Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Businesses SuSE

Novell-SUSE Sponsors Openswan 132

hsjones writes "Concerned about the demise of FreeS/WAN? Well, looks like Openswan is going to be a good, strong open source IPsec project going forward. Novell and SUSE have jumped in with Astaro to back the project and move it along. See the press release. The Openswan project is at http://www.openswan.org. SUSE Linux and Astaro Security Linux both use FreeS/WAN in their current releases. It will be very interesting to watch what they do now with Openswan!"
This discussion has been archived. No new comments can be posted.

Novell-SUSE Sponsors Openswan

Comments Filter:
  • Somewhat off-topic (Score:5, Informative)

    by coupland ( 160334 ) * <dchaseNO@SPAMhotmail.com> on Saturday June 19, 2004 @11:06PM (#9476238) Journal

    Building on its contributions to the open source community and commitment to interoperability

    As one of many people who vividly remembers the success of NetWare 3.x, the current situation seems very alien. Novell virtually died when the fact of the matter is their product was by far the best. Today they have good products, yet they really can't claim an enormous technological edge. Their second coming is, instead, based on commitment to a thriving community, and feeds off anti-Microsoft sentiment. If best-of-breed products didn't work, will this perhaps be the strategy that finally works for them? I don't know, but I certainly wouldn't complain to see Novell take back a sizeable bite of the business that was stolen from them.

  • by ErikTheRed ( 162431 ) on Saturday June 19, 2004 @11:13PM (#9476277) Homepage
    Even since FreeS/WAN gave up on changing the world to Opportunistic Encryption (not my favorite idea, but I suppose if I feel too strongly I can write my own damn implementation :) ), I've been looking into alternatives, and obviously OpenS/WAN is the first choice. A frustration I had when looking into it was that I couldn't find any documentation describing the differences between the two projects. I didn't do any diffs on the documentations, but from a brief perusal it looks pretty much like the FreeS/WAN docs. Does anyone out there have a list of specific differences between the projects - other than the included patches for things like x.509 NAT traversal, etc that are also included in Super FreeS/WAN (I'm kind of assuming that there are more changes)?
  • by krumms ( 613921 ) on Saturday June 19, 2004 @11:15PM (#9476288) Journal
    Well, "Openswan is an implementation of IPsec for Linux."

    IPsec is basically authentication/encryption for packets at the IP level.
  • by whoever57 ( 658626 ) on Saturday June 19, 2004 @11:19PM (#9476300) Journal
    Yeah, I understand how SuSE & Novell become involved in this, but can someone explain what this does? I mean, what's the hoopla about?
    FreeSWAN/OpenSWAN is a Linux-based VPN solution. It is a flexible solution providing host-to-host, network-to-network and host-to-network VPNs.

    What's more, unlike other Linux-based solutions, I don't think there have ever been any serious questions raised over its security.

    Free/OpenSWAN also interoperates with a wide variety of commercial (soft and hard) VPNs. Authentication can be by RSA secrets or X509 certificates.

  • Comment removed (Score:5, Informative)

    by account_deleted ( 4530225 ) on Saturday June 19, 2004 @11:27PM (#9476341)
    Comment removed based on user account deletion
  • by buddha42 ( 539539 ) on Saturday June 19, 2004 @11:27PM (#9476342)
    http://www.openswan.org/development/roadmap.php
  • Re:and ? (Score:5, Informative)

    by ErikTheRed ( 162431 ) on Saturday June 19, 2004 @11:31PM (#9476356) Homepage
    What does FreeSWAN do that OpenVPN does not?
    It's an implementation of IPSec, and thus is compatible with a whole slew of systems. For most corporations running VPNs, Extranets, etc., IPSec is pretty much the defacto standard. I'll be the first to call IPSec a huge designed-by-committee pain in the ass, but it's pretty damned secure when properly implemented, and it's a widely supported open standard.
  • Re:and ? (Score:5, Informative)

    by accessdeniednsp ( 536678 ) <detoler@g3.14mail.com minus pi> on Saturday June 19, 2004 @11:34PM (#9476364)
    The *SWANs are IPsec. OpenVPN is not. IPsec is cross platform and cross-vendor (hang on, before you get excited, let me finish) and is a (series of) RFCs. IPsec also gets you plenty of perks such as kernel-space (fast, secure, etc).

    Now for the "reply" trigger-happy, OpenVPN does do SSL/TLS, is all in user-space, and does neat things, yes. However, with the *SWANs, you can also get x509, nat-t, dpd, foo, and bar. And yes, OpenVPN is cross-platform.

    The problem lies in not being cross-vendor. And you also have to realize that there is a very large inter-web out there and not everyone uses the same platforms and vendors, etc.

    For example, as a security engineer, I often have to build VPNs between disparate vendors, devices, and software versions. Even with IPsec/IKE it's difficult enough. And they've all pretty much agreed on how to speak IKE well enough to at least have a meet-and-greet among each other. Unfortunately, there is plenty of room for interpretation, so each vendor has a slightly different dialect.

    The point being, OpenVPN isn't a "standards-based VPN" whereas an IKE-based VPN is. I know it's not necessarily a great answer to the question, but it is the truth. (Besides, OpenVPN even says so on their site...it does not do IKE.)

    (whoa, poet and didn't know it)
    (woops, i did it again!)
  • by jaymzter ( 452402 ) on Saturday June 19, 2004 @11:41PM (#9476382) Homepage
    Openswan is a good example of a patent hurting an Open Source app. I *need* LZS compression for my company's VPN, but Openswan won't work cuz of IPCP LZS compression. I was offered an internal version of super-freeswan with the LZS code but refuse to use it cuz it's not Free. i'm stupid that way
  • Again, you're mixing up your history. Sure Novell was slow to adopt TCP/IP but that's because IPX/SPX was always routable. Microsoft held onto NetBEUI (ptooie!) for far longer and still won the war. Sure Microsoft competitors made some mis-steps, but no more so than Microsoft. Unfortunately they didn't have an endless supply of cash to help them recover.
  • by Anonymous Coward on Sunday June 20, 2004 @12:45AM (#9476616)
    Huh? IPCP is used by PPP, not IPsec. If you really need LZS compression, you would need to fix your ppd. You would still have the patent issue, though.

    Openswan supports IPCOMP compression. It should interoperate with many IPsec implementations, if they support IPCOMP.
  • Ok fine after mocking you mercilessly I will explain why you are such a funny guy.

    1. Microsoft was only involved in OS/2 up until version 1.3
    2. OS/2 was widely criticized because it did not have built-in networking. So Microsoft certainly didn't introduce TCP/IP in the 80's with OS/2.
    3. The first version of OS/2 with built-in networking was OS/2 WARP, which was after OS/2 2.1. This was many years after the IBM/Microsoft rift.

    So.... yeah. This is what any decent research will tell you. Rebuttals are welcome, I'm kind of enjoying teaching a new generation about how the 80's played out. ;-)
  • Sorry but you are falling into "retard" status. LAN Manager was based on NetBIOS and NetBEUI was the transport protocol. Neither were routable, and had nothing to do with TCP/IP. In fact, LAN Manager was licensed technology to begin with! Sure, you could run TCP/IP under LANMAN, but you could also run IPX/SPX. This doesn't mean Microsoft "went" TCP/IP any more so than they "went" IPX/SPX. Your memory of the time is passable at best and totally flawed at worst.
  • by billstewart ( 78916 ) on Sunday June 20, 2004 @01:38AM (#9476791) Journal
    IPX actually did fine - it was the IP layer equivalent. What sucked on large networks was Netware. One of its problems was inadequate flow control (though I forget if that was SPX's fault or other Netware protocols - the PBurst stuff just didn't cut it when there were congestion problems.)

    But the real performance killer on lots of networks was all the chatty SAP announcements - even on a medium-sized network, all the printers advertising themselves can clog up any useful bandwidth, which often meant 56kbps back when this sort of networking was common for users like banks, retail stores, and branch offices of big companies. Yes, we learned how to do SAP filtering, and eventually Novell came out with NLSP which helped a lot.

    The more important problems were pricing - upgrading to Netware 5 which could use TCP/IP instead of IPX tended to cost too much for the types of companies that were big Netware users back in mumblety-95, so they stayed with IPX way past its prime, around the time that Microsoft was figuring out how to make NetBIOS-over-IP perform badly over long distances (as opposed to NetBIOS-over-NETBEUI.) While Microsoft _still_ doesn't have a clue about decent networking, they were good enough to beat Netware in the market, and small networks of either Netware or NetBEUI could both be self-configuring, a lesson we're trying to relearn for IPv6.

  • Re:Why? (Score:5, Informative)

    by hsjones ( 789284 ) <hsjones@sisna.com> on Sunday June 20, 2004 @01:45AM (#9476809) Homepage
    A complete VPN solution is more than just an IPsec module (Kame) or an IKE module (Racoon). So it's not a question of Openswan vs. 2.6 kernel IPsec. Openswan moves up the stack with added functionality and intends to continue doing so. And it can use either the FreeS/WAN IPsec engine (which is being carried forward for use on pre-Linux 2.6 machines) *or* the 2.6 kernel IPsec (Kame).

    (Btw, the 2.6 kernel hasn't exactly been official "for some time now" -- even SuSE is just now shipping it in their 9.1 release.)

    In fact, with Novell now involved in Openswan (which means IBM is likely involved as well but less publicly), we will probably see Openswan work with IPsec hardware too (IBM makes some).
  • by ticktockticktock ( 772894 ) on Sunday June 20, 2004 @02:43AM (#9476958)
    Copied and pasted in verbatim from www.wikipedia.org [wikipedia.org]:

    "A Virtual Private Network [wikipedia.org], or VPN, is a private communications network [wikipedia.org] usually used within a company, or by several different companies or organisations, communicating over a public network. VPN message traffic is carried on public networking infrastructure (ie, the Internet) using standard (possibly unsecure) protocols.

    VPNs use cryptographic [wikipedia.org] tunneling [wikipedia.org] protocols to provide the necessary confidentiality (preventing snooping), sender authentication (preventing identity spoofing), and message integrity (preventing message alteration) to achieve the privacy intended. When properly chosen, implemented, and used, such techniques can indeed provide secure communications over unsecure networks.

    Note that such choice, implementation, and use are not trivial and there are many unsecure VPN schemes on the market. Users are cautioned to investigate products they propose to use very carefully. 'VPN' is a label which, by itself, provides little except a marketing tag.

    VPN technologies may also be used to enhance security as a 'security overlay' within dedicated networking infrastructures.

    VPN protocols include:

    * IPSec [wikipedia.org] (IP security), an obligatory part of IPv6.
    * PPTP [wikipedia.org] (point-to-point tunneling protocol), developed by Microsoft.
    * L2F (Layer 2 Forwarding), developed by Cisco.
    * L2TP [wikipedia.org] (Layer 2 Tunnelling Protocol), including work by both Microsoft and Cisco.

    Multi-protocol label switching [wikipedia.org] can be used to build VPNs."

  • by velkro ( 11 ) * on Sunday June 20, 2004 @03:32AM (#9477063) Homepage
    Hi,

    I was the maintainer of Super FreeS/WAN, and am now the release manager of Openswan.

    We're currently working on a whole new set of documentation, in DocBook/XML format to boot. It's slow, since we all know how much developers love to write documentation, but it's coming. For now, you can see The Wiki [openswan.org] which will probably get slashdotted.

    Ken
  • by afriguru ( 784434 ) on Sunday June 20, 2004 @04:24AM (#9477156) Homepage
    Note that Freeswan and Openswan are not strictly needed for the future because:
    As of Linux 2.5.47, there is a
    native IPSEC implementation in the kernel. It was written by Alexey Kuznetsov and Dave Miller, inspired by the work of the USAGI IPv6 group. With its merge, James Morris' CrypoAPI also became part of the kernel - it does the actual crypting.
    http://lartc.org/howto/lartc.ipsec.html
    Freeswan only needs to remain secure for current deployments. This means fixing any discovered veulenrabilities. __________
  • by billstewart ( 78916 ) on Sunday June 20, 2004 @04:38AM (#9477186) Journal
    Actually, IPSEC does require setting up point-to-point connections (though they can be tunnel mode or transport mode) - but one of the goals of FreeSWAN's Opportunistic Encrytion was to do this automatically whenever possible.

    The real difference is that IPSEC is encrypting at the IP layer of the protocol stack, aka Layer 3 in OSI terms, while OpenVPN is creating a TCP Layer 4 tunnel. Inside the tunnel, IPSEC normally puts Layer 3 IP packets, while OpenVPN does something with a TUN/TAP driver on the ends, so they could be doing Layer 3 IP packets or Layer 2 Ethernet packets, and I haven't read the docs enough to know which they did. Layer 4 has more overhead, but has a potentially easier time going through NAT.

    For both of these applications, you have to create an association between two endpoints, and then tell your endpoints' packet handlers to use that association when they want to get packets somewhere. The choice of protocol layers for the inside and outside of the crypto tunnel has a major impact on how you get the routing mechanisms (or whatever) to decide to set up a tunnel and send packets through it.

  • Re:SUSE (Score:2, Informative)

    by rkit ( 538398 ) on Sunday June 20, 2004 @05:18AM (#9477250) Homepage
    Slight correction: redhat 7.0 shipped with a snapshot towards gcc-3.0 they called gcc-2.96. It is true that this compiler version miscompiled the kernel, but it is also true that they provided a gcc version that was the recommended compiler for the kernel at that time. (they called it kgcc).
    It is also true hat "gcc-2.96" did not have the quality of a proper gcc release. However, this step proved very valuable for gcc 3.0 development, because of the huge user base acting as testers. Of course, 99 percent of redhat users would never have bothered to install a development snapshot of gcc. (and the rest would not have used in a production environment...)
  • by Anonymous Coward on Sunday June 20, 2004 @05:47AM (#9477294)
    OpenVPN (http://openvpn.sf.net/) is an excellent alternative to IPSec. It's using UDP or TCP as transport layer and doesn't care about NAT. You can have NAT on the both sides. The client and server share the same code and can be used on WIN32 or GNU/Linux (and more). The version 2.0 can handle routing per X.509 certificate... and much more.

    Novell-Suse-... should sponsor this excellent project instead of the brain damaged(tm) IPSec.
  • by velkro ( 11 ) * on Sunday June 20, 2004 @08:35AM (#9477594) Homepage
    Sorry, but completed your research before spouting off links and quotes.

    2.6 has an IPsec kernel layer implementation. There are two part to IPsec - the kernel layer, and the key management (IKE) portion. The IKE daemons are userland, and without them, you don't have a complete IPsec implementation.

    Thus, they have ported isakmpd/racoon to Linux, or you can run Openswan's userland tool (aka pluto).
  • by pe1chl ( 90186 ) on Sunday June 20, 2004 @12:31PM (#9478174)
    It needs support from some router manufacturers to become viable. Cisco would be nice, but it could start with Draytek, ZyXEL, etc.
  • Re:and ? (Score:3, Informative)

    by jjackson ( 83961 ) on Sunday June 20, 2004 @04:58PM (#9479241) Homepage
    Granted, IPSEC can be a pain to configure.

    However, if you are implementing a VPN between Linux and a device such as a Cisco PIX, you can't use OpenVPN.

    The fact of the matter is - Openswan implements an industry standard VPN implementation, OpenVPN does not.

    Not that it is a cause for great concern, but OpenVPN connections are also vulnerable to connection cutting (see the many, many recent stories about TCP/IP connection cutting DoS attacks), IPSEC is not.
  • by crabapple469 ( 789931 ) on Monday June 21, 2004 @01:19PM (#9485994)
    Maybe because strongswan is a class project with no QA. Easy to get enhancements in when you don't need to bother testing them...

2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League

Working...