________________________________
You might consider a creative solution with Dead Peer Detection.  Per 
ipsec.conf(4), you enable Dead Peer Detection by using an ike dynamic statement.

Heya

On Thu, Apr 14, 2011 at 3:09 AM, Scott McEachern <sc...@blackstaff.ca>wrote:

> On 04/13/11 09:38, Randal L. Schwartz wrote:
>
>> "Scott" == Scott McEachern<sc...@blackstaff.ca>  writes:
>>>>>>>
>>>>>> Scott>  It's called "port knocking".  Google is your friend here.
>>
>> And if you recommend or use port knocking, you're an amateur at crypto.
>> If adding 8 sniffable bits to your effective key length makes you
>> significantly more secure, you've lost the game already.
>>
>>
> I'm not advocating it, but it is what he's asking about.
>
> I should have added "This is not a good idea", but I was hoping he'd figure
> that out by reading about it.
>
> Nemir, you might want to go back and find out exactly what problem the bank
> is trying to solve with their idea.
>
>
Actually from what I read in his email, it isn't Port knocking he is after.

What the Bank likely wants is to not have any n+ client(s) out of however
many maintaining a permanent VPN through their infrastructure, thereby
leading to a potential DoS for their other clients.
( based on several appliances having hardware / licensing limitations on how
many concurrently active VPNs are running at once )

Thus what the Bank would like is for the VPN connection to be torn down
after the relevant data is transmitted.

And no, I don't see a "disconnect" option after a brief read of the IPSEC
man pages either.

Shane

Reply via email to