[6017] in cryptography@c2.net mail archive
HOWTO: Encryption on local LAN
daemon@ATHENA.MIT.EDU (Lenny Foner)
Wed Nov 3 17:26:47 1999
Date: Wed, 3 Nov 1999 17:06:04 -0500 (EST)
Message-Id: <199911032206.RAA16219@out-of-band.media.mit.edu>
From: Lenny Foner <foner@media.mit.edu>
To: dstoler@globalpac.com
Cc: me@nettest.dk, cryptography@c2.net
In-reply-to: <v04210100b44606872dd7@[206.15.155.19]> (dstoler@globalpac.com)
Cc: foner@media.mit.edu
Date: Wed, 3 Nov 1999 07:43:43 -0800
From: dstoler@globalpac.com (dstoler)
Michael,
The NetLOCK Gateway does what you need. The NetLOCK gateway is software that runs on an ordinary Windows NT computer with two network interface cards. The computer running the NetLOCK Gateway software serves as the IPsec black box between your device (or devices) and the network, securing its (their) network communications. It can be used to secure communications to ordinary network printers, for example.
See http://www.netlock.com
A software implementation on an ordinary PC seems to make the NetLOCK
machine an extraordinarily tempting target for a subtle attack, such
as one that patches the running code to dramatically reduce the
keyspace used. May I assume that they have some clever scheme to
prevent this, or is it just that I misunderstand what they're doing?