On Thu, 16 Jan 2025 10:54:50 -0300
"Soni \"It/Its\" L." <fakedme+free...@gmail.com> wrote:

> we would like to propose an experiment where we treat ipsec as an 
> address family, similar to tcp/ip or tcp/ipv6 but with tcp/ipsec instead.
> 
> traditionally, ipsec is something the sysadmin configures between 
> systems. well, nowadays we use wg because the configuration flow is 
> basically the same. so ipsec as a vpn is conceptually very outdated.
> 
> this experiment basically involves adding ipsec as a first-class address 
> family, including AF_IPSEC and sockaddr_ipsec. also, there's not much 
> point trying to support ipv4 since ipsec (in)famously doesn't work over 
> ipv4 due to NAT (but we can still discuss AF_IPSEC_LEGACY if there's 
> enough interest).
> 
> the purpose of the experiment would be to see if such thing is at all 
> viable, and whether or not it has the consequence of protecting an 
> application endpoint against traditional forms of network scanning. (in 
> particular, our hope is that someone at an internet exchange would be 
> able to see the routing address (IPv6), but not the keys necessary to 
> actually initiate a connection to the service. this should raise the 
> cost of attacks that rely on such simple scanning techniques.)
> 
> we have also briefly discussed the experiment on the ipsec IETF mailing 
> list.
> 
> would anyone be interested in such an experiment?

Could you provide technical overview, both from API and packet format side, at
least briefly?

-- 
WBR, @nuclight

Reply via email to