On Fri, 12 Apr 2002, Mikael Olsson wrote:

> Fixing it would be a Good Thing(tm).

Yeah, but it would probably slow things a little, as running back up the 
skbuff chain is quick, and if I recall correctly, you'd have to fix it in 
something like four places...

/me resists peeking at the code

> Yes. Without broadcast, you can only DoS reassembly on a single
> host with those 300bps. OTOH, you can DoS reassembly on a hundred
> hosts with a 28.8Kbps modem. And that is with VJ header compression
> disabled >:]

I wonder if it's really better under 2k+patches, or if the threading is 
just better?

> Actually, just making software developers browse the entire bug 
> tracking system (assuming you have one, of course) before they start
> coding on a project would probably help in certain cases :)

In some cases, that would take *years*[1].

> > > Let's see now, what more mud slinging can I do.. Oh yeah, Barbie(tm)
> > > software with buffer overruns in it, pre-installed on proxies!
> > 
> > Instantiation problem, not architectural 
> 
> Woho! I believe you just shot your own argument to pieces! :)
> 
> Using the same logic, I hereby decree that rirel obk fuvccrq sebz 
> $evqvphybhfyl_uhtr_sverjnyy_iraqbe [1] is, in and of itself, an
> instantiation problem! :)

Ah, but since in my case, the software wasn't proxy software, it doesn't 
count as part of the architecture, where as in your case it does! :)

> > > And sendmail used as mail proxy! And BIND as DNS proxy!
> > 
> > I haven't run Sendwhale in about 8 years, so I'll counter with Postfix as
> > an SMTP proxy.  And I'll up your BIND to BIND 9 ("|grep vixie" returns
> > null.) and accept it on the box as a client, but not as a proxy-- since
> > that's not _necessary_ in a proxy-only scenerio.  Now, let's take a
> > resolver problem, and see how many "protected" machines need patching in
> > each scenerio...
> 
> Angh. I'm very close to just sending you that beer and be done 
> with the pain, but, damnit, not just yet. :)
> 
> 
> Here's another go at an abstract reason why I believe SPFs are
> better firewalls than proxy firewalls.
> 
> Of course, first of all I must agree with one of your earlier
> points: for 95%+ of all installations, using just one "firewall box",
> (properly coded of course) it won't make a difference either way.
> What we're talking about here is "the best security available",
> short of installing an A-1 firewall.
> 
> I also assume that chaining an SPF with a Proxy firewall is out 
> of the question, since that invalidates the topic, and we
> wouldn't want that, now would we? :)

WE wouldn't, but I'd guess that maybe 15,000 others might just vote for 
that option ;)

> Now, I believe that given the (relatively, as compared to L7) low 
> complexity of L3 and L4 headers, there are only so many possible 
> vulnerabilities. I believe that a well-designed [2] SPF covers

Ah, this is the major flaw in your thinking...

> enough of the possible vulnerabilities (and certainly the known), 
> that, in these layers, there is no "real" difference in the 
> protection that a proxy firewall affords compared to an SPF. [3]

(I see no footnotes)

The proxy is the only client that needs patching in client-side issues, 
and the only place that needs content filtering in content issues.  *Some* 
content issues can be negated with an SPF, but not all and certainly the 
range of client issues that can be fixed is significantly less.

> I think we all agree that segmentation is a good thing.
> Segmentation is hard (maybe too hard) to accomplish when:
> - your proxy won't forward necessary protocols. 

If we assume circuit-level relays (a la' plug-gw, then that goes away, 
without them, we could always assume a stronger deny stance ;) ))

> - And let's not forget routing problems. How many proxies support 
>   lifting a host out from its LAN and placing it behind another 
>   interface, without restructuring your IP plan - heck, without even 
>   touching the IP config of a single host?!
>   (Yes, I assume that you've already got boxes scattered across
>   your available IP range; not that you have several ready-made
>   subnets sitting around just in case you need to create another
>   segment some day. I know no admin that has. :))

We had  spare _routable_ space reserved at the last company I was 
at, but I'm puzzled as to why you think a host route doesn't work on a 
proxy server?

> - And.. important.. speed. When you segment dozens of servers, they 
>   very often still need to be able to talk to each other at high
>   speeds. (Think web server -> backend DB. Think backups.)

Speed is the only point I'll readily concede.

> Now, as to internal boxes.
> Internal workstations, as we all know, need to be kept on a tight leash, 
> considering who's driving them, who's written the OS, ... whatever.
> I agree fully that their activities need to be 
> 1) Restricted on a port/protocol basis. Any dumb filter can do this.

Every dumb filter requires DNS passed to every client.

> 2) Analyzed on the application layer. 
>    I believe that this is best done by specialized relays/proxies
>    (NOT! a proxy firewall with everything from a single vendor or
>    organization!). 

A proxy firewall doesn't have to be a single box, and a single box doesn't 
have to run everything from the vendor.  For instance, ever since I 
started using Postfix in production (2nd Alpha version), for instance, 
I've ripped out the native SMTP proxy and replaced it with Postfix- you 
can't mix and match pieces of an SPF on a per-protocol basis.

> <marketroid warning> (again!!! *sigh* ANYONE with a good working
>                       knowledge of other SPFs is VERY welcome to 
>                       chip in any time now!)
> Said public servers, and also relays/proxies are probably 
> sensitive to traffic overload, which can result in (expensive) 
> DoS scenarios. I can name at least one SPF vendor (modesty bids 
> me not name the company ;)) that has implemented traffic shaping 
> (also with packet rate limits) on the assumption that traffic 
> shaping is not only a "feature", but also a valid grab at 
> protection from resource exhaustion attacks, and is best done
> at the (multi-legged) firewall itself in order to be able to 
> apply said shaping to _all_ flows that need it.
> </marketroid warning>

Traffic shaping and rate limiting can be done with a proxy (though I'm not 
familiar with any implementation that does it.) But it's not really an 
application layer problem, so it's best left to lower-level gear.  That 
also makes the firewall simpler ;)

> > I'll counter with Postfix as an SMTP proxy.  And I'll up your BIND 
> > to BIND 9 
> 
> Now, given how you describe your set-ups, I'd venture to state 
> that my ideal firewalling environment is probably very much the 
> same as yours, the difference being that I describe it as centered 
> around an SPF with helper relays/proxies, while you call a
> carefully selected collection of relays/proxies "a proxy firewall".

Sure, and my firewall implementations always include some sort of packet 
filter (preferably with state)- generally IPFilter/NetBSD behind 
non-stateful router filters.

> Yes, you are 100% correct for the internal traffic case if one uses 
> the original meaning of the term "firewall": a collection of systems 
> that enforces a security policy. I do believe however that we've been 
> using the popular meaning of the term "firewall" so far in this topic.

Right, which is how I've been debating the topic.

> Now you're welcome to rip this apart :)

Moi?  Rip? ;)

Paul
[0] Really, check again[2]!
[1] Not that that would be a necessarily bad thing in those cases.
[2] There was no [0].
-----------------------------------------------------------------------------
Paul D. Robertson      "My statements in this message are personal opinions
[EMAIL PROTECTED]      which may have no basis whatsoever in fact."

_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to