At 02:13 AM 9/29/00 +0200, Harald Alvestrand wrote:
>At 09:42 26/09/2000 -0700, Paul Hoffman / VPNC wrote:
>>At 4:09 AM +0200 9/24/00, Fred Baker wrote:
>>>A VPN is, by my definition, any case where one overlays the global
>>>Internet with another private Internet using tunneling. Tunneling
>>>p
At 09:42 26/09/2000 -0700, Paul Hoffman / VPNC wrote:
>At 4:09 AM +0200 9/24/00, Fred Baker wrote:
>>A VPN is, by my definition, any case where one overlays the global
>>Internet with another private Internet using tunneling. Tunneling
>>procedures today include MPLS, IPSEC, IP/IP, GRE/IP, and p
> If IPSec adds any latency beyond startup negotiation
The encryption takes some time. Some $olutions will have
hardware for it, but straightforward implementations mean
lots of bit-field operations, which most C compilers don't
optimize very well, and some compilers on certain platforms
> The "P" in
> "VPN" stands for "privacy", which requires encryption ...
I expected the term or concept of "data confidentiality" (the "p" is
silent) to be bundled into this service model, not "privacy".
Eric
> The most popular IETF standard for VPNs is IPsec using ESP.
IPsec could be improved for wireless:
http://pilc.grc.nasa.gov/pilc/list/archive/1012.html
http://pilc.grc.nasa.gov/pilc/list/archive/1022.html
Now PPP-over-SSH isn't any better, just a lot easier and much less
expensive for most
At 2:19 PM -0700 9/26/00, Dave Crocker wrote:
>At 07:56 PM 9/26/00 +0100, Lloyd Wood wrote:
>>Beg to differ. Encapsulation makes the VPN virtual.
>>Encryption ensures that the VPN is private.
>>
>>All networks are privately managed, whether virtual or not; referring
>>to that explicitly seems a bi
> Usage of language does change and meaning does evolve. (has anyone set
> up a VPN sans encryption recently?)
Well, does it count if the encryption doesn't cover the whole path?
I'm aware of a number of ipsec "vpn" hardware vendors out there who
are looking to put encryption in ISP edge "concen
At 07:56 PM 9/26/00 +0100, Lloyd Wood wrote:
>Beg to differ. Encapsulation makes the VPN virtual.
>Encryption ensures that the VPN is private.
>
>All networks are privately managed, whether virtual or not; referring
>to that explicitly seems a bit pointless to me...
while your explanation is ent
For a number of years I have joking referred to VPNs without
encryption as "virtually private networks" as opposed to "virtual
private networks," to emphasize the difference. But, I agree, the
historical use of the acronym VPN did not imply crypto security, just
"private" management.
Steve
>>Others might have a very different definition of VPN. The "P" in "VPN"
>>stands for "privacy", which
>I thought the word was "private" rather than "privacy". "Private" has two
>different meanings, one for shutting out others from seeing, but the other
>referring to restricted management, as
At 09:42 AM 9/26/00 -0700, Paul Hoffman / VPNC wrote:
>Others might have a very different definition of VPN. The "P" in "VPN"
>stands for "privacy", which
I thought the word was "private" rather than "privacy". "Private" has two
different meanings, one for shutting out others from seeing, but t
At 4:09 AM +0200 9/24/00, Fred Baker wrote:
>A VPN is, by my definition, any case where one overlays the global
>Internet with another private Internet using tunneling. Tunneling
>procedures today include MPLS, IPSEC, IP/IP, GRE/IP, and probably
>several others.
Others might have a very differ
At 08:00 PM 9/20/00 -0700, dheep vijay b wrote:
>It would be of great pleasure if any one could help me finding the
>solution for whether " vpn's could be extended for mobile computing" if
>so how to go abt.
A VPN is, by my definition, any case where one overlays the global Internet
with ano
It would be of great pleasure if any one could help me finding
the solution for whether " vpn's could be extended for mobile computing" if
so how to go abt.
In the recent advancement in cellular phones ,it is made
possible to browse the internet .when this is made possible will it be abl
14 matches
Mail list logo