[Openswan Users] ISCS Pre-Alpha Release Announcement

John A. Sullivan III jsullivan at opensourcedevelopmentcorp.com
Tue Aug 24 00:31:29 CEST 2004


In response to numerous requests, The Open Source Development
Corporation has issued a pre-alpha release of the Integrated Secure
Communications System (ISCS).  ISCS seamlessly combines Access Control,
NAT, VPN, Routing, User Authentication and Security Policy Management
into a single network security environment.

ISCS is not a GUI firewall rule configurator.  It is a security
environment configurator which produces consistent rule sets for a
variety of security subsystems on a variety of platforms from different
vendors.  It is a very different approach to network security.  Neither
we nor any of the major vendors and enterprise organizations to whom we
have presented the technology have seen anything similar in either the
proprietary or open source world.  The results are a much more flexible
and secure environment with an over 90% reduction in security
configuration time.  It makes true, multi-layered, network
compartmentalization realistic and manageable.

The project home page is http://iscs.sourceforge.net and the download
page is http://sourceforge.net/project/showfiles.php?group_id=72799
Please continue reading if you would like more information.


ISCS has the potential to demonstrate the power of the open source
development model.  Far less efficient and innovative commercial
offerings carry five and six figure price tags.  The open source
community can produce a better solution.  The key is the support
community.

ISCS is an enormous undertaking.  It requires skills in C, C++, SQL, GUI
design and development, embedded systems, open source and proprietary
firewall systems, open and proprietary VPN systems, open and proprietary
routing systems, open and proprietary IDS, IPS, Content Filtering, Virus
Scanning, Layer 1 and Layer 2 configuration for open and proprietary
systems, wireless technology, PKI, documentation, SSH, SSL.  The list is endless.

The ISCS road map is published below.  It may change based upon sponsor
funding and the skill sets of the volunteer support community.  If you
seen something that interests you and you have at least eight hours per
week to contribute to the project, please contact the Open Source
Development Corporation at info at opensourcedevelopmentcorp.com 

Version 1.0:
Complete automatic configuration of *swan based IPSec VPN
Complete automatic configuration of iproute2 routing
Complete simple integration of PKI

Version 1.1:
Logging, monitoring and alerting
Troubleshooting and analysis tools
Policy evaluation
Enhanced system administration and database management

Version 1.2:
More database enhancements
Ability to save edit sessions
Online help
Segment the administration environment into different "VPN clouds"
Enhanced response to security emergencies
Enhanced self protection for gateways

Version 2.0:
Extended user authentication - RADIUS, LDAP, Active Directory,
e-Directory, SecureID tokens, CAC, SmartCards, etc.
Delegated administration, i.e., different administrative rights to
different parts of the database, e.g., Managed Service Providers able to
delegate some administration rights to their clients.
Environment consistency checks
Application proxies
Security based upon protocol specific options, e.g., URI for HTTP
Live fail-over
Enhanced search and navigation functions for the GUI Security Policy
Manager
The ability to schedule updates based upon universal or local time
Implement pre-configured server templates for the quick creation of
server objects
Patch management
Relaying Internet traffic
Provide options to build Mesh, Hub & Spoke and Hybrid VPNs
Ability to change root CA
Nested gateways
Implement QoS
Encryption and Authentication based upon the needs of the data rather
than the configuration of the tunnel
View and manipulate data flows
VPN based upon native Linux and BSD
VPN based upon OpenVPN
VPN based upon proprietary IPSec stacks
Firewall based upon BSD
Integration with ISC DHCP for DHCP-over-IPSec
Full PKI integration
User customization of Security Policy Manager settings

Version 3.0:
Registration service for mobile gateways
Gateway rule optimization
An SSL type VPN RAS component
Change a gateway's DBD
Add time as a factor for access control decisions
Add location as a factor for access control decisions
Integrated IDS/IPS
Integrate Anti-Virus
Integrate Content Filtering
Implement an inherited rights mask
Added intelligence to DBD
Hierarchical change distribution
Integrate network security devices from Cisco, Nortel, Netscreen,
WatchGuard and others - create a vendor independent management console
Integrate security gateways and wireless access points
Integrate mobile devices (mobile phones, PDAs, embedded systems, etc.)
-- 
John A. Sullivan III
Open Source Development Corporation
Financially sustainable open source development
http://www.opensourcedevel.com



More information about the Users mailing list