How about L2TP and IPSec
Feature Description PPTP/ L2TP L2TP/
IPSec IPSec
PPP PPP IPSec
Xport Tunnel
User Authentication Can authenticate
the user that is
initiating the
communications. Yes Yes Yes
WIP WIP
Machine Authentication Authenticates
the machines
involved in the
communications. Yes Yes Yes
Yes Yes
NAT Capable Can pass through
Network Address
Translators to hide
one or both
end-points of the
communications. Yes Yes No
No No
Multiprotocol Support Defines a standard
method for carrying
IP and non-IP
traffic. Yes Yes Yes
No WIP
Dynamic Tunnel IP
Address Assignment Defines a standard
way to negotiate an
IP address for the
tunneled part of the
communications.
Important so that
returned packets are
routed back through
the same session rather
than through a non-tunneled
and unsecured path
and to eliminate static,
manual end-system
configuration. Yes Yes
Yes N/A WIP
Encryption Can encrypt traffic
it carries. Yes Yes
Yes Yes Yes
Uses PKI Can use PKI to
implement encryption
and/or authentication. Yes Yes
Yes Yes Yes
Packet Authenticity Provides an authenticity
method to ensure packet
content is not changed
in transit. No No
Yes Yes Yes
Multicast support Can carry IP multicast
traffic in addition
to IP unicast traffic. Yes Yes
Yes No Yes
-----Original Message-----
From: michael [mailto:[EMAIL PROTECTED]]
Sent: Friday, January 05, 2001 5:47 AM
To: openssl-users
Cc: michael
Subject: Re: Open VPN - Anybody interested / suggestions
Peter Stamfest wrote:
>
> On Fri, 5 Jan 2001, Michael Strvder wrote:
>
> > SSL sits on top of a connection-oriented protocol like e.g. TCP or
> > PPP. Some VPN products use SSL over PPP over UDP. Did you mean that?
>
> What I have in mind is not SSL over UDP.
Off course since UDP is not a connection-oriented protocol.
> It shares the same ideas,
> though. The problem with SSL for encapsulation of PPP traffic is the
> retransmit problem.
I don't understand you. I meant:
+-------+
|TCP/SPX|
+-------+
| IP/IPX|
+-------+
| LLC |
+-------+
| SSL |
+-------+
| PPP |
+-------+
| UDP |
+-------+
| IP |
+-------+
Are we talking about the same thing?
> The most important things I want:
> * Freely available
> * No extra hardware on the client side (this is why it needs a windows
> part).
>
> > But what's wrong with IPSec, S/WAN and http://www.freeswan.org ? Ok,
> > there's no direct IPX support but this gets more and more
> > unimportant...
>
> IP/Sec is a possibility, but what I think of is more of what MicroSoft
did
> with its VPN (aka PPTP) solution, but based on certificates. (and with
> only one channel for control and data [to ease the setup of
firewalls]).
Did you ever have a closer look at FreeS/WAN? You have to add three
firewall rules. That's it. Not a big deal but well-defined.
For interoperability with Windows clients check
http://www.freeswan.org/freeswan_trees/freeswan-1.8/doc/interop.html
> The PPP inside of the tunnel is good for routing data in and out of an
> office lan, something one would have to do with an IPsec tunnel as
> well.
Make sure you describe the protocol stacks exactly...
> So do you think it is a waste of time to start such a project?
Somewhat...
It's non-trivial to design and implement a really secure encryption
protocol. I would not claim to be able myself to start such a
project.
IMHO it would be more promising to add X.509 support to Free S/WAN.
There was a patch available some months ago but the Free S/WAN folks
were not willing to add it to their distribution.
Well, it's getting off-topic here...
Ciao, Michael.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]