This may not necessarily be the safest advice either, Jacob.

Let's say you have a firewall:

.


...with no open ports to the internet, *BUT* you are portforwarding to some internal 
webservers and a mail server and the like:

.
25
80


In this situation, the most likely way your network is cracked is through the 
webserver or another service.  Now the webserver is cracked, and we find ourselves in 
a DMZ or some portion of a network:

fw:         web (we are here):      mail:  
22 ssh      80                      25
53 domain                           110
2049 nfs

Now we have more access to the firewall.

The point of the point:  
There aren't likely any services running on the firewall open to the internet, except 
perhaps ssh.  Therefore, I claim a network is more likely to become cracked through a 
forwarded port, behind the (or a) firewall.  So the firewall shouldn't trust it's 
network anymore than the internet, or more than necessary.


Cory


On Mon, Jul 23, 2001 at 05:48:54PM -0700, Jacob Meuser wrote:
> On Mon, Jul 23, 2001 at 02:03:49PM -0700, Justin Bengtson wrote:
> > debian running iptables.  the firewall doesn't need storage.  it needs
> to
> > talk to the networked drive so i can play music with it.  besides, i
> only
> > filter the outside world, not the internal LAN.  i'm sure SAMBA is
> mature
> > enough to know what connections it is allowed to talk on and which not
> to.
> > isn't it?
> > 
> But if your f/w gets comprimised, Samba may be an easy route to the
> rest of your network.
> 
> It's better to have your f/w trust your network, than to have your
> network trust your f/w, if that is possible with Samba.
> 
> In other words, (some of) your internal network should be able to
> connect
> to your firewall, but your firewall should not be able to connect to
> anything on your internal network.  
> 
> <[EMAIL PROTECTED]>

Reply via email to