> On Jun 11, 2025, at 17:47, [email protected] wrote:
> 
> Using book on OpenSwan (your book which I found very interesting) it requires 
> the manual configuration of the DNS records

That’s a very old version of things. If you use a CA and certificates for each 
node, you don’t need DNS records (but libreswan does allow you to enable a 
check that the cert FQDN matches an A/AAAA record (after it got triggered by IP)

Also, the unbound resolver supports libreswan as module so you can run a local 
DNS resolver and whenever it looks up A/AAAA it also looks up IPSECKEY records 
and if found, gives the pubkey/IP to libreswan to negotiate IKE before unbound 
returns the A/AAAA to the application.
So by the time the application opens a connection, it’s covered by an existing 
IPsec tunnel.  And it only does it for lookups for names that were not already 
in the cache.


> I specifically targeted IPv6 only so that NAT would not be an issue, given 
> the size of the IPv6 address space.

That might work in clouds but not with mobile networks using CGNAT.


> Internally if an organisation wanted to secure internal communication then 
> the IPv6 hosts could be configured to automatically populate their public 
> IPSec information into DNS via DHCP so all internal communication could use 
> IPSec Tunnel mode as a point to point connection.

It’s much easier to just give them all a certificate and opportunistically try 
it based on CIDR networks of the internal networks.
> IPSec transport could be used internally but I would expect this to be more 
> typically used within a DMZ allowing external clients to make an IPSec 
> connection to a public IPv6 host, 
> 

You can use transport mode if you are sure that there is no NAT.

Paul
_______________________________________________
IPsec mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to