public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* RFC:  p&p ipsec without authentication
@ 2002-12-15 20:34 Rik van Riel
  2002-12-15 21:59 ` Andrew McGregor
  2002-12-16  9:20 ` Henning P. Schmiedehausen
  0 siblings, 2 replies; 4+ messages in thread
From: Rik van Riel @ 2002-12-15 20:34 UTC (permalink / raw)
  To: netdev; +Cc: linux-kernel

Hi,

I've got a crazy idea.  I know it's not secure, but I think it'll
add some security against certain attacks, while being non-effective
against some others.

The idea I have is letting the ipsec layer do opportunistic encryption
even when there are no ipsec keys known for the destination address,
ie. negotiate a key when none is in the configuration or DNS.

I know this gives absolutely no protection against man-in-the-middle
attacks (except maybe being able to detect them), but it should prevent
passive sniffing of network traffic, as done by some governments.

If this "random" encryption could be turned on with one argument to
ip or ifconfig and millions of hosts would use it, sniffing internet
traffic might just become impractical (or too expensive) for large
organisations.   Furthermore, even if just 0.1% of the hosts were to
use ipsec authentication, the 3-letter agencies would be faced with
the additional challenge of identifying which connections could safely
be intercepted with man-in-the-middle attacks and which couldn't.

Not to mention the fact that the port number on many communications
would be invisible, vastly increasing the difficulty of doing any
kind of statistical analysis on the traffic that's traversing the
network.

Is this idea completely crazy or only slightly ?

regards,

Rik
-- 
Bravely reimplemented by the knights who say "NIH".
http://www.surriel.com/		http://guru.conectiva.com/
Current spamtrap:  <a href=mailto:"october@surriel.com">october@surriel.com</a>

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: RFC:  p&p ipsec without authentication
  2002-12-15 20:34 RFC: p&p ipsec without authentication Rik van Riel
@ 2002-12-15 21:59 ` Andrew McGregor
  2002-12-16  9:20 ` Henning P. Schmiedehausen
  1 sibling, 0 replies; 4+ messages in thread
From: Andrew McGregor @ 2002-12-15 21:59 UTC (permalink / raw)
  To: Rik van Riel, netdev; +Cc: linux-kernel

It's not crazy at all.  Perfectly practical, now that lots of people have 
fast enough machines and slow enough connections that it won't drive them 
mad with the performance issues :-)

Actually, it can be done (fairly) securely against MITM attacks as well. 
Check out a keying protocol called HIP, most of the resources are linked to 
from www.hip4inter.net.

The basic idea is that each end prove to the other that they know a private 
key.  The MITM protection is quite hard to describe :-)

And it can be done (at least on IPv6) with almost zero cost in time for 
connections that don't support HIP, as well as only one round trip + 
compute time for those that do.

There are four implementations in progress, two for linux.  It would be 
very nice to get the necessary hooks into the mainline kernel.

Cool, eh?

Andrew

--On Sunday, December 15, 2002 18:34:06 -0200 Rik van Riel 
<riel@conectiva.com.br> wrote:

> Hi,
>
> I've got a crazy idea.  I know it's not secure, but I think it'll
> add some security against certain attacks, while being non-effective
> against some others.
>
> The idea I have is letting the ipsec layer do opportunistic encryption
> even when there are no ipsec keys known for the destination address,
> ie. negotiate a key when none is in the configuration or DNS.
>
> I know this gives absolutely no protection against man-in-the-middle
> attacks (except maybe being able to detect them), but it should prevent
> passive sniffing of network traffic, as done by some governments.
>
> If this "random" encryption could be turned on with one argument to
> ip or ifconfig and millions of hosts would use it, sniffing internet
> traffic might just become impractical (or too expensive) for large
> organisations.   Furthermore, even if just 0.1% of the hosts were to
> use ipsec authentication, the 3-letter agencies would be faced with
> the additional challenge of identifying which connections could safely
> be intercepted with man-in-the-middle attacks and which couldn't.
>
> Not to mention the fact that the port number on many communications
> would be invisible, vastly increasing the difficulty of doing any
> kind of statistical analysis on the traffic that's traversing the
> network.
>
> Is this idea completely crazy or only slightly ?
>
> regards,
>
> Rik
> --
> Bravely reimplemented by the knights who say "NIH".
> http://www.surriel.com/		http://guru.conectiva.com/
> Current spamtrap:  <a
> href=mailto:"october@surriel.com">october@surriel.com</a> -
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> Please read the FAQ at  http://www.tux.org/lkml/
>
>



^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: RFC: p&p ipsec without authentication
  2002-12-15 20:34 RFC: p&p ipsec without authentication Rik van Riel
  2002-12-15 21:59 ` Andrew McGregor
@ 2002-12-16  9:20 ` Henning P. Schmiedehausen
  2002-12-16 12:06   ` Andrew McGregor
  1 sibling, 1 reply; 4+ messages in thread
From: Henning P. Schmiedehausen @ 2002-12-16  9:20 UTC (permalink / raw)
  To: linux-kernel

Rik van Riel <riel@conectiva.com.br> writes:

>Hi,

>I've got a crazy idea.  I know it's not secure, but I think it'll
>add some security against certain attacks, while being non-effective
>against some others.

While the idea itself is nice, it would allow many attackers on your
host to "dive" under IDS systems or avoid stateful firewalls which do
protocol verification. And IDS system is "a three letter acronym
listening on your traffic". And you want to avoid that. =:-)

It won't traverse many firewalls either (because they won't let IPSEC
pass) and you might get in trouble with NAT and protocols that need
NAT fixup.

And you basically divide the Internet into "Linux <-> Linux" and "the
rest". :-)

	Regards
		Henning

-- 
Dipl.-Inf. (Univ.) Henning P. Schmiedehausen       -- Geschaeftsfuehrer
INTERMETA - Gesellschaft fuer Mehrwertdienste mbH     hps@intermeta.de

Am Schwabachgrund 22  Fon.: 09131 / 50654-0   info@intermeta.de
D-91054 Buckenhof     Fax.: 09131 / 50654-20   

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: RFC: p&p ipsec without authentication
  2002-12-16  9:20 ` Henning P. Schmiedehausen
@ 2002-12-16 12:06   ` Andrew McGregor
  0 siblings, 0 replies; 4+ messages in thread
From: Andrew McGregor @ 2002-12-16 12:06 UTC (permalink / raw)
  To: hps, linux-kernel

NAT traversal can be done, in some (limited) cases even without the 
cooperation of the NAT (although someone on the inside must cooperate). 
Firewalls do be a problem.  I think the best thing here is if you use this 
kind of thing outside the firewall; I always build networks, even LANs, 
with the crown jewels behind a firewall from the workstations, especially 
if they run Windows.  Authenticated IPSEC is a nice way to find out if we 
can to some extent trust them, although it costs cycles.

As for compatibility, there are three ways to do it presently in the IETF 
process (HIP, IKEv2 and FreeSWAN opportunistic mode), and two of them have 
running code on multiple platforms.

Andrew

--On Monday, December 16, 2002 09:20:27 +0000 "Henning P. Schmiedehausen" 
<hps@intermeta.de> wrote:

> Rik van Riel <riel@conectiva.com.br> writes:
>
>> Hi,
>
>> I've got a crazy idea.  I know it's not secure, but I think it'll
>> add some security against certain attacks, while being non-effective
>> against some others.
>
> While the idea itself is nice, it would allow many attackers on your
> host to "dive" under IDS systems or avoid stateful firewalls which do
> protocol verification. And IDS system is "a three letter acronym
> listening on your traffic". And you want to avoid that. =:-)
>
> It won't traverse many firewalls either (because they won't let IPSEC
> pass) and you might get in trouble with NAT and protocols that need
> NAT fixup.
>
> And you basically divide the Internet into "Linux <-> Linux" and "the
> rest". :-)
>
> 	Regards
> 		Henning


^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2002-12-16 12:08 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2002-12-15 20:34 RFC: p&p ipsec without authentication Rik van Riel
2002-12-15 21:59 ` Andrew McGregor
2002-12-16  9:20 ` Henning P. Schmiedehausen
2002-12-16 12:06   ` Andrew McGregor

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox