I think something that many have failed to understand is that this is all
running on DMZ's behind the firewall. From the net, there is no way you
could start an X session. IOW, one would have to get through our PIX for
them to even begin trying to hijack the session.
In addition, they have been running X in the classrooms for over 4 years.
Security hasn't been, and isn't, an issue. Allowing our students to program
and perform their labs is.
Let me pose it like this. I have a hub. There are computers on the hub and
is a server on the hub. The server needs to be able to send X traffic back
to the students. Why would I need to use SSH in this situation? It is a
private network, and we WANT our students to be able to create X sessions as
required. Now introduce a PIX. I don't see how the situation has changed,
except that now that there is a firewall, many people feel like "more
security" is somehow needed. Under that philosophy, we might as well put
firewalls between any and all network devices. At this point, security,
especially in a over-zealous fashion, becomes self defeating. Security
should not hamper performing a job. Security should mitigate risk to an
acceptable level.
Will we use SSH for this in the future? Maybe. It really comes down to the
instructors who teach the programming class feeling it is a worthwhile
endeavor.
Security that does not fulfill a business need is worthless. One must keep
that in perspective.
Wes Noonan, MCSE/MCT/CCNA/NNCSS
Senior QA Rep.
BMC Software, Inc.
(713) 918-2412
[EMAIL PROTECTED]
http://www.bmc.com
-----Original Message-----
From: Ron DuFresne [mailto:[EMAIL PROTECTED]]
Sent: Friday, January 19, 2001 10:28
To: Noonan, Wesley
Cc: 'Rich Pitcock'; '[EMAIL PROTECTED]' '
Subject: RE: Permiting X through a PIX
security should be the issue here, especially with X sesions as X is a
well known risk and has been since the old mitnick days and prior...
Thanks,
Ron DuFresne
On Thu, 18 Jan 2001, Noonan, Wesley wrote:
> Unfortunately, I am being told that Solaris does not ship with SSH and it
> would take making some changes to the classrooms that they aren't prepared
> to make right now. I think this is something that we will probably pursue
as
> a long term solution though, based on what I am hearing in this thread and
> from the trainers involved. In the short term though, I need to get access
> working. Would those conduits do the trick? Am I correct in thinking that
it
> isn't working because the server needs to send data back on different
ports
> to the clients and those ports are closed? Would it be better to use the
> established command?
>
> One thing to keep in mind right now is that security isn't the high
priority
> here. We aren't sending any data across the internet.
>
> We are currently running 5.1(2). Let me see what I can dig up on 5.1(3).
>
> Thanks again.
>
> Wes Noonan, MCSE/MCT/CCNA/NNCSS
> Senior QA Rep.
> BMC Software, Inc.
> (713) 918-2412
> [EMAIL PROTECTED]
> http://www.bmc.com
>
> -----Original Message-----
> From: Rich Pitcock [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, January 18, 2001 11:30
> To: 'Noonan, Wesley' '
> Cc: '[EMAIL PROTECTED]' '
> Subject: RE: Permiting X through a PIX
>
> SSH is the way to go but if it is not an option then PIX Firewall ver
5.13
> supports XDMCP (X Display Manager Control Protocol) XWindows TCP back
> connection. XDMCP uses UDP port 177. XWindows uses TCP ports 6000 through
> 6063.
>
> Rich
>
> -----Original Message-----
> From: Ron DuFresne
> To: Ng, Kenneth (US)
> Cc: 'Noonan, Wesley'; '[EMAIL PROTECTED]'
> Sent: 1/18/01 12:21 PM
> Subject: RE: Permiting X through a PIX
>
>
> He';s still going to need to open his 600 port though.
>
> Thanks,
>
> Ron DuFresne
>
> On Thu, 18 Jan 2001, Ng, Kenneth (US) wrote:
>
> > Allow ssh to go through instead. The user will log onto the machine
> via
> > ssh. ssh will set the DISPLAY environment variable so that when apps
> are
> > started up, they tunnel back to the user's workstation. On the whole
> I
> > think this is a better way to do it if you need X. Also works great
> if you
> > need to run through NAT.
> >
> > -----Original Message-----
> > From: Noonan, Wesley [mailto:[EMAIL PROTECTED]]
> > Sent: Thursday, January 18, 2001 11:49 AM
> > To: '[EMAIL PROTECTED]'
> > Subject: Permiting X through a PIX
> >
> >
> > Hello all. I need some advice from the experts around here.
> >
> > I have a situation where I have a PIX with 4 interfaces. 2 are inside
> and
> > outside and 2 are considered DMZ1 and DMZ2. DMZ2 is a higher security
> than
> > DMZ1 (thus all traffic is permitted outbound from DMZ2 to DMZ1). We
> have
> > various machines on DMZ2 than need to access 2 servers on DMZ1 via X.
> For
> > some reason this is not working, and unfortunately, I am not a Unix
> guru and
> > know very little about X. My suspicion is that X requires that the
> target
> > machine (the server) be able to send data back to the clients, which
> of
> > course is being blocked by the firewall.
> >
> > Here is a little diagram
> > Server2
> > DMZ2----PIX----DMZ1---[
> > Server1
> >
> > So, what I am wondering is how to proceed. I am pretty sure that X
> uses TCP
> > and UDP 6000-6063. Based on that, one of my ideas is to setup a
> conduit as
> > follows:
> > Conduit permit tcp 172.16.0.0 255.255.255.0 range 6000 6063 host
> 172.16.1.2
> > Conduit permit udp 172.16.0.0 255.255.255.0 range 6000 6063 host
> 172.16.1.2
> > Conduit permit tcp 172.16.0.0 255.255.255.0 range 6000 6063 host
> 172.16.1.3
> > Conduit permit udp 172.16.0.0 255.255.255.0 range 6000 6063 host
> 172.16.1.3
> >
> > The other idea is to use the established command, but I am not very
> familiar
> > with it's use.
> >
> > Any ideas? TIA
> >
> > Wes Noonan, MCSE/MCT/CCNA/NNCSS
> > Senior QA Rep.
> > BMC Software, Inc.
> > (713) 918-2412
> > [EMAIL PROTECTED]
> > http://www.bmc.com
> >
> > -
> > [To unsubscribe, send mail to [EMAIL PROTECTED] with
> > "unsubscribe firewalls" in the body of the message.]
> >
> ************************************************************************
> *****
> > The information in this email is confidential and may be legally
> privileged.
> > It is intended solely for the addressee. Access to this email by
> anyone else
> > is unauthorized.
> >
> > If you are not the intended recipient, any disclosure, copying,
> distribution
> > or any action taken or omitted to be taken in reliance on it, is
> prohibited
> > and may be unlawful. When addressed to our clients any opinions or
> advice
> > contained in this email are subject to the terms and conditions
> expressed in
> > the governing KPMG client engagement letter.
> >
> ************************************************************************
> *****
> > -
> > [To unsubscribe, send mail to [EMAIL PROTECTED] with
> > "unsubscribe firewalls" in the body of the message.]
> >
>
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> "Cutting the space budget really restores my faith in humanity. It
> eliminates dreams, goals, and ideals and lets us get straight to the
> business of hate, debauchery, and self-annihilation." -- Johnny Hart
> ***testing, only testing, and damn good at it too!***
>
> OK, so you're a Ph.D. Just don't touch anything.
>
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"Cutting the space budget really restores my faith in humanity. It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation." -- Johnny Hart
***testing, only testing, and damn good at it too!***
OK, so you're a Ph.D. Just don't touch anything.
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]