On Thu, 26 Apr 2001, Ben Nagy wrote:

> > IPFilter's had its share of problems too.[...]
> > FWIW, I prefer NetBSD for IPfilter boxen.
> 
> I don't recall the IPfilter problems you're talking about - got a reference?

The most recent one is:

http://groups.google.com/groups?q=serious+ipfilter+bug&hl=en&lr=&safe=off&rnum=1&seld=905165927&ic=1

> Why NetBSD - just the performance win?

Yep, if you can ensure that the protection isn't the bottleneck, it's
easier to defend.

> [...]
> > 1. Redhat isn't Linux.
> 
> True. Very true, in fact. The distro fragmentation is one of the reasons I'm
> nervous about talking about "Linux Firewalls". I'm sure that SELinux will

You bounded it pretty well to the specific packet filtering mechanism.

> come out looking like a completely different beast to a lot of the others -
> but SELinux being good and secure doesn't make "Linux" good and secure. I
> guess the converse is also true - RH being sucky doesn't make everything
> else suck - it's just that RH _is_ Linux to lots of people.

There's no substitute for dilligence.  Redhat doesn't totally suck, and I
use it almost exclusively these days.  I wouldn't feel bad about deploying
it on the Net as a primary protection device so long as I'd done my part
of configuring it.

 > > > 2. 7.1 includes an autofirewall feature if you're into RedHat.
> > 3. It was an inside going out bug, not the worst kind for a firewall
> > certainly.
> 
> OK, I must have misread. I thought it was yet-another-PORT-parsing-error

It was...

> (YAPPE) which meant that if you had an internal FTP server an attacker could
> peel your firewall like an onion. I'll take another look at the advisory
> (and stop getting my security news from /. ;)

ISTR that it was a pretty benign "if the server says this, the client can
open that" kind of thing.  If it's your server, I think you're safe in
call cases.

> 
> > 4. You can add application layer proxies on top of packet 
> > filtering, which
> > is better for a firewall IMO.
> 
> In which case you'd probably be better falling back to ipchains, since the
> redirection stuff is very mature, right? That's a whole different kettle of
> fish - and a much more palatable one, in my book.

You don't need redirection unless you're looking specificly at inbound
service network type protection or transparency.  I wouldn't go back to a
2.2 kernel unless I had a swap space size issue at this point.  

Personally, (and I'm a big Linux fan) I'd be happier with IPFilter/*BSD
than Linux if I needed strong packet filtering for the next 6 months or
so.  Linfilter might be cool, but it's too new for security infrastructure
in my book.  The BSDs intimidate a lot of people though, so if it's an
administratively heavy role, I'd consider Linux as long as there were
multiple layers of filters.  ipfw may still be a BSD option as well.

Paul
-----------------------------------------------------------------------------
Paul D. Robertson      "My statements in this message are personal opinions
[EMAIL PROTECTED]      which may have no basis whatsoever in fact."

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to