On Mon, 4 Dec 2000, Samir Fahim wrote:
> >I doubt your definition of proxy matches mine. I'm no plug-gw fan either.
>
> What is your def of proxy ? I'm sure you know what I mean by proxy in this
> case(statefull vs proxy based fw)
> In the Raptor Fw you can define your own proxy by means of protocol(TCP,
> UDP or both) + ports...
My definition of proxy includes the application protocol, not just port
numbers. Transport layer relaying is still a bad thing in my book, since
it doesn't help the tunneling risk at all. Not that application layer
tunneling is difficult, just that it requires yet another layer of
compromise.
> Problem is that admins will eventually grant rights or
> >roles that are inappropriate just as they'll pass inappropriate traffic.
> >Hence we draw a circle.
>
> +- no, You are right at one level but...
> since B2 level OS has no root users, indeed you can define a user with all
> kind of privileges, but since a particular user can only be granted rwx
> access in a particular compartment, he never gets full rw access in another
> compartment! This level of AC (MAC + DAC) just protects abuse on the whole
> OS and prevents the recreation of a new kind of root user.
This requires drawing up compartments and granting privilege based on
role, neither of which seems to be "easy."
If you're interested in a free (both speech and beer) compartmented
project, try http://www.rsbac.de.
Paul
-----------------------------------------------------------------------------
Paul D. Robertson "My statements in this message are personal opinions
[EMAIL PROTECTED] which may have no basis whatsoever in fact."
PSB#9280
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]