On 12/13/2017 09:44 AM, Bill Shirley wrote:
> I don't see that SSH tunneling or running IPSEC in a VM as a security
> gain.  It
> would be very complex with multiple points of failure.  If you don't
> trust the traffic
> from the other endpoint, filter it with Shorewall after it's
> decrypted.  After decryption
> a packet will traverse the Shorewall rules where you can DROP or
> REJECT if
> desired.
>
> Also, with a IPSEC using manual keying, you don't even need
> LibreSwan.  Look
> at /usr/share/doc/initscripts/sysconfig.txt for IPSEC setup.
>
> Bill


Bill, I do trust my laptop and remote LAN.  Point is, if I run the IPSec
left (server) on my router (the VM which provides outside access to the
LAN), if ne'er-do-wells compromise ipsec they will be inside my router. 
I don't want this.  If they compromise ipsec I want them to end up
inside a benign machine.

I just don't know how to tunnel UDP.

It's not a good idea to use ipsec with PSK anymore.  I'll be using
(self-genned) certs only.  RSA was compromised in 2014 (granted, NSA),
and Schnier say he doesn't trust EC because the curves NSA submitted to
NIST are related.




------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to