Firewall Wizards mailing list archives
Re: a cutting-edge open-source network security project
From: Darren Reed <darren.reed () oracle com>
Date: Thu, 20 May 2010 16:57:04 -0700
Ok, since you've asked... Lets look at the list of reasons why to use it: * Have you ever wanted to troubleshoot some networking problems, only to realize that your own firewall prevents your test packets from getting through?I don't need DFD for this and if I'm using un*x software as my firewall, I probably need to be looking at a whole lot of things to understand what's going wrong (or right.)
* Have you ever wanted to block attackers from communicating with you at all? Any good IPS software should do this.. * Have you ever wanted to implement port-knocking (http://www.port-knocking.org/)? I think port-knocking, as a security mechanism, has already been debunked. * Have you ever wanted to run peer-to-peer programs from behind NAT? What if you decide to switch internal computers? Wouldn't you want a tool that could detect use on the other computer and redo your port forwarding automagically, and close (de-forward) the port when it was no longer being used?Running peer-to-peer from behind a NAT usually requires something that does UPnP. There are tools out there (like miniupnpd) that already do this. Using DFD for this is a not likely to go anywhere because support for it isn't already built into bit-torrent tools (unlike UPnP.)
* Have you ever just wanted to make a temporary rule that expires after a certain amount of time?If there is really a desire to do this, then it should be natively supported by the firewall software. (I've recently added this to ipfilter.)
* Have you wanted to make a simple change to the firewall rules and easily revert it, without logging in an editing a file?I think every un*x firewall allows you to do this. If the current thought is that it is "too hard" to do right, then I'd like to know how DFD thinks it can make it easier. For example, if you want to insert a rule at a specific point, you somehow need to convey that regardless of whether or not DFD is used. For very simple rule sets, making a change is simple. But as firewall rules grow, making a simple change becomes more fraught.
* Have you ever wanted to have a queue of the last N blocked hosts, so that you don't end up with a ton of outdated perjorative rules?Again, that sounds like something that should be supported natively by the firewall. (I've added it as something to add to ipfilter in the future.)
* Have you ever wanted to do all this with open-source software alone? We do already most of this today, so yes... * Have you ever wanted to do all of these at one time without the different systems stepping on each other's changes?That's the only real bit of value here. But use of rsync over ssh can be just as effective.
When I first read about DFD, I thought there was something to be excited about.. but the more I think about it, the more I realise not really. Or perhaps a better thing to say is, not along the lines that are being considered here.
For example, above it says "have you ever wanted to have a queue of the last N blocked hosts" but it seems to provide nothing to support adding a host to that queue. For some reason, the thought is that adding/removing rules is the thing to do. au contraire. The rules define my security policy, what changes is the set of IP#'s that I want to apply segments of my security policy to.
Darren On 19/05/10 10:00 AM, Thomas Ptacek wrote:
You're right, but that's kind of a straightforwardly-solved problem, isn't it? Just park it behind SSH. The heresies involved in Travis' project are much more violent than the command/control channel. Interested in your real thoughts. On May 18, 2010, at 7:49 PM, Darren Reed wrote:On 2/05/10 03:48 PM, travis+ml-firewalls () subspacefield org wrote:Quoting: http://www.subspacefield.org/security/dfd/... How do you authenticate connections to the dfd daemon? If all I need is netcat (as per the example in your web page above), then that doesn't speak too highly of the security of the daemon itself. Are you effectively giving all users that can connect to it root level privilege on the firewall? Darren _______________________________________________ firewall-wizards mailing list firewall-wizards () listserv icsalabs com https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards--- Thomas Ptacek // matasano security // founder, product manager read us on the web: http://chargen.matasano.com check out playbook: http://runplaybook.com reach me direct: 888-677-0666 x7805 "The truth will set you free. But not until it is finished with you." _______________________________________________ firewall-wizards mailing list firewall-wizards () listserv icsalabs com https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards
_______________________________________________ firewall-wizards mailing list firewall-wizards () listserv icsalabs com https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards
Current thread:
- a cutting-edge open-source network security project travis+ml-firewalls (May 03)
- Re: a cutting-edge open-source network security project Frank Knobbe (May 06)
- Re: a cutting-edge open-source network security project ArkanoiD (May 07)
- Re: a cutting-edge open-source network security project travis+ml-firewalls (May 17)
- Re: a cutting-edge open-source network security project travis+ml-firewalls (May 07)
- Re: a cutting-edge open-source network security project ArkanoiD (May 07)
- Re: a cutting-edge open-source network security project Darren Reed (May 19)
- Re: a cutting-edge open-source network security project Thomas Ptacek (May 20)
- Re: a cutting-edge open-source network security project Darren Reed (May 20)
- Re: a cutting-edge open-source network security project Thomas Ptacek (May 20)
- Re: a cutting-edge open-source network security project Frank Knobbe (May 06)