--On Monday, 17 January, 2000 08:47 -0800 Merton Campbell Crockett 
<[EMAIL PROTECTED]> wrote:

> At the Microsoft Federal Security Conference last year, Microsoft had a
> presentation on L2TP and IPsec.  L2TP does use an IPsec encryption scheme
> but does not provide a virtual connection in the same sense as SSH.

One of the goals with IPsec was to support non-connection oriented
services (such as UDP). If one can use transport mode, and the
implementation(s) support a reasonable way to configure the desired
policy, then one can get a "virtual connection." If you mean connection
forwarding as SSH does, then one could use tunnel mode.

> SSH allows you to establish a secure communication path to the target
> system.  It only affects packets destined for the target system, i.e. you
> retain connectivity to your local network and access to your local
> network resources.

Isn't the secure communications path only for TCP streams for which one
has set up forwarding?

And I think one can get user authentication with IPsec, albeit with
constraints: use of IKE, transport mode, and certificates. There has
been discussion of how to use other authentication mechanisms
within IKE, such as use of openPGP keys. In particular, there is
a draft on use of GSS-API to authenticate the Diffie-Hellman
exchange, which would allow use of whatever authentication
scheme is available with GSS-API (such as Kerberos in many
cases).

-paul

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to