Novell-SUSE Sponsors Openswan 132
hsjones writes "Concerned about the demise of FreeS/WAN? Well, looks like Openswan is going to be a good, strong open source IPsec project going forward. Novell and SUSE have jumped in with Astaro to back the project and move it along. See the press release. The Openswan project is at http://www.openswan.org. SUSE Linux and Astaro Security Linux both use FreeS/WAN in their current releases. It will be very interesting to watch what they do now with Openswan!"
Shampoo is better, no, conditioner is better (Score:3, Funny)
Re:Shampoo is better, no, conditioner is better (Score:2, Funny)
Somewhat off-topic (Score:5, Informative)
Building on its contributions to the open source community and commitment to interoperability
As one of many people who vividly remembers the success of NetWare 3.x, the current situation seems very alien. Novell virtually died when the fact of the matter is their product was by far the best. Today they have good products, yet they really can't claim an enormous technological edge. Their second coming is, instead, based on commitment to a thriving community, and feeds off anti-Microsoft sentiment. If best-of-breed products didn't work, will this perhaps be the strategy that finally works for them? I don't know, but I certainly wouldn't complain to see Novell take back a sizeable bite of the business that was stolen from them.
Novell fumbled the ball - again and again... (Score:5, Insightful)
A littany of bad management decisions is why they are where they are today. Maybe Novell can regain some of its lost market share but you'll have to wait a very long time if you want to see it regain market dominance.
Re:Novell fumbled the ball - again and again... (Score:5, Insightful)
No offense, but you don't remember the timeline particularly well. WordPerfect had the poop beaten out of it long before Novell bought it -- caused by their failure to release a Windows version while they still had the superior product. By the time Novell bought it they were a steal. Agreed, not a brilliant move, but not what killed them, either. What really killed Novell was Windows 3.11 (Windows for Workgroups) which had built-in networking. Windows NT followed and sealed Netware's fate, despite the fact that NW4 was years ahead of NT. Both instances where the OS was leveraged to strangle the market for a superior product.
Novell didn't look on doe-eyed, the Wordperfect aquisition (which came much later) was a desperate attempt to save themselves once they realized Microsoft could leverage the OS to beat them, *no matter how superior their products were*. It was desperation, not stupidity.
Re:Novell fumbled the ball - again and again... (Score:3, Insightful)
Re:Novell fumbled the ball - again and again... (Score:3, Informative)
Re:Novell fumbled the ball - again and again... (Score:4, Funny)
Also, Microsoft adopted TCP/IP back in the 80s with OS/2 so I dunno if you know your history either.
Awww, yer so cute when you have no clue what you're talking about. Microsoft? TCP/IP? OS/2? That's utterly adorable. Go do some research and once you realize how funny that is come back here and we'll have a good ol' laugh about it.
OS/2... Snicker...
Re:Novell fumbled the ball - again and again... (Score:3, Insightful)
Re:Novell fumbled the ball - again and again... (Score:1)
Microsoft HAD LOTS to do with OS/2. They just so happen to be making a competeing product along side it. DOn't you remember Microsoft's OS/2? IBM's OS/2? WinOS2? Oh yeah... you know what Microsofts OS/2 version 3 got renamed too? Windows NT
Even a little googling can prove you retarded. Please drive through.
Re:Novell fumbled the ball - again and again... (Score:2)
I would not call it a LanMan clone. Putting aside what role NetBios, NetBEUI, LanMan, SMB, CIFS and whatever other acronyms involved play in the proccess of me accessing my home directory on my FreeBSD box from my windows 2000 server, Samba was originally built to allow the author to access a DEC server from his Unix (I believe slowlaris) box.
Re:Novell fumbled the ball - again and again... (Score:5, Informative)
1. Microsoft was only involved in OS/2 up until version 1.3
2. OS/2 was widely criticized because it did not have built-in networking. So Microsoft certainly didn't introduce TCP/IP in the 80's with OS/2.
3. The first version of OS/2 with built-in networking was OS/2 WARP, which was after OS/2 2.1. This was many years after the IBM/Microsoft rift.
So.... yeah. This is what any decent research will tell you. Rebuttals are welcome, I'm kind of enjoying teaching a new generation about how the 80's played out.
Re:Novell fumbled the ball - again and again... (Score:3, Informative)
Re:Novell fumbled the ball - again and again... (Score:1, Flamebait)
OOooo, thanks, that tickled!
IPX on large networks (Score:5, Informative)
But the real performance killer on lots of networks was all the chatty SAP announcements - even on a medium-sized network, all the printers advertising themselves can clog up any useful bandwidth, which often meant 56kbps back when this sort of networking was common for users like banks, retail stores, and branch offices of big companies. Yes, we learned how to do SAP filtering, and eventually Novell came out with NLSP which helped a lot.
The more important problems were pricing - upgrading to Netware 5 which could use TCP/IP instead of IPX tended to cost too much for the types of companies that were big Netware users back in mumblety-95, so they stayed with IPX way past its prime, around the time that Microsoft was figuring out how to make NetBIOS-over-IP perform badly over long distances (as opposed to NetBIOS-over-NETBEUI.) While Microsoft _still_ doesn't have a clue about decent networking, they were good enough to beat Netware in the market, and small networks of either Netware or NetBEUI could both be self-configuring, a lesson we're trying to relearn for IPv6.
Re:Novell fumbled the ball - again and again... (Score:3, Interesting)
TCP/IP is fundamentally designed to let anybody in, very routable and hardly securable. It's essentially a difference between private roads and public roads.
Just on the basis of where Novell is coming from, I'd expect a Linux coming from Novell to be somehow much more "business-friendly". Just a different bias in setting various tweaks and configurations would be enough.
Re:Novell fumbled the ball - again and again... (Score:1)
a) proprietary, so it couldn't interoperate with any other platform
b) couldn't scale globally, although Novell tried to sell it that way
c) cost a mint to buy licenses for
d) Had nowhere near the number of apps that TCP/IP had riding on top of it.
TCP/IP was a FAR better protocol from the ground up.
Re:Novell fumbled the ball - again and again... (Score:1)
Re:Novell fumbled the ball - again and again... (Score:1)
Re:Novell fumbled the ball - again and again... (Score:1)
Re:Novell fumbled the ball - again and again... (Score:1)
[Btw, the Cambridge buy was 99% cronyism (east coast faction that time) and failed even worse.]
SuSe is the first major acquisition by Novell that was motivated 100
Re:Novell fumbled the ball - again and again... (Score:2)
Re:Somewhat off-topic (Score:3, Insightful)
It was not stolen from them, they gave it away. They lost market share with arrogance and poor support that at the time made Micro$oft seem a breath of fresh air. Their support devolved to where didn't want to even talk to you if you weren't a CNE. The whole certification racket they pioneered was a brilliant stratagem. It got people to pay Novell for the privilege of doing
Re:Somewhat off-topic (Score:1)
>It was not stolen from them, they gave it away
Uhm, they had stolen that market share from someone else before Microsoft stole or took it from them.
What comes around, goes around.
Re:Somewhat off-topic (Score:2)
That probably holds true for any company in any industry.
Seems it almost did in IBM. Seems also that Linux has rejuvenated IBM, maybe moreso that Linux is an antidote for the same-old same-old than Linux itself. Assuming that Novell can provide value for its customers, highly likely since most businesses would rather deal with Novell than the Open Source rabble, both Novell and SuSE shou
Re:Can someone explain this? (Score:3, Informative)
IPsec is basically authentication/encryption for packets at the IP level.
Re:Can someone explain this? (Score:5, Informative)
What's more, unlike other Linux-based solutions, I don't think there have ever been any serious questions raised over its security.
Free/OpenSWAN also interoperates with a wide variety of commercial (soft and hard) VPNs. Authentication can be by RSA secrets or X509 certificates.
Re:Can someone explain this? (Score:2)
Re:Can someone explain this? (Score:3, Informative)
"A Virtual Private Network [wikipedia.org], or VPN, is a private communications network [wikipedia.org] usually used within a company, or by several different companies or organisations, communicating over a public network. VPN message traffic is carried on public networking infrastructure (ie, the Internet) using standard (possibly unsecure) protocols.
VPNs use cryptographic [wikipedia.org] tunneling [wikipedia.org] protocols to provide the necessary confidentiality (preventing snooping), sender authentication (pr
Re:Can someone explain this? (Score:1)
Honestly, this project is bloated. FreeS/Wan was allways bad (specially on it's setup, documentation and interoperabillity), but for some time it was less bad sollution. Then Linux Kernel 2.5 and 2.6 came, and with it a good IPS
"It will be very interesting to watch..." (Score:3, Funny)
SUSE (Score:3, Interesting)
Re:SUSE (Score:1)
Re:SUSE (Score:2)
Then fedora came. I took a copy of the CDs at linux world after talking to one of the peopel there and forgave the company. Mind you I don't think Bob Young would care about my excommunication enough to stand barefoot in the snow outside my window for a few days, I was
Re:SUSE (Score:2, Informative)
It is also true hat "gcc-2.96" did not have the quality of a proper gcc release. However, this step proved very valuable for gcc 3.0 development, because of the huge user base acting as testers. Of course, 99 percent
Re:SUSE (Score:2)
Hmm, I think they also were before. But with Novell's help probably even more so.
Nice project but documentation is lacking... (Score:5, Informative)
Re:Nice project but documentation is lacking... (Score:3, Informative)
Re:Nice project but documentation is lacking... (Score:5, Informative)
I was the maintainer of Super FreeS/WAN, and am now the release manager of Openswan.
We're currently working on a whole new set of documentation, in DocBook/XML format to boot. It's slow, since we all know how much developers love to write documentation, but it's coming. For now, you can see The Wiki [openswan.org] which will probably get slashdotted.
Ken
and ? (Score:4, Interesting)
I have never tried SWAN because OpenVPN is so easy.
Are there any compelling reasons to try it ??
Comment removed (Score:5, Informative)
IP Encryption vs. TCP Encryption (Score:5, Informative)
The real difference is that IPSEC is encrypting at the IP layer of the protocol stack, aka Layer 3 in OSI terms, while OpenVPN is creating a TCP Layer 4 tunnel. Inside the tunnel, IPSEC normally puts Layer 3 IP packets, while OpenVPN does something with a TUN/TAP driver on the ends, so they could be doing Layer 3 IP packets or Layer 2 Ethernet packets, and I haven't read the docs enough to know which they did. Layer 4 has more overhead, but has a potentially easier time going through NAT.
For both of these applications, you have to create an association between two endpoints, and then tell your endpoints' packet handlers to use that association when they want to get packets somewhere. The choice of protocol layers for the inside and outside of the crypto tunnel has a major impact on how you get the routing mechanisms (or whatever) to decide to set up a tunnel and send packets through it.
Re:IP Encryption vs. TCP Encryption (Score:2)
An interesting use of OpenVPN is to bridge the OpenVPN TUN/TAP interface with the local ethernet interface. This way you have all your broadcast packets going over the VPN and keeping Network Neighborhood and other b'cast protocols happy. Plus you only have one address space and don't have to stuff around with a seperate subnet. I haven't done much with IPsec, but I don't think it can do either of these things. Still, IPsec does have the whole Standrd thing going for it.
Re:IP Encryption vs. TCP Encryption (Score:2)
Re:and ? (Score:5, Informative)
Re:and ? (Score:2)
Re:and ? (Score:5, Informative)
Now for the "reply" trigger-happy, OpenVPN does do SSL/TLS, is all in user-space, and does neat things, yes. However, with the *SWANs, you can also get x509, nat-t, dpd, foo, and bar. And yes, OpenVPN is cross-platform.
The problem lies in not being cross-vendor. And you also have to realize that there is a very large inter-web out there and not everyone uses the same platforms and vendors, etc.
For example, as a security engineer, I often have to build VPNs between disparate vendors, devices, and software versions. Even with IPsec/IKE it's difficult enough. And they've all pretty much agreed on how to speak IKE well enough to at least have a meet-and-greet among each other. Unfortunately, there is plenty of room for interpretation, so each vendor has a slightly different dialect.
The point being, OpenVPN isn't a "standards-based VPN" whereas an IKE-based VPN is. I know it's not necessarily a great answer to the question, but it is the truth. (Besides, OpenVPN even says so on their site...it does not do IKE.)
(whoa, poet and didn't know it)
(woops, i did it again!)
Re:and ? (Score:2)
Re:and ? (Score:5, Interesting)
x509 is certs right ? OpenVPN can do em. nat-t ? OpenVPN doesnt need that kludge. It uses one port that can be redirected through multiple Nats if need be. Dead peer detection ? OpenVPN is self healing. Link goes down, comes back up and OpenVPN reconnects.
Now before I get too carried away, I dont know shit about vpn, but SWAN looks like a bitch (based on my IPCop machine) and OpenVPN is very easy.
Re:and ? (Score:2)
How long does it take to put together a "normal" VPN? I spent about 6 hours before I got OpenVPN to work, futzing with this option, that config file, etc. until I *finally* got it to do what I wanted.
Specifically, I have a remote desktop application that I use for tech support (based on VNC) that requires the customer to download a program from a web page, and then connect to a dedicated IP.
The VPN connects my laptop to the
Re:and ? (Score:2)
Re:and ? (Score:2, Interesting)
This is one area where I think one of the commercial distrobutions could easily different
Re:and ? (Score:3, Informative)
However, if you are implementing a VPN between Linux and a device such as a Cisco PIX, you can't use OpenVPN.
The fact of the matter is - Openswan implements an industry standard VPN implementation, OpenVPN does not.
Not that it is a cause for great concern, but OpenVPN connections are also vulnerable to connection cutting (see the many, many recent stories about TCP/IP connection cutting DoS attacks), IPSEC is not.
Re:and ? (Score:2, Interesting)
openvpn by default uses the UDP port (Score:2)
Re:and ? (Score:2)
IPSec is an open standard, so implementations are available from many different vendors in many different setups, including hardware.
One other advantage if you're supporting windows roadwarriors, is that L2TP/IPSec is built into dialup networking on windows 2K/XP
Re:and ? (Score:2)
ISAKMPD (Score:1)
It easy to set up, and works just fine on my gentoo box.
Re:ISAKMPD (Score:2)
patents hurt openswan (Score:3, Informative)
Re:patents hurt openswan (Score:1, Informative)
Openswan supports IPCOMP compression. It should interoperate with many IPsec implementations, if they support IPCOMP.
Re:patents hurt openswan (Score:2)
FreeS/Wan doesn't.
I would like to enable encryption on my link to work, but as soon as I do so the link dies.
It works OK between FreeS/WANs and between Ciscos but not between the two...
Re:patents hurt openswan (Score:2)
So, details please... it works nicely for me.
Re:patents hurt openswan (Score:2)
Re:patents hurt openswan (Score:1, Interesting)
I thought the former was possible, but the latter was not (yet) there ?
Re:patents hurt openswan (Score:2)
Why? (Score:5, Interesting)
Re:Why? (Score:2, Interesting)
Re:Why? (Score:2)
Will it be as big as KAME's list of corporations? KAME's list:
Fujitsu Limited [fujitsu.com]
Hitachi, Ltd. [hitachi.co.jp]
Internet Initiative Japan Inc. [iij.ad.jp]
NEC Corporation [nec.co.jp]
Toshiba Corporation [toshiba.co.jp]
Yokogawa Electric Corporation [yokogawa.co.jp]
Re:Why? (Score:5, Informative)
(Btw, the 2.6 kernel hasn't exactly been official "for some time now" -- even SuSE is just now shipping it in their 9.1 release.)
In fact, with Novell now involved in Openswan (which means IBM is likely involved as well but less publicly), we will probably see Openswan work with IPsec hardware too (IBM makes some).
Re:Why? (Score:3, Interesting)
Look at the recent posts on the netfilter lists, for instance - doing secure firewalling with 26sec is still a real pain. There's a set of 6 patches now, but they aren't integrated into the kernel yet, and some may not be for some time.
Also, there's some network configurations that work fine under 2.4/Openswan, but will not work at all in 2.6. One of these c
KAME has problems (Score:3, Interesting)
Novell's Commitment to Free Software (Score:5, Insightful)
We've seen it now with their support of OpenSWAN, the open-sourcing of YaST and iFolder, and the continuing free releases of SuSE 9.1.
As I said, I'm very pleased to see this, and I suspect we'll see even more support of the open source and free software community from the reborn phoenix that is Novell.
Re:Novell's Commitment to Free Software (Score:4, Interesting)
Look, we all know which company you're thinking of, and I'm telling you you're completely misinformed. Can you please let me know some of the supposed closed programs this evil company is distributing, because the last time I checked it was all open source. Somehow the bashers always forget this detail...
This is the comany that is afraid to include mp3 support for being non-free, right? The company that pays Alax Cox, Arjan van de Ven, Dave Jones, Jeff Garzik, Warren Togami, Roland McGrath, Guy Streeter and many more to hack the kernel? In fact, if I'm not mistaken this company has more kernel hackers than IBM and Novell combined (read a kernel changelog lately)? I'd list some GNOME developers that works for this beast of a company, but let's just say outside Ximian they're the #1 employer here as well (cough, Havoc Pennington, Alexandre Oliva *cough*). And all that money and effort they pour into Freedesktop.org and X.org, that's just to lock you in, right?
That company? Am I forgetting something... ? Oh yeah, they pretty much alone funded NPTL development for 2.6, backported it to 2.4 not only for their paying customers but their free version too. I guess they're pretty much the defacto maintainers of GCC and glibc these days too, but other than that, what have they ever given us?
Re:Novell's Commitment to Free Software (Score:1, Interesting)
1. The n00b. Red Hat = MS. This person doesn't let the facts get in the way of a good argument. He's running Linux 'cause it's the l33t thing to do. Listen sonny, I was installing Slackware from disksets from the local BBS when you where a twinkle in your daddy's eye. Between then and now the community, and I myself, have written a shitload of code so that I and you don't have to do things the hard way anymore to be l33t. I've got actual work to
Re:Novell's Commitment to Free Software (Score:3, Interesting)
Novell, on the other hand, had built a (at one time) very successful business around proprietary software. It's a huge culture shift for them. Not they were ever the "evil empire" type of company, but they were certainly no
Nativew IPsec Embedded in the Kernel (Score:3, Informative)
Re:Nativew IPsec Embedded in the Kernel (Score:1)
Re:Nativew IPsec Embedded in the Kernel (Score:2)
Re:Nativew IPsec Embedded in the Kernel (Score:4, Informative)
2.6 has an IPsec kernel layer implementation. There are two part to IPsec - the kernel layer, and the key management (IKE) portion. The IKE daemons are userland, and without them, you don't have a complete IPsec implementation.
Thus, they have ported isakmpd/racoon to Linux, or you can run Openswan's userland tool (aka pluto).
Re:Nativew IPsec Embedded in the Kernel (Score:1)
Personally, I have found easier and more mature the Freeswan tools than the the ipsec-tools.
Omar
OpenVPN is an excellent alternative to IPSec... (Score:2, Informative)
Novell-Suse-... should sponsor this excellent project instead of the brain damaged(tm) IPSec.
Re:OpenVPN is an excellent alternative to IPSec... (Score:3, Informative)
Re:OpenVPN is an excellent alternative to IPSec... (Score:2, Interesting)
With those hardware companies moving to Linux as a platform (CyberGuard, BorderWare, Stonesoft, Astaro and others already there -- many more moving),
Why not Strongswan? (Score:1)
Omar
Re:Why not Strongswan? (Score:2, Informative)
Why didn't they sponsor FreeSWAN? (Score:1)
2) Is opportunistic encryption still a priority for the FreeSWAN project as it was for OpenSWAN? I didn't see any mention of it on their starting page.
Re:screw this...why not just use.. (Score:1)
How many Cisco VPN are around, and how many Freeeswan ?
Probably it's not possible to know any of these numbers, but it would be very interesting to be able to estimate them.
You say "Cisco VPN more secure" ?
How many known vulnerabilities has been found in Cisco VPN, and how many in freeswan ?
This time it's possible to know the numbers. Any one volunteer to search Google and/or securityfocus ?