I would have to agree with Henrik here.

Not to allow established connection from a higher level security zone to a 
lesser one, seem to be more a design issue, than, that of clam implementation 
issue. The idea of zones should be to guard inbound, no hamper user outbound. 

It's true you can skin a cat a million ways, but some of those ways are simply 
cruel, time consuming, and of little relevance to the objective.

If there is a router acting as a firewall (PIX or Cisco 2621, etc...) the a 
simple ACL seems a much more robust solution. Of course the likely hood you are 
using internal IP address is high, which means you will need to NAT from that 
segment, which you most likely do because you need to have internet.

If the firewall is on the machine, then a simple allow statement to the right 
chain in the iptables will achieve the same thing (windows has the same level 
of security via a GUI).

In either case, the "hack" would be to figure it out on your network, not 
request bloatware that will be used in very few situations, given the 
complexity (thus insecurity) it introduces. (IMHO) 

Frankly my objection is a bit personal too. I hate the fact that everyone and 
everything is becoming HTTP. It is one single silly port of a possible 60,000 
+, and its protocol was designed to centralize documentation. It has now become 
the default port AND PROTOCOL for everything. This beyond ridiculous! Since now 
everyone knows where to focus there attacks! The best way to protect data is to 
keep it binary and OFF port 80 or 443.
This time in my IMNSHO

 :oP   




> Date: Sun, 16 May 2010 09:29:57 +0300
> From: h...@hege.li
> To: clamav-users@lists.clamav.net
> Subject: Re: [Clamav-users] Tiered freshclam updates on port443
> 
> On Fri, May 14, 2010 at 06:34:33PM -0400, Nathan Gibbs wrote:
> > 
> > At our site, the "update server" hosts clamav DBs, snort rules,  some conf
> > files, etc.  The ability to protect the other data would be a plus.  It 
> > would
> > add another layer of defense to our setup.  However its not workable if
> > Freshclam cannot speak https.  Its redundant as far as ClamAV's data 
> > integrity
> > goes.  However, I think its worth doing as far as "hack value" and
> > interoperability go.
> 
> Using https sounds silly in favor of more robust methods like rsync+ssh. I
> certainly would trust rsyncing a verified set of signatures more than using
> freshclam code which has had bugs in past.
> 
> -1 for adding yet another external library dependency for little purpose.
> 
> As far as the original poster goes, I don't think https protocol was the
> issue, only TCP port. Such human generated firewall "problems" are solvable
> in many ways if desired and IMHO has nothing to do with ClamAV.
> 
> _______________________________________________
> Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
> http://www.clamav.net/support/ml
                                          
_________________________________________________________________
The New Busy think 9 to 5 is a cute idea. Combine multiple calendars with 
Hotmail. 
http://www.windowslive.com/campaign/thenewbusy?tile=multicalendar&ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_5
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to