Re: Use IPSEC as SSH replacement

Dan McDonald <danmcd@Eng.Sun.Com> Wed, 02 December 1998 16:12 UTC

Received: by portal.ex.tis.com (8.9.1/8.9.1) id LAA17992 for ipsec-outgoing; Wed, 2 Dec 1998 11:12:59 -0500 (EST)
From: Dan McDonald <danmcd@Eng.Sun.Com>
Message-Id: <199812021631.IAA11588@kebe.eng.sun.com>
Subject: Re: Use IPSEC as SSH replacement
To: kent@bbn.com
Date: Wed, 02 Dec 1998 08:31:34 -0800
Cc: ipsec@tis.com
In-Reply-To: <v04011702b28b0c01dcbd@[128.89.0.110]> from "Stephen Kent" at Dec 2, 98 10:36:41 am
X-Legal-Disclaimer: Please note that the information being provided does not constitute a warranty or a modification of any agreement you may have with Sun Microsystems, Inc., its subsidiaries or its customers.
X-Mailer: ELM [version 2.4 PL25]
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7bit
Sender: owner-ipsec@ex.tis.com
Precedence: bulk

> In a native host implementation, an application can determine what IPsec
> services are applied to each data stream.  The only real issue is the API
> for doing this, and I thought PFKey was a step in that direction.

PF_KEY does not solve this problem.  It solves the "user-level IKE daemon
talking to the kernel SADB" problem.

I had some "IPsec socket API extensions" drafts out a while back.  Craig Metz
has a "net-security-api" draft out.  This is the sort of API that you're
talking about, Steve.

Dan