At 11:54 AM 5/15/2002 -0400, Alan DeKok wrote:
>Chris Parker <[EMAIL PROTECTED]> wrote:
> > That could be solved by establishing an IPSec tunnel between our radius
> > and your servers, setting up a direct network connection ( peering point )
> > for exchange of radius/authentication traffic, or installing a server
> > at our colo facility so auth traffic never crosses a third-party network.
> >
> > >   Anybody making NAS boxes that support IPSec tunnelling?
> >
> > Yes, but the number that support IPSec tunneling of radius packets is
> > about equal to the number that support EAP authentication.  :\
>
>   I'm curious if there would be any use/interest in hacking FreeRADIUS
>to "encrypt" packets it's sending to a proxy.

I wouldn't invent a proprietary method.

>   Pro: Some minor peace of mind
>
>   Con: It's only interopable with itself.

Maybe.  I think support somehow for enabling IPSec to be used between
selected clients would accomplish this.  It would also serve to "hide"
the radius attributes that are all sent clear-text ( making MitM and
sniffing attacks ) significantly more difficult.

Would that be done at the freeradius level, or at the kernel/ip stack
level though... Hmmmm.... I'm intriguied now.  :)

>   Con: There's no guarantee that anything we can come up with will be
>secure or even useful.

If we could incorporate IPSec support somehow, it'd be interoperable
with anything else that speaks IPSec.  :)

-Chris
--
    \\\|||///  \          StarNet Inc.      \         Chris Parker
    \ ~   ~ /   \       WX *is* Wireless!    \   Director, Engineering
    | @   @ |    \   http://www.starnetwx.net \      (847) 963-0116
oOo---(_)---oOo--\------------------------------------------------------
                   \ Wholesale Internet Services - http://www.megapop.net



- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to