[Openswan dev] Re: v6-in-v4 IPsec and NAT traversal
Michael Richardson
mcr at xelerance.com
Sat Mar 13 12:24:56 CET 2004
-----BEGIN PGP SIGNED MESSAGE-----
>>>>> "Pekka" == Pekka Savola <pekkas at netcore.fi> writes:
Pekka> I'm interested whether Linux IPsec implementations support:
Pekka> 1) IPv6 payload inside IPv4 IPsec tunnel/transport?
Pekka> That is, when the intermediate network doesn't support IPv6,
Pekka> you could do IPv6, secured, without first encapsulating in
Pekka> IPv6-over-IPv4 tunnel and then running IPv6 IPsec.
I don't know if 26sec can do it at the bottom layer - I think not.
I can tell you that neither racoon nor pluto can negotiate a mixed
mode SA. Both are pretty close - but at present no real testing is done
on that.
Pekka> 2) NAT-traversal? (There are at least some patches in
Pekka> OpenSWAN, etc. for this). This could be very handy combined
Pekka> with the above.
Both 26sec and KLIPS have support for NAT-Traversal for IPv4, but
both requires support from the UDP - this is in 2.6, 2.4 backport, and
showing up in many distros. The patch is 140 lines.
Pluto will detect the kernel support for NAT-Traversal and use it
if it exists.
I don't know about racoon.
Pekka> [[ 3) Some feasible key management method, such as
Pekka> certificates. I think this exists, and doesn't require
Pekka> support in the kernel. ]]
Racoon has poor pkix-self-signed certificate support.
Pluto has pkix, raw RSA, RSA-from-DNS. The latest X.509 patches from
Andreas (not yet integrated) include OCSP (RFC2560).
Pekka> I'm considering how viable this kind of NAT -traversal
Pekka> supporting v6-in-v4 IPsec would be as an IPv6
Pekka> tunneling/transition mechanism.
Well, I was rather hoping that NAT-traversal for IPsec would have been
done as:
IPv4/ESP/IPv6/Teredo/UDP/IPv4.
Pekka> What's the status (implementations, planned or future) of
Pekka> these features?
http://www.openswan.org/development/roadmap.php
- --
] ON HUMILITY: to err is human. To moo, bovine. | firewalls [
] Michael Richardson, Xelerance Corporation, Ottawa, ON |net architect[
] mcr at xelerance.com http://www.sandelman.ottawa.on.ca/mcr/ |device driver[
] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Finger me for keys
iQCVAwUBQFNDp4qHRg3pndX9AQHmGwP/TsrZQ4etRT4SBWVJtV+FZJ6iqeMytexi
aqfCcAINlQV5/8wWo45/cwdOuJ/t6dHxffZGYFnbXeZzZyzxGqgraB/UscAX9zcN
rfDKSgs3ShwR8T5VKnKYeMjqELifGDJKOQFtaOvgcXG0yzQdVLG/XzBhgDUSmmnA
32OtcTr2tes=
=J4Bs
-----END PGP SIGNATURE-----
More information about the Dev
mailing list