Stewart Stremler wrote:

When usability and security conflict, security loses.  Period.

Which is exactly opposite of good sense. :(

No, it's not.

I'm tired of this platitude from security people.  It's just wrong.

Good security == maximally usable for the task at hand and minimally usable for anything else.

The fact that an end user can't tell the difference is a fault from the *security* side. Most of the applications are trying desperately to be usable and play by the security rules. The fact that the applications programmers cannot query the local security environment to make things better for the user is what creates the security/usability tradeoff.

The "owner" only appears when he gets in the way of the "user". There is no "owner" to please; there is only the "user". And the "user" has said "Own my NAT, please!"
The obvious approach, I think, would be to build a NAT-control library,
like termcap and terminals.  "Tell me what sort of NAT device you have,
and where it's at."  A beneficial side-effect would be to allow for the
development of a set of open-source NAT-management tools built on top
of such a library.

Yes! That would be *fine*. However, no one from the land of security has stepped forward to do the work required. Presumably it would be an extension to SNMP.

Until then, we are stuck with subverting NATs.

There are plenty of ways for an active owner to stop traversal. Even with hole punching, there are still plenty of ways to stop this (RST any incoming connection without a rule stops all TCP hole punching cold).
By "active owner", I take it that you mean someone who explicitly allows
incoming connections through a firewall?

No, I mean owner with clue. One who doesn't say "Own my NAT, please!" One who explicitly chooses the policy on the NAT rather than pulling it out of the box, plugging in the cables, and never touching it again.

-a


--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to