(again: you probably shouldn't listen to a word I'm saying)

"Marc E. Mandel" wrote:
> 
> [firewall management interfaces...]
>
> - An https management interface where both the firewall and the
> administrator(s) have valid certificates.  

Hmm.. for what kind of environment? Aren't you worried about all the
client-side vulnerabilities in browsers?

> - a secure version of Simple Network Management Protocol (SNMP).  SNMP
> Version 2 was designed to provide secure management.  

RFC1445, "Administrative Model for SNMPv2":

          4.5.  Public Key Configuration

          This section presents an example configuration predicated upon
          a hypothetical security protocol.  [...]

Nice. Hypothetical.

          5.  Security Considerations

          In order to participate in the administrative model set forth
          in this memo, SNMPv2 implementations must support local, non-
          volatile storage of the local database of party information.
          Accordingly, every attempt has been made to minimize the
          amount of non-volatile storage required.

In my book, that's not a security consideration. 
(Yes, that's the full text)

For encryption, plain old DES is used. No good.
It also uses a _constant_ IV. Useless. 

Also, it's all based on static keys. Where are the session keys?
Break one old session and you get unlimited access to future
messages.

>From a cryptography perspective, the SNMP security protocol is
a complete disaster. Maybe, _maybe_, it's good enough for some
uses (for some value of "some"), but _I_ for one don't want
code for SNMP write access anywhere near my firewalling process,
let alone let it make changes to my policy.

(And don't get me started on the inherent complexity of the
entire SNMP protocol. Recent incidents speak for themselves,
I believe.)

> - an Secure Shell (SSH) implementation that supports both secure 
> telnet and secure ftp.

SSH has problems too; perhaps not so much design-wise as complexity-
wise, which the recent and not-so-recent stream of bugs in various
SSH implementations has shown us.

Granted, these problems could probably be worked around by writing 
a minimalistic implementation that scraps SSHv1 compatibility 
and a few other things that one really shouldn't need in a 
firewall.

Then again, if I had to choose from the above three, SSH would 
definately be my choice.


Regards,
Mikael Olsson

-- 
Mikael Olsson, Clavister AB
Storgatan 12, Box 393, SE-891 28 �RNSK�LDSVIK, Sweden
Phone: +46 (0)660 29 92 00   Mobile: +46 (0)70 26 222 05
Fax: +46 (0)660 122 50       WWW: http://www.clavister.com

"Senex semper diu dormit"
_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
For Account Management (unsubscribe, get/change password, etc) Please go to:
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to