On 03/08/11 03:45, Brzozowski, John wrote:
On 8/2/11 9:20 PM, "Shane Amante"<[email protected]>  wrote:
On Aug 2, 2011, at 5:08 PM, Brzozowski, John wrote:
On 8/2/11 8:28 AM, "Keith Moore"<[email protected]>  wrote:
On Aug 2, 2011, at 4:22 AM, Philip Homburg wrote:
The idea that a firewall should automatically know what "it has to do"
strikes me as utterly bizarre.   I realize that there's a desire to
minimize the configuration burden for unsophisticated users (and agree
with that), but the idea that the firewall knows better than the user
what his security policy should be seems ridiculous.
[jjmb] I agree Keith that having a firewall automatically know
what to do is a tall order. I also think the is more than a
desire to ease configuration burden, this is a must since most
users on the Internet have very basic technical skills.

[...]

My take on firewalls is that devices, or more precisely software installed on devices, must request for services to be opened. UPnP IGDv2 is capable of doing this today for IPv6, just as UPnP IGDv1 does it for IPv4. I see no other way to make firewalling scalable (working for every service at every hop), sturdy (not fall over due to misconfiguration), and working without user interaction.

And, we'd need to decide if this is something a device in the home can
'dynamically' request from the CPE-router/FW via, say, DHCPv6 or if there
are better options ...

Another interesting scenario where part of a delegated is interested
or required to be firewalled while others not. I do not think we are
limited ourselves. I think advanced users will still have the ability
to do as they please and we are making sure not so advanced are not
unknowingly exposed.

As I mentioned earlier, I think there may be an opportunity for some
protocol development in this space.

I'm not a big fan of the UPnP protocol, but it already fills some of this space. Others could be considered, e.g. PCP.

My take on this, and every single technical element in the scope of homenet's problem space, is that the challenge is symmetry: to make every protocol and delegation work upstream and downstream from every router. I would bet that every CPE router will contain a firewall. All available IPv4 CPE routers today do, and my customers all require the same for IPv6.

UPnP IGDv2 (or another protocol) can be extended to allow opening all ports in all protocols for a prefix that is delegated to a downstream router, (or announced by a downstream router or whatever).

So, thinking about our "tall order" here...

Scenario 1: the downstream router implements its own firewall. The upstream router's firewall allows all traffic from and to that router to pass through, assuming the downstream router will handle it. Scenario 2: the downstream router does not implement its own firewall, or is not aware that the upstream router already implements a firewall, and relays firewall service requests to the upstream router. Scenario 3: the downstream router implements its own firewall. The upstream router's firewall, by policy, denies all traffic from and to that router, or, in the more likely SPI case, denies all new connections to that router's prefix. The downstream router must not only serve requests by hosts on its own downstream interface, but relay those requests to the upstream router. Scenario 3a: same as 3, but the downstream router starts by requesting to allow all traffic to and from its prefix to release the upstream router of the burden of firewalling, like in scenario 1.
... and more scenarios imaginable.

Upstream and downstream capability detection is one challenge, so the right behaviour for the right scenario can be picked. All of this must be subject to override by policies set by the user or the provider. That's another challenge; the user must be able to determine at what level which policy makes his application fail. It all has to be secure. You don't want a malware agent to be able to pose as a downstream CPE router and punching a /64-size (or bigger) hole in the firewall.

bfn, Wouter
_______________________________________________
homenet mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to