to for a while. One could simply implement a means that tries to connect with IPsec by default and falls back to IP if unsuccessful (keeping a cache of IPsec incapable hosts). The main problem here, of course, the required public key repository, if you don't want to have your keys in DNS records. And also, the expensive SA negotiation and the potential for DoS. -- martin; (greetings from the heart of the sun.) \____ echo mailto: !#^."<*>"|tr "<*> mailto:" net@madduck invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver! "it is only the modern that ever becomes old-fashioned." -- oscar wilde [demime 0.97c removed an attachment of type application/pgp-signature]
On Thu, Oct 09, 2003 at 06:57:33PM +0200, martin f krafft wrote:
A curious idea that I've been paying some attention to for a while. One could simply implement a means that tries to connect with IPsec by default and falls back to IP if unsuccessful (keeping a cache of
That's how Opportunistic Encryption (OE) is supposed to work. It's just it's much too high-threshold for Joe Schmoe systems. Software firewalls are not even NATed, and increasingly cheap NAT allows IPsec tunnelling; at least single-session.
IPsec incapable hosts). The main problem here, of course, the required public key repository, if you don't want to have your keys in DNS records. And also, the expensive SA
What is wrong which just exchanging the keys for ad hoc mode? You could cache them and log whenever a key has changed (at least allowing to detect a MITM post facto). We're really looking for blanket rollout of a low-security service which wouldn't stand a dedicated attacker yet would effectively prevent large-scale screening of cleartext traffic as currently practised by diverse TLAs. You can always upgrade to higher paranoia layers (like web of trust, or direct exchange of secrets), but right now the entire traffic is open to sniffing and filtering at will. It's a disgrace.
negotiation and the potential for DoS.
-- Eugen* Leitl <a href="http://leitl.org">leitl</a> ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 0.97c removed an attachment of type application/pgp-signature]
also sprach Eugen Leitl <eugen@leitl.org> [2003.10.09.1931 +0200]:
What is wrong which just exchanging the keys for ad hoc mode? You could cache them and log whenever a key has changed (at least allowing to detect a MITM post facto).
... like SSH, huh?
We're really looking for blanket rollout of a low-security service which wouldn't stand a dedicated attacker yet would effectively prevent large-scale screening of cleartext traffic as currently practised by diverse TLAs.
I am all for it. This should be implementable in a cousin of isakmpd, no? PS: please don't CC me on mailing lists... -- martin; (greetings from the heart of the sun.) \____ echo mailto: !#^."<*>"|tr "<*> mailto:" net@madduck invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver! microsoft windoze - the best solitaire game you can buy. [demime 0.97c removed an attachment of type application/pgp-signature]
also sprach martin f krafft <madduck@madduck.net> [2003.10.09.2316 +0200]:
PS: please don't CC me on mailing lists...
i am sorry, you didn't. that was the other guy on another list. doh! -- martin; (greetings from the heart of the sun.) \____ echo mailto: !#^."<*>"|tr "<*> mailto:" net@madduck invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver! Most Intelligent Customers Realise Our Software Only Fools Them. [demime 0.97c removed an attachment of type application/pgp-signature]
participants (3)
-
Eugen Leitl
-
Eugen Leitl
-
martin f krafft