2012/1/20 Michael <[email protected]>:
> Iñigo, thanks for stepping in !
>
> Arturo,
>
> Please don't feel discouraged. As Iñigo already said, it is totally ok to 
> create a system for a specific purpose, restricted to some usage scenario. It 
> is 100 time better than giving up upon the too big task !
>
> Iñigos' suggestions are already hitting the point. When you make it highly 
> configurable, and keep different scenarios in mind, it still can be 
> restricted and 'narrow' in the beginning, but be expanded in future.
>
> Commenting Iñigos good suggestions a little,
>
>> One good publicity for your package, could be to make a detailed
>> comparison with currently available tools
>
> While this is for sure a good idea, generally, but i would not throw the 
> burden upon you, to analyze all of them ...! Maybe investigate only those who 
> seem to have a similar target or those that you simply are interested in.
>
> One should be aware that the real value of your work is not in the code, but 
> in the choices and decisions what specific situations to tackle and how to 
> solve it, i.e. your security / networking knowledge. Ideally, you would have 
> an UML flowchart that does not even depend on a specific platform or network 
> backend. That would be the real value, and no other available package would 
> include exactly your experiences.
>
> For example, personally i installed shorewall but that's more just a more 
> complex backend (still using iptables of course), it does not ship any 
> specific scenario. It still leaves what you already have done to the admin.
>
> I strongly support to just source the /etc/default files (it is a shell 
> inbuilt command) to keep it simple. Some config sanity / bug checking could 
> be done catching the shell return code (man trap).
>
> Try to stay compatible to the Linux Standard Base as much as possible, it 
> makes your package easier to port to another distribution. 
> http://www.linuxfoundation.org/collaborate/workgroups/lsb/about
> In this respect, it is another good idea to make anything configurable which 
> uses specific Debian infrastructure (like backends.)
>
>>   + Debian if-up-down maybe extended to match firewall policies
>
> But, isn't if-up-down somehow spinning towards becoming obsolete somehow ? It 
> already does not bring up all available interfaces, today. I think this 
> shifts to udev (and desktop daemons using dbus), but anyway, IMHO the 
> firewall should not bring interfaces up or down, you could easily run into a 
> bad mess with other managers. It should not bother about who manages that as 
> long as it can poll the actual network state, and as long as there are 
> triggering hooks. (Maybe add udev monitoring rules ?) But YMMV.
>
>> > The problem is that document is in my native language (spanish) and
>> > the translation is pending.
>
> Arturo, I think that you are the only one who really will be able to 
> translate your doc w/o mistakes... and your English is quite good.
>
>> You can start by pasting the docs at debian wiki, under the "es"
>> (spanish) namespace, and requesting translators using such link (you
>> will need people that is able to edit a wiki and know Spanish+other
>> language).
>
> I wonder if anyone would dare to pick up the job :) it is not like there are 
> many people with your knowledge, who are also working as translators.
>
> But Arturo, you may ask for 50:50 teamwork, maybe someone picks it up as a 
> matter of exercise then.
>
>> It's always great when people wants to share acquired knowledge and
>> help to others. Congrats.
>
> ACK
>
> Also Iñigo for good suggestions.
>
>
> --
> To UNSUBSCRIBE, email to [email protected]
> with a subject of "unsubscribe". Trouble? Contact [email protected]
> Archive: http://lists.debian.org/[email protected]
>


Hi there!

First, thanks Iñigo and Michael for your detailed post, and thanks for
your interest. I thank you for your time and hassle.

Reading all emails, you give me a lot of TODO.  Just give me time to
think about some issues both you said and i will come back with a
better package. I promisse it :) I can't say when, because my
extremely-full-time job.

About Iñigo and Michael ideas, i have to say:

I approached my package as a standar service in the system. Mostly
(maybe) inspired by RHEL iptables-save+iptables-restore method. I miss
(in debian) a standar way to deploy iptables rules. I know that the
system lacks of methods that a real firewall must have (with vpn,
checking interfaces, checking conectivity, a system to avoid dns
queries in each rule, and a long etc..) But that's not the scope of
the package.
In real deployment of a firewall, it's not rare to find a custom
script to manage the specific system. Thats my case: in my job (5k+
iptables rules, both IPv6 and IPv4) I have a totally different system.
I want you to understand the scope difference.

Said that, i will continue working on it.

About the HA-cluster-firewall documentation, I absolutely have no time
to translate it. So I will go to debian-wiki.

And again, thanks for all. I had doubt about how could a newbie
packager join a discussions like this.


-- 
/* Arturo Borrero Gonzalez || [email protected] */
/* Use debian gnu/linux! Best OS ever! */


--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]
Archive: 
http://lists.debian.org/CAPfcJatrNfaMDN68Ynk=egvamdqdh1q1wcv7wbkwhe3ueuo...@mail.gmail.com

Reply via email to