[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[no subject]
- <!--x-content-type: text/plain --> "http://www.w3.org/TR/html4/loose.dtd">
- <!--x-date: Thu, 25 Aug 2005 19:39:01 -0400 -->
- <!--x-from-r13: Dboreg.Z.Vneevf ng eqyt.arg (Dboreg Z. Vneevf) -->
- <!--x-message-id: [email protected] -->
- <!--x-subject: [ale] [[email protected]: An Illustrated Guide to IPSec] -->
- <li><em>date</em>: Thu, 25 Aug 2005 19:39:01 -0400</li>
- <li><em>from</em>: Robert.L.Harris at rdlg.net (Robert L. Harris)</li>
- <li><em>subject</em>: [ale] [<a href="mailto:steve%40unixwiz.net">[email protected]</a>: An Illustrated Guide to IPSec]</li>
Nice read for anyone curious.
----- Forwarded message from Steve Friedl <steve at unixwiz.net> -----
From: Steve Friedl <steve at unixwiz.net>
To: ale at ale.org
To: bugtraq at securityfocus.com
Subject: An Illustrated Guide to IPSec
Date: Thu, 25 Aug 2005 13:25:04 -0700
User-Agent: Mutt/1.4i
Message-ID: <20050825202504.GA26124 at linux.unixwiz.net>
X-CRM114-Status: Good ( pR: 84.1710 )
Hello listmates,
One of the most widespread security protocols is IPSec, but many of
us have found that the number of knobs and settings and switches gets
really overwhelming. I was in that boat as well, so I dove in and wrote
a paper that covers IPSec at the protocol level.
It doesn't cover things like Key Exchange yet (that's the *next* paper),
but it's got a lot of detail that should be comforting to any TCP/IP
geeks.
Unixwiz.net Tech Tip: An Illustrated Guide to IPSec
<a rel="nofollow" href="http://www.unixwiz.net/techtips/iguide-ipsec.html">http://www.unixwiz.net/techtips/iguide-ipsec.html</a>
It's amazing how much one learns by writing about it...
Steve
--
Stephen J Friedl | Security Consultant | UNIX Wizard | +1 714 544-6561
www.unixwiz.net | Tustin, Calif. USA | Microsoft MVP | steve at unixwiz.net
** ACCEPT: CRM114 PASS Markovian Matcher **
CLASSIFY succeeds; success probability: 1.0000 pR: 84.1710
Best match to file #0 (nonspam.css) prob: 1.0000 pR: 84.1710
Total features in input file: 4784
#0 (nonspam.css): features: 11228229, hits: 2117503, prob: 1.00e+00, pR: 84.17
#1 (spam.css): features: 4271668, hits: 1132407, prob: 6.75e-85, pR: -84.17
----- End forwarded message -----
:wq!
---------------------------------------------------------------------------
Robert L. Harris | GPG Key ID: E344DA3B
DISCLAIMER:
These are MY OPINIONS "We can't solve problems by using
ALONE. I speak for the same kind of thinking we used
no-one else. when we created them."
- Einstein
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
</pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<ul><li><strong>Follow-Ups</strong>:
<ul>
<li><strong><a name="00464" href="msg00464.html">[ale] [[email protected]: An Illustrated Guide to IPSec]</a></strong>
<ul><li><em>From:</em> transam at verysecurelinux.com (Bob Toxen)</li></ul></li>
</ul></li></ul>
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
<ul>
<li>Prev by Date:
<strong><a href="msg00429.html">[ale] Syntax problem</a></strong>
</li>
<li>Next by Date:
<strong><a href="msg00437.html">[ale] ntfs only accessible by root</a></strong>
</li>
<li>Previous by thread:
<strong><a href="msg00434.html">[ale] Ale Digest, Vol 57, Issue 9</a></strong>
</li>
<li>Next by thread:
<strong><a href="msg00464.html">[ale] [[email protected]: An Illustrated Guide to IPSec]</a></strong>
</li>
<li>Index(es):
<ul>
<li><a href="maillist.html#00436"><strong>Date</strong></a></li>
<li><a href="threads.html#00436"><strong>Thread</strong></a></li>
</ul>
</li>
</ul>
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
</body>
</html>