Penguin
Blame: OpportunisticEncryption
EditPageHistoryDiffInfoLikePages
Annotated edit history of OpportunisticEncryption version 5, including all changes. View license author blame.
Rev Author # Line
1 CraigBox 1 Devised by the authors of FreeSwan, Opportunistic Encryption is a method for securing communication between any two correctly configured computers on the Internet, without them needing any prior information about one another.
2
3 Think of the name as "I will encrypt packets for sites that can use them, where I have the opportunity to do so reliably."
4
5 [IPSec] previously suffered from a scaling problem in that that the system/network administrators from any pair of systems or networks that want to have encryption between them had to exchange some sort of PublicKey.
6
7 With OE, each system/network administrator puts the key(s) needed to create IPSEC tunnels with their networks into the [DNS]. Then when another OE enabled IPSEC gateway wants to send packets to a host on the Internet, a check is first done to see if there are any keys in the DNS for that host and if there are, they are fetched and an encrypted tunnel is set up transparently. If there are no keys, then the packets MAY (if the administrator of the sending network allows so in his security policy) be sent in the clear.
8
2 CraigBox 9 FreeSwan 2 does [OE] out of the box. [FreeSWAN's quickstart to Opportunistic Encryption|http://www.freeswan.org/freeswan_trees/CURRENT-TREE/doc/quickstart.html] might help.
1 CraigBox 10
4 LawrenceDoliveiro 11 See the very readable [IETF draft for the Opportunistic Encryption specification|http://www.sandelman.ottawa.on.ca/SSW/freeswan/oeid/draft-richardson-ipsec-opportunistic.html].
3 LawrenceDoliveiro 12
4 LawrenceDoliveiro 13 Note that OE does ''not'' guard against ManInTheMiddle attacks, unless the keys can be independently authenticated, for example by [DNSSEC].
5 LawrenceDoliveiro 14
15 So what is the point of it? It is resistant to passive snooping, for example by spy agencies, other Government organizations, and Bad Guys in general. To defeat the encryption, they would have to actively intercept your connection attempts and substitute their own keys. This might be considered too much work for somebody who is not specifically targeting you, but just generally snooping on Internet traffic, hoping to find something interesting. Is this a realistic threat to guard against? Only you can decide.
16
3 LawrenceDoliveiro 17 ----
18 CategoryCryptography