On Thu, Jul 03, 2003 at 06:32:08PM +1000, herbert wrote: > > > I am afraid I did not understand the idea. > > Can you be a bit more specific about which bit doesn't make sense > to you? Then I can try to clarify it. Thanks. Perhaps it would help if I gave these entities IP addresses. Let the host in question be A with the address 192.168.0.178. A connects to the local private network via the security gateway 192.168.0.1. It does so by establishing a ESP tunnel to 192.168.0.1. The selector of the tunnel is 192.168.0.178 <-> 10.10.0.0/16. The network 10.10.10.0/24 is the trusted network T. Any packets with source addresses in T via the ESP tunnel are genuine. The rest of 10.10.0.0/16 are not necessarily trusted. However, 10.10.0.1 is the gateway to the national private network and is trusted provided that we can verify its identity. So we shall establish an ESP/IPCOMP tunnel to 10.10.0.1, on top of the existing ESP tunnel to 192.168.0.1. The selector of this tunnel would be 192.168.0.178 <-> 10.0.0.0/8. The policies are arranged so that the ESP tunnel to 192.168.0.1 has a higher priority so we can still reach 10.10.0.0/16 through it. Now the problem is that any other host in 10.10.0.0/16, e.g., 10.10.20.30 can hijack the IPCOMP tunnel to 10.10.0.1 and send packets to A with source addresses in the trusted network 10.10.10.0/24. My proposed solution is to strengthen the policy check by making the loose match that we have now exact. That is, a packet passes the policy check only if its security path contains exactly the SAs specified by the policy template. Of course, we'll need to deal with the IPCOMP/IPIP situation but that isn't too difficult if we sacrifice a bit of elegance and allow the eligible IPIP tunnel to match the IPCOMP SA. Incidentally, this removes the need to have SA selectors as they are now subsumed by the policy checks. This makes it possible to have SAs that apply to IP address ranges, e.g., 192.168.0.10-20 which currently can only be achieved with multiple SAs unless you make the selector wider than it should be. Cheers, -- Debian GNU/Linux 3.0 is out! ( http://www.debian.org/ ) Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt - : send the line "unsubscribe linux-net" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html