Search results

Jump to navigation Jump to search
  • ...he current version is RFC 2437. RSA is used in many protocols, including [[IPsec]], [[Open PGP]] and [[DNS security]]. ...ntations do it differently. In an [[IPsec#Complications | example]] from [[IPsec]], the [[FreeSWAN |FreeS/WAN]] implementer used the product while [[PGPnet]
    7 KB (1,171 words) - 05:48, 8 April 2024
  • ...intro.html FreeS/WAN project] which is a [[Linux]] implementation of the [[IPsec]] encryption protocols. I have permission to re-use that text here (see [[
    2 KB (347 words) - 18:31, 13 March 2024
  • '''IPsec''' (also written as IPSEC) stands for '''I'''nternet '''P'''rotocol '''Sec'''urity. It defines a basi ...ed implies that not necessarily all IPv6 systems will actually make use of IPsec, but functionality is required as specified by the [[RFC]] (RFCs serve as "
    40 KB (6,219 words) - 05:49, 8 April 2024
  • ...of operation]] and how these ciphers should be used in protocols such as [[IPsec]], [[Open PGP]], [[SSL]] and [[SSH]]. For details, see the linked articles
    4 KB (600 words) - 23:49, 7 June 2012
  • Cipher block chaining is much the most '''widely used mode'''. [[IPsec]] specifies it as the only permitted mode. [[PGP]] and [[TLS]] use it as we Much of the work has been done in the context of Internet standards such as [[IPsec]], where it addresses a significant performance issue. See RFC 5116 "An Int
    8 KB (1,297 words) - 05:48, 8 April 2024
  • ...key variant is widely used; for example RFC 2451 specifies it for use in [[IPsec]].
    4 KB (685 words) - 05:48, 8 April 2024
  • | url = http://www.ietf.org/rfc/rfc2890.txt}}</ref> and IPSec. The IPSec case may involve either the Authentication Header alone, or the Authenticat
    9 KB (1,543 words) - 16:22, 30 March 2024
  • ...rise VPNs are running over it. If he looked at the line, he would only see IPSec packets in public address space he assigned. ...ecure links. But then, the only VPN work I've done was on FreeS/WAN, Linux IPsec, so perhaps I have too narrow a view. Anyone else care to chime in? [[User:
    19 KB (3,256 words) - 18:09, 10 June 2010
  • ...r aspect of Internet Protocol version 6 deployment may be increased use of IPsec, which, in turn, needs a secure DNS as a trusted repository for public keys ...se of client and server authentication, probably based on some features of IPsec.<ref name=RFC4301>{{citation
    13 KB (2,037 words) - 16:22, 30 March 2024
  • The [[Internet Key Exchange]] protocol automates key management for [[IPsec]]. It can be set to re-key after a fixed time or after a fixed amount of da
    6 KB (1,064 words) - 02:04, 24 January 2017
  • ...s tunnel among customer sites using a secure tunneling protocol, such as [[IPSec]], over physical connections to Internet Service Providers. The ISP, in suc ...of different encrypting protocols may be used to construct a secure VPN. [[IPsec]] is most often used for secure VPNs between an organisation's offices and
    15 KB (2,421 words) - 05:49, 8 April 2024
  • ...ere having an in-joke there, because DOI-100, which had nothing to do with IPSec Domain of Interpretation, was a long-obsolete message header format for spe
    13 KB (2,155 words) - 12:34, 16 August 2008
  • ...ts. In the FreeS/WAN docs I was dealing with a limited context: issues for IPsec usage. For an encyclopedia, we need both broader coverage and removal of so
    6 KB (990 words) - 08:26, 4 May 2024
  • ...elated products appeared, PGP disk for disk encryption, PGP [[VPN]] with [[IPsec]], and PGP Firewall. However, it proved an unprofitable product for NA. In
    7 KB (1,143 words) - 05:49, 8 April 2024
  • ...ent undetected. This technique is used in many security systems, such as [[IPsec]], to ensure [[information security#integrity|data integrity]]. ...very wide use. For example, it is used in protocols such as [[PGP]] and [[IPsec]] and in [[random number]] generators such as [[Intel]]'s hardware generato
    16 KB (2,641 words) - 15:51, 8 April 2024
  • ...the receiver. In the [[Diffie-Hellman]] key agreement protocol, used in [[IPsec]] and other systems, public key techniques provide authentication.
    8 KB (1,233 words) - 05:48, 8 April 2024
  • ...compatibility (e.g., [[Generic Route Encapsulation]]) or security (e.g., [[IPSec Tunnel Mode]]) also may do "layer 3.5". Stateful firewalls and network add
    9 KB (1,294 words) - 06:08, 17 March 2024
  • ...s and turniness with which a lot of things are coming together: DNS, IPv6, IPSec, PKI, DNSSEC (which is probably confusing because it really isn't ready for RFC 4322 proposes using DNS to manage keys for IPsec. [[User:Sandy Harris|Sandy Harris]] 15:26, 31 October 2008 (UTC)
    29 KB (4,787 words) - 15:19, 14 July 2010
  • ...articles. However, I feel that those citations have no direct relevance to IPsec, so citing them in this article is just clutter. ...external sources vs when to wikilink? Should we sometimes do both, as the IPsec article currently does for things like SSL and TLS?
    66 KB (10,879 words) - 17:02, 5 March 2024
  • Even systems generally thought to be secure, such as [[IPsec]] or [[PGP]], are ''trivially'' easy to subvert if the enemy has unfettered ...[[IPsec]] tunnel protects data as it travels between two offices, and the IPsec gateways are secure, an attacker with access to either office network can s
    32 KB (4,913 words) - 14:38, 18 March 2024
View ( | ) (20 | 50 | 100 | 250 | 500)