On Mon, 4 Dec 2000, Samir Fahim wrote:

> Oooh calm down there !

I'm perfectly calm.

> What I meant by opening TCP high ports on the Firewall is the normal
> procedure if you have an application running at high ports and you want to
> debug it to perform some fine tuning on your application. Since the deamons

In a well-run environment, application debugging shouldn't be happening
between an Internet exposed host and a protected network.  Do you think
it's common practice to not have development machines?  Best practice?  I
happen to think that a good firewall administrator should be in a stable
enough place to be able to enforce general "goodness" in a organization.

> running at tcp-high should not provide root access(wr) on your system; the
> risk to provide root-access with your application is low! BUT still exists.
> An FTP deamon contains "some" risks because it runs in TCP-low. The best
> way to solve it in my opinion is by

It's pretty easy to change the water-mark for priv. ports in most modern
OS'.  That doesn't always mitigate the largest risk, and assumes a
correctly administered and patched system- a rarity these days it would
seem.

>
> 1)using a "proxy server" between your CORBA server and Firewall, and let
> every at random cessions be port-mapped by your proxy to a know port of
> your choice; after that define a rule on your Firewall for this typical
> traffic.

My contention is that automatically deciding that random port-hopping
CORBA applications should automatically pass trust boundaries is a bad thing.
The proclivity  for some administrators to roll over at any sign of poor
protocol design sets us all back.  You're assuming a predicate of passing
the traffic and figuring out how to do it while I'm contesting the
predicate itself.

> 2)If you have a RAPTOR Proxy Firewall, you can define a proxy-deamon on
> your Firewall that fits your CORBA application. The Raptor Firewall also
> provides the possibility of OS hardening(strips the OS & kills all
> unnecessary applications & shells running on your Firewall) by default.

I doubt your definition of proxy matches mine.  I'm no plug-gw fan either.

> 3) Use HP-VVAULT B2 OS, ... for more info check www.hp.com/security

Compartmented OS' are a good architecture but not too widely deployed.
That's a shame, because they mitigate significant risk when correctly
administered.  Problem is that admins will eventually grant rights or
roles that are inappropriate just as they'll pass inappropriate traffic.
Hence we draw a circle.

Paul
-----------------------------------------------------------------------------
Paul D. Robertson      "My statements in this message are personal opinions
[EMAIL PROTECTED]      which may have no basis whatsoever in fact."
                                                                     PSB#9280

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to