Date: Thu, 12 Sep 2002 15:42:11 -0700 (PDT) From: Jason Stone <jason-fbsd-security@shalott.net> To: <freebsd-security@FreeBSD.ORG> Subject: Re: ipfw, natd, and keep-state - strange behavior? Message-ID: <20020912152423.M3276-100000@walter> In-Reply-To: <12908E71-C69D-11D6-90D4-000A27D85A7E@mac.com>
next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > > Having the firewall permit such packets and counting on the client to > > correctly discard them is probably a bad idea - after all, if you trust > > the clients to run a properly configured and non-broken OS, why have a > > firewall at all? > > Defense in depth. Yes, that's exactly my point - you are advocating that we have the firewall permit more than we need to and trust the clients. I'm saying that of course you try to do as good a job securing the clients as you can, but you also have the firewall be as restrictive as possible so that you're trusting the clients as little as possible. > What happens if the packets don't go through the dynamic firewall? Or > are sent in response to an internal request and dynamicly permitted > through? > Presuming that you should permit responses to internal requests because > internally-initiated requests are supposed to be "safer" is an assumption > that I question. We are not presuming anything of the kind - obviously, any packets that you mean to deny you set up deny rules for. We are talking about a situation where you want to allow a particular outbound service. With your ruleset, you are allowing packets back into the internal network that should never be allowed in there. With a ruleset that involves keep/check-state, you have the same semantics in terms of what you mean to allow, but you deny more packets that shouldn't be allowed. And if you're only setting keep-state on the rules allowing the outbound setup packets, you probably don't have to worry about DoS. We're replacing: allow tcp from $INET to any 22 setup allow tcp from any 22 to $INET established with check-state allow tcp from $INET to any 22 setup keep-state -Jason ----------------------------------------------------------------------- I worry about my child and the Internet all the time, even though she's too young to have logged on yet. Here's what I worry about. I worry that 10 or 15 years from now, she will come to me and say "Daddy, where were you when they took freedom of the press away from the Internet?" -- Mike Godwin -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: See https://private.idealab.com/public/jason/jason.gpg iD8DBQE9gRhDswXMWWtptckRArKuAJ9bV+AM72M0sKZj63IkGLmCTbI9UwCgqbiz mqoMdw+4bj50uCVTFC4OTlw= =I8Mr -----END PGP SIGNATURE----- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020912152423.M3276-100000>