Thank you very much for the info.

Regards,

Brian H.



-----Original Message-----
From: Kevin Anderson [mailto:[EMAIL PROTECTED] 
Sent: Friday, October 31, 2003 3:51 PM
To: [EMAIL PROTECTED]
Subject: Re: (clug-talk) VPN

How and why would you run VPN traffic through 2 firewalls?  Either you
block
the traffic, or you don't.

IPcop does run SuperFreeSwan, so really, anything he's trying to
accomplish
with SFS he could accomplish with IPcop.  I won't argue that IPcop is
the
equal of some appliances, but for 80% of people, they really just want a
VPN, and this will provide a rock solid solution.

IPcop handles multiple external IPs simply and flawlessly through the
GUI (I
do it here), however, it becomes really ugly if you want two physical
NICs
rather than just aliases on a single NIC.

IPcop could easily run as only a firewall (Shut off DHCP (I don't use
it),
Squid, Snort, etc) .  I'm not sure if you mean only as a VPN box, which
it
could also do.  Really, the firewalling piece is just a script, and if
you
wanted, it could easily be edited so that the firewalling code was
ignored
(then you'd just have a vpn box).  Unless the VPN is enabled, it isn't
used,
same for the other services.  So customizing it to suit a particular
application should be no problem.  For example: I needed to add a script
for
routing in my environment.

In terms of security, you'd be hard pressed to beat IPcop.  One of our
Sonicwalls here can't connect to the IPcop box because the sonicwall
doesn't
support 3DES, and the IPcop box won't do DES.  (I know there's an
upgrade
available)  IPcop is a 3DES IPSEC vpn.  Authentication can be either via
Certificate or PSK.  That's pretty standard, and would be equal to any
other
VPN appliance on the market currently.  If you're going to use it
heavily, I
will say that the people making hardware sizing suggestions came from
the MS
camp.  We run a P3-650 w 512megs RAM, and it's never below a load
average of
.30  I'd say .60 is more of an average.  SCSI might help, but that *IS*
a
legitimate complaint about IPcop.

Personally, I'd rather have a VPN either forwarded through the firewall,
or
sit on the firewall itself.  If you run the VPN into a DMZ, you will
pass
unencrypted communication between the DMZ and the LAN.  Since the
purpose of
the DMZ is (more or less) to be the compromiseable area, this wouldn't
really sit too well with me.  A DMZ should really have servers that do
not
need to communicate back into the corporate LAN.  Web Servers, FTP
Servers,
perhaps Mail Servers, etc.  These boxes would accept a connection from
the
LAN to them, but would have no way to initiate a connection from
themself
inside the LAN.  This way, a compromise would allow an attacked to jump
from
box to box inside the DMZ, but not allow them inside the LAN.  VPN
traffic
is authenticated end-to-end, and therefore, I'd be more willing to trust
it.
If someone can succesfully fake a legitimate IP address on the Internet,
OR,
if they can fake a certificate, you probably won't stop them anyway,
IMO.
If they're willing to go to that much trouble, they'd socially engineer
their way into your LAN and hide a wireless NIC, or find some other way
to
bypass your security.  Or use violence.  Or pay someone off.  Or
whatever.
If someone really wants your info, they WILL get it.

I'm not saying IPcop is the ultimate solution, I just think that it's
easy
to set up, and will make setting up a VPN far easier than setting up SFS
config files on your own.  If nothing else, use IPcop to generate the
conf
files, and then put them onto another box.

Kev.




----- Original Message ----- 
From: "Shawn Grover" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, October 31, 2003 4:03 PM
Subject: RE: (clug-talk) VPN


> With regards to SonicWalls, I've had recent experience with them, and
after
> 3 RMAs in a row (as requested by THEIR tech support) and never once
being
> able to get the thing to work properly (with their tech support help
even).
> I'll accept the fact that I may have been doing something odd, but I
can't
> see what.  Bottom line is that I will not be recommending SonicWall in
the
> near future.  However, it's rare that I need to recommend that type of
> hardware, so this probably is a non-issue.
>
> As for Brian's VPN, I know a bit about what he's trying to do, and I'm
not
> sure if IPCop is a proper solution.  He needs a VPN server sitting
behind
> two firewalls (external, and internal, with DMZ between), or even
sitting
in
> DMZ.  These firewalls do more than IPCop was designed for (multiple
external
> IPs - yes I know IPCop can do this, with some tweaking...).
>
> Is it possible to run IPCop as a firewall only?  If so, is it feasible
to
> route VPN traffic through the two firewalls to the IPCop box?
> How sever is this for a security hole?  The only other option I can
see is
> to put the VPN server in the DMZ, and allow all traffic from that box
> through the internal firewall...  another possible security hole....
>
> Shawn
>
>
> -----Original Message-----
> From: Kevin Anderson [mailto:[EMAIL PROTECTED]
> Sent: Friday, October 31, 2003 2:52 PM
> To: [EMAIL PROTECTED]
> Subject: Re: (clug-talk) VPN
>
>
> Since the other responsed weren't overly detailed, I'll just add that
it
has
> never gone down unexplainably for us in the past year.  It's rock
solid,
and
> we do use it Corporately.  I've advised we replace the remaining
SonicWalls
> with it, but they work well too, so obviously replacing something that
works
> well is pretty low priority.
>
> Kev.
>
>
> ----- Original Message ----- 
> From: "Brian Horncastle" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Friday, October 31, 2003 1:49 PM
> Subject: (clug-talk) VPN
>
>
> > Hi,
> >
> > Anyone ever setup Linux as a VPN server?
> >
> > Regards,
> >
> > Brian
> >
> >
>
>


Reply via email to