On Wed, 29 Dec 1999, Mikael Olsson wrote:

> 
> Just a little .... slap on the wrist :-P


Rebuke accepted.


> Merton Campbell Crockett wrote:
> >
> > L2TP is interesting from a security perspective as it isolates the system
> > from its current network and connects it to the target network.  Once the
> > connection is established to the target network, all connectivity is lost
> > to the local network, i.e. any mapped drives are unreachable as are any
> > shared devices such as printers.  
> > 
> > Voila!  None of the back channel problems of IPsec.
>           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> 
> IPsec implementations do not have a back channel problems unless
> you configure them to have back channel problems.


Or, depending upon OS, configure them not to have a back channel problem.


> It is completely possibly to divert ALL traffic to the IPsec connection
> ("VPN tunnel"), the same way it is possible to establish a connection
> only for a single port and forward all other traffic in plain text.
> Flexibility does not automagically mean insecurity.


It is equally important to remember that IPsec defines a mechanism for
encrypting traffic between the end points of a virtual circuit and shares
the physical interface with other traffic.  IPsec secures data while it is
in transit.  It does not, inherently, provide a secure communications
link.


> I for one would rather be able to choose which way best fits my
> needs (and security model).


One should consider IPsec.  Its a useful, interoperable mechansim for
encrypting traffic while it passes over a public Internet.

Merton Campbell Crockett

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to