On Wed, 2002-10-16 at 20:20, Naman Latif wrote:
> I am not sure, if Solaris supports it. If I remember correctly, using
> IPSec in "Transport" mode instead of "Tunnel", would only Encrypt the
> Payload and not the Packet Header. However you will then have to make

With esp transport mode, the original header of the IP packet is not
placed in the encrypted payload.

But you will not see the complementing part to the ip header that makes
up TCP, or UDP. It is encrypted and part of the payload. So the question
whether to use transport or tunnel mode is irrelevant, here.

> sure that the addresses in the Header Field are Public and Routable
> through Internet.
> 
> Regards \\ Naman
> 
> 
> > -----Original Message-----
> > From: Zep [mailto:zep@;nemesis.mmind.net] 
> > Sent: Tuesday, October 15, 2002 10:06 AM
> > To: [EMAIL PROTECTED]
> > Subject: IPsec problems/ideas.
> > 

[snip]

> > 
> >     I've been poking at ipsec for this, because (from what 
> > I've read), I can seamlessly poke it into the conversation 
> > and all is encrypted.  and I can configure it to just encrypt 
> > the traffic that I'm worried about.
> > 
> >     The problem that I'm running into is that since IPsec 
> > encrypts the TCP header, so the firewall can't see that it's 
> > traffic bound for 
> > port X and thus should be allowed.

Hiding tcp information is exactly what IPSec (esp, I assume you need
confidential/encrypted traffic and not message integrity only) is made
for.

To overcome this problem, set up an IPSec gateway just before the
firewall so that only unecrypted traffic passes through (assuming you
view the internal network behind as confidential/trusted).

> >     So what I'm looking for is suggestions/ideas/whatever 
> > of ways around this... I'd like something that acts like 
> > ipsec but just encrypts the data part of the packet, but 
> > leaves the rest of the header alone.

[snip]

regards
jordan


Reply via email to