On 7 Jun 2001, at 18:11, Paul D. Robertson wrote:

> On Thu, 7 Jun 2001 [EMAIL PROTECTED] wrote:
> 
> > > The problem is that everyone seems to _require_ HTTP/HTTPS access these
> > > days, so there's your trojan's control vector happily provided either
> > > directly, or via the corporate firewall.  
> > 
> >   And this is different from an on-site user, visiting the web 
> > through the corporate firewall, exactly HOW?  i.e. I do not see how 
> 
> It's not, hence the words "or via the corporate firewall."

  If it's not, then the VPN is not a relevant part of the risk 
scenario you're presenting.  If the vulnerability is in allowing 
machines on the trusted network to browse the web, then that's all 
that's needed to define the scenario.
 

> >   [Consider also the case of the travelling employee who, after a 
> > stint on the road, plugs his laptop into the internal net.  No amount 
> > of filtering at the tunnel endpoint is going to address this 
> > analogous real-world case where a machine is sometimes connected to 
> > the internal net, and sometimes not.]
> 
> Right, the difference is that you're dealing with store and forward
> intrustion versus real-time intrusion in that case.

  If the VPN tunnel cuts off all other access -- as it does in the 
clients I've deployed -- then the VPN case is *also* strictly store-
and-forward.  THAT is whay I called this case "analogous".  Again, 
I'm trying to grasp what features of your scenario are relevant, and 
what are not.


>   ....  If said laptop is only used to directly dial the corporate
> network, it's a signifcantly lower risk than if it's plugging into
> Ethernet jacks in hotel rooms. 

  You've lost me here.  (a) Running a modem pool securely has always 
seemed to me like *more* of a security challenge than a VPN, not 
less, and (b) I can write any such policy I like, but how do I 
monitor compliance, short of assigning each mobile user a chaperone?
 

> Again, if you go with application access, then that works on the
> local net as well, making it easier to place less trust on internal
> clients as well. 

  I suppose that if I only ever had clients and servers, I could put 
all of each class in a separate subnet/VLAN and filter/NIDS/firewall 
them at the router connection.  That doesn't play very well in a peer-
to-peer world, does it?

  [Perhaps this is an argument for segmenting the internal network by 
function and deploying NIDS at the segment boundaries, as a defense 
in depth.  I've no argument with that! -- *except* that we've 
wandered even *further* from talking about any special vulnerability 
that VPNs bring to the mix.]

David Gillett


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to