2

I am using a rackspace cloud environment to host a server farm. The problem i've run into is that Rackspace shares all internal network traffic on a single subnet (or rather, all the servers in what they call a 'huddle'). This is not ideal, as I need to pass some sensitive information between servers and do not want to take the risk of being sniffed. We could use ssl, but that would require a great deal of re-architecting the application.

Rackspace suggested creatinga VPN between servers. This seems like the easiest solution at this point, however, i'm looking for a vpn solution that is stable and works well in a backend server environment with lots of traffic.

The servers are a mix of Windows and Linux servers. Keep in mind that the vpn has to work without an interactive user logged in. As such, it has to be something that is service friendly. So, client-side vpn's like Hamachi aren't really viable, nor do I want a solution that requires an outside server.

Any suggestions?

EDIT:

I'd like to avoid any options that require a great deal of configuration to make work. This leaves out IPSec and OpenVPN (both of which give you very powerful low-level control, but require a lot of configuration)

EDIT2:

I thought it was relatively obvious from my requirements, but I cannot have a point-to-point solution, it needs to be a private subnet not clients connecting to a single server. And I definitely don't want to create configurations to connect to the entire set of permutations of servers.

Erik Funkenbusch
  • 600
  • 10
  • 27

4 Answers4

6

tinc does exactly what you want; although automated deployment would require extra scripting.

Edit: highlights:

  • User space tun/tap daemon, runs at least on win + lin, without user interaction
  • Creates a single virtual nic on a hub/switch (layer 2) or router (layer 3) (depending on config) for your entire cloud, so no N^2 cross-tunnels or gateways required for a full any-to-any
  • ipv6 compatible (in fact in use at some pops on ipv6 tunnel system sixxs)
  • Smaller community, but very knowledgeable and helpful
Joris
  • 5,939
  • 1
  • 15
  • 13
2

Most stable decision OpenVPN and IPsec. Stunnel is very easy, try it first.

pQd
  • 29,561
  • 5
  • 64
  • 106
bindbn
  • 5,153
  • 2
  • 26
  • 23
0

Can you configure IPSec to encrypt the network traffic? This wouldn't require any changes to the application code, just a quick config change on your servers.

mrdenny
  • 27,074
  • 4
  • 40
  • 68
  • IPsec between Windows and Linux are not very quick decision – bindbn Sep 25 '10 at 19:18
  • Yeah, i've alrady wasted a lot of time trying to get windows and linux to talk to each other via IPSec. I'm sure it can be done, but wow... – Erik Funkenbusch Sep 25 '10 at 19:53
  • I've never done a Windows to Linux IPSec. Getting it setup for Windows to Windows should be pretty easy. Then it's just the linux part. – mrdenny Sep 25 '10 at 20:41
0

You didn't say if you wanted a mesh or single server to multiple client setup. For a single server setup, OpenVPN is easy and works. Never tried a mesh setup with OpenVPN.

Porch
  • 680
  • 5
  • 12
  • It's not a single server multiple client setup. Some clients talk to each other, some talk to the database server. At some point we will have to cluster the database servers, etc.. Point to point just doesn't work. And I don't want all traffic going through a central server (that's a single point of failure) – Erik Funkenbusch Sep 26 '10 at 17:15