Subject: Re: RFC: p&p ipsec without authentication

Rik van Riel <[email protected]> writes:

>Hi,

>I've got a crazy idea. I know it's not secure, but I think it'll
>add some security against certain attacks, while being non-effective
>against some others.

While the idea itself is nice, it would allow many attackers on your
host to "dive" under IDS systems or avoid stateful firewalls which do
protocol verification. And IDS system is "a three letter acronym
listening on your traffic". And you want to avoid that. =:-)

It won't traverse many firewalls either (because they won't let IPSEC
pass) and you might get in trouble with NAT and protocols that need
NAT fixup.

And you basically divide the Internet into "Linux <-> Linux" and "the
rest". :-)

Regards
Henning

--
Dipl.-Inf. (Univ.) Henning P. Schmiedehausen -- Geschaeftsfuehrer
INTERMETA - Gesellschaft fuer Mehrwertdienste mbH [email protected]

Am Schwabachgrund 22 Fon.: 09131 / 50654-0 [email protected]
D-91054 Buckenhof Fax.: 09131 / 50654-20


2002-12-16 12:08:00

by Andrew McGregor

[permalink] [raw]
Subject: Re: RFC: p&p ipsec without authentication

NAT traversal can be done, in some (limited) cases even without the
cooperation of the NAT (although someone on the inside must cooperate).
Firewalls do be a problem. I think the best thing here is if you use this
kind of thing outside the firewall; I always build networks, even LANs,
with the crown jewels behind a firewall from the workstations, especially
if they run Windows. Authenticated IPSEC is a nice way to find out if we
can to some extent trust them, although it costs cycles.

As for compatibility, there are three ways to do it presently in the IETF
process (HIP, IKEv2 and FreeSWAN opportunistic mode), and two of them have
running code on multiple platforms.

Andrew

--On Monday, December 16, 2002 09:20:27 +0000 "Henning P. Schmiedehausen"
<[email protected]> wrote:

> Rik van Riel <[email protected]> writes:
>
>> Hi,
>
>> I've got a crazy idea. I know it's not secure, but I think it'll
>> add some security against certain attacks, while being non-effective
>> against some others.
>
> While the idea itself is nice, it would allow many attackers on your
> host to "dive" under IDS systems or avoid stateful firewalls which do
> protocol verification. And IDS system is "a three letter acronym
> listening on your traffic". And you want to avoid that. =:-)
>
> It won't traverse many firewalls either (because they won't let IPSEC
> pass) and you might get in trouble with NAT and protocols that need
> NAT fixup.
>
> And you basically divide the Internet into "Linux <-> Linux" and "the
> rest". :-)
>
> Regards
> Henning