RFC 2137 |
Secure Domain Name System Dynamic Update |
RFC 2230 |
Key Exchange Delegation Record for the DNS |
RFC 2535 |
Domain Name System Security Extensions |
RFC 2536 |
DSA KEYs and SIGs in the Domain Name System (DNS) |
RFC 2537 |
RSA/MD5 KEYs and SIGs in the Domain Name System (DNS) |
RFC 2538 |
Storing Certificates in the Domain Name System (DNS) |
RFC 2539 |
Storage of Diffie-Hellman Keys in the Domain Name System (DNS) |
RFC 3007 |
Secure Domain Name System (DNS) Dynamic Update |
RFC 3008 |
Domain Name System Security (DNSSEC) Signing Authority [obsoleted] |
RFC 3130 |
Notes from the State-Of-The-Technology: DNSSEC |
RFC 3225 |
Indicating Resolver Support of DNSSEC |
RFC 3226 |
DNSSEC and IPv6 A6 aware server/resolver message size requirements |
RFC 3757 |
Domain Name System KEY (DNSKEY) Resource Record (RR) Secure Entry Point (SEP) Flag [obsoleted] |
RFC 3845 |
DNS Security (DNSSEC) NextSECure (NSEC) RDATA Format [obsoleted] |
RFC 4025 |
A Method for Storing IPsec Keying Material in DNS |
RFC 4033 |
DNS Security Introduction and Requirements |
RFC 4034 |
Resource Records for the DNS Security Extensions |
RFC 4035 |
Protocol Modifications for the DNS Security Extensions |
RFC 4322 |
Opportunistic Encryption using the Internet Key Exchange (IKE) |
Openswan: Building and Integrating Virtual Private Networks
By :
Openswan: Building and Integrating Virtual Private Networks
By:
Overview of this book
<p>With the widespread use of wireless and the integration of VPN capabilities in most modern laptops, PDA's and mobile phones, there is a growing desire for encrypting more and more communications to prevent eavesdropping. Can you trust the coffee shop's wireless network? Is your neighbor watching your wireless? Or are your competitors perhaps engaged in industrial espionage? Do you need to send information back to your office while on the road or on board a ship? Or do you just want to securely access your MP3's at home? IPsec is the industry standard for encrypted communication, and Openswan is the de-facto implementation of IPsec for Linux.</p>
<p>Whether you are just connecting your home DSL connection with your laptop when you're on the road to access your files at home, or you are building an industry size, military strength VPN infrastructure for a medium to very large organization, this book will assist you in setting up Openswan to suit those needs.</p>
<p>The topics discussed range from designing, to building, to configuring Openswan as the VPN gateway to deploy IPsec using Openswan. It not only for Linux clients, but also the more commonly used Operating Systems such as Microsoft Windows and MacOSX. Furthermore it discusses common interoperability examples for third party vendors, such as Cisco, Checkpoint, Netscreen and other common IPsec vendors.</p>
<p>The authors bring you first hand information, as they are the official developers of the Openswan code. They have included the latest developments and upcoming issues. With experience in answering questions on a daily basis on the mailing lists since the creation of Openswan, the authors are by far the most experienced in a wide range of successful and not so successful uses of Openswan by people worldwide.</p>
Table of Contents (22 chapters)
Building and Integrating Virtual Private Networks with Openswan
Credits
About the Authors
Acknowledgements
About the Reviewers
Preface
Free Chapter
Introduction
Practical Overview of the IPsec Protocol
Building and Installing Openswan
Configuring IPsec
X.509 Certificates
Opportunistic Encryption
Dealing with Firewalls
Interoperating with Microsoft Windows and Apple Mac OS X
Interoperating with Other Vendors
Encrypting the Local Network
Enterprise Implementation
Debugging and Troubleshooting
Unresolved and Upcoming Issues
Networking 101
Openswan Resources on the Internet
IPsec-Related Requests For Comments (RFCs)
Customer Reviews