Joel M Snyder -
>> If you do the job right, from a security point of view, you can certainly put a fine firewall in front of a very busy DNS server. (and when I say "very busy" I'm talking 10K queries a second, which is to say about 20Mbit/second sustained round-the-clock load, for less than $10K)

what you recommend for this? Some of my colleague have suggested a redundant open-bsd cluster (with plenty of RAM b/c memory is cheap these days) with PF; I can see a scalable home grown solution that can address the "exhausted state table" issue; I'm just wondering if cheap fast CPU will be on par (performance and throughput wise) with fast ASIC like the big box vendor uses on their firewall products.

What do you think?



Regards,
Ge Moua | Email: [email protected]

Network Design Engineer
University of Minnesota | Networking & Telecommunications Services



Joel M Snyder wrote:
> The worst thing you can do is put a stateful firewall in
> front of a
> busy DNS server

Well, as a security guy (rather than as a network guy), I would respectfully disagree.

First of all, if your firewall is underspecified or underrated, then yes, you'll have problems. Secondly, if your firewall is misconfigured or mistuned, then yes, you'll have problems. Of course, both of these things are true of the network itself as everyone on this list knows very well.

If you do the job right, from a security point of view, you can certainly put a fine firewall in front of a very busy DNS server. (and when I say "very busy" I'm talking 10K queries a second, which is to say about 20Mbit/second sustained round-the-clock load, for less than $10K)

So then the question comes: well, what's the point? I think that a lot of the folks on this list feel that throwing an ACL in front of a box is effectively the same, from a security point of view, as a firewall and a hell of a lot cheaper.

If you have a lousy firewall (i.e., one that is doing nothing more than keeping a UDP session open), yes, absolutely. However, good firewalls are doing a lot more than that.

You may remember last year's "the Internet is falling and only Dan Kaminsky can explain it" flap around DNS. Well, a lot of the discussion around this bug/problem/issue ignored the truth that a good firewall prevented the attack directly, by knowing enough 'deep packet smarts' around the DNS protocol that the attack scenario was effectively blocked (hey, that's why we have a session table in the first place!). Similarly, a well-configured firewall would have per-IP rate limits in it, which would have been a second line of defense.

Now, if you put in a piece-o-crap firewall that is misconfigured, too slow, doesn't have a big enough session table, and doesn't do anything more than your average reflexive access control list, then you're right on: rip that junk out and go bareback.

But if you do it right, there is value to be provided by a firewall.

jms


_______________________________________________
cisco-nsp mailing list  [email protected]
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Reply via email to