Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
The Internet

Open VPNs On Unix That Support Windows Clients? 189

Adam Schumacher writes:"At work, I've been investigating the possibility of migrating our proxy/ftp/VPN server from NT4 to Linux. Proxying and FTP are obviously no problem, but I am at a bit of a loss as to what to recommend as our VPN server. We need transparent and secure tunneling of our network traffic across the Internet to Windows 95/98/NT/2000 workstations. I know that there are commercial vendors offering VPN solutions that interoperate beautifully between Windows and Linux, but these carry a hefty pricetag, upwards of several thousand dollars. I would much rather go with an Open Source solution. What experience have you had with setting up a VPN between a Linux server and Windows clients? Can you recommend any particular products I should investigate further? In the event that we do have to go with a commercial solution, would you recommend one product over another? Why? Bear in mind that this machine will control access to our entire internal network, so I need a product that has been proven to be robust and secure. Immature code need not apply."
This discussion has been archived. No new comments can be posted.

Open VPNs on Unix that Support Windows Clients?

Comments Filter:
  • by Anonymous Coward
    I rather like that he's showing demand for an Open Source or Free Software alternative. He's betting his company's future on something mature and well-tested, and it is clear he'd obviously settle for a commerical offering if necessary. However, he's testing the waters.
  • by Anonymous Coward

    OpenBSD with IPSec is a no brainer. It is simple to set up, works great, and never goes down. Plus, IPSec is a standard, works with lots of other implementations. The OpenBSD folks have done an amazing job with IPSec. It is awesome.

  • by Anonymous Coward
    I have set up PoPToP (www.moretonbay.com) for Linux as a VPN solution. It has worked pretty well - no real complaints. The only thing I don't like is how addresses are assigned - this is something that can and will get unmanageable if you have a large VPN to roll out. Personally, I prefer the Cisco IRE client, though its not linux based.
  • by Anonymous Coward
    Actually the Nortel Contivity Extranet Switch has heavy interoperability with the Free S/WAN product. And Nortel does support it and it is listed under supported interoperability. They also have white papers that give you step by step installation instructions. The Nortel solution does support every brand of VPN tunnel(PPTP, L2TP, IPSec, L2F, and in 3.0 Ipsec Protected L2TP) and since it is ICSA certified it can interoperate with everything IPSec based VPN solution that is also certified. Since Nortel owns part of Entrust they have full support with them for Digital Certifcates. Full support with Verisign. You can go on. All the major managed VPN solution use it(GTE, Sprint, Genuity, MCI). The number 2 player in that space is Checkpoint which can get expensive in a hurry. By far the best solution on the market for the money. Look on E-Bay there is usally one of the older models laying around if you are worried about price.
  • by Anonymous Coward
    I recommend SonicWall (http://www.sonicwall.com). They work great. Tech support never answers, but neither does Checkpoint's, and a hefty SonicWall only costs 1/10 as much ($2500). VPN clients cost $50 each. It also does nice firewall stuff.
  • by Anonymous Coward on Monday July 17, 2000 @08:18AM (#927485)
    Hey, ssh has port redirection over a tunnel to another box with ssh on it. We had it setup here, with a NT 4 server on one end and a few 95 clients on the other. The Windows people didn't even know they were going over anything but a LAN, because we managed to get samba to flow seamlessly over ssh. Drop me a note if you want more info. mattj@invisik.com
  • by Anonymous Coward on Monday July 17, 2000 @08:39AM (#927486)
    I use a VPN system called Carnivore, by FBI Privacy Solutions, Inc. The FBI techs (called agents) are extremely helpful, and do all the installation and monitoring for you, no added charge.
  • I have used Freeswan extensively, as recent as 4 months ago and it was not even close to being ready for primetime. It was plagued by many. many problems as their very busy mailing list will attest to. I made the mistake of putting it into a production environment without even testing it's reliability.

    Once the VPN systems were in production with Freeswan, they were plagued by kernel panics, flaky startup and shutdown and many other problems.

    Also, back then, there was a major problem with Windows clients connecting using DHCP addresses (all?!!), in that the way Freeswan is configured, it expects a static IP address at the other end of the tunnel.

    These guys who are posting that Freeswan is any sort of panacea, or even a workable solution, either haven't used it for real or are using a dramatically different product than the one I used 4 months ago.

    You can read my many cries for help on the mailing list archives I'm sure. Whatever your case, I wouldn't recommend Freeswan unless they have fixed the kernel panics, flaky startup and shutdown,and the dependency on fixed IP addresses.

    My two cents. --Aaron Newsome

  • by anewsome ( 58 ) on Monday July 17, 2000 @09:31AM (#927488)
    I have used Freeswan extensively, as recent as 4 months ago and it was not even close to being ready for primetime. It was plagued by many. many problems as their very busy mailing list will attest to. I made the mistake of putting it into a production environment without even testing it's reliability.

    Once the VPN systems were in production with Freeswan, they were plagued by kernel panics, flaky startup and shutdown and many other problems.

    Also, back then, there was a major problem with Windows clients connecting using DHCP addresses (all?!!), in that the way Freeswan is configured, it expects a static IP address at the other end of the tunnel.

    These guys who are posting that Freeswan is any sort of panacea, or even a workable solution, either haven't used it for real or are using a dramatically different product than the one I used 4 months ago.

    You can read my many cries for help on the mailing list archives I'm sure. Whatever your case, I wouldn't recommend Freeswan unless they have fixed the kernel panics, flaky startup and shutdown,and the dependency on fixed IP addresses.

    I submitted this earlier as a reply, I hope the dupe engine doesn't flag me as bad.

    My two cents. --Aaron Newsome

  • Try FreeS/WAN [xs4all.nl]. It is an IPSec package that handles VPNs and other firewalling-type stuff, and it's compatible with most other IPSec packages (meaning you can hook up with Checkpoint VPN-1 and such).

    :wq!

  • Thirdly, there's SSH, SCP, et al. This is OK, but it's main drawback as a -transparent- VPN is that it's not very transparent. It's at the application level, rather than the stack level, which means that it's going to be more visible to the average user.

    There are tools out there that will let you tunnel PPP over SSH or SSL. Five minutes of config work and you have a completely transparent VPN (though granted one better suited for LAN-to-LAN VPN than remote client-type VPN like this question is asking about). Do a freshmeat search for vpnstarter (for SSH) or stunnel (for SSL) for more info.

  • (makes waving hand gesture with an oddly calm facial expression)

    "This is not the VPN solution you're looking for."

    --

  • The quick answer:

    First of all, if you want a VPN with Windows clients and don't want to spend any money, use PoPToP. However, be aware: PoPToP doesn't work correctly with many broken versions of Windows, and the PPTP protocol has some serious shortcomings.

    IPsec, while still not being particularly secure, is a somewhat better protocol. However, you'll need to purchase a commercial Windows client to use it (even with Windows 2000, which supports IPsec, you'll need a commercial client such as that from Network Associates to work without L2TP; I haven't heard of anyone making succesful use of l2tpd in this context). Via FreeS/WAN, a free, high quality client/server solution for linux is available, as well.

    In any event, you'll want to use ipsec for your linux clients. Use it for your Windows clients also, if you can afford the commercial software.
  • Posted by BSD-Pat:

    recently, at USENIX, I had the pleasure of talking to Jason Wright, who works at NETSEC.

    Jason is also an OpenBSD developer, and rpesented a paper on something very interesting, which I am in the process of planning to deploy.

    OpenBSD currently can bridge layer 2 over IPSec interfaces, which makes for a nice, transparent VPN.

    those who are interested, I can point anyone to the paper that was written, its also available from the USENIX Association... http://www.usenix.org.

    echoing other people's comments, OpenBSD , because of its IPSec implementation, is perfect for this scenario, in fact IMHO its really the only thing that will do this particular job this well.

    And this is coming from someone adamantly pro-FreeBSD =)

    -Pat
  • But there are now differences between open source and free software (at least according to OSI and FSF, arguably the two big deciders even if neither term is really limited in usage).

    The APSL is not free software, but it is open source, for example. There would be more, except the OSI stopped certifying new licenses (AFAICT) a long time ago.

    What it comes down to for me is this: Open Source is unconcerned with the users; a good number of annoying licenses (from the user-programmer's PoV) have come into existance because of OSI's policies. Companies have essentially been able to progressively trim down the rights extended to licensees because of their willingness to extend the Open Source blanket to new licenses -- the new licenses are no longer written by hackers to make sure their software isn't misused, but by lawyers intent on making sure as little IP escapes as possible.

    Their attempt and failure to trademark "Open Source" made it abundantly clear, as well, that companies didn't have to toe community lines to fit in -- Plan 9, an operating system that I really like, now refers to itself as Open Source even though their license has some of the nastiest clauses I've seen for end-user licenses ("if you bring an intellectual property claim against any Contributor you will lose your license to Plan 9," essentially and paraphrased although IANAL) which would make any business that relies on Plan 9 unable to protect their intellectual property (which, as it happens, includes enforcing the terms of the GPL on other software) since another entity could probably become a contributor to Plan 9 trivially (i.e., find a single bug, fix it, rape other company). A company wouldn't dare call their software Free Software (although possibly freeware or free) unless the license seemed free to the community; but the community doesn't matter to Open Source.

    Free Software, OTOH, is all about users. The user's right to modify the code, the user's right to borrow the code, the user's right to learn from the code, and the user's right to be part of a community that shares the code. If nobody makes money from it, well, that's OK because people benefitted. If people do make money from it, well that's great because more people benefitted.

    The point to this long rant is that, really, there is a difference between Open Source and Free software, whether the people who started it want to be different or not. That difference is how, at the end of the day, a person like me feels after contributing to both -- with free software, I've added something; with open source, something has been taken from me.

  • There is a company here in Ireland called Danu. They are located in the Dundalk Institute of Technology. Their web address is http://www.danu.ie [www.danu.ie] and they do VPN stuff for NT and Linux (and Solaris, maybe). They might be of some help.

    T.
  • I've heard very bad things about pptp, which PoPTop implments.

    I believe the FAQ is talking about the MSCHAPV1 protocol, which is indeed very poor. You can convince the server to drop encryption altogether. I have -mschap_v1 in my options.pptpd file.

    I also believe that the FAQ speaks about the Microsoft PPTP server, although looking through it again doesn't specifically say. I am confident that the PoPToP pptpd does not allow the clients to "talk it down" as the MS server allowed. To quote the article:

    Passwords are protected by hash functions so badly that most can be easily recovered. And the control channel is so sloppily designed that anyone can cause a Microsoft PPTP server to go belly up.

    These problems are allievated by MSCHAPV2 and PoPToP, this much I do know for sure. :-)

    I too scoured all kinds of messages on PPTP security and came to the conclusion that it was all in lieu of MSCHAPV1 and not MSCHAPV2. The latter does allow provisions to fall back to MSCHAPV1 but I do not allow this in my configuration, as I have stated above.

  • BTW, Google had 60,000 hits for "linux vpn".

    Yeah, but "linux vpn pptp" had only 5000 :-)

  • Hi, I'd like to move a server from NT4 to Linux. I'd like to stress that it is a server that is extremely vital to my company's business.

    Actually the linux fileserver I'd installed performs much better and is far more reliable than the NT4 box we have here doing nothing but PDC. It used to run Exchange Server 5 (P2-233 I think) and crashed regularly. Meanwhile the poor linux box gets pounded for ever file and db access the office generates. Damn, I wish I had stayed with NT.

    Just because it costs money doesn't mean it is better. The reverse of your little translation is just as true.

  • So, what does that mean for the average user? Does this make the MSCHAPv2 authentication mechanism less secure than other password based protocols - let's say ssh?

    Probably on the same as password-based protocols. As I said in a few earlier posts the PPTP configuration I've chosen is to force MSCHAPV2 and 128-bit encryption.

  • by tzanger ( 1575 ) on Monday July 17, 2000 @11:12AM (#927500) Homepage

    1) Kernel patches (yay). There seem to be problems getting these patches to work with some distros (read: Red Hat) that have slightly-customized kernels

    Only if you're dealing with some bonehead distribution that customizes the kernel instead of using kernel modules and a userland (or at least non-invasive) process to do whatever the hell it is they think is so important they should modify the kernel in the first place.

    2) Windows only supports some real lame encryption out-of-the-box. To get 128 bit, you have to go through some real hoops to get the software from Microsoft, only to find it doesn't work.

    Got some proof? I downloaded an easily-found file from MS' site, installed it and while I have not verified that it is indeed spitting out 128-bit encryption (anyone know a good way to actually test the wire?) pptpd/pppd won't talk to the client if I force 128-bit encryption on the server side and use weak encryption on the client.

    3) Firewall/IPMasq causes even more fun, depending on which side of the firemasq the PPTP server is on.

    Come on. This is getting silly. In my case I put the pptpd server on the firewall. I figure a VPN is an integral part of a firewall. Then I set aside a block of IPs and set up your masquerade rules to match. The hardest part of my whole firewall was making sure that my input chain didn't kill packets I didn't want gone. The forward chain is only three lines long.

    4) Browsing windows shares over a VPN link is akin to black magic and seldom works.

    I haven't had too much trouble. You mention that you're on the PoPToP list. Check out the Samba lists as well and read up on Samba and WINS. The key is a WINS server which is accessible to everyone (internal and VPN).

    The rabbit I'm gonna have to pull out of my hat involves setting up a VPN'd subnet (using FreeS/WAN, pptpd is useless here) and making a couple servers on the inside of each end appear in the subnet as well, without munging things up too badly and without having each server step too much into the VPN. I may just set up coda and Samba on the firewalls and "fake" that they're the servers in question. It'll make security tighter in the end, I think.

  • by tzanger ( 1575 ) on Monday July 17, 2000 @08:19AM (#927501) Homepage

    Moretonbay [moretonbay.com], the company who gave us so much work on uCLinux has PoPToP, a Linux PPTP server.

    I have set it up personally and included the MPPE and stateless patches which give excellent performance and 128-bit encryption.

    You mentioned that immature code need not apply. I can't say how mature this code is but I have not had any problem with the encryption nor the actual VPN going down or otherwise futzing up.

    PoPToP uses pppd + openssl with a custom daemon to set up Windows VPN connections. You can force MSCHAPV2 (V1 has problems with security, what else is new? :-), enforce 128-bit encryption, use PAP or CHAP, whatever you please. Since it is pppd which is authenticating, you can use PAM or whatever authentication methods you can use with pppd. Another important feature is that you can configure pptpd to assin IPs or have pppd do it for you. Configuring for MPPE and stateless compression was a bit of a pain but in reality it involved scanning the already big mailing list and applying the correct version of the patches.

    Overall I am very pleased with PoPToP, even if my typing slows to 10WPM when I have to type the name. :-)

  • by jd ( 1658 ) <imipak@ y a hoo.com> on Monday July 17, 2000 @08:37AM (#927502) Homepage Journal
    1) IPSEC is transparent, and there are versions for Windows and Linux. It's also about as secure as you can get.

    2) Then, there's always SKIP. An invention of SUN, but still worth investigating. SKIP has higher throughput than IPSEC, and faster recovery in the event of a system failure anywhere down the chain. Again, it's available for Windows and Linux.

    3) Thirdly, there's SSH, SCP, et al. This is OK, but it's main drawback as a -transparent- VPN is that it's not very transparent. It's at the application level, rather than the stack level, which means that it's going to be more visible to the average user.

    4) Last, but by no means least, your favourite hound of hell and mine, Kerberos! It's possible to set Kerberos as both an authentication AND an encryption mechanism. The main drawback with this option is that applications would need to be aware of Kerberos before they could benefit.

    All in all, I'd say IPSEC or SUN SKIP are your two best options, as they don't require any user intervention or special code in the application.

  • by Effugas ( 2378 ) on Monday July 17, 2000 @09:15AM (#927503) Homepage
    I've got a system I've been sitting on for a while that gives you the network isolation of Windows PPTP with the trustable crypto of SSH. I haven't done much development work on it in quite some time; anyone out there who'd like to hack on this and get it up to 1.0, toss me a note.

    Yours Truly,

    Dan Kaminsky
    DoxPara Research
    http://www.doxpara.com

    "Little Caesars? You do pizza?"
    1. Microsoft's "secure" PPTP protocol is inherently insecure, and hence no implementation of it can be secure.

    Daaaaah. Trying to match MS at FUD or what?

    The protocol itself is okay, according to people who have a much better understanding of security matters than me (like Bruce Schneier). It's just that Microsoft's implementation of PPTP is brain-damaged. To quote from Counterpane's FAQ about the matter(emphasis mine):

    1. 1. What did Bruce Schneier and Mudge actually do? They found security flaws in Microsoft PPTP that allow attacks to sniff passwords across the network, break the encryption scheme and read confidential data, and mount denial of service attacks against PPTP servers. They did not find flaws in PPTP, only in Microsoft's implementation of it.

    Read the whole thing here [counterpane.com]
  • www.checkpoint.com no BS....
  • Microsoft's "secure" PPTP protocol is inherently insecure, and hence no implementation of it can be secure.

    I was wondering about this thing myself, so I did some reasearch. Basically, the situation is that there are Unix VPN servers/clients that implement IPSec protocol. IPSec is the industry standard for VPN. (read: it's secure). Microsoft did not want to go with the standard protocol (surprised?) and instead "innovated" PPTP. Well, PPTP is complete joke. It didn't take me long to find articles analyzing PPTP security. (I'm sure other /. readers will post links to them).

    So anyway, there are PPTP servers for Linux, like PoPTop, and PPTP comes built into win9x/NT. You could certainly go with this solution, as it would be the easiest one. (PPTP is better than nothing, I guess). If you want real security though, the best thing to do is to put Linux VPN servers on both sides of the tunnel. This is not always possible though. If you have two or more offices that you want to connect, that's easy -- just put the VPN servers/firewalls in each of them. But if you have windows users with laptops, or people working from home, you'll have to resort to PPTP. Unless there is a free/cheap IPSec client for windows (which I am not aware of).

    ___
  • You know where I can get one?
    ___
  • by RelliK ( 4466 )
    What the hell are you talking about? I just downloaded VPND source code and looked at it myself. Looks fine to me. Go troll somewhere else. I got it from the link below, btw.

    http://sunsite.auc.dk/vpnd/
    ___
  • FYI: the primary people working on FreeS/WAN are in Canada.

  • uh, free s/wan works with anything that does tcp/ip.
  • odd, a rather large multinational based in ireland (with offices in germany, miami, new york, pennsylvania and california to name a few) is using freeswan quite happily.

    it gets oodles of traffic and It Just Works.
  • IPSec is one of the more interesting technologies out there at the moment. Essentially, it has the advantages of being implemented into multiple diffrent server platforms and client workstations.



    For example OpenBSD [openbsd.org] supports it's natively and Linux can be made to support it with the FreeS/WAN [xs4all.nl] projects kernel patches which allow you the IPSec functionality.



    Unforuntately, the problems lie with IPSec compatible clients for the Win32 platform:



    Essentially, if you company uses Win9X and NT then you have no problems. The Link [openbsd.org] will show you a bunch of clients that will actually work under OpenBSD's implementation of IPSec. Some of which are actually quite good.



    On the other hand Windows 2000 is VERY unsupported. In fact it is very hard to find a Windows 2000 implementation (other then the poor implementation in Windows 2000 itself). Quite a few promise an implementation in a few months, some even a few weeks, but that does little if you need it done now.



    If you need to get VPN clients for Windows 2000. I have found two that support it, but have yet to be able to test it's implementation ability with OpenBSD (the companies current Firewall/NAT platform). The two I have found are listed below:



    Ashley-Laurent's VPCom Client. They also sell server software which may be of use (as you can open up one port to that box to gain IPSec functionality). The clients are a bit pricy (US 89.00$) in my opinion and I found the configuration to be somewhat convoluted. You can find their page
    here [vpcom.com].


    While I have not tried this one yet, it looks very nice, at least on the sales side. They offer a hardware server as well as software clients and the licensing is a bit lower in price (US 49.00$). They too have had a Windows 2000 clients for a few months now, and seem to be keeping tabs on technology. You can look at their products
    here [vpnet.com].

    Note : You can get a trial server and client if you are a company for about a month.
    .

    Now if anyone else knows of Windows 2000 compatible clients that work with IPSec then I would be very interested in knowing about them

  • I use a combination of PGPNet windows clients and Linux FreeSWAN gateways with great success. The FreeSWAN code has been maturing quite nicely.

    http://www.freeswan.org
  • Server: OpenBSD
    Client: NAI Labs PGP Client

    Information On PGP Client:
    http://www.pgp.com/asp_set/products/tns/pgpvpncl ient_intro.asp

    To quote their page:

    PGP MIT Freeware Downloads
    PGP is the world's defacto standard for email encryption and authentication, with over 6 million users. PGP 6.5.1 MIT freeware supports RSA, PGP email and secure client-to-client connections using PGP certificates. It is available for non-commercial use only.

    The commercial PGP VPN Client is available from Network Associates and is fully IPSec compliant with support for X.509 certificates from industry leaders such as VeriSign, Entrust and Net Tools, and VPN gateway support to create encrypted network connections to your company for secure remote access. The commercial client also includes PGPdisk for lightning fast disk, file and directory encryption and authentication in addition to technical support!

    -------------------------------------------

    Use the OpenBSD mailing list archives, man pages, and faqs for info on how to set up this scenario (VPNs with X.509 certificates).
  • Just one caveat: this is probably not the same product, but the VPN client that Nortel acquired from Bay Networks doesn't work with Windows 2000, and according to my IS guy, there is no ETA on a version that does. Grr !
  • the words "Open Source" were also used in other fields from software (eg. in the military intelligence field, where it meant something like "information that is accessible to the public". however, I think i'ts silly now to claim that Open Source is anything else than what the Open Source Initiative has defined as it. They've been overwhelmingly successful in getting the public to know this term, with *their* definition (a repackaged concept of Free Software). So, I'm sorry, but OSAS is no longer Open Source in my book, nor in most people's.

    The difference between Open Source and Free Software is just a matter of focus (focus on freedom or on open development), of ideology, and of degree of purism (some borderline licences might get more easily accepted by Open Source advocates than by Free Software ones), but the main idea is the same: software where you get the source code, and the right to use, modify, alter, compile and distribute (incl. for profit) under the same conditions.

  • If you only need SSH1, there is a free Windows plugin for TeraTerm that will do SSH. We use this in our office, with port-forwarding, to provide a secure TCP connection to our SQL database, and it works exceedingly well.

    The plugin is called ttssh, and it's a tiny bit tricky to set up, but if you follow the instructions it will work.

    Haven't looked at the license, but it is free for all uses, and comes with source code, as is TeraTerm.

    For the server side, OpenSSH should work, although we use the F-Secure server.
  • If you used a copy of VMWare running Linux on the Windows laptop, that could act as the gateway. Set up host-only networking, give Linux control of the modem...Kinda crude, but it could (possibly) work.
  • To make this work under Windows, rather than to a proxy server, and configure everything on the Windows machine to go through the proxy via the forwarded port. Bring up Dial-Up Networking, start up ssh, and everything should Just Work.

    That would force *everything* through the VPN, though, which might not be what you want.
  • By definition, you can't restrict redistribution of Open Source software, so with every Open Source program I'm aware of, zero-cost legal copies are available.

    Zero cost certainly isn't the most important part of an Open Source program, but it isn't the least important part, either. There's nothing wrong with using Open Source software just because it's free and good.

  • Is there any way to make this work under Windows?
  • Only if you're dealing with some bonehead distribution that customizes the kernel instead of using kernel modules and a userland (or at least non-invasive) process to do whatever the hell it is they think is so important they should modify the kernel in the first place.

    Userland processes to fix kernel security bugs?

    --
  • The LDP just doesn't hang when some random bug drops your entire system to a dead halt in the middle of the night. Sure, you can spend the weekend hacking to figure out what the bug is but it takes you a lot longer than it would the author cause you have to learn so much first. Commerical support has it's uses.
  • I assume you mean support as in "Help me with this problem" support? In that case, how does Linux stand up to Windows when the problem is "I need a driver for XXX". Also, Linux and gaming should not be mentioned in the same comment. They are mutually exclusive.
  • That's fine when you have a few days to wait for a e-mail response, but what about when a production system is down and you need help NOW? AFAIK most Open Source programmers don't include their cell phone numbers in the README :)
  • i always thought it was a "squares are rectangles but not all rectangles are squares" type relationship, substituting "free software" for "squares" and "open source software" for "rectangles". conflating these terms as synonums is sick and wrong, not to mention sloppy.
  • by flanker ( 12275 ) on Monday July 17, 2000 @08:17AM (#927529)
    ...but these carry a hefty pricetag, upwards of several thousand dollars. I would much rather go with an Open Source solution.

    I think what you mean to say here is "I want someone to make me this thing for free." This is a great example of why RMS doesn't like the term Open Source. For 90% of the schmucks out there it translates to Free Beer, rather than the Free Speech he is speaking of. You want VPN software? Go write it and GPL it.

  • by sammy baby ( 14909 ) on Monday July 17, 2000 @09:45AM (#927532) Journal

    I'm actually pretty shocked that you managed to score a rating of 4: Insightful off this one, but what the hell, I'll bite.

    Hi, I'd like to move a server from NT4 to Linux. I'd like to stress that it is a server that is extremely vital to my company's business. It is so vital in fact that I'm prepared to spend no money on it at all. I want someone to give me high-powered, reliable software upon which I can bet my job, for free.

    Is that not reasonable? I use OpenSSH, Snort, and nmap all the time at my place of business for security. For other purposes, I use Red Hat, Debian, Apache, Perl, PHP, MySQL, and PostgresSQL. All "high-powered, reliable software," as you put it. All free.

    Why must Open-Source necessarily equal free?

    This may come as a shock to you, but I'm not in the habit of spending money on Open Source software unless I absolutely have to. Oh, I've certainly purchased the occasional RH distro CD because I wanted to install it at home, but at work, where I'm fortunate to have a decent net connection, I do net installs like crazy.

    It's true that you can spend money on OSS. However, most people associate OSS with no charge, and not without reason.

    Why does Open-Source necessarily equal best?

    The orignal poster stated that he would rather go with an Open Source solution rather than ones that "carry a hefty pricetag, upwards of several thousand dollars." I think that this is an important consideration for him. Since you didn't suggest any commercial solutions (or, in fact, OSS ones), I'll pose the converse question to you: what is your familiarity with VPN software, and what commercial solution would you say was the best?

    If it were my job on the line here, I'd find the best solution, not necessarily the one that meets my agenda.

    I thought that the original post articulated his reasons for pursuing an Open Source package pretty nicely. On the flip side, your post seems to reflect a prejudice that only businessess with money to burn should have access to decent software. If you're of the opinion that Open Source software has no role in mission critical applications, fine, but just out of curiosity, why the hell would you read /.?

  • If this box will have proxy, ftp, and VPN on it all at once and have access inside and outside I would consider not putting the ftp server on this box. FTP servers are usually best put some cold place all by themself. What with all the various problems that have occured with PROftpd, wuftpd, etc. I would hesitate giving a process like that root level access on my vpn =)
  • from /etc/inetd.conf

    ftp stream tcp nowait root /usr/sbin/tcpd in.ftpd -l -a

    wuftpd and proftpd run as root through inetd and chroot to the user that logs in (E.g. ftp, your login, etc.)

    There have been numerous postings on SANS and securityportal.com relating to wuftp weaknesses proftpd shares quite a lot of design with wuftp and so once every three of these flaws shows up in proftpd.
  • I think he was clear. He wants somethign that supports windows VPN clients.
  • Granted, not everyone's a programmer, but when people turn to Linux because they _expect_ free (as in beer) software, that kinda yanks my krank.

    You don't need to be a programmer to be a good sys admin, but it's getting too easy for people to take Free software for granted.
  • Comment removed based on user account deletion
  • by FascDot Killed My Pr ( 24021 ) on Monday July 17, 2000 @08:18AM (#927544)
    (I have an answer to the question at the end of my rant)

    Is there an open Slashdot terminal in some public place? Because these "Ask Slashdots" are starting to seem more like "Ask A Random Question Without Searching First". This is getting REALLY lame.

    Now, then. Go to Yahoo (yes, even Yahoo can find this, albeit through Google). Type "linux vpn". Find a link [moretonbay.com]. Follow it.

    For those that aren't interested in enough to click, this is PoPToP, a Linux implementation of the server-side of MS PPTP. A secure implementation. Why PPTP? Because you want Windows clients and the only thing they do out of the box is PPTP. BTW, PoPToP is GPL'd....
    --
  • Although this is not the VPN solution you're looking for, it is very cool.

    You can use taptunnel [linux.exit.de] to connect multiple LANs together through an encrypted pipe.

    It's also the best solution for playing multiplayer IPX games like starcraft between LANs.
  • by debrain ( 29228 ) on Monday July 17, 2000 @09:25AM (#927547) Journal
    We had a similar situation where we had to decided on a particular system to implement VPN as well as all the firewall and DMZ (demilitarized zone) rulesets.

    We finally decided on OpenBSD [openbsd.org] although we considered Linux, Tru64, Solaris, NetBSD, FreeBSD, Irix, NT and Windows 2000. By considered, I mean we thought about it. But we finally decided on OpenBSD because throughout all the security bulletins that we've seen, this was the one that touted the best security, and was notably lacking in security bulletins.

    We have been extremely satisfied with OpenBSD, and use it as a real bastion firewall, and as a transparent bridge to our production servers. It has an incredible amount of power, and is very versatile. Combined with Snort, Nessus, Nmap, IPF, and Perl (or any scripting language), it makes an wonderful IDS (Intrusion Detection System). I have yet to see a commercial system rival the power of this open source system in terms of complexity and diversity.

  • I've heard good things about the AltaVista tunneling software from some people who were looking at a very similar situation. It appears to be abandoned, although it may just be hiding.

    I found links to it on Tom Dunigan's VPN page [ornl.gov], which has a number of good links for the problem at hand.

    A link to AltaVista tunnel info that does work is found on this Digital link in Russia [decsy.ru], which is oddly, in English.

    Again, I haven't tried this myself, so caveat emptor.
  • by x0 ( 32926 ) on Monday July 17, 2000 @12:03PM (#927549) Homepage
    To further your argument that 'Ask /.' is a good jumping off point for starting a discussion, I find that it is sometimes a good place for me to learn about things I am not currently involved with, but that are interesting nevertheless.

    Sure, a search engine is generally where I start to find out about different solutions I might be looking to implement, but it is nice to hear discussion about various things as a 'Gee, that's cool!' discussion also.

  • The entire body of main is the entire source file.
    I think you are mistaking vpnd for some other program. If you take a look at the source code [sunsite.auc.dk], I think you'll agree that it is a fairly well-organized program, and that there is a lot more to it than just a single main() function.
  • by bgarcia ( 33222 ) on Monday July 17, 2000 @08:28AM (#927554) Homepage Journal
    I've been using vpnd [sunsite.auc.dk] for over a year now, and it has been extremely reliable and should be very secure (can you say "576-bit blowfish encryption?).

    It is meant more to connect two subnets, rather than a single device to a network. Also, it does not run on windows. However, you can do what I do, and resurrect an old 486 to act as a gateway/firewall/vpnd server at home, and hook your windows box to it.

    It is setup to re-establish broken connections. Even though I often lose connectivity between work and home, as long as the downtime is less than a tcp timeout, all of my tcp connections over the encrypted channel will actually remain up! Very nice.

  • by Fideaux! ( 44069 ) on Monday July 17, 2000 @08:33AM (#927558) Homepage

    Hi, I'd like to move a server from NT4 to Linux. I'd like to stress that it is a server that is extremely vital to my company's business.

    It is so vital in fact that I'm prepared to spend no money on it at all. I want someone to give me high-powered, reliable software upon which I can bet my job, for free.

    Why must Open-Source necessarily equal free?
    Why does Open-Source necessarily equal best?
    If it were my job on the line here, I'd find the best solution, not necessarily the one that meets my agenda.

  • I agree wholeheartedly. And I'd mod you up if I ever got moderation points when I fscking wanted them.

    (rant)
    Taco: Can't we move to a moderation system where people accumulate moderation points and can use them WHENEVER they want. Just put a cap on it so people who go on vacation don't come back to 1000 moderation points or something. I NEVER get moderation points when I want them, and only get them when there is nothing really of interest to me, or just flames or hot grits.
    (/rant)
  • by Hard_Code ( 49548 ) on Monday July 17, 2000 @09:40AM (#927560)
    "Why must Open-Source necessarily equal free? Why does Open-Source necessarily equal best?"

    Because that's what Open-Source advocates advocate. That's as opposed to Free Software which claims only to be Free, and only ethically best. I think the claim is valid that Open-Source is subtley distorting the spirit of Free-Software. It results in people asking questions like these. It's my impression anyway that Open-Source tries to sell itself as a panacea.
  • If you want a free one check out TeraTerm Pro and the SSH addon. We use it here and it works great.
  • Not to give moderators too much credit, but it *might* have been somebody trying to be funny. I have to admit it made me laugh.
  • Check this [linux.com] out. I've had it working flawlessly for a while now. There isn't much out there that isn't more proven or secure than ssh. Give it a try, it's the best of what's out there.
  • Comment removed based on user account deletion
  • I checked into VPND somewhat recently to see if it'd be a nice way to link a few LANs which have faily powerful (min 200Mhz) firewalls which could be used to tunnel traffic.

    I looked at the source code, as I had to port the program to OpenBSD [openbsd.org]. My first thought was that the person who wrote the code must've been some ASM programmer who took a 5-hour course in C. The entire body of main is the entire source file. Functional programming? What's that? The code is one big blob function. You can see blocks which are similar and could probably be handled by a separate function, but aren't.

    My friend's first comment on waving him over to see the code was, "and you wanted to run that on your server?"

    The code looks a lot like procmail's code [gimp.org], and is (IMO) a complete tear down and rewrite. I'm sure a lot can be salvaged from vpnd, but I find it hard to believe that the person who wrote code looking like that also did the strictest possible checking on all input/output code for security problems.

    You might want to read the VPN section [linuxdoc.org] of the Linux Admin Security Guide [linuxdoc.org] for a listing of alternatives.
    ---
  • Using this at our site to do VPN with several other Linux boxen. It's IPSec compliant, so PGPNet, W2K, and others have all been noted to work with it. It's a pretty good solution.
  • Yeah, PPTPv1 is very broken, but PoPToP also implements PPTPv2 which I understand is a massive improvement. You can force v2-only connections too.

    Looks to be a v.good product; something that I'm looking at implementing myself.

    j.
  • Mudge and Schneier analyzed PPTP and found half a dozen major things wrong with it. The symmetric encryption algorithm it uses, RC4, is quite strong, but has a one rule aboutusing it safely - Never use the same key twice. PPTP violates this two or three different ways, and has some leftover Microsoft Wimpy Password Algorithm cracks that provide a couple of other ways in, and there may be some other holes as well. (Then there's the usual security principle of "Never plug anything sensitive into a Windows machine":-)
  • If speed is a problem, use a system based on RC4-128 encryption instead of Blowfish. It's strong enough if used correctly (i.e. unlike MS PPTP's use), and blazingly fast. There are also some other AES candidate algorithms that are respectably fast.
  • The FreeS/WAN project www.freeswan.org is the Free Linux implementation, developed outside the US to avoid export restriction problems. They've done a lot of work on compatibility with a large number of other packages, including Nortel Contivity and PGPnet. Typical compatibility situations are that IPSEC/IKE have zillions of different options for keying, and any two products will have some subset that work, usually manual keying. The other typical issue is that for policy reasons, FreeS/WAN only does 3DES, and some commercial products only do single-DES. (John Gilmore, who funds FreeS/WAN, spent a lot of money and time developing the DES cracker to convince people that single DES is dead...)

    Nortel has a policy of Freeswan compatibility, so you should be able to use their server or client to talk to a FreeSWAN linux box. Nortel's client software runs on Win95, Win98, and NT, and is free if you buy the Nortel hardware (formerly Bay, formerly New Oak.) I don't know if it's free if you don't buy a box from them. So far I've used the Nortel client only with Nortel servers, but it works quite well and has multiple options for keying, including SecureID.

  • As far as I know, Slashdot does not exist in order to save a few people time by wasting a great many people's time.

    It's your decision to read it. Wander off quietly if you've got a problem.

    Jesus, people are bitchy today.
  • heh... ok, works for me.

    at a maximum of, say, 12 posts per day, each one being a paragraph, or 4 lines at most, the "wasting our time" argument is a bit weak.

  • To respond to the rant portion: I think the Ask Slashdot features are less about giving this one particular guy an answer, and more about taking his question as a starting point for further discussion. You'll note that the majority of the responses are not one line "you should check out X". Most contain extra info like, I've used this and it works, or here are some caveats, or is it even reasonable to expect free VPN software? etc. This extra information is worth far more than a simple link.

  • by Ledge Kindred ( 82988 ) on Monday July 17, 2000 @08:25AM (#927582)
    Your best bet is probably to get IPsec running on a Linux server farm and find IPsec clients for WinXX. At least that way, you'll be using a standard protocol, unlike most (read: all) proprietary VPN softwares out there. You'd then be able to support any OS that had an IPsec stack (which includes a lot of them nowadays).

    Barring that, we've had good luck with VSgate by infoexpress [infoexpress.com] in huge (and I mean huge) enterprise environments. Bonus: they directly support Linux not only as a server platform but client as well.

    You could also look for PoPToP, which is a reverse-engineered hack of Microsoft's "Point-to-Point Tunnelling Protocol" to make a Linux box able to be a server for it, but take a look at some past issues of Schneier's Cryptogram (don't know the specific one, sorry) for some scathing commentary on the brokenness of PPTP.

    -=-=-=-=-

  • by mr ( 88570 ) on Monday July 17, 2000 @11:33AM (#927586)
    >You want VPN software? Go write it and GPL it.

    Why should I?

    Sun has already done this. It is called SKIP.

    And it is under a BSD-esque license.

    Permission is hereby granted, free of charge, to any person
    obtaining a copy of this software and associated documentation
    files (the "Software"), to deal in the Software without
    restriction, including without limitation the rights to use,
    copy, modify, merge, publish, distribute, sublicense, and/or sell
    copies of the Software or derivatives of the Software, and to
    permit persons to whom the Software or its derivatives is furnished
    to do so, subject to the following conditions:

    http://skip.incog.com/src-form.html [incog.com] is the link in my old code version.
    http://www.mirr or.ac.uk/sites/ftp.zedz.com/pub/crypto/programs/sk ip/ [mirror.ac.uk] is the link to the code in case you don't have this laying about.

    The code works between Unix boxen and between unix and windows. And, it has been rumored to work with IPsec, but given I do not have a windows box doing ipsec, I can neither confirm nor deny it.

    So:
    1) Sun DOES release code.
    2) The world does not revolve about the GPL.

  • by TheCarp ( 96830 ) <sjc.carpanet@net> on Monday July 17, 2000 @08:50AM (#927593) Homepage
    > Please remember that Open Source != Free
    > Software.

    That depends who you are talking to.

    When people originally started talking about OpenSource, the idea (as I understand it was) "Lets take the 'Free Software' concept and repackage it under a new name, because the word 'free' scares suits".

    The basic idea being Open Source *IS* free software in the same way that Zantac is Ranitidine (same chemical, different name).

    So when we talk about "OpenSource" we talk about how you have source code and all sorts of other things. When we talk about "Free Software" we call all those things 'side effects' and talk about freedom as the main concern.

    That doesn't mean there is a difference, just a different focus. In original intent though, the "focus" is the only difference, and when not trying to sell suits on the idea, the two terms can be used interchangably.

    It has come to pass that you can seem to tell a persons beliefs on the subject by which term they use. FSF types will ALWAYS talk about "Free Software" and disparage the term "OpenSource". Those who just care that the code exists and think that having source code is better for the technical reasons, will call it "OpenSource".

    The entire criticizm of the term is the focus change. People like RMS argue that the focus shift is bad. The whole point of free software is freedom and focusing on the other benefits instead is diminishing the value of the work by removing the political association of it.

    At the end of the day though...the two are the same in every way but terminology and connotation.

    -Steve
  • by Mark F. Komarinski ( 97174 ) on Monday July 17, 2000 @08:27AM (#927595) Homepage
    IMO PoPToP has some serious issues. Unfortunately, most are outside the scope of what the PoPToP developers can work with:

    1) Kernel patches (yay). There seem to be problems getting these patches to work with some distros (read: Red Hat) that have slightly-customized kernels
    2) Windows only supports some real lame encryption out-of-the-box. To get 128 bit, you have to go through some real hoops to get the software from Microsoft, only to find it doesn't work.
    3) Firewall/IPMasq causes even more fun, depending on which side of the firemasq the PPTP server is on.
    4) Browsing windows shares over a VPN link is akin to black magic and seldom works.

    These are the most common issues I've seen (and I'm a lurker on the PoPToP list). To their credit, the gang that make this software have integrated it into a hardware box [moretonbay.com] (look for the NetTel) that does both PPTP and Firewall functionality. It's pretty inexpensive at $399US, and I'm pondering just buying that instead of hacking around on my own.
  • If I were you, I'd try out IPsec and PGP.net. IPsec [openbsd.org] is included with the default OpenBSD install(if you can install Debian you can install OpenBSD) and PGP.net [mit.edu] is a component of the free Windows PGP client. They interoperate just fine with eachother, and the client will work on a standalone computer or as a gateway for a VPN linking two LANs into a WAN.
  • by denjin ( 115496 ) <denjin AT myway DOT com> on Monday July 17, 2000 @08:14AM (#927600) Homepage
    Check out this place...it would be installed on a linux server. It probably is going to work best with the Windows 2000 VPN clients and even then I could be wrong :) Chris
  • We at work [keyware.com] have recently migrated from Windows NT4 RRAS (PPTP based) servers to a Linux based IPSEC implementation. This was done using the UNI-BOX of the people at ABLE.be (http://www.able.be [www.able.be]). The only thing I can say is that the FreeS/WAN setup on the UNI-BOXes is quite superior to the RRAS that we used to have. The response speed seems to be faster and the downtime is reduced to an absolute minimum.

    We only use Linux boxes to connect the different offices together. Inside it's still a full blown Windows NT 4 deal.

    My $0.02

  • by jeroenb ( 125404 ) on Monday July 17, 2000 @08:19AM (#927610) Homepage
    I know that there are commercial vendors offering VPN solutions that interoperate beautifully between Windows and Linux, but these carry a hefty pricetag, upwards of several thousand dollars. I would much rather go with an Open Source solution.

    Please remember that Open Source != Free Software. Open Source does not specifically require the software to be free, an example of this is Solaris. Free Software (in the FSF sense of the term) however, requires the software to be free, open source and a bunch of other things (concerning distribution, etc.)

    Sorry for bitching, but I think that at least the people at /. (and those submitting to /.) should have the terms straight.

  • If there is a product that works really well, why not purchase it? The cost probably gets you not only the software that you need, but also a manual, tech support, etc.

    Do you really need the source code to your VPN software? If so, that sounds like the "immature" code you want to avoid in the first place.
  • by TangentMan123 ( 134048 ) on Monday July 17, 2000 @08:29AM (#927617) Homepage
    This is an search engine. The bonus is you get answers specific to your question without having to plow through 1,240 hits (AltaVista "linux vpn") of which some are probably porn. Let's see Ask Jeeves do that. Personally, I have an interest in this question as well as many other questions posted on /. The point is, it (should) never hurts to ask...
  • by Kondoor ( 135852 ) on Monday July 17, 2000 @08:22AM (#927618)
    Have you considered getting 2 routers with VPN built in? being a small company here we use a cheap easy to setup product that is a firewall\router all in one. The current model we are using is the WebRamp 700s. Were small and it works well for us. http://www.webramp.com
  • It's good enough for windows clients out in the wild...

    IPSEC is better, but I don't know if there is a free client avaiable for Windows.
  • PoPToP [moretonbay.com] is an open source implementation of PPTP under Linux. I've used it. It's solid. It rocks.
  • This is an search engine. The bonus is you get answers specific to your question without having to plow through 1,240 hits (AltaVista "linux vpn") of which some are probably porn.

    As far as I know, Slashdot does not exist in order to save a few people time by wasting a great many people's time. If the answer to a question is either easy to find elsewhere, or of little interest to most people here, I would hope it didn't make the front page.

    So FascDot's complaint seems perfectly valid in principle. Whether it is valid in fact is another issue. Apparently, while the question at hand was interesting to some (you, for instance), it was not to others (some of whom modded FascDot up). By all means, voice your opinion on the question; it's a very legitimate point of debate.

  • It's your decision to read it. Wander off quietly if you've got a problem.

    Jesus, people are bitchy today.

    I'm certainly not complaining; I simply disagree with TangentMan123's view. And it's not very reasonable to take a "like it or leave it" attitude about a site which is principally user-driven. I might say that someone who tried to squelch discussion would be the better one to wander off quietly... but it takes all types. :-)

  • at a maximum of, say, 12 posts per day, each one being a paragraph, or 4 lines at most, the "wasting our time" argument is a bit weak.

    And interestingly as well, do the wasting-our-time arguments waste more of our time than the things they're complaining about? :-)

    Anyway, my argument was mostly about regarding Slashdot as a search engine. I think that's a crummy attitude, because it looks at the other users simply as a means to a personal end. Alhough I can see where you might have thought I was just bitching about irritating questions, I actually don't have much of a problem with the status quo.

    Well... guess we beat that horse to death...

  • I've got a very similar problem concering a VPN solution. My company has a Checkpoint firewall with VPN support that we've been quite happy with running on NT. The main problem that I've been running into is the software for client side only supports Windows platforms and the client must have a routable IP address.

    For the most part, this isn't a problem since Windows is the dominant desktop platform around our office. With home networking kicking in with a lot of my folks, they're finding a need to have a single routable IP solution at home for multiple boxes AND having VPN support for them. I also have one remote office that presently has to have unique routable IP's for each client. To further complicate matters, that remote office has a couple of Macs tossed into the mix.

    I've been looking about for a reasonable server side solution that I can deploy to a number of locations to handle the chit chat between it and this Checkpoint firewall. If I can get either Linux or a flavor of BSD to act as a proxy and VPN solution, freeware will get migrated into my office setup for the first time.

    Aside from getting this to work at all, I do have support concerns. Between Linux and BSD, I've at least spent some time using Linux but there's apparently stability concerns with S/Wan. OpenBSD looks interesting, but I have zero BSD experience at this point in time. All the support and configuration falls squarely into my lap to implement.

    I had rather hoped to find something that was a Windows based solution, mostly since that's what all my remote users are using. Not too many folks want to go out and purchase a seperate PC just to handle network proxying. Granted, this isn't nearly as much of an issue as the remote office is, as I can easily get another PC to deal with this there.

    Bottom line: I need a solution that proxies non-routable IP addresses to the internet while providing for VPN support to a Checkpoint firewall.
  • Just supporting IPSec doesn't necessarily mean your job as an administrator will be easy. IPSec is only a definition of the encrypted tunnel protocols, and does not define the process of exchanging public keys, validating the computer on the other end with a certificate authority, negotiating what type of encryption algorithm to use, or many other menial configuration tasks. It is possible to set up an IPSec tunnel by hand, but I hope you enjoy typing in lengthy configuration files and copying around encryption keys by hand. If you want the keys to rollover, you'll have to redo portions of this process every time you want that to happen too.

    To automate all this, you need a key exchange protocol like IKE which can handle all of these tasks for you. I personally work for a VPN company that implemented and released IPsec software/hardware before IKE had become a standard, and so we have our own protocols for establishing the Security Association for the IPSec tunnel. Our setup protocol is pretty darn good (IMHO), but it's not an open standard, so it only works between our own products. IKE is a feature likely to be added to a future release of our products.

    In general regards to the big question, I think an IPSec client that supports IKE is the way to go, since both are now open standards (mostly in the range RFC2401 through RFC2409). There are already open source projects on the BSDs and Linux to support IPSec/IKE, and most VPN vendors are also moving towards it. (Check FreeS/WAN for Linux and isakmpd for BSD)

    From my highly biased standpoint, I think my company's product is pretty good and we have a nice client for WinXX if you're willing to work with your key server being on an NT machine. The server can work from behind a firewall with only a few UDP ports forwarded, which is also nice.

    The opinions expressed in this email don't imply or assert anything about those of my employer in any way shape or form, either for or against anything I said. Everything in this post is entirely my own opinion and beliefs.
  • A fairly mature package I've seen is S/WAN (Swan), avaliable from www.freeswan.org. Its in version 1.5 and is being activly devepoped. A good source for this type of software is munitions.org [perlhacker.org]. They have a software section containing many VPN / cryptography related packages. Good luck!
  • by buffalo_chip ( 189435 ) on Monday July 17, 2000 @09:21AM (#927645)
    There are unfortunately no Open Source Windows VPN clients. A good alternative however is SafeNet's client. Though not open source, you can get a pack of 10 licenses for about $80, last I checked. Cisco rebrands and sells this very product but charges about 10 times as much for it. SafeNet's VPN client works with FreeS/WAN which can be loaded on Windows 95/98/NT and possibly 2k. DO NOT use Windows 2000's built in IPSec, is has a major bug in that when told to operate in 3DES mode is suddenly drops to single DES without so much as telling you. When inter-operating with FreeS/WAN the connection barfs, I consider this a great feature of FreeS/WAN :-). FreeS/WAN no longer supports single DES as it is too easily brute force cracked. If there is enough interest in this sort of thing, I could see the company I work for producing an Open Source windows VPN client. www.protectix.com
  • I have been using vpnd for about six months now, and I have to say that it has been very stable and completely seamless to my Windows networks. I used two old Pentium MMX boxes that were collecting dust, and they are more than powerful enough for the load. It is worth a look if you need security, reliability, and transparency. Best of all, it is free at http://sunsite.auc.dk/vpnd/ [sunsite.auc.dk].
  • by 11223 ( 201561 ) on Monday July 17, 2000 @08:24AM (#927658)
    Solaris, while the source is available, isn't Open Source. Open Source requires that
    1. That the source to the program be redistributable.
    2. That any compiled binaries from the source be redistributable.
    Therefore, it's free, too.

For God's sake, stop researching for a while and begin to think!

Working...