To: TimeToMakeTheInvs who wrote (2851 ) 6/25/1998 10:12:00 PM From: jttmab Respond to of 7150
You are correct in saying that there is a consensus recommendation to support IPSEC, though personally I don't share the enthusiasm. IPSEC has acknowledged problems both in security, such as the man-in-the-middle attack, as well as some implementation issues. For example, IPSEC hasn't yet addressed the multipath problem....in IP routing individual datagrams may take different paths, or routes along the network, if these paths involve other IPSEC compliant devices, keys will not likely be established for the session....Let's not also forget that IPSEC is a draft standard and IPSEC compliance is only deemed for a minimal set of poor security solutions such as 56-bit DES. Microsoft was responsible for PPTP, well known to be quite poor with respect to security; while the chief sponsor of SOCKS was NEC and does have the support of MS. You might find: aventail.com to be of interest in helping sort through these. (Note that the paper was prepared by Aventail, a SOCKS VPN vendor). Re: Intrusion detection...Firewalls are a prevention technology while Intrusion detection is a technology that detects an intrusion when the firewall has failed or the attacker has found a way around the firewall. For instance, an employee may install an unauthorized modem on their PC at work to have access from home. An attacker will use a dialer on a set of exchanges known to the company looking for a modem connection and then use password attacks. One in the host, and behind the firewall, the attacker then has free reign over the network. An intrusion detection system will monitor host and more likely, network activity to determine unusual or unauthorized activity. IDSs are usually combined with User Misuse rules (the approach is similar) to again monitor network activity for unauthorized activity....e.g., cruising pornographic web sites during work hours. VPNs, Firewalls, IDSs are complimentary technologies rather than competitive technologies. It could be argued that as VPNs become more prolific IDS technology becomes less effective since they generally monitor network traffic to determine policy violation. Hope this helps. Jim