Subject: Re: Non-IPSec Processing Point for ipf
To: Curt Sampson <cjs@cynic.net>
From: Andrew Brown <atatat@atatdot.net>
List: tech-net
Date: 04/18/2003 09:37:55
>> >> >If I have two IPSec links, one to network A/24 and one to network B/24,
>> >> >I need to block all source=A/24 packets that come in via the tunnel from
>> >> >B, and all source=B/24 packets that come in via the tunnel from A, because
>> >> >those packets are forged.
>> >> why not filter at the other end of the tunnel (tunnel egress point)?
>>
>> s/egress/ingress/
>
>You mean at the interface on my router where the packets enter? Because
>at that point all I see are encrypted packets from the other end of the
>tunnel. I have no idea what inner packets are going to be extracted from
>the encapsulating packets and injected into my system.
interesting. you are actually in a situation where you are using
ipsec to obscure yet do not trust the other party? why waste time on
ipsec? i assume from this, that ah would not help at all.
--
|-----< "CODE WARRIOR" >-----|
codewarrior@daemon.org * "ah! i see you have the internet
twofsonet@graffiti.com (Andrew Brown) that goes *ping*!"
werdna@squooshy.com * "information is power -- share the wealth."