From owner-freebsd-security Mon Feb 11 18:18:10 2002 Delivered-To: freebsd-security@freebsd.org Received: from newman2.bestweb.net (newman2.bestweb.net [209.94.102.67]) by hub.freebsd.org (Postfix) with ESMTP id B663D37B421 for ; Mon, 11 Feb 2002 18:16:28 -0800 (PST) Received: from okeeffe.bestweb.net (okeefe.bestweb.net [209.94.100.110]) by newman2.bestweb.net (Postfix) with ESMTP id 9EEF7232D4 for ; Mon, 11 Feb 2002 21:16:33 -0500 (EST) Received: by okeeffe.bestweb.net (Postfix, from userid 0) id 7AEDB9F269; Mon, 11 Feb 2002 21:11:40 -0500 (EST) To: security@freebsd.org Subject: Questions (Rants?) About IPSEC Date: Thu, 07 Feb 2002 11:33:47 -0500 From: "James F. Hranicky" Message-Id: <20020212021140.7AEDB9F269@okeeffe.bestweb.net> Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org After reading up on IPSEC, I have one major question: Is it really a good protocol? It may be that I don't understand it well enough, or that the implementations I've looked at are lacking in features that I want, but it seems to me that it simply isn't a good solution for anything more than a small number of users. Here are the problems I have with IPSEC: - IPSEC routers don't seem to be able to advertise routes for an arbitrary number of networks behind them - IPSEC routers have to basically be the border router for a site, as there is no post-decryption NAT protocol to get packets back to a router on the inside of the network (Apparently, Cisco VPN boxes have this capability, but it's an add-on to IPSEC AFAICT). - Clients with dynamic IPs are poorly supported. AFAICT, what I want is to be able to issuce x509 certs to any of my remote users for key exchange, and accept any cert from any client that was signed by my CA. That's what PKI is all about, right? Checking the racoon.conf man pages and sample racoon.conf files shows that I need to have the client's *private* key for a *specific* IP address. o Is this really the case, or am I just wrong here? o Isn't requiring the server to have the private cert key the same as having a shared secret? o If I'm not wrong, and cert's private keys are required per IP address, is there some problem with the scheme I detailed above? As a comparison, isn't the whole point of the ssh_known_hosts file to keep only the public keys on the remote server? I mean, wouldn't it be great if ssh supported x509 certs, obviating the need for even the ssh_known_hosts file, as host keys would be signed by the CA? Isn't this what we want for IPSEC??? In the end, if I go with a FreeBSD racoon or isakmpd solution, am I limited to the following setups ? : - One shared secret for all my users in the interest of manageability. I can only assume this means any user could theoretically listen in on the key exchange and thus be able to decrypt another's IPSEC communications - Different shared secrets for all users/client machines. Key management nightmare. - Different x509 certs for all users/client machines. See above. - GSSAPI Auth . Does this even work? Does it work with w2k clients and an MIT KDC? If it does, this would probably do what I need for any w2k boxes out there, but all the info I read said it didn't work with w2k yet. Never mind any other IPSEC client software. Is there another VPN solution (mpd-netgraph+PPTP) that would suit my needs any better? Any enlightenment I can receive that can convince me IPSEC is anything more than an alpha-quality protocol that requires vendors (a la Cisco) to fix it would be most appreciated. It's entirely possible I have no idea what I'm talking about. ---------------------------------------------------------------------- | Jim Hranicky, Senior SysAdmin UF/CISE Department | | E314D CSE Building Phone (352) 392-1499 | | jfh@cise.ufl.edu http://www.cise.ufl.edu/~jfh | ---------------------------------------------------------------------- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message