From owner-freebsd-security Sat Jun 26 5:10:16 1999 Delivered-To: freebsd-security@freebsd.org Received: from megaweapon.zigg.com (megaweapon.zigg.com [206.114.60.8]) by hub.freebsd.org (Postfix) with ESMTP id A45AE14D8D for ; Sat, 26 Jun 1999 05:10:12 -0700 (PDT) (envelope-from matt@zigg.com) Received: from localhost (matt@localhost) by megaweapon.zigg.com (8.9.3/8.9.3) with ESMTP id IAA03584; Sat, 26 Jun 1999 08:10:04 -0400 (EDT) (envelope-from matt@zigg.com) Date: Sat, 26 Jun 1999 08:10:03 -0400 (EDT) From: Matt Behrens To: Nicholas Brawn Cc: freebsd-security@FreeBSD.ORG Subject: Re: IPSec options for *BSD In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Sat, 26 Jun 1999, Nicholas Brawn wrote: : Apart from KAME (www.kame.net) what else is available on *BSD to enable : IPSec functionality? Try Pierre Beyssac's tunip/pipsecd. You just need OpenSSL. It does not yet, AFAIK, support any of the key exchange protocols yet. It's basically a usermode program reminiscent of ppp. Last time I checked, it was available at . Matt Behrens Owner/Administrator, zigg.com Chief Engineer, Nameless IRC Network To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message