Vulnerability Development mailing list archives
IPSec research
From: verberk () NORTELNETWORKS COM (Bep Verberk)
Date: Fri, 24 Mar 2000 14:34:52 -0500
I'm trying to locate some research/documents/papers discussing the use of IPSec to provide enhanced security. Aside from the obvious performance hit, people seem to be talking like this is the "silver bullet" for security over IP. Surely, there must be some inherent flaws ? What about the need for a trusted key exchange system ? Is that vulnerable ? Perhaps a good idea in theory will fall apart due to bad implementations, riddled with buffer overflow exploits and DOS vulnerabilities ?? Any thoughts, ideas, pointers ? Cheers.
Current thread:
- Re: spoofing the ethernet address, (continued)
- Re: spoofing the ethernet address Juan M. Courcoul (Mar 15)
- Linux Mandrake 6.1 PAM/userhelper exploit Paulo Ribeiro (Mar 16)
- AIM 3.0 Buffer Overflow exploit lewkir () YAHOO COM (Mar 17)
- Re: AIM 3.0 Buffer Overflow exploit Jamal Hendershot (Mar 19)
- Re: AIM 3.0 Buffer Overflow exploit - - (Mar 21)
- Re: spoofing the ethernet address Arnold, Jamie (Mar 15)
- Re: spoofing the ethernet address James A. Robbins (Mar 15)
- Re: spoofing the ethernet address Pierre Landau (Mar 21)
- Re: spoofing the ethernet address Ex Machina (Mar 22)
- Re: spoofing the ethernet address (license managers) Eric Sherrill (Mar 24)
- IPSec research Bep Verberk (Mar 24)
- Re: IPSec research Dug Song (Mar 24)
- Re: IPSec research Mike Hudack (Mar 25)
- Re: IPSec research potential problem areas. Patrick Denton (Mar 25)
- Re: spoofing the ethernet address Ex Machina (Mar 22)