[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4ef5fec60511260735r55bb2415n1de84d00f9296fe4@mail.gmail.com>
Date: Sat Nov 26 15:35:43 2005
From: coderman at gmail.com (coderman)
Subject: IPsecurity theater
On 11/26/05, Joachim Schipper <j.schipper@...h.uu.nl> wrote:
> I fully agree. But if you only want to accept traffic from trusted,
> authenticated sources, it's about as close to that as you can get.
what i'd like a key daemon to do:
- create or import a symmetric key database (hardware entropy++)
- for encrypted key databases prompt for authentication
- enter SA's according to key schedule associated with db
- invalidate used keys and securely delete them from db
you can assume that key distribution details are covered.
what i don't what it ever doing:
opening a public network socket and listening to unauthenticated
traffic (ISAKMP).
Powered by blists - more mailing lists