New column -- Using IPsec for network protection
I'm now writing semi-regular articles for TechNet. These are part of the security management series, and they're also linked from the security newsletter.
The first column is a two-parter about IPsec. Part 1 describes the technology: how it operates, its various modes and methods, a bit on IKE, and how it works over NAT.
https://www.microsoft.com/technet/community/columns/secmgmt/sm121504.mspx
Part 2 illustrates three excellent scenarios that you can apply IPsec to today: stopping worms, protecting servers, and isolating domains -- a very cool approach for requiring domain membership of all your computers. Get rid of the rogues!
https://www.microsoft.com/technet/community/columns/secmgmt/sm0105.mspx
Security newsletter
If you haven't already, I urge you to sign up for the security newsletter. Hundreds of thousands of subscribers -- many of whom might be your competitors (LOL) -- already benefit from the tips, tricks, updates, guidance, and news we publish every month. So sign up today! My columns are always linked from here, too.
https://www.microsoft.com/technet/security/secnews/default.mspx
Comments
- Anonymous
January 01, 2003
The comment has been removed - Anonymous
February 10, 2005
Thanks Steve! Been looking for something like this for a long time.
Great writing and easy to understand!
As a MCT teaching this subject next week I will sincerly recommend this for further reading in my "must have" url -LIST ;-) - Anonymous
February 20, 2005
Steve, I think it is incorrectly to use term 'SHA1 or MD5 digital signature' then you describe authentication. Definitely one of the core properties of DigSig is that other party could not compute its own version and compare that with stored 'signature' - Anonymous
February 27, 2005
No, my terminology is correct. It's the digital signataure that provides the per-packet authentication of the traffic. IOW, the signature authenticates that the packet actually comes from the sending IP address that's claiming to have sent the packet. When the receiving side computes its own version of the packet's signature, that second computation must match the same signature that's included in the packet. - Anonymous
February 28, 2005
The comment has been removed - Anonymous
March 02, 2005
Ah, I see your point. I am using the term "digital signature" more loosely here. You are technically correct, SHA-1 and MD5 are one-way hashes, not true digital signatures in the classic sense of that term. But the definition of the concept of "singing" has expanded to include hashing, too.