Ray Olszewski wrote:
> 
> This would probably be a good topic to explore further, either here or on
> the -devel list, and that is why I am bothering to reply at all. It is (or
> may be) a concrete, and potentially widespread, instance of a general
> problem with firewalling ... what is the difference between a tunnel and a
> hole? If users can run software that punches hard-to-find holes in firewalls
> (and we know they can, as a general matter), what's a sysadmin to do?

Yup, an interesting topic!  My personal ten cents is that too many
sysadmins are not doing a good network analysis to start with...  what
needs to be protected, why?  What has to talk to the outside and why?  A
combination of firewalls, proxy servers, ipsec, internal virtual
networks and tunnels, stateful packet inspection, etc., while not
guaranteeing anything, does make it possible to make a graded effort in
protecting within a view of specific guideline criteria.  Anyone in this
line of work for a living knows that all the software running inside
your network by your ever-faithful users/clients is the stuff that
really gives you the fits and  makes for nightmares at night.  Keeping
stuff inside is at least just as important as keeping stuff outside
too.  The comment above on internal clients running tunneling
software.....  you will have to go to stateful inspection in addition
enforcing bottlenecks via proxies or other methods to restrict, in order
to control or limit them... ie firewall rules, etc., have to be just as
tight on what goes out (protocol & IP)as what comes in.

Like my bumper sticker says, "Linux, it's not just for breakfast
anymore!", that breakfast bowl that used to hold all of it has sort of
been outgrown a little bit as both linux, and internet/networking
technologies have just exploded in size.  Firewalling and security isn't
very simple anymore either.  Requires a continual learning curve for the
administrator.

Watching the list, there's a number of people that want multiple apps
running on the firewall....  I've never done that in the business world
as I'm one of the ones that falls on the side that a firewall is a
firewall.  If you need somthing else, fire off another server.  One size
doesn't fit all, and goes back to my original and main point here -- You
have to do a strenuous network analysis to determine what your security
posture requirements are, and then build it.  Keep it modular, and
layered.  It makes it much easier than rebuilding an entire network when
it comes time to change your security model.

Just some comments learned through several years in the commercial
world, maybe it will help someone, maybe it won't.  <grin>  At any rate,
to Charles and the others who build and maintain leaf variants, your
efforts are truly appreciated.

   Sam

_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to