Opportunistic Encryption Using IPsec by Paul Wouters, Libreswan IPsec VPN Project
Opportunistic Encryption Using IPsec - Paul Wouters, Libreswan IPsec VPN Project
Opportunistic IPsec (Paul Wouters, Red Hat) - Leveraging the XFRM code inside the kernel, the libreswan IKE daemon can create XFRM kernel so it will be notified of each new netflow. It uses this information to encrypt as much of the host’s traffic as possible towards other hosts with the same IPsec capability. In addition to packet-triggered events, it can also hook itself into the system via DNS calls, attempting to setup IPsec encryption before the application has even been given the IP address to contact.
By supporting different authentication mechanisms, such as certificates, GSSAPI, or DNSSEC secured IPSECKEY records, this method can be deployed on any enterprise or cloud platform or even for internet hosts at large.
Wouters will show how to configure Opportunistic IPsec for an based cloud deployment and for internet-wide deployment using LetsEncrypt.
About Paul Wouters
Paul Wouters is one of the core develo
4 views
128
60
8 years ago 00:53:38 4
Opportunistic Encryption Using IPsec by Paul Wouters, Libreswan IPsec VPN Project