Myvideo

Guest

Login

Opportunistic Encryption Using IPsec by Paul Wouters, Libreswan IPsec VPN Project

Uploaded By: Myvideo
4 views
0
0 votes
0

Opportunistic Encryption Using IPsec - Paul Wouters, Libreswan IPsec VPN Project Opportunistic IPsec (Paul Wouters, Red Hat) - Leveraging the XFRM code inside the kernel, the libreswan IKE daemon can create XFRM kernel so it will be notified of each new netflow. It uses this information to encrypt as much of the host’s traffic as possible towards other hosts with the same IPsec capability. In addition to packet-triggered events, it can also hook itself into the system via DNS calls, attempting to setup IPsec encryption before the application has even been given the IP address to contact. By supporting different authentication mechanisms, such as certificates, GSSAPI, or DNSSEC secured IPSECKEY records, this method can be deployed on any enterprise or cloud platform or even for internet hosts at large. Wouters will show how to configure Opportunistic IPsec for an based cloud deployment and for internet-wide deployment using LetsEncrypt. About Paul Wouters Paul Wouters is one of the core develo

Share with your friends

Link:

Embed:

Video Size:

Custom size:

x

Add to Playlist:

Favorites
My Playlist
Watch Later