-----BEGIN PGP SIGNED MESSAGE-----

Hi Joel,


Your project sounds interesting. A couple of comments:

> > > 2) How do I get access to keys I'll need to pass to
> > >    my hardware?
> >
> > You will have to create/read them (from DNS/etc). The docs/howtos
> > are your friends.

I think this person was thinking of it from a user's perspective, rather
than a hacker's perspective. You are not the first to try hardware
assisted FreeS/WAN. One project I know about is here; there may be
others:

        http://sources.colubris.com/en/projects/FreeSWAN/
 
> I agree about the docs. Thus far they still look more like a refresher
> course than they do "Intro to IPSec". I'll need to modify the code so
> it can dump the keys into my hardware directly.

Thank you for your feedback on the docs.

We have a lot of docs, so we may have something that better suits
your needs but that you haven't tripped across yet. For more general
information try:

doc/intro.html Our Introduction
doc/ipsec.html IPsec protocol information

You might also find this useful:

doc/roadmap.html  What's where in Linux FreeS/WAN
doc/web.html    Web Links 

Some of these documents may require updating, but they should
still be able to give you a general idea about the topics they cover.


> > > 3) The docs for rev 2.01 say you need BIND v9. Is this
> > >    anywhere on the network or on the local box? Lots of
> > >    embedded systems don't run bind.
> >
> > Most definitely! DJB's 'tinydns' perhaps. Once more, the docs/howtos
> > are a good place to start.
> >
> >From this I gather it means I need dns on my box.

DNS is only required if you're doing key distribution via DNS.
Opportunistic Encryption is the main use of key distribution via DNS,
but you can also do custom configurations where the keys are fetched
from DNS.


> > > 4) Do you need a config file entry for each host involved
> > >    in key exchange.

Yes and no. Using the 1.x-style ipsec.conf entries, you generally need 
one entry for each peer FreeS/WAN (or other IPsec implementation). 
There is a shorthand notation ("also=") that can condense repetition
in the config files. Please note that although we offer a lot of 
config file levers, the defaults are fairly sensible, and in many 
cases each entry can be fairly short.

You may also wish to use Policy Groups to reduce the amount of 
configuration needed (see doc/policygroups.html). However, this *is* 
designed for use with OE (and key distribution via DNS).


> The config will have some boxes in the same room. Some in the same
> complex of buildings and some scattered around the country. I suppose
> there will be firewalls and NAT in between. 

Where NAT is in between, you will need Super FreeS/WAN with NAT
traversal. NAT also throws a monkey wrench into using OE, though I 
think I've heard that you can run initiator-only OE 
(ref: doc/quickstart.html, doc/glossary.html#iOE) from behind NAT.


Cheers,

Claudia Schmeing
FreeS/WAN Documentation

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQCVAwUBPzkrfnDIYXPDEHodAQFjHQP9F65zKBsC7pwKezfHhEZ3fLwPTQ353Aaw
93ZA7tVRcnGNo3On4rvILaIIrDE4Ey6kdWYY4DH9JIzHMNgTYVZ+DTvwcBQ3YxlN
heWJBHL2ir9859tJ4sjV2vH2Sdqx9x6xPX4bUzxTFistJq4wTsDEOhsqDdlsoB1/
dgQh+Bpg+Lg=
=wH+K
-----END PGP SIGNATURE-----
_______________________________________________
FreeS/WAN Users mailing list
[EMAIL PROTECTED]
https://mj2.freeswan.org/cgi-bin/mj_wwwusr

Reply via email to