On Tue, 5 Oct 1999, Laurent Butti wrote:

> Hello,
> 
> I have a question : does firewalls replace (or configure) TCP/IP stacks,
> particularly in NT world ?

In the NT world, yes, a few produts replace the IP stack.  In the Unix world, 
I'm not aware of any that replace the stack (not that it's not possible- 
but the original implementations were vendor-based, or in close 
cooperation with vendors who could harden the stack that was already there), 
though some open raw sockets and handle the implementation details themselves.  
There were problems with the initial NT IP implementation and a low level of 
trust in Microsoft's code historically, so some vendors who wished to still 
market "NT Firewalls" initially added a stack they had more confidence in, 
initially reducing NT to the role of boot loader and process manager.

Microsoft's stack has improved over time, so it's not a given that this 
still adds a great deal of value.  If the vendor didn't replace the stack 
though, I'd want to know that they're looking at MS' source esp. after 
service packs that affect it if I were in the position of using their 
products.

> If yes, which products ? What is changed in the configuration of the

You'll have to ask the vendors or hope for another answerer, I don't and 
won't use NT as a firewall in its current incantation, and I'm less than 
happy with almost any of the commercial firewalls these days under any 
OS.  

In either case, it's really almost moot unless you trust the vendor to have 
done a complete audit of the stack correctly or you spend significant time with 
packet generators testing the stack's behaviour to various inputs.  If 
you look at the bug list for any commercial firewall vendor, you'll 
probably end up with as much confidence in 'Quality Assurance' as I have, wich 
is zero.

> TCP/IP stack ?

About the only thing you can change in an IP stack without the source 
code is performance tuning (window sizes, timeout values...)  I would 
guess under NT that would mean changing registry settings if it's 
possible to affect those settings at all.  Any documentation to high-volume 
Web server performance would be a good starting point.

I think it comes down to what you expect a firewall to do for you.  If 
you're like 'most' firewall consumers, almost any of the products will be 
indistinguishable in actual use because you'll let a significant ammount 
of traffic go through the firewall and not attempt to do a high level of 
end-user auditing.  Only the type of firewall will determine how much 
additional vulnerability there is, but the configuration will probably 
leave more issues open than the products.

If you expect to enforce an extremely conservative policy and do significant 
auditing and authentication you'll either get to know your vendor's technical 
support department *really well*, or you'll end up using Open Source software 
and modifying it to meet your requirements and scalablility needs.

Paul
-----------------------------------------------------------------------------
Paul D. Robertson      "My statements in this message are personal opinions
[EMAIL PROTECTED]      which may have no basis whatsoever in fact."
                                                                     PSB#9280

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to