Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 12 Sep 2002 15:42:11 -0700 (PDT)
From:      Jason Stone <jason-fbsd-security@shalott.net>
To:        <freebsd-security@FreeBSD.ORG>
Subject:   Re: ipfw, natd, and keep-state - strange behavior?
Message-ID:  <20020912152423.M3276-100000@walter>
In-Reply-To: <12908E71-C69D-11D6-90D4-000A27D85A7E@mac.com>

next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


> > Having the firewall permit such packets and counting on the client to
> > correctly discard them is probably a bad idea - after all, if you trust
> > the clients to run a properly configured and non-broken OS, why have a
> > firewall at all?
>
> Defense in depth.

Yes, that's exactly my point - you are advocating that we have the
firewall permit more than we need to and trust the clients.  I'm saying
that of course you try to do as good a job securing the clients as you
can, but you also have the firewall be as restrictive as possible so that
you're trusting the clients as little as possible.


> What happens if the packets don't go through the dynamic firewall? Or
> are sent in response to an internal request and dynamicly permitted
> through?

>    Presuming that you should permit responses to internal requests because
> internally-initiated requests are supposed to be "safer" is an assumption
> that I question.

We are not presuming anything of the kind - obviously, any packets that
you mean to deny you set up deny rules for.  We are talking about
a situation where you want to allow a particular outbound service.  With
your ruleset, you are allowing packets back into the internal network that
should never be allowed in there.  With a ruleset that involves
keep/check-state, you have the same semantics in terms of what you mean to
allow, but you deny more packets that shouldn't be allowed.  And if you're
only setting keep-state on the rules allowing the outbound setup packets,
you probably don't have to worry about DoS.

We're replacing:

    allow tcp from $INET to any 22 setup
    allow tcp from any 22 to $INET established

with

    check-state
    allow tcp from $INET to any 22 setup keep-state


 -Jason

 -----------------------------------------------------------------------
 I worry about my child and the Internet all the time, even though she's
 too young to have logged on yet.  Here's what I worry about.  I worry
 that 10 or 15 years from now, she will come to me and say "Daddy, where
 were you when they took freedom of the press away from the Internet?"
	-- Mike Godwin


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: See https://private.idealab.com/public/jason/jason.gpg

iD8DBQE9gRhDswXMWWtptckRArKuAJ9bV+AM72M0sKZj63IkGLmCTbI9UwCgqbiz
mqoMdw+4bj50uCVTFC4OTlw=
=I8Mr
-----END PGP SIGNATURE-----


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020912152423.M3276-100000>