RE: ORBS (Re: Scanning)

> I don't buy the "we need open relay for nationwide users" argument,
> either. Build a cheap MX that does nothing but take mail from a given
> POP, and send it to the world. Anti-spoofing at the border,
> don't accept mail from the outside world, and you're done.

You must not have a roaming staff or are willing to keep telcos wealthy.

Roaming staff usually needs some form of VPN access, anyway, and even if
they don't, this is a great use for one. Put a VPN client on the roamer's
computer (Linux, Mac, and Windows 9x/NT/ME/2k all have IPSEC capable clients
available), then use the VPN to get back to the mail relay. If the mail
relay is behind the VPN tunnel termination point at the server end, then
it should only accept mail for relay from valid VPN clients. As such,
you solve the roaming staff problem without an open relay. VPN boxes
like Ravlin and Nokia Crypto Cluster are cheap enough today that I would
consider it a valid cost of doing business if you don't have a better
solution.

Owen

Roaming staff usually needs some form of VPN access, anyway, and even if

>they don't, this is a great use for one. Put a VPN client on the roamer's
>computer (Linux, Mac, and Windows 9x/NT/ME/2k all have IPSEC capable clients
>available), then use the VPN to get back to the mail relay. If the mail
>relay is behind the VPN tunnel termination point at the server end, then
>it should only accept mail for relay from valid VPN clients. As such,
>you solve the roaming staff problem without an open relay. VPN boxes
>like Ravlin and Nokia Crypto Cluster are cheap enough today that I would
>consider it a valid cost of doing business if you don't have a better
>solution.

I have an "operational" question. (SURPRISE! :slight_smile:

VPN solutions are getting inexpensive. However, they are sometimes far from optimal.

The VPN solutions I have used (e.g. Bay Networks, MS PPTP) send *every* packet from the end user machine to the VPN end-point, not just selected packets (like with SSH tunneling).

This can cause extremely poor performance for some roaming users. For instance, someone in Sydney with a home office in New York trying to get to a Sydney web server suddenly has to make two round trips to New York, just to cross town. Considering trans-pacific fiber congestion and other problems, this can make the VPN nearly unusable.

Of course, you could tell the user to turn off the VPN, but you try to explain to a typical end user when he should and should not have the VPN turned on, or that he cannot send mail while browsing the web, or things like that.

So, does anyone know of a VPN that does selective forwarding like SSH tunneling?

>Owen

TTFN,
patrick

With the MS PPTP client, there is an option to not use the default gateway
on the remote network. By default this is on, so all your traffic goes
through the VPN. Turn it off and only traffic destined for the remote
network goes over the VPN.

I would bet that there are similar options for other clients.

Jason Lewis
http://www.packetnexus.com
It's not secure "Because they told me it was secure". The people at the
other end of the link know less about security than you do. And that's
scary.

I've not had experience with MS PPTP or Bay Networks but have worked
with the Sonicwall VPN client and FreeS/WAN and both only routed traffic
through the tunnel if it was destined for that end-point and left all other
traffic to traverse the network as it would be without the VPN tunnel. Both
of these solutions can manage this as they both actually modify the routing
table to include a route to the end-point over the tunnel and leave the
default route as is.

  Jeremy

Patrick W. Gilmore was said to been seen saying:

VPS is toop complex and it's necessary only if you use your corporate services.

On the other hand, it's not big p[roblem to allow relaying for the roamers keeping
it close for the spammers (and mainly for ORBS).

(1) Allow relaying for the message with yopur roaming From: . It's not best
solution but it cut 99% of the spammers (including ORBS which behave like
spammer).

(2) Connect your POP/IMAP with your relay so to allow SMCP relaying from IP
addrerss which was registered in POP/IMAP for last 3 hours.

And so on.

An idea to use VPN for the common roaming is the crazy one; and what for you
propose to use cryptography? To prevent mail sniffering? Who treat you with it?
And if you need secure mail, use PGP or something like it.

VPM is a good thing - for access to the corporate network, through 50% of it's
configurations don't provide enougph security (using multy-time passwords for PPTP
just mean _you have not security_ no matter if you use PAP, CHAP or something more
complex - you can think _why_ but it's reality).

The Altiga/CiscoVPN3000 series allows you to do split tunneling. You give
it a list of networks, and it drops this on the client when it connects.
The client will check the list, and if the network is there, will send the
packets through the tunnel. Works great for users who have a LAN printer
but still want remote access.

craig

The VPN solutions I have used (e.g. Bay Networks, MS PPTP) send *every*
packet from the end user machine to the VPN end-point, not just selected
packets (like with SSH tunneling).

  If you want a commercial solution that does selective tunnelling - the
FW-1 addin (VPN-1) exports a "topography" file to the client at setup; this
really consists of a list of subnets that the VPN will handle, and is set at
the server side. anything not on the topography list goes out via the dialup
adaptor or network card as normal.

Does anyone know of a way to put layer 4 switching in front of a VPN client such that (for example) email and nntp dont get tunnelled while everything else does, or vice-versa?

We're probably talking Windows software here I know......

Jon.

Along with those others mentioned, InfoExpress' VTCP will only route
traffic over the VPN destined for the defined secure network. All other
traffic routes over your normal non-tunneled connection.

http://www.infoexpress.com/products/vpn/index.html