In a message dated: 02 Aug 2002 08:38:52 EDT
"Kenneth E. Lussier" said:
>I think that we could probably come up with thousands of different ways
>to compromise the security of an internal network. What about actually
>securing it? One of the easiest things that I have seen done was
>impliment an IPSec-based LAN. The setup was simple.
>
>From the outside in:
>
>router -> firewall -> FreeS/WAN gateway -> encrypted traffic to LAN.
>
>Each machine on the LAN had it's own keypair that was registered with
>the gateway, so when a desktop was fired up, it would authenticate
>itself to the gateway, and it was then free to communicate with anyone.
>Anyone that was able to sniff the traffic just got encrypted streams. If
>you could get a system onto the network, it would be useless unless the
>gateway was compromised to accept a bogus key.
In theory, this is a great idea. However, keep in mind that:
Security = 1/productivity
In many corporate situations, especially engineering environments,
the implementation of a VPN would get in the way of development.
For instance, my current environment is co-located between the US and
Belgium. The folks in Belgium require direct access to our lab here,
and vice-versa. Additionally, both groups require direct access to
central corporate servers. A lot of what's going on requires high
performance connectivity with as little latency introduced as
possible. Placing a VPN client on some of these systems would
automatically get in the way of a lot of the testing that is done.
As a result, there aren't even virus scanners on a lot of the systems
in the labs. And, since the labs need direct access to corporate
servers, the labs often become breeding grounds for virii.
A proposal was made to VPN off all the labs, which would prevent a virus
from escaping since the virus couldn't authenticate with the VPN,
however, it was determined that there are no VPN servers at this time
which will not slow down a GigE connection, which is required for a
lot of the stuff going on here.
(of course, since we only have a 2MB connection to Belgium, I don't
see why the GigE thingy is a requirement for *our* situation :)
Also, as Ben pointed out, just because all the traffic between hosts
is now encrypted, that doesn't prevent someone from using a box to
internally probe your network looking for ways out.
Once you're in, you're in, and if you can use that internal system to
create a conduit you can get into from the outside, all bets are off!
--
Seeya,
Paul
--
It may look like I'm just sitting here doing nothing,
but I'm really actively waiting for all my problems to go away.
If you're not having fun, you're not doing it right!
*****************************************************************
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*****************************************************************