"Paul D. Robertson" wrote:
> 
> [some very interesting points, even though less than 1% of 
>  the firewall admins today actually care about it :/ ]

We're getting into deep enough specifics that I realize I can't 
counter this using general arguments. This would mean I'd have to 
resort to discussing our stuff (which obviously I know best), but:

1. That sort of voids the topic
2. It isn't nearly as fun :)
3. I've already posted more clavister-specific stuff to this
   (general-purpose) list than I'm comfortable doing :/
   (unless specifically asked to do so, of course)

IOW: "Here, have a freebie point or two" :)

> [on (pseudo) fragment reassembly]
> The issue becomes how much checking is someone doing with frags- 
> as it becomes a pretty plausible DoS attack to send pseudo-initial 
> frags in some instances

If you're refering to simply filling up the available reassembly
slots, that will DoS fragment reassembly on a proxy equally well.

An SPF on the other hand, given that it can make the assumption that
it can eat more kernel RAM in its in-kernel hooks (or doesn't even 
have a thing called "kernel RAM". hehe :)), and that it knows that 
it has to protect thousands of internal hosts, would potentially be 
better at this than a general-purpose IP stack designed for local 
reassembly only.

No points to you for that one. Maybe half a point to me :)

(Although I guess the key word there is "potentially", generally 
speaking. I'm almost starting to see your point, given the 
"general" state of affairs. &%@#�&#@&)


> On Wed, 10 Apr 2002, Mikael Olsson wrote:
> > And here's one more for proxies: most (all?) proxy firewalls ride
> > on top of full-fledged OSes, and when the proxy dies, it tends
> > to leave to OS somewhat unshielded :)
>
> Unshielded how?  If the proxy code is all that's bound to sockets, 
> the exposure window isn't all that horrific is it?

Just a point of interest:
Isn't it fairly common for (commercial) proxy firewalls to apply
packet filtering on traffic to the firewall itself?
(At least stuff like the "kill raptor boxes by sending IP options 
with 0 length" bug from a couple of years ago has led me to think so.
I could be wrong.)

> > OTOH, the same is true for at least the majority of the SPFs. %&#%�.
> 
> Darnit!  No fair taking my points! ;)

Suddenly turning around and taking the opposite view of one's
usual view is a great brain exercise, I've been told.

... and done in the middle of an entertaining argument, it also 
tends to drive people nuts :)


Now, you either need to stop dropping points that we (I? ;)) haven't
finished arguing, or tell me where to pick up my cigar :)

-- 
Mikael Olsson, Clavister AB
Storgatan 12, Box 393, SE-891 28 �RNSK�LDSVIK, Sweden
Phone: +46 (0)660 29 92 00   Mobile: +46 (0)70 26 222 05
Fax: +46 (0)660 122 50       WWW: http://www.clavister.com

"Senex semper diu dormit"
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to