Re: ipsec in tunnel mode and dynamic routing
Joe Touch <touch@ISI.EDU> Tue, 20 November 2001 08:23 UTC
Received: from lists.tislabs.com (portal.gw.tislabs.com [192.94.214.101]) by above.proper.com (8.11.6/8.11.3) with ESMTP id fAK8No827574; Tue, 20 Nov 2001 00:23:50 -0800 (PST)
Received: by lists.tislabs.com (8.9.1/8.9.1) id CAA11725 Tue, 20 Nov 2001 02:27:17 -0500 (EST)
Message-ID: <3BFA07D0.3060903@isi.edu>
Date: Mon, 19 Nov 2001 23:35:44 -0800
From: Joe Touch <touch@ISI.EDU>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4) Gecko/20011019 Netscape6/6.2
X-Accept-Language: en-us
MIME-Version: 1.0
To: Henry Spencer <henry@spsystems.net>
CC: ipsec@lists.tislabs.com, xbone@ISI.EDU
Subject: Re: ipsec in tunnel mode and dynamic routing
References: <Pine.BSI.3.91.1011119190906.10966J-100000@spsystems.net>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Content-Transfer-Encoding: 7bit
Sender: owner-ipsec@lists.tislabs.com
Precedence: bulk
Henry Spencer wrote: > On Mon, 19 Nov 2001, Joe Touch wrote: > >>FWIW - this is yet another place where I'd prefer to let firewall rules >>do their job, and IPsec to its. >> > > I think you're missing an important point: the "sec" in "IPsec" stands > for "security", and that encompasses more than just encryption and > authentication. In particular, packet access controls are *inherently* > part of IP security; they are not a separate issue. IPsec's SPD *is* a > firewall, and it is a necessary part of IPsec. IPsec already requires that a packet, once decrypted or authenticated, passes _with_ that information thoughout the rest of the IP processing. The packet is allowed to leave IPsec and re-enter. There is no reason to incorporate redundant functions in IPsec to make it monolithic. >>The "full glory" (IMO) here lies in modularization rather than a stovepipe. > > Modularization is all very well for *mechanisms*, Actually, it is intended for implementations as well. > but there has to be > unified *policy* control of the mechanisms if real security is to result. Which is why packets must carry the security info with them. > There is nothing that says you can't implement the SPD using existing > firewall machinery, but it has to be done somehow. Leaving the firewall > in ignorance of what's going on with IPsec -- either by separating the two > completely, or by losing information when IPsec throws a packet over the > fence to the firewall -- does not work. Ahh- disconnnect on my part with the term 'firewall' - I meant 'firewall rules', as per ipfw. The entirety of what is considered a firewall includes both ipfw and IPsec, in that case. Joe
- ipsec in tunnel mode and dynamic routing Giaretta Gerardo
- Re: ipsec in tunnel mode and dynamic routing Derek Atkins
- RE: ipsec in tunnel mode and dynamic routing Giaretta Gerardo
- Re: ipsec in tunnel mode and dynamic routing Derek Atkins
- RE: ipsec in tunnel mode and dynamic routing Giaretta Gerardo
- Re: ipsec in tunnel mode and dynamic routing Ricky Charlet
- Re: ipsec in tunnel mode and dynamic routing Lars Eggert
- Re: ipsec in tunnel mode and dynamic routing Steven M. Bellovin
- Re: ipsec in tunnel mode and dynamic routing Derek Atkins
- Re: ipsec in tunnel mode and dynamic routing Steven M. Bellovin
- Re: ipsec in tunnel mode and dynamic routing Derek Atkins
- RE: ipsec in tunnel mode and dynamic routing Wang, Cliff
- Re: ipsec in tunnel mode and dynamic routing Derek Atkins
- Re: ipsec in tunnel mode and dynamic routing Henry Spencer
- Re: ipsec in tunnel mode and dynamic routing Ricky Charlet
- Re: ipsec in tunnel mode and dynamic routing Joe Touch
- Re: ipsec in tunnel mode and dynamic routing Joe Touch
- Re: ipsec in tunnel mode and dynamic routing Joe Touch
- Re: ipsec in tunnel mode and dynamic routing Lars Eggert
- Re: ipsec in tunnel mode and dynamic routing Joe Touch
- Re: ipsec in tunnel mode and dynamic routing Henry Spencer
- Re: ipsec in tunnel mode and dynamic routing Lars Eggert
- Re: ipsec in tunnel mode and dynamic routing Michael Richardson
- Re: ipsec in tunnel mode and dynamic routing Michael Richardson
- Re: ipsec in tunnel mode and dynamic routing Joe Touch
- Re: ipsec in tunnel mode and dynamic routing Joe Touch
- Re: ipsec in tunnel mode and dynamic routing Stephen Kent
- Re: ipsec in tunnel mode and dynamic routing Stephen Kent
- Re: ipsec in tunnel mode and dynamic routing Joe Touch
- Re: ipsec in tunnel mode and dynamic routing Stephen Kent
- Re: ipsec in tunnel mode and dynamic routing Joe Touch
- Re: ipsec in tunnel mode and dynamic routing Derek Atkins