From owner-freebsd-security Sun Sep 24 13:29: 4 2000 Delivered-To: freebsd-security@freebsd.org Received: from flood.ping.uio.no (flood.ping.uio.no [129.240.78.31]) by hub.freebsd.org (Postfix) with ESMTP id BF42C37B422 for ; Sun, 24 Sep 2000 13:29:01 -0700 (PDT) Received: (from des@localhost) by flood.ping.uio.no (8.9.3/8.9.3) id WAA49707; Sun, 24 Sep 2000 22:28:55 +0200 (CEST) (envelope-from des@ofug.org) X-URL: http://www.ofug.org/~des/ X-Disclaimer: The views expressed in this message do not necessarily coincide with those of any organisation or company with which I am or have been affiliated. To: mipam@ibb.net Cc: "Vladimir Mencl, MK, susSED" , Ali Alaoui El Hassani <961BE653994@stud.alakhawayn.ma>, CrazZzy Slash , freebsd-security@FreeBSD.ORG, Peter Pentchev Subject: Re: Encryption over IP References: <20000924205556.D590@ibb0021.ibb.uu.nl> From: Dag-Erling Smorgrav Date: 24 Sep 2000 22:28:55 +0200 In-Reply-To: Mipam's message of "Sun, 24 Sep 2000 20:55:56 +0200" Message-ID: Lines: 13 User-Agent: Gnus/5.0802 (Gnus v5.8.2) Emacs/20.4 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Mipam writes: > > If you join together userlevel PPP and ssh, you can create the same > > effect - two hosts connected by an encrypted virtual link, at each host > > connected to a (virtual) interface - tun0 in case of FreeBSD. > Ahem, well, ppp over ssh isnt such a good idea. > In general tcp over tcp is a bad idea. Your throughput goes down the drain, but it works fine and it's easy to set up. And remember, sweeping generalizations are always wrong. DES -- Dag-Erling Smorgrav - des@ofug.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message