Dear All:

Mr. DuFresne message and the various replies harken back to my Fall 2000 
topic (Proper architecture for firewalls connected to switches)
which is summarized at 
http://archives.neohapsis.com/archives/firewalls/2000-q3/1418.html. 
Specifically, I stressed my view that to prevent a compromise of a 
firewall's protection, its ports should be connected to physically 
separated media.  That media can be hubs, switches, or actual cabling.  In 
any case, with full physical isolation, a failure of the external media 
will not produce a bypass of the firewall.

Respectfully yours;

Marc Mandel

At 12:06 AM 05/22/2002 -0500, Wesley Noonan wrote:
> > -----Original Message-----
> > From: Ron DuFresne [mailto:[EMAIL PROTECTED]]
> > Sent: Tuesday, May 21, 2002 23:00
> > To: Noonan, Wesley
> > Cc: [EMAIL PROTECTED]
> > Subject: RE: beating dead horses: Catalyst 4000 VLAN issues
> >
><snip>
> > Who got who's attention?
>
>Oh, no doubt you got mine. As I said, I don't like people misrepresenting my
>statements. You are no exception to this.
>
> > Like it or not, you non-stance on the issue in
> > fact is a stance.
>
>Fine, here is my stance.
>
>1) Use hubs. They are cheap and it makes it easy to sniff all the traffic on
>the DMZ. I like that for things like IDS implementation.
>2) If making it easy to sniff all the traffic on the DMZ is a security
>issue, then use switches. Cheaper the better. Don't get manageable switches
>unless you need them.
>3) If you do use a switch, refrain from using VLANs that include any part of
>the internal network. Multi-DMZ VLANs aren't as high a priority to me,
>though if I had my druthers I wouldn't use them either. While there are no
>current issues related to traffic hopping VLANs (thanks to Ron and Paul for
>making this point clear), it has happened before (again, thanks to Ron and
>Paul for making this point clear), so why create a design where you need to
>worry about it? Follow the KISS principle, which states that physically
>separate switches are easier to maintain and manage in a DMZ environment
>than VLANs are. Simplicity of design can often be a security measure in and
>of itself.
>
> > Your rejection of historical issues is a stance.
>
>I never rejected historical issues. I rejected the crap you produced as fact
>when you couldn't prove or support any of it (OK, you were able to back up
>ONE thing which was valid at one point in time in regards to VLANs and
>DMZs).
>
>I am doing the same thing with this issue as well. Even now, you take a
>completely unrelated issue, and try to make it sound like it is in some way
>relevant to VLANs and DMZs. They are so not related to each other, it's
>pathetic. Just because a bug report uses the term VLAN, doesn't mean that it
>has something to do with your "VLANs and DMZs are evil" quest. On a side
>note, you would probably have a lot more success with your position if you
>left the speculation and rhetoric to the side, and stuck with simple concise
>facts. A number of other folks on this list did a masterful job of summing
>the issues and reasons for/not for using VLANs with DMZs when they left the
>FUD at the door.
>
><snip>
> > >
> >
> >  The switch was *not*  doing what it was supposed to do, it was working
> > proper, then not then  working proper then not, it was fading in and out
> > intermittently, often mid tcp stream;
> >
><snip>
>
>But Ron, flooding the packets isn't the problem, no matter how hard you want
>to make it the problem. Flooding the packets is *by design*.
>
> > > It doesn't make you wonder how secure VLAN setup is, it makes you wonder
> > how
> > > secure switches are... then again, if someone is implementing a switch
> > > solely for security, they are a fool.
> > >
> >
> > agreed!  which includes VLAN segments in a security setting, which is
> > after all what a DMZ is...
>
>Which *may* include VLAN segments...
>
><snip>
> > >
> > > Correct. This is the only problem. The switch *should* have learned the
> > > address. That is the *only* problem. Nothing to do with passing traffic
> > > between VLANs, nothing to do with buffer overflows, nothing to do with
> > > spoofing, simply the switch should have learned the address mappings and
> > > didn't.
> > >
> >
> > had learned the MAC address it would seem, afterall it found a
> > destination,  then the switch *forgot* what it had learned, and a number
> > of times the  posting indicated, this was not a pre-learning issue, nor
> > was it a one  time issue, it seemed to be indicated this was an issue that
> > popped in and out.
>
>Sure, it appears that the switch learns, then forgets. When it forgets, it
>can do nothing other than flood. Do you understand this point? The flooding
>isn't the problem, it's the symptom. The problem is the switch forgetting.
>
><snip>
> >
> > Ahh, yes, ethernet, but, this was *not* an issue at all related to 802.x
> > specifications.  It was a failing of the switch to deal with ports
> > properly.
>
>Wrong, it is a failing of the switch to deal with it's port to MAC address
>filtering properly. When that occurs (switch doesn't know what port the
>destination is on), per basic switch design, the switch defaults to standard
>Ethernet rules and function. IOW, it acts like a hub, flooding packets to
>all ports. Do you really not get this? I have been pretty snotty with you
>about it because, well... because I figured you had to know this and you
>were simply being an ass about it and I know you have thick skin. The more I
>read though, the more I am wondering if you really don't know this about
>switches, and rather than taking cheap shots at you, if I should be trying
>to teach you how it works... You understand that switches flood data to
>ports if they don't know what port the destination is on, right? This isn't
>a bug, it's an intentional design. If you want more info, I will be happy to
>provide it, seriously.
>
> > the packets went where they were not supposed to go, the
> > switch failed, it's VLAN setup  failed.
>
>What??!?! Where does it say the VLAN setup failed? At what point does it say
>anything other than "the traffic floods to all ports on that VLAN". The VLAN
>has nothing to do with the problem, beyond the fact that the problem does
>not occur if one uses default VLAN1. The VLAN is simply an environmental
>variable.
>
> > Where was it mentioned that the
> > port sniffed was setup to read all traffic flowing across the switch, I
> > think it was pretty clear this was not the setup in question.
>
>And this is in response to what? There is no dispute about where the sniffer
>is located. You are really reaching here.
>
> > > And why again would you think this, when the "problem" has nothing to do
> > > with traffic traversing a VLAN? Having uninformed opinions is not a good
> > > practice. Making recommendations to others, based on those uniformed
> > > opinions is even worse.
> > >
> >
> > Yet, it was traversin ports it was not ment to.
>
>Wrong, but running with your statement, traversing ports <> traversing
>VLANs. Read up on how switches work. Besides, in the situation given (the
>switch does not know what port the destination is on), the switch is
>actually behaving EXCACTLY like it should. The problem has nothing to do
>with the passing of data to other ports - this is intentional and by design,
>and everything to do with the switch losing that port to MAC address mapping
>in the first place.
>
> > If the switch is failing
> > so, what makes one presume the switch has only those problems?
>
>So this is the heart of your position? If a switch has this problem, who
>says it doesn't have others? Give me a break Ron. Hell, under that logic,
>you can pick apart anything that has ever been exploited. Might as well go
>back to using sneakernet and slide rules (rulers? hell I'm too young to know
>and too lazy to look it up).
>
> > The VLAN
> > in qustion failed to function as it was supposed to do, who knows what
> > other issues it has, I'm sure you might well agree.
>
>No, I wouldn't. The VLAN has nothing to do with the problem, aside from the
>circumstance that permits the problem to occur (only happens on a VLAN other
>than VLAN1). The VLAN didn't fail to function as it was supposed to. The
>more you hammer on this, the more clear it becomes that, while you may know
>firewalls and Unix, you are really lacking in understanding of switch design
>and function.
>
><snip>
> >
> > It has in the past, so, seeing issues of port hopping makes one feel less
> > positive that the switch works as designed, yes?
>
>Ron, I don't have time to chase ghosts. Apparently you do. I prefer to
>operate in reality. The switch isn't port hopping. It is sending data as it
>is designed to, given the circumstance that the switch does not know where
>the destination host is located.
>
> > Past issues have been
> > documented of packets crossing VLANS, now we are seeing packets hoping to
> > ports they are not destined for.
>
>I think I have addressed this point enough. You clearly do not understand
>how switches function, much less the nature of the bug report as it relates
>to switch function.
>
> > Perhaps not all the problems supposedly
> > fixed in past patches fixed all the issues, or then again, perhaps past
> > fixes introduced new issues.  Of course, this is not too surprising this
> > we'd be seeing problems again.  Afterall, switches are fairly new toys as
> > compared to some of the other devices we all play with, including hubs,
> > unix systems, that stable windows environment <cough>, and routers, etc.
>
>Yes, anything newer than 1962 sucks. Whatever... If all that old stuff was
>so grand, people wouldn't use new technologies (did you get the pun Ron?
>Don't want you to think I don't have a sense of humor)
>
> >
> > <chuckle>  Wes, you need to inject a sense of humor into the personality
> > there, it helps keep from getting those fingers so stressed with blood
> > flow as you pound on the keys.  Seriously, it helps one avoid burnout in a
> > tense industry.
>
>I appreciate your concern. I will endeavor to do some yoga or something
>alleviate my stress?
>
>Burnout isn't the issue, any more than stress or your perception that I am
>busting a vein as a result of this conversation. Truth be told, I think it
>is quite funny that me, someone that you seem to deem unworthy and lacking
>of skills, could so readily and easily point out how terribly flawed your
>statements on this matter are. There, I guess I was a little wrong. I do see
>some humor in the situation. Perhaps I should use emoticons more often...
>
>Oh, and what I have found helps to avoid burnout in a tense industry... is
>being educated on the stuff I am responsible for. The more educated I am,
>the less time I find myself chasing ghosts and the unknown. The less time I
>chase ghosts, the more time I have to goof off on mailing lists and play
>foosball (trying to get out of the losers bracket... yeah, I choked like the
>Spurs or the 'stros...)
>_______________________________________________
>Firewalls mailing list
>[EMAIL PROTECTED]
>For Account Management (unsubscribe, get/change password, etc) Please go to:
>http://lists.gnac.net/mailman/listinfo/firewalls

_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
For Account Management (unsubscribe, get/change password, etc) Please go to:
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to