Re: Big VPN

2004-03-03 Thread Jarosaw Tabor
Hello!

W licie z wto, 02-03-2004, godz. 22:57, Richard Atterer pisze: 

 Does each of these 100 LANs need to connect to *any* other LAN, or just to 
 your LAN? Are the LANs real LANs or do you only want to connect single 
 road warrior machines to your LAN?

Generally I need possibility to connect from every LAN to every LAN.
It can be up to few simultenous connections, but there is no rule.
All LANs are real LANs with few till tenths of peers. Of course not all
of them have to talk to others, and for sure not at the same time.
Generally I expect about 10 outgoing simultenous connections per LAN.

 What's wrong with IPSec with X.509 certificates? You can give out a signed
 certificate to all people who should get access to your network, and remove 
 individual people from the allowed list if necessary. IPSec works with 
 all OSes as clients. The only downside (IMHO) is that the server can be 
 fairly complex to set up for this kind of scenario.

I don't know IPSec so good, so one question: if I will add new node
(LAN), do I need to update configuration of all others about it ?
This is my biggest concern...

 http://www.freeswan.org/ - you've seen this already I guess :)
 http://www.natecarlson.com/linux/ipsec-x509.php
 http://www.ipsec-howto.org/ - new kernel 2.6.0 IPSec
 http://ipsec.math.ucla.edu/services/ipsec.html
 http://lugbe.ch/action/reports/ipsec_htbe.phtml
 http://vpn.ebootis.de/

THX!

best regards
Jarek


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Big VPN

2004-03-03 Thread Richard Atterer
On Wed, Mar 03, 2004 at 09:39:06AM +0100, Jaros?aw Tabor wrote:
 I don't know IPSec so good, so one question: if I will add new node
 (LAN), do I need to update configuration of all others about it ? This is
 my biggest concern...

I'm not so sure about this - anybody else?

But I think it's possible - with X.509 certificates, shouldn't you be able 
to

 1) Set up one root CA (certificate authority), which issues certificates 
and a revocation list
 2) Sign the individual LANs' certificates with that CA's key
 3) Tell all IPSec routers in your LANs to trust certificates with a 
signature by the root CA
 4) Now, when one LAN A connects to another B for the first time, A can
send its own signed certificate. B allows the connection to be set up 
due to the fact that A's certificate carries a signature of the CA.

This means that each of your 100 LANs only needs a copy of the root CA's 
certificate in order to connect to any other LAN.

You must maintain a CRL (certificate revocation list) to be able to remove
certain LANs from your big VPN without updating all nodes. See the PDF
which is the first link on http://www.strongsec.com/freeswan/, sections
3.1 and 3.2.

HTH,

  Richard

-- 
  __   _
  |_) /|  Richard Atterer |  GnuPG key:
  | \/¯|  http://atterer.net  |  0x888354F7
  ¯ '` ¯


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Big VPN

2004-03-03 Thread Dariush Pietrzak
 What is Racoon like in terms of configuration ease? I've used FreeSWAN and 
 wilst it's not the easiest to set up, once you've got your head around it, 
 it does make sense.
 Racoon makes sense from the start;)

-- 
Dariush Pietrzak,
Key fingerprint = 40D0 9FFB 9939 7320 8294  05E0 BCC7 02C4 75CC 50D9


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Big VPN

2004-03-03 Thread Richard Atterer
Hi, CCing the list again because other people might have cleverer ideas. I 
hope you don't mind, Jaroslaw.

On Wed, Mar 03, 2004 at 11:36:27AM +0100, Jaros?aw Tabor wrote:
 That's OK. But what about routing ? How to inform other nodes, about new
 subnet ? I think, that this will require some kind of dynamic routing and
 IPSec on demand. But, as I see from freeswan and openswan doc, this isn't
 supported.

Hmm, you are right... The only solution I see ATM is to pre-configure an
appropriate amount of subnets on each LAN's IPSec router in advance, say
200. :-/ LAN number n gets the network 10.0.n.0/24, and its IPSec router is
set up as ipsecn.mydomain.net.

Later, when network number 42 has been set up to use 10.0.42.0/24, you only
need to update the DNS entry of ipsec42.mydomain.net and all other LANs 
should be able to use it. (New IPSec links will be set up on demand once 
anyone tries to connect to the new network.)

Obviously, an alternative would be to have one central node which acts as
as a router between any two LANs. This will be much easier to maintain, I
don't know if the resulting single point of failure and possibly lower
performance are a problem for you. Each of the 100 LANs would just route
all 10.0.0.0/16 addresses to the central node, and only the central node
would be trusted, so you don't have to mess with CAs etc...

Cheers,

  Richard

--
  __   _
  |_) /|  Richard Atterer |  GnuPG key:
  | \/¯|  http://atterer.net  |  0x888354F7
  ¯ '` ¯


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Big VPN

2004-03-03 Thread Jarosaw Tabor
W licie z ro, 03-03-2004, godz. 12:07, Richard Atterer pisze: 

 Later, when network number 42 has been set up to use 10.0.42.0/24, you only
 need to update the DNS entry of ipsec42.mydomain.net and all other LANs 
 should be able to use it. (New IPSec links will be set up on demand once 
 anyone tries to connect to the new network.)

This looks interesting. I didn't see in doc anythig about on demand
connections. Doc states that during startup, all tunnels are started,
making startup very long. 
Additionally, I don't need all tunnels permanently open, when there is
no trafic. Every LAN need to have possibility to connect to another, but
may never use most of them.
Typically, there will be few outgoing connections per LAN.

 Obviously, an alternative would be to have one central node which acts as
 as a router between any two LANs. This will be much easier to maintain, I
 don't know if the resulting single point of failure and possibly lower
 performance are a problem for you. Each of the 100 LANs would just route
 all 10.0.0.0/16 addresses to the central node, and only the central node
 would be trusted, so you don't have to mess with CAs etc...

Not acceptable due to the traffic and reliability.

best regards
Jarek


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Big VPN

2004-03-03 Thread Milan P. Stanic
On Wed, Mar 03, 2004 at 08:54:38AM +0100, Dariush Pietrzak wrote:
  FreeS/WAN is orphaned upstream. OpenSWAN is based on FreeS/WAN and as
  such it does not work with 2.6.
  That is untrue. 
 1.x branch works with 2.4.x kernels, 2.x branch works with 2.6.x

Right! I shouldn't write mail at 01:25 after midnight :-)
I used freeswan for years but I'm switching to racoon so I don't
follow freeswan (or openswan) anymore. Sorry for inconvenience.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Big VPN

2004-03-03 Thread I.R. van Dongen
On Wed, 3 Mar 2004 12:07:23 +0100
Richard Atterer [EMAIL PROTECTED] wrote:

 Hi, CCing the list again because other people might have cleverer
 ideas. I hope you don't mind, Jaroslaw.
 
 On Wed, Mar 03, 2004 at 11:36:27AM +0100, Jaros?aw Tabor wrote:
  That's OK. But what about routing ? How to inform other nodes, about
  new subnet ? I think, that this will require some kind of dynamic
  routing and IPSec on demand. But, as I see from freeswan and
  openswan doc, this isn't supported.

Tinc does full mesh :)
You only need to add the new subnets to one other node to make it work
on all subnets, it keeps an internal routing table.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Big VPN

2004-03-03 Thread J.H.M. Dassen (Ray)
On Wed, Mar 03, 2004 at 01:25:46 +0100, Milan P. Stanic wrote:
 FreeS/WAN is orphaned upstream. OpenSWAN is based on FreeS/WAN and as
 such it does not work with 2.6.

For Kernel's 2.6.0 and higher, Openswan uses the built in IPsec support.
Only the userland component of Openswan is required to use Openswan with a
2.6 series kernel. 
[...] 
Note: you will need setkey from the ipsec-tools package, available from
http://ipsec-tools.sourceforge.net;
(From http://www.openswan.org/code/openswan-2.1.0rc1.tar.gz's README)

The way I read it is that the userland part of Openswan works fine with 2.6,
it's just that with a 2.6 kernel its IPSec kernel part is used rather than
an Openswan or FreeS/WAN one as was the case with 2.4 (which didn't have an
IPSec kernel part by default).

Ray
-- 
Those who are willing to trade their liberty for security deserve neither.
Benjamin Franklin



Re: Big VPN

2004-03-03 Thread Dariush Pietrzak
 think an acceptable user-land alternative might be openvpn.  I would
 I don't think openvpn would easily handle such large number of connections,
it would be also a configuration nightmare.
tinc was designed to handle such scenario, but I wouldn't use anything
user-land for ~100 lans, no metter how maintainable the configuration is.
 I guess best bet is kernel 2.6.x and racoon-based key management. 

Oh, and btw, if you're going to use FreeS/WAN, better look at 
http://www.openswan.org, they've got the good code. ( and backwards
compatbile, if you've got frees/wan based network and want to upgrade to
2.4.25 you're out of luck with free s/wan - they migrated to 2.x with never
kernel, and it means you need to upgrade your userland tools, and probably
tune configuration a bit. Openswan works nicely with upgrades ).

-- 
Dariush Pietrzak,
Key fingerprint = 40D0 9FFB 9939 7320 8294  05E0 BCC7 02C4 75CC 50D9



Re: Big VPN

2004-03-03 Thread Dariush Pietrzak
 FreeS/WAN is orphaned upstream. OpenSWAN is based on FreeS/WAN and as
 such it does not work with 2.6.
 That is untrue. 
1.x branch works with 2.4.x kernels, 2.x branch works with 2.6.x
-- 
Dariush Pietrzak,
Key fingerprint = 40D0 9FFB 9939 7320 8294  05E0 BCC7 02C4 75CC 50D9



Re: Big VPN

2004-03-03 Thread Jarosław Tabor
Hello!

W liście z wto, 02-03-2004, godz. 22:57, Richard Atterer pisze: 

 Does each of these 100 LANs need to connect to *any* other LAN, or just to 
 your LAN? Are the LANs real LANs or do you only want to connect single 
 road warrior machines to your LAN?

Generally I need possibility to connect from every LAN to every LAN.
It can be up to few simultenous connections, but there is no rule.
All LANs are real LANs with few till tenths of peers. Of course not all
of them have to talk to others, and for sure not at the same time.
Generally I expect about 10 outgoing simultenous connections per LAN.

 What's wrong with IPSec with X.509 certificates? You can give out a signed
 certificate to all people who should get access to your network, and remove 
 individual people from the allowed list if necessary. IPSec works with 
 all OSes as clients. The only downside (IMHO) is that the server can be 
 fairly complex to set up for this kind of scenario.

I don't know IPSec so good, so one question: if I will add new node
(LAN), do I need to update configuration of all others about it ?
This is my biggest concern...

 http://www.freeswan.org/ - you've seen this already I guess :)
 http://www.natecarlson.com/linux/ipsec-x509.php
 http://www.ipsec-howto.org/ - new kernel 2.6.0 IPSec
 http://ipsec.math.ucla.edu/services/ipsec.html
 http://lugbe.ch/action/reports/ipsec_htbe.phtml
 http://vpn.ebootis.de/

THX!

best regards
Jarek



Re: Big VPN

2004-03-03 Thread Richard Atterer
On Wed, Mar 03, 2004 at 09:39:06AM +0100, Jaros?aw Tabor wrote:
 I don't know IPSec so good, so one question: if I will add new node
 (LAN), do I need to update configuration of all others about it ? This is
 my biggest concern...

I'm not so sure about this - anybody else?

But I think it's possible - with X.509 certificates, shouldn't you be able 
to

 1) Set up one root CA (certificate authority), which issues certificates 
and a revocation list
 2) Sign the individual LANs' certificates with that CA's key
 3) Tell all IPSec routers in your LANs to trust certificates with a 
signature by the root CA
 4) Now, when one LAN A connects to another B for the first time, A can
send its own signed certificate. B allows the connection to be set up 
due to the fact that A's certificate carries a signature of the CA.

This means that each of your 100 LANs only needs a copy of the root CA's 
certificate in order to connect to any other LAN.

You must maintain a CRL (certificate revocation list) to be able to remove
certain LANs from your big VPN without updating all nodes. See the PDF
which is the first link on http://www.strongsec.com/freeswan/, sections
3.1 and 3.2.

HTH,

  Richard

-- 
  __   _
  |_) /|  Richard Atterer |  GnuPG key:
  | \/¯|  http://atterer.net  |  0x888354F7
  ¯ '` ¯



Re: Big VPN

2004-03-03 Thread Ronny Adsetts

Milan P. Stanic was heard to utter, at roughly 03/03/04 00:25:


On Tue, Mar 02, 2004 at 03:37:52PM -0600, Jacques Normand wrote:


On Tue, Mar 02, 2004 at 10:08:22PM +0100, J.H.M. Dassen (Ray) wrote:


If you're looking for a VPN solution, by all means look at FreeS/WAN (or its
likely successor, OpenSWAN). Just forget about OE. OE isn't about the type
of security you're looking for in a VPN.


And what about the ipsec system in the 2.6 kernel (KAME) and the racoon
daemon for initial key exchange? It does the same work as freeswan but
it is still developped..


FreeS/WAN is orphaned upstream. OpenSWAN is based on FreeS/WAN and as
such it does not work with 2.6.


As others have mentioned, v2 of both FreeSWAN and OpenSWAN work with the 
native IPSEC strack of 2.6.x. You do need the ipsec-tools package too.



I'm not sure but I think that Herbert Xu (Debian kernel maintainer)
added patches to pluto (FreeS/WAN IKE daemon) to work with IPSec in
the kernel 2.6.x



Herbert also added the backport of the native IPSEC stack from 2.6 to the 
Debian kernels from 2.4.22 onwards IIRC. It's certainly in 2.4.25. I've not 
tried these kernels and the native IPSEC in combination with FreeSWAN yet 
but intend to do so soon.



Racoon is in FreeBSD for few years and is actively developed.



What is Racoon like in terms of configuration ease? I've used FreeSWAN and 
wilst it's not the easiest to set up, once you've got your head around it, 
it does make sense.


Ronny
--
Technical Director
Amazing Internet Ltd, London
t: +44 20 8607 9535
f: +44 20 8607 9536
w: www.amazinginternet.com



Re: Big VPN

2004-03-03 Thread Dariush Pietrzak
 What is Racoon like in terms of configuration ease? I've used FreeSWAN and 
 wilst it's not the easiest to set up, once you've got your head around it, 
 it does make sense.
 Racoon makes sense from the start;)

-- 
Dariush Pietrzak,
Key fingerprint = 40D0 9FFB 9939 7320 8294  05E0 BCC7 02C4 75CC 50D9



Re: Big VPN

2004-03-03 Thread Richard Atterer
Hi, CCing the list again because other people might have cleverer ideas. I 
hope you don't mind, Jaroslaw.

On Wed, Mar 03, 2004 at 11:36:27AM +0100, Jaros?aw Tabor wrote:
 That's OK. But what about routing ? How to inform other nodes, about new
 subnet ? I think, that this will require some kind of dynamic routing and
 IPSec on demand. But, as I see from freeswan and openswan doc, this isn't
 supported.

Hmm, you are right... The only solution I see ATM is to pre-configure an
appropriate amount of subnets on each LAN's IPSec router in advance, say
200. :-/ LAN number n gets the network 10.0.n.0/24, and its IPSec router is
set up as ipsecn.mydomain.net.

Later, when network number 42 has been set up to use 10.0.42.0/24, you only
need to update the DNS entry of ipsec42.mydomain.net and all other LANs 
should be able to use it. (New IPSec links will be set up on demand once 
anyone tries to connect to the new network.)

Obviously, an alternative would be to have one central node which acts as
as a router between any two LANs. This will be much easier to maintain, I
don't know if the resulting single point of failure and possibly lower
performance are a problem for you. Each of the 100 LANs would just route
all 10.0.0.0/16 addresses to the central node, and only the central node
would be trusted, so you don't have to mess with CAs etc...

Cheers,

  Richard

--
  __   _
  |_) /|  Richard Atterer |  GnuPG key:
  | \/¯|  http://atterer.net  |  0x888354F7
  ¯ '` ¯



Re: Big VPN

2004-03-03 Thread Milan P. Stanic
On Wed, Mar 03, 2004 at 08:54:38AM +0100, Dariush Pietrzak wrote:
  FreeS/WAN is orphaned upstream. OpenSWAN is based on FreeS/WAN and as
  such it does not work with 2.6.
  That is untrue. 
 1.x branch works with 2.4.x kernels, 2.x branch works with 2.6.x

Right! I shouldn't write mail at 01:25 after midnight :-)
I used freeswan for years but I'm switching to racoon so I don't
follow freeswan (or openswan) anymore. Sorry for inconvenience.



Big VPN

2004-03-02 Thread Jaroslaw Tabor
Hi all!

I know that this list isn't the best place to ask, but I'm reding this
list for years. I hope You will forgive me :)

I'm looking for good linux (debian of course) based solution for VPN
connecting about 100 LANs. The solution should be stable, easy for
implementation and easy for management. I've some expirience with VPNs
based on PPTPd, but not so big. I've reviewed freeswan and OE feauture.
This looks nice, but I'm afraid about security. If I understand this
solution right there is no authentication at all. So every one can
connect to the LANs if he will spoof IP. I need something better,
because I cannot trust to LAN users. To avoid that, I have idea, to use
some kind of secure DNS, which will answer only to authorized peers, but
I don't know how to do it.
Finally, the questions:
Did someone sucessfully build such network ? If yes, how?
Do You know any other VPN solution for this problem?
If my idea isn't so bad, how to add secure authentication for OE
solution.
Is there any solution to easily manage keys in so big network, if I will
choice freeswan (or other) without OE ?

best regards
Jarek
PS: Sorry, for my poor english, I'm not a native speaker.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Big VPN

2004-03-02 Thread I.R. van Dongen
Jaroslaw Tabor wrote:

Hi all!

I know that this list isn't the best place to ask, but I'm reding this
list for years. I hope You will forgive me :)
I'm looking for good linux (debian of course) based solution for VPN
connecting about 100 LANs. The solution should be stable, easy for
implementation and easy for management. I've some expirience with VPNs
based on PPTPd, but not so big. I've reviewed freeswan and OE feauture.
This looks nice, but I'm afraid about security. If I understand this
solution right there is no authentication at all. So every one can
connect to the LANs if he will spoof IP. I need something better,
because I cannot trust to LAN users. To avoid that, I have idea, to use
some kind of secure DNS, which will answer only to authorized peers, but
I don't know how to do it.
Finally, the questions:
Did someone sucessfully build such network ? If yes, how?
Do You know any other VPN solution for this problem?
If my idea isn't so bad, how to add secure authentication for OE
solution.
Is there any solution to easily manage keys in so big network, if I will
choice freeswan (or other) without OE ?
 

You might want to check tinc (http://tinc.nl.linux.org)

best regards
Jarek
PS: Sorry, for my poor english, I'm not a native speaker.
 

me neither :)

Gr,

Ivo

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


Re: Big VPN

2004-03-02 Thread J.H.M. Dassen (Ray)
On Tue, Mar 02, 2004 at 21:41:34 +0100, Jaroslaw Tabor wrote:
 I've reviewed freeswan and OE feauture. This looks nice, but I'm afraid
 about security.

If you're looking for a VPN solution, by all means look at FreeS/WAN (or its
likely successor, OpenSWAN). Just forget about OE. OE isn't about the type
of security you're looking for in a VPN.

 If I understand this solution right there is no authentication at all.

With OE that may be true. For a VPN you shouldn't configure OE, but use one
of the authentication methods in IPSec, like RSA digital signatures, or a
shared secret.

http://en.wikipedia.org/wiki/IPSEC provides a nice overview of IPSec.

HTH,
Ray
-- 
AJ: Geeez, Erwin. He wasn't even ARMED.
Erwin: I don't care. I have lots of ammo and he was wearing a TIE.
http://ars.userfriendly.org/cartoons/?id=20010209


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Big VPN

2004-03-02 Thread Jacques Normand
On Tue, Mar 02, 2004 at 10:08:22PM +0100, J.H.M. Dassen (Ray) wrote:
 On Tue, Mar 02, 2004 at 21:41:34 +0100, Jaroslaw Tabor wrote:
  I've reviewed freeswan and OE feauture. This looks nice, but I'm afraid
  about security.
 
 If you're looking for a VPN solution, by all means look at FreeS/WAN (or its
 likely successor, OpenSWAN). Just forget about OE. OE isn't about the type
 of security you're looking for in a VPN.

And what about the ipsec system in the 2.6 kernel (KAME) and the racoon
daemon for initial key exchange? It does the same work as freeswan but
it is still developped..

jacques


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Big VPN

2004-03-02 Thread Richard Atterer
On Tue, Mar 02, 2004 at 10:00:58PM +0100, I.R. van Dongen wrote:
 You might want to check tinc (http://tinc.nl.linux.org)

I strongly recommend *not* to use tinc. 
http://www.securityfocus.com/archive/1/249142 illustrates that the
authors didn't have enough expertise to build a secure tool 2 years ago.
The problems were still present last autumn, see
http://www.mit.edu:8008/bloom-picayune/crypto/14238. What a track record!

With VPN software, IPSec is the only real option if you want to be certain
it is secure.

 Jaroslaw Tabor wrote:
 I'm looking for good linux (debian of course) based solution for VPN
 connecting about 100 LANs. The solution should be stable, easy for
 implementation and easy for management. I've some expirience with VPNs
 based on PPTPd, but not so big.

PPTP is also believed not to be quite insecure, see
http://www.schneier.com/pptp-faq.html (NB old!). A small number of people
believe it's OK these days due to some improvements made by Microsoft
http://www.schneier.com/paper-pptpv2.html, but I still wouldn't recommend
it.

Does each of these 100 LANs need to connect to *any* other LAN, or just to 
your LAN? Are the LANs real LANs or do you only want to connect single 
road warrior machines to your LAN?

 I've reviewed freeswan and OE feauture. This looks nice, but I'm afraid
 about security. If I understand this solution right there is no
 authentication at all. So every one can connect to the LANs if he will
 spoof IP.

I don't think it is the right thing for you, yes. Its main objective (in my 
eyes) is to protect general internet traffic from people who are not 
willing/able to do man-in-the-middle attacks, i.e. from people who just 
sniff on the wire. At least that's what it boils down to as long as no 
secure DNS is available...

 I need something better, because I cannot trust to LAN users. To avoid
 that, I have idea, to use some kind of secure DNS, which will answer
 only to authorized peers, but I don't know how to do it.

What's wrong with IPSec with X.509 certificates? You can give out a signed
certificate to all people who should get access to your network, and remove 
individual people from the allowed list if necessary. IPSec works with 
all OSes as clients. The only downside (IMHO) is that the server can be 
fairly complex to set up for this kind of scenario.

Secure DNS doesn't exist today, does it?

 Finally, the questions:
 Did someone sucessfully build such network ? If yes, how?

Well, since I'm in the mood of handing out URLs today ;-), here are some
useful pages I found about IPSec setups involving both Linux and Windows
clients.

http://www.freeswan.org/ - you've seen this already I guess :)
http://www.natecarlson.com/linux/ipsec-x509.php
http://www.ipsec-howto.org/ - new kernel 2.6.0 IPSec
http://ipsec.math.ucla.edu/services/ipsec.html
http://lugbe.ch/action/reports/ipsec_htbe.phtml
http://vpn.ebootis.de/

 Is there any solution to easily manage keys in so big network, if I will
 choice freeswan (or other) without OE ?

100 VPN connections isn't /that/ much, I think FreeS/WAN or the 2.6.0 IPSec 
should be able to handle it. (Maybe ask the developers to ensure it does.)

 PS: Sorry, for my poor english, I'm not a native speaker.
 me neither :)
Ditto. :-)

ü,

  Richard

-- 
  __   _
  |_) /|  Richard Atterer |  GnuPG key:
  | \/¯|  http://atterer.net  |  0x888354F7
  ¯ '` ¯


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Big VPN

2004-03-02 Thread I.R. van Dongen
Richard Atterer wrote:

On Tue, Mar 02, 2004 at 10:00:58PM +0100, I.R. van Dongen wrote:
 

You might want to check tinc (http://tinc.nl.linux.org)
   

I strongly recommend *not* to use tinc. 
http://www.securityfocus.com/archive/1/249142 illustrates that the
authors didn't have enough expertise to build a secure tool 2 years ago.
The problems were still present last autumn, see
http://www.mit.edu:8008/bloom-picayune/crypto/14238. What a track record!

With VPN software, IPSec is the only real option if you want to be certain
it is secure.
 

Nice, the first article is based on a alpha version (pre-beta) of tinc, 
you didn't include the official answer.

This sounds alot like FUD, are you the author of a compeditive product?

Gr,

Ivo

PS. cc: to tinc mailinglist



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


Re: Big VPN

2004-03-02 Thread Jan Minar
On Wed, Mar 03, 2004 at 12:18:32AM +0100, I.R. van Dongen wrote:
 Richard Atterer wrote:
 
 On Tue, Mar 02, 2004 at 10:00:58PM +0100, I.R. van Dongen wrote:
  
 
 You might want to check tinc (http://tinc.nl.linux.org)

 
 
 I strongly recommend *not* to use tinc. 
 http://www.securityfocus.com/archive/1/249142 illustrates that the
 authors didn't have enough expertise to build a secure tool 2 years ago.
 The problems were still present last autumn, see
 http://www.mit.edu:8008/bloom-picayune/crypto/14238. What a track record!
 
 With VPN software, IPSec is the only real option if you want to be certain
 it is secure.
  
 
 Nice, the first article is based on a alpha version (pre-beta) of tinc, 
 you didn't include the official answer.

IMHO, the key words in Richard's posting are ``[not] enough expertise'',
and ``a track record''.  The idea that the [conceptual] flaws will be
fixed in The Next Release [TM], although quite common amongst the
people, is a mere instance of a proof by wishful thinking.  Clueless
authors will always produce crappy software, regardless of how long
they've been in the business.

 This sounds alot like FUD, are you the author of a compeditive product?

Occasionally, I author thoughts and speeches that require the audience to
use their brain.  Does it count?

HAND.
Jan.

-- 
``You know those mail clients:  MS Outlook, mail(1), or even telnet(1).
  All of them suck.  This one just sucks less.''


pgp0.pgp
Description: PGP signature


Re: Big VPN

2004-03-02 Thread Luca Filipozzi
On Wed, Mar 03, 2004 at 12:18:32AM +0100, I.R. van Dongen wrote:
 Richard Atterer wrote:
 On Tue, Mar 02, 2004 at 10:00:58PM +0100, I.R. van Dongen wrote:
  You might want to check tinc (http://tinc.nl.linux.org)
 
  
 
 I strongly recommend *not* to use tinc. 
 http://www.securityfocus.com/archive/1/249142 illustrates that the
 authors didn't have enough expertise to build a secure tool 2 years ago.
 The problems were still present last autumn, see
 http://www.mit.edu:8008/bloom-picayune/crypto/14238. What a track record!
 
 With VPN software, IPSec is the only real option if you want to be certain
 it is secure.
 
 Nice, the first article is based on a alpha version (pre-beta) of tinc, 
 you didn't include the official answer.
 
 This sounds alot like FUD, are you the author of a compeditive product?

What about the second link?  Perhaps you could have pointed us to TINC's
reply to Gutmann's (the second link) criticisms rather than simply
claiming this is FUD.

Unfortunately, I can only point to the google cache of the TINC's
response since the machine (nl.linux.org) that hosts TINC's website has
been rooted.  Anyway, here's the google cache of the response:

http://www.google.ca/search?q=cache:tinc.nl.linux.org/security

Gutmann's criticisms, slightly expanded over his original posting, can
be found here:

http://www.cs.auckland.ac.nz/~pgut001/pubs/linux_vpn.txt

I'm personally in favour of an IPsec VPN using openbsd or linux 2.6.  I
think an acceptable user-land alternative might be openvpn.  I would
have to do more investigation of Gutmann's claims before feeling
comfortable with the other user-land alternatives: tinc, cipe or vtun.

Yours,

Luca

-- 
Luca Filipozzi
gpgkey 5A827A2D - A149 97BD 188C 7F29 779E  09C1 3573 32C4 5A82 7A2D


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Big VPN

2004-03-02 Thread Milan P. Stanic
On Tue, Mar 02, 2004 at 03:37:52PM -0600, Jacques Normand wrote:
 On Tue, Mar 02, 2004 at 10:08:22PM +0100, J.H.M. Dassen (Ray) wrote:
  If you're looking for a VPN solution, by all means look at FreeS/WAN (or its
  likely successor, OpenSWAN). Just forget about OE. OE isn't about the type
  of security you're looking for in a VPN.
 
 And what about the ipsec system in the 2.6 kernel (KAME) and the racoon
 daemon for initial key exchange? It does the same work as freeswan but
 it is still developped..

FreeS/WAN is orphaned upstream. OpenSWAN is based on FreeS/WAN and as
such it does not work with 2.6.
I'm not sure but I think that Herbert Xu (Debian kernel maintainer)
added patches to pluto (FreeS/WAN IKE daemon) to work with IPSec in
the kernel 2.6.x

Racoon is in FreeBSD for few years and is actively developed.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Big VPN

2004-03-02 Thread I.R. van Dongen
Jan Minar wrote:

IMHO, the key words in Richard's posting are ``[not] enough expertise'',
and ``a track record''.  The idea that the [conceptual] flaws will be
fixed in The Next Release [TM], although quite common amongst the
people, is a mere instance of a proof by wishful thinking.  Clueless
authors will always produce crappy software, regardless of how long
they've been in the business.
 

It's not about releases, it's about auditing a product before the 
authors accually have made their minds up about where the product is 
going. Tinc started out as a idea on using the tap device for something 
useful. It migrated to a pretty nice vpn solution.
Even linus made some pretty bad coding errors when he started out with 
linux, if you want to imply that when  software, or a part of it was 
once flawed, you shouldn't trust the author ever, you shouldn't use 
linux at all.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


Re: Big VPN

2004-03-02 Thread Bernd Eckenfels
In article [EMAIL PROTECTED] you wrote:
 I'm personally in favour of an IPsec VPN using openbsd or linux 2.6.

For a distributed Installation with up to 100 sites, I strongly recommend to go
with a small SOHO Router appliance. Because they are easy to replace with
UPS delivery, they are more robust than PC Hardware, and have less
mechanical parts.

Depending on your topology, a simple commercial concentrator in the main
office, may also be much better than implementing a Linux solution, as long
as you do not have reasonable experiences. I tink the OP made himself clear,
he has none.

There might be good reasons to go with an OpenBD or Linux 2.6 IPSec Installation,
in that case go for it. If you do not need the programmable features, and you 
do not have experiences in Linux Networking and IPSec, safe the money for endless
work hours to get it up, running.

Greetings
Bernd
-- 
eckes privat - http://www.eckes.org/
Project Freefire - http://www.freefire.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Big VPN

2004-03-02 Thread Jan Minar
On Wed, Mar 03, 2004 at 01:33:17AM +0100, I.R. van Dongen wrote:
 Jan Minar wrote:
 
 IMHO, the key words in Richard's posting are ``[not] enough expertise'',
 and ``a track record''.  The idea that the [conceptual] flaws will be
 fixed in The Next Release [TM], although quite common amongst the
 people, is a mere instance of a proof by wishful thinking.  Clueless
 authors will always produce crappy software, regardless of how long
 they've been in the business.
  
 
 It's not about releases, it's about auditing a product before the 
 authors accually have made their minds up about where the product is 
 going.

They made the minds quite early.  They just had not enough expertise to
implement it.  Now are the supposed auditors going to handhold the tinc
people every time they will add some more code?  If not, have the tinc
people enough expertise to do it right, now?

Tinc started out as a idea on using the tap device for something 
 useful. It migrated to a pretty nice vpn solution.

One thing is a fast prototyping, when I implement a phony MIC, for
example, and I comment it as such, and another thing is a hotch-potch
coding, when I get pieces together just to look like a valid MIC.
AFAICT, the tinc people did the latter.  I tend to presume this coding
practice is still present with them.

Note that we are not talking feature completeness, but that the actual
implementation of (alleged) general features, e.g. confidentiality, and
authenticity, was flawed.

 Even linus made some pretty bad coding errors when he started out with 
 linux, if you want to imply that when  software, or a part of it was 
 once flawed, you shouldn't trust the author ever, you shouldn't use 
 linux at all.

The same goes for Linux.  Although it might have been a major leap from
2.2 to 2.4 and to 2.6, the overall experience is still the same: some
things work, some have problems that have to be tracked down and
repaired manually, some won't even compile. And I have to reboot time to
time.  I presume this will be the case with 3.0, 3.2, 3.4, too.

The rule of thumb is the things just don't change.  Because great amount
of the code doesn't change after initial testing, because the authors'
attitude seldom changes, because it would require incompatible changes
to the underlaying protocols, etc.

FWIW, J.

-- 
``You know those mail clients:  MS Outlook, mail(1), or even telnet(1).
  All of them suck.  This one just sucks less.''


pgp0.pgp
Description: PGP signature


Re: Big VPN

2004-03-02 Thread J.H.M. Dassen (Ray)
On Wed, Mar 03, 2004 at 01:25:46 +0100, Milan P. Stanic wrote:
 FreeS/WAN is orphaned upstream. OpenSWAN is based on FreeS/WAN and as
 such it does not work with 2.6.

For Kernel's 2.6.0 and higher, Openswan uses the built in IPsec support.
Only the userland component of Openswan is required to use Openswan with a
2.6 series kernel. 
[...] 
Note: you will need setkey from the ipsec-tools package, available from
http://ipsec-tools.sourceforge.net;
(From http://www.openswan.org/code/openswan-2.1.0rc1.tar.gz's README)

The way I read it is that the userland part of Openswan works fine with 2.6,
it's just that with a 2.6 kernel its IPSec kernel part is used rather than
an Openswan or FreeS/WAN one as was the case with 2.4 (which didn't have an
IPSec kernel part by default).

Ray
-- 
Those who are willing to trade their liberty for security deserve neither.
Benjamin Franklin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Big VPN

2004-03-02 Thread Dariush Pietrzak
 think an acceptable user-land alternative might be openvpn.  I would
 I don't think openvpn would easily handle such large number of connections,
it would be also a configuration nightmare.
tinc was designed to handle such scenario, but I wouldn't use anything
user-land for ~100 lans, no metter how maintainable the configuration is.
 I guess best bet is kernel 2.6.x and racoon-based key management. 

Oh, and btw, if you're going to use FreeS/WAN, better look at 
http://www.openswan.org, they've got the good code. ( and backwards
compatbile, if you've got frees/wan based network and want to upgrade to
2.4.25 you're out of luck with free s/wan - they migrated to 2.x with never
kernel, and it means you need to upgrade your userland tools, and probably
tune configuration a bit. Openswan works nicely with upgrades ).

-- 
Dariush Pietrzak,
Key fingerprint = 40D0 9FFB 9939 7320 8294  05E0 BCC7 02C4 75CC 50D9


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Big VPN

2004-03-02 Thread Dariush Pietrzak
 FreeS/WAN is orphaned upstream. OpenSWAN is based on FreeS/WAN and as
 such it does not work with 2.6.
 That is untrue. 
1.x branch works with 2.4.x kernels, 2.x branch works with 2.6.x
-- 
Dariush Pietrzak,
Key fingerprint = 40D0 9FFB 9939 7320 8294  05E0 BCC7 02C4 75CC 50D9


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Big VPN

2004-03-02 Thread Jaroslaw Tabor
Hi all!

I know that this list isn't the best place to ask, but I'm reding this
list for years. I hope You will forgive me :)

I'm looking for good linux (debian of course) based solution for VPN
connecting about 100 LANs. The solution should be stable, easy for
implementation and easy for management. I've some expirience with VPNs
based on PPTPd, but not so big. I've reviewed freeswan and OE feauture.
This looks nice, but I'm afraid about security. If I understand this
solution right there is no authentication at all. So every one can
connect to the LANs if he will spoof IP. I need something better,
because I cannot trust to LAN users. To avoid that, I have idea, to use
some kind of secure DNS, which will answer only to authorized peers, but
I don't know how to do it.
Finally, the questions:
Did someone sucessfully build such network ? If yes, how?
Do You know any other VPN solution for this problem?
If my idea isn't so bad, how to add secure authentication for OE
solution.
Is there any solution to easily manage keys in so big network, if I will
choice freeswan (or other) without OE ?

best regards
Jarek
PS: Sorry, for my poor english, I'm not a native speaker.




Re: Big VPN

2004-03-02 Thread I.R. van Dongen

Jaroslaw Tabor wrote:


Hi all!

I know that this list isn't the best place to ask, but I'm reding this
list for years. I hope You will forgive me :)

I'm looking for good linux (debian of course) based solution for VPN
connecting about 100 LANs. The solution should be stable, easy for
implementation and easy for management. I've some expirience with VPNs
based on PPTPd, but not so big. I've reviewed freeswan and OE feauture.
This looks nice, but I'm afraid about security. If I understand this
solution right there is no authentication at all. So every one can
connect to the LANs if he will spoof IP. I need something better,
because I cannot trust to LAN users. To avoid that, I have idea, to use
some kind of secure DNS, which will answer only to authorized peers, but
I don't know how to do it.
Finally, the questions:
Did someone sucessfully build such network ? If yes, how?
Do You know any other VPN solution for this problem?
If my idea isn't so bad, how to add secure authentication for OE
solution.
Is there any solution to easily manage keys in so big network, if I will
choice freeswan (or other) without OE ?

 



You might want to check tinc (http://tinc.nl.linux.org)


best regards
Jarek
PS: Sorry, for my poor english, I'm not a native speaker.
 


me neither :)

Gr,

Ivo



Re: Big VPN

2004-03-02 Thread J.H.M. Dassen (Ray)
On Tue, Mar 02, 2004 at 21:41:34 +0100, Jaroslaw Tabor wrote:
 I've reviewed freeswan and OE feauture. This looks nice, but I'm afraid
 about security.

If you're looking for a VPN solution, by all means look at FreeS/WAN (or its
likely successor, OpenSWAN). Just forget about OE. OE isn't about the type
of security you're looking for in a VPN.

 If I understand this solution right there is no authentication at all.

With OE that may be true. For a VPN you shouldn't configure OE, but use one
of the authentication methods in IPSec, like RSA digital signatures, or a
shared secret.

http://en.wikipedia.org/wiki/IPSEC provides a nice overview of IPSec.

HTH,
Ray
-- 
AJ: Geeez, Erwin. He wasn't even ARMED.
Erwin: I don't care. I have lots of ammo and he was wearing a TIE.
http://ars.userfriendly.org/cartoons/?id=20010209



Re: Big VPN

2004-03-02 Thread Jacques Normand
On Tue, Mar 02, 2004 at 10:08:22PM +0100, J.H.M. Dassen (Ray) wrote:
 On Tue, Mar 02, 2004 at 21:41:34 +0100, Jaroslaw Tabor wrote:
  I've reviewed freeswan and OE feauture. This looks nice, but I'm afraid
  about security.
 
 If you're looking for a VPN solution, by all means look at FreeS/WAN (or its
 likely successor, OpenSWAN). Just forget about OE. OE isn't about the type
 of security you're looking for in a VPN.

And what about the ipsec system in the 2.6 kernel (KAME) and the racoon
daemon for initial key exchange? It does the same work as freeswan but
it is still developped..

jacques



Re: Big VPN

2004-03-02 Thread Richard Atterer
On Tue, Mar 02, 2004 at 10:00:58PM +0100, I.R. van Dongen wrote:
 You might want to check tinc (http://tinc.nl.linux.org)

I strongly recommend *not* to use tinc. 
http://www.securityfocus.com/archive/1/249142 illustrates that the
authors didn't have enough expertise to build a secure tool 2 years ago.
The problems were still present last autumn, see
http://www.mit.edu:8008/bloom-picayune/crypto/14238. What a track record!

With VPN software, IPSec is the only real option if you want to be certain
it is secure.

 Jaroslaw Tabor wrote:
 I'm looking for good linux (debian of course) based solution for VPN
 connecting about 100 LANs. The solution should be stable, easy for
 implementation and easy for management. I've some expirience with VPNs
 based on PPTPd, but not so big.

PPTP is also believed not to be quite insecure, see
http://www.schneier.com/pptp-faq.html (NB old!). A small number of people
believe it's OK these days due to some improvements made by Microsoft
http://www.schneier.com/paper-pptpv2.html, but I still wouldn't recommend
it.

Does each of these 100 LANs need to connect to *any* other LAN, or just to 
your LAN? Are the LANs real LANs or do you only want to connect single 
road warrior machines to your LAN?

 I've reviewed freeswan and OE feauture. This looks nice, but I'm afraid
 about security. If I understand this solution right there is no
 authentication at all. So every one can connect to the LANs if he will
 spoof IP.

I don't think it is the right thing for you, yes. Its main objective (in my 
eyes) is to protect general internet traffic from people who are not 
willing/able to do man-in-the-middle attacks, i.e. from people who just 
sniff on the wire. At least that's what it boils down to as long as no 
secure DNS is available...

 I need something better, because I cannot trust to LAN users. To avoid
 that, I have idea, to use some kind of secure DNS, which will answer
 only to authorized peers, but I don't know how to do it.

What's wrong with IPSec with X.509 certificates? You can give out a signed
certificate to all people who should get access to your network, and remove 
individual people from the allowed list if necessary. IPSec works with 
all OSes as clients. The only downside (IMHO) is that the server can be 
fairly complex to set up for this kind of scenario.

Secure DNS doesn't exist today, does it?

 Finally, the questions:
 Did someone sucessfully build such network ? If yes, how?

Well, since I'm in the mood of handing out URLs today ;-), here are some
useful pages I found about IPSec setups involving both Linux and Windows
clients.

http://www.freeswan.org/ - you've seen this already I guess :)
http://www.natecarlson.com/linux/ipsec-x509.php
http://www.ipsec-howto.org/ - new kernel 2.6.0 IPSec
http://ipsec.math.ucla.edu/services/ipsec.html
http://lugbe.ch/action/reports/ipsec_htbe.phtml
http://vpn.ebootis.de/

 Is there any solution to easily manage keys in so big network, if I will
 choice freeswan (or other) without OE ?

100 VPN connections isn't /that/ much, I think FreeS/WAN or the 2.6.0 IPSec 
should be able to handle it. (Maybe ask the developers to ensure it does.)

 PS: Sorry, for my poor english, I'm not a native speaker.
 me neither :)
Ditto. :-)

ü,

  Richard

-- 
  __   _
  |_) /|  Richard Atterer |  GnuPG key:
  | \/¯|  http://atterer.net  |  0x888354F7
  ¯ '` ¯



Re: Big VPN

2004-03-02 Thread I.R. van Dongen

Richard Atterer wrote:


On Tue, Mar 02, 2004 at 10:00:58PM +0100, I.R. van Dongen wrote:
 


You might want to check tinc (http://tinc.nl.linux.org)
   



I strongly recommend *not* to use tinc. 
http://www.securityfocus.com/archive/1/249142 illustrates that the

authors didn't have enough expertise to build a secure tool 2 years ago.
The problems were still present last autumn, see
http://www.mit.edu:8008/bloom-picayune/crypto/14238. What a track record!

With VPN software, IPSec is the only real option if you want to be certain
it is secure.
 

Nice, the first article is based on a alpha version (pre-beta) of tinc, 
you didn't include the official answer.


This sounds alot like FUD, are you the author of a compeditive product?

Gr,

Ivo

PS. cc: to tinc mailinglist





Re: Big VPN

2004-03-02 Thread Jan Minar
On Wed, Mar 03, 2004 at 12:18:32AM +0100, I.R. van Dongen wrote:
 Richard Atterer wrote:
 
 On Tue, Mar 02, 2004 at 10:00:58PM +0100, I.R. van Dongen wrote:
  
 
 You might want to check tinc (http://tinc.nl.linux.org)

 
 
 I strongly recommend *not* to use tinc. 
 http://www.securityfocus.com/archive/1/249142 illustrates that the
 authors didn't have enough expertise to build a secure tool 2 years ago.
 The problems were still present last autumn, see
 http://www.mit.edu:8008/bloom-picayune/crypto/14238. What a track record!
 
 With VPN software, IPSec is the only real option if you want to be certain
 it is secure.
  
 
 Nice, the first article is based on a alpha version (pre-beta) of tinc, 
 you didn't include the official answer.

IMHO, the key words in Richard's posting are ``[not] enough expertise'',
and ``a track record''.  The idea that the [conceptual] flaws will be
fixed in The Next Release [TM], although quite common amongst the
people, is a mere instance of a proof by wishful thinking.  Clueless
authors will always produce crappy software, regardless of how long
they've been in the business.

 This sounds alot like FUD, are you the author of a compeditive product?

Occasionally, I author thoughts and speeches that require the audience to
use their brain.  Does it count?

HAND.
Jan.

-- 
``You know those mail clients:  MS Outlook, mail(1), or even telnet(1).
  All of them suck.  This one just sucks less.''


pgppSQ3etPmVh.pgp
Description: PGP signature


Re: Big VPN

2004-03-02 Thread Luca Filipozzi
On Wed, Mar 03, 2004 at 12:18:32AM +0100, I.R. van Dongen wrote:
 Richard Atterer wrote:
 On Tue, Mar 02, 2004 at 10:00:58PM +0100, I.R. van Dongen wrote:
  You might want to check tinc (http://tinc.nl.linux.org)
 
  
 
 I strongly recommend *not* to use tinc. 
 http://www.securityfocus.com/archive/1/249142 illustrates that the
 authors didn't have enough expertise to build a secure tool 2 years ago.
 The problems were still present last autumn, see
 http://www.mit.edu:8008/bloom-picayune/crypto/14238. What a track record!
 
 With VPN software, IPSec is the only real option if you want to be certain
 it is secure.
 
 Nice, the first article is based on a alpha version (pre-beta) of tinc, 
 you didn't include the official answer.
 
 This sounds alot like FUD, are you the author of a compeditive product?

What about the second link?  Perhaps you could have pointed us to TINC's
reply to Gutmann's (the second link) criticisms rather than simply
claiming this is FUD.

Unfortunately, I can only point to the google cache of the TINC's
response since the machine (nl.linux.org) that hosts TINC's website has
been rooted.  Anyway, here's the google cache of the response:

http://www.google.ca/search?q=cache:tinc.nl.linux.org/security

Gutmann's criticisms, slightly expanded over his original posting, can
be found here:

http://www.cs.auckland.ac.nz/~pgut001/pubs/linux_vpn.txt

I'm personally in favour of an IPsec VPN using openbsd or linux 2.6.  I
think an acceptable user-land alternative might be openvpn.  I would
have to do more investigation of Gutmann's claims before feeling
comfortable with the other user-land alternatives: tinc, cipe or vtun.

Yours,

Luca

-- 
Luca Filipozzi
gpgkey 5A827A2D - A149 97BD 188C 7F29 779E  09C1 3573 32C4 5A82 7A2D



Re: Big VPN

2004-03-02 Thread Milan P. Stanic
On Tue, Mar 02, 2004 at 03:37:52PM -0600, Jacques Normand wrote:
 On Tue, Mar 02, 2004 at 10:08:22PM +0100, J.H.M. Dassen (Ray) wrote:
  If you're looking for a VPN solution, by all means look at FreeS/WAN (or its
  likely successor, OpenSWAN). Just forget about OE. OE isn't about the type
  of security you're looking for in a VPN.
 
 And what about the ipsec system in the 2.6 kernel (KAME) and the racoon
 daemon for initial key exchange? It does the same work as freeswan but
 it is still developped..

FreeS/WAN is orphaned upstream. OpenSWAN is based on FreeS/WAN and as
such it does not work with 2.6.
I'm not sure but I think that Herbert Xu (Debian kernel maintainer)
added patches to pluto (FreeS/WAN IKE daemon) to work with IPSec in
the kernel 2.6.x

Racoon is in FreeBSD for few years and is actively developed.



Re: Big VPN

2004-03-02 Thread I.R. van Dongen

Jan Minar wrote:


IMHO, the key words in Richard's posting are ``[not] enough expertise'',
and ``a track record''.  The idea that the [conceptual] flaws will be
fixed in The Next Release [TM], although quite common amongst the
people, is a mere instance of a proof by wishful thinking.  Clueless
authors will always produce crappy software, regardless of how long
they've been in the business.
 

It's not about releases, it's about auditing a product before the 
authors accually have made their minds up about where the product is 
going. Tinc started out as a idea on using the tap device for something 
useful. It migrated to a pretty nice vpn solution.
Even linus made some pretty bad coding errors when he started out with 
linux, if you want to imply that when  software, or a part of it was 
once flawed, you shouldn't trust the author ever, you shouldn't use 
linux at all.





Re: Big VPN

2004-03-02 Thread Bernd Eckenfels
In article [EMAIL PROTECTED] you wrote:
 I'm personally in favour of an IPsec VPN using openbsd or linux 2.6.

For a distributed Installation with up to 100 sites, I strongly recommend to go
with a small SOHO Router appliance. Because they are easy to replace with
UPS delivery, they are more robust than PC Hardware, and have less
mechanical parts.

Depending on your topology, a simple commercial concentrator in the main
office, may also be much better than implementing a Linux solution, as long
as you do not have reasonable experiences. I tink the OP made himself clear,
he has none.

There might be good reasons to go with an OpenBD or Linux 2.6 IPSec 
Installation,
in that case go for it. If you do not need the programmable features, and you 
do not have experiences in Linux Networking and IPSec, safe the money for 
endless
work hours to get it up, running.

Greetings
Bernd
-- 
eckes privat - http://www.eckes.org/
Project Freefire - http://www.freefire.org/