> OK, now that we have come down to publishing the who's who in the network
> community... I'd like to take advantage of this great opportunity to pose a
> question.  Since M$ came out with PPTP and had it incorporated into their
> server products, why did they migrate to IPSEC on Win2k?  Is the fact that
> the packets cannot be rewritten the reason?  Is that a potential problem
> with other encryption techniques that IPSEC stands out from?  How then does
> CIPE and the other technologies compare?

PPTP has been heavily criticized as not very secure.  That's probably
one reason M$ is moving away from it.

Another likely reason is more complex.  When people say "PPTP", they
usually mean PPTP (which is unencrypted) with MPPE encryption and
sometimes MPPC compression.  MPPC is patented, and M$ doesn't own the
patent ... or at least not the valid one.  Supposedly the patent
office issued two patents for the same algorithm, and M$ was second in
line, lost a court battle, and had to pay up.

PPTP also has a weird setup.  It uses PPP to negotiate the encryption,
but nominally PPP has no provision for negotiating encryption.  PPP
does have the ability to negotiate compression, so MPPE encryption is
stuck in as a "compression" that doesn't compress, with MPPC then
added as another compression, one that actually does compress.

Initially, MPPE used only 40-bit keys.  You could upgrade later to
128-bit keys, but only under the usual US-only restrictions.  (MPPE
has provision for 56-bit keys, but I've never seen one used.)

I don't know how good the 128-bit encryption is, but it doesn't
matter.  Having begun with a 40-bit key and with the US-only nonsense
about longer keys, MPPE is stuck with a bad reputation it's not going
to live down no matter how good its longer-key encryption may be.

The PPTP/MPPE/MPPC implementation of Windows 95/98 also had really
poor performance.  It was designed for dialup, and it could make DSL
or a cable modem seem like dialup.  The Windows 2K PPTP works much
better, but again PPTP isn't going to live down its reputation as a
dog any time soon.

There was plenty of reason to move on.  With IPsec out there as an
IETF-sponsored standard, it was the obvious choice for any vendor.

The CIPE FAQ comments:

    As for CIPE vs. IPSEC, they should be equivalent security-wise,
    with CIPE giving a bit better performance because of the
    lightweight protocol. However, IPSEC is standardized and thus has
    better interoperability.

Interoperability here mean interoperability in the sense Jason means
it: if you have to connect to equipment that only runs IPsec, then you
too have to run IPsec.  However, in the sense that I think is more
important, all VPN technologies are interoperable, because it doesn't
matter how you connect networks.

An IPsec-based VPN and a CIPE-based VPN can be joined by putting a
CIPE-speaking box on a DMZ segment of the IPsec-based VPN or by
putting an IPsec-speaking box on a DMZ segment of the CIPE-based VPN.
(For that matter, you could join them by putting an OpenVPN-speaking
box on a DMZ segment of each.)

What it comes down to is that if you limit your VPN to IPsec-speaking
boxes, then you limit your VPN to IPsec-speaking boxes.  If you don't,
you don't.

CIPE was originally developed for Linux, but it's been ported to
Win2K, so boxes that could talk CIPE are common on most networks.

--
Dick St.Peters, [EMAIL PROTECTED] 



-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to