| To: | Rik van Riel <riel@xxxxxxxxxxxxxxxx>, netdev@xxxxxxxxxxx |
|---|---|
| Subject: | Re: RFC: p&p ipsec without authentication |
| From: | Andrew McGregor <andrew@xxxxxxxxxxxxxx> |
| Date: | Mon, 16 Dec 2002 10:59:10 +1300 |
| Cc: | linux-kernel@xxxxxxxxxxxxxxx |
| In-reply-to: | <Pine.LNX.4.50L.0212151745360.2711-100000@imladris.surriel.com> |
| References: | <Pine.LNX.4.50L.0212151745360.2711-100000@imladris.surriel.com> |
| Sender: | netdev-bounce@xxxxxxxxxxx |
|
It's not crazy at all. Perfectly practical, now that lots of people have
fast enough machines and slow enough connections that it won't drive them
mad with the performance issues :-) Actually, it can be done (fairly) securely against MITM attacks as well. Check out a keying protocol called HIP, most of the resources are linked to from www.hip4inter.net. The basic idea is that each end prove to the other that they know a private key. The MITM protection is quite hard to describe :-) And it can be done (at least on IPv6) with almost zero cost in time for connections that don't support HIP, as well as only one round trip + compute time for those that do. There are four implementations in progress, two for linux. It would be very nice to get the necessary hooks into the mainline kernel. Cool, eh? Andrew --On Sunday, December 15, 2002 18:34:06 -0200 Rik van Riel <riel@xxxxxxxxxxxxxxxx> wrote: Hi, |
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | RFC: p&p ipsec without authentication, Rik van Riel |
|---|---|
| Next by Date: | Re: [PATCH RESEND] memory leak in ndisc_router_discovery, YOSHIFUJI Hideaki / 吉藤英明 |
| Previous by Thread: | RFC: p&p ipsec without authentication, Rik van Riel |
| Next by Thread: | [patch] Make rt_cache_stat use kmalloc_percpu, Ravikiran G Thirumalai |
| Indexes: | [Date] [Thread] [Top] [All Lists] |