Hi Steve,

Thanks for taking the time to provide me with your feedback.  I'm not
adverse to getting or taking criticism if I'm wrong and/or if I learn
something.  As my very close father-like friend says to me, "Mark, 
if you're not careful, you'll learn something everyday!" :)

> Overall the presentation is well-done, but I take some exception with 
> some of your conclusions on slide 34.  I know when I talk to a vendor 
> and get unrealistic comparisons, mentally that vendor is out the door.

I agree with you that things do not look right on slide 34 at face value.
It's at this point in my talk that I give a little background on
why the switch in the first place.  DNS and DHCP were running on the
Domain Controllers that were not replicating.  In fact, Active Directory
was corrupt and the only good AD backup was done six month prior to
me taking over the SysAdmin position.  It was a nightmare as the whole
office was dependent on one last remaining Primary Domain Controller
that was on it's last legs.  Nothing could be done to repair the 
situation and I tried so hard.  It was an upgrade from a previous NT4 
Domain Controller with a 4 GB C:\ drive that was as red as rudolf's
nose as there was no room left for the much needed defrag :(  This is
not what I set up, it's what I inherited.  I never wanted to be put
in that position again and so I decided to separate DNS and DHCP from 
AD.  In doing so, I found that I was able to troubleshoot and find
problem hosts a lot more efficiently and effectively.
 
> DNS: You don't need a dual P3 with 2gb for a DNS server in Windows.  If 
> the server isn't an AD controller, that P3/500 would be plenty.  If it 
> is an AD controller, then the server size depends on how many users you 
> have, and to offer a good comparison, you'd have to size the OpenBSD 
> machine for Kerberos and LDAP.

You may be right here.  DNS and DHCP were the only internal conversions
that I made from Windows to OpenBSD.  I was mostly concerned with stability
and security issues that I had to contend with.  I therefore concentrated
mainly on perimeter security.  Yes, we rebuilt a new Domain, Windows
Servers and all PCs but that wasn't really exciting.  It just had to 
be done.  I could have done a lot more but I didn't.  I didn't need
to push the envelope.  Just because it can be done, doesn't necessarily
mean it should be done.  I did what was needed to restore stability
and improve security.  The by-product was the savings and less dependance
on commercial hardware/software.    
 
> (Same argument for DHCP, if you run a DHCP server on a dual P3, the 
> server is going to be bored most of the time.)

Yup. 

> I also noticed you're comparing a PC to a server.  For any OS, a "real" 
> server will generally be a higher quality and more stable than a PC. 
> PCs don't have hot-swap drives or power supplies.  Again, this isn't a 
> fair comparison.

This all depends on the purpose.  I know that I don't need dual everything
and redundant power supplies for my firewalls thanks to pfsync and CARP :)
Imagine trying to rebuild a whole new windows domain and infrastructure
all the while maintaining business as usual.  We had no choice but to
use anything that was available to us as we were also told not to spend
anything :(  The previous Adminstrator took advantage of his situation. 
As usual, rational decision makers tend to go from A-Z and we were the 
beneficiaries :(  So we did two migrations: one to the old servers and
back again to the really good servers when they were available again.

Another point that I made in the talk was that the switch to OpenBSD
as a necessity.  We didn't have a choice as most of the Windows Servers
were just too resource intensive for the older servers.  If we didn't
offload the services such as DNS and DHCP as an example onto many older 
machines, we would not have been able to clean the whole mess up.

> Remote access: Windows' built-in Remote Desktop is included with the OS, 
> you don't need OpenBSD for that.  You couldn't do that over your Intel 
> VPN?  Remote Desktop is potentially vulnerable to MITM, but it's 
> probably more secure than an external web site like GoToMyPC.

I can't comment too much on the security aspect.  I'm not at liberty to
say what was done here.  Suffice it to say, that I could have easily 
done a couple of talks on just what was done in this area.  Please don't
get me going on Intel.  Remote Desktop has poor authentication and
therefore it only made sense for us to tunnel RDC through OpenSSH. 
 
> You can also install OpenSSH on your Windows machines and manage them 
> with netsh or a variety of other command-line tools.

I for one have problems putting a Windows Server on the Internet.  Even
within a DMZ and hardened as much as I know how.   I just wouldn't be able
to sleep at nights. 

> Wireless: I'm not sure if Server 2003 can act as an AP, I haven't tried 
> setting it up.  It can, however, provide 802.1X authentication, which 
> requires less end-user configuration (on Windows clients) than authpf.

This just happens to be another area where OpenBSD shines above the
commercial alternatives.  Most WAPs don't encorporate any firewalling.
They'll do authentication and encryption to some extent but many lack 
true firewalling capability unless you pay through the nose for it.

If there is a Secure Commercial Wireless Solution that even comes
close to the solution that I have implemented in regards to the OpenBSD's
security track record, usability, interoperability and ease of use, 
ease of administration and cost, then please do enlighten me.  The basis
of what was implemented are on the slides.  You mention authpf in a
negative sense.  I think it was the best thing developed since sliced
bread :)  That's not totally true.  OpenBSD on Zaurus, PF, CARP and SPAMD
are also right up there ;)
 
> VPN: Why the hell does everyone hate the included Microsoft VPN?  If you 
> run an MS shop, it's easy and cheap.  That uses IPsec, ISAKMP and PKI. 

Maybe because there's an easier, cheaper and more secure alternative!

> It also has features to quarantine Windows clients that don't meet your 
> criteria for system security.

No comment.
 
> (Yes, the MS PPTP protocol had some weaknesses, but that was 1998. 
> That'd be like avoiding OpenSSH because the SSH 1.0 protocol had some 
> weaknesses.)

MS has their own way of implementing standards.  They've done it time
and again.  Here's there latest example:

http://tinyurl.com/bavw4

http://www.eweek.com/article2/0,1759,1820921,00.asp
  
I don't want to go down this path.  We need to play nice with windows
but there are better alternatives at least in the area of security. 
   
> Web: I assume you had some talking points here, specifically about 
> privsep and code cleanup in OpenBSD's Apache.  The biggest problems with 
> IIS are from admins enabling it when they don't need to, or using IIS 
> when another product would do.  The Microsoft developers are even 
> learning to run the web processes as low-privilege processes (Srv 2003 
> SP1), although third-party developers aren't paying attention.

Yup.
 
> Besides, you can run Apache on Windows, so the core argument is between 
> the trunk Apache and OpenBSD's Apache.

Good point as alternative to IIS but I'd still use it only for internal
purposes.  Apache on OpenBSD in the Wild Wild West is still the only
way to go for me ;)

> IDS: Snort doesn't run on Windows?

Diddo.
 
> Firewall: I'm not familiar with Checkpoint, but their web site 
> (http://www.checkpoint.com/products/downloads/firewall-1_datasheet.pdf) 
> says that Checkpoint on Windows requires 256mb RAM and doesn't list 
> processor requirements.  Sounds like somebody just wanted to buy a big 
> server.  There's no good reason to have two processors in a firewall.

Obviously you've not run Checkpoint on Windows :)  But that's okay,
I wouldn't wish it on anyone 8-)  By the way, in my talk, I do mention
a point in time (August 2003) when I had to protect my firm standard 
Checkpoint Firewall with my OpenBSD Firewall due to an outbreak of
'nachi', 'msblaster' & 'sobig' viruses.  Imagine that, an OpenBSD
firewall out in front protecting another firewall because it was going
to 100% CPU utilization with dual CPU's!
 
> Other comments: When you boil it down, the $500 for Server 2003 isn't 
> really all that expensive for a mid-size or large company.  CALs can 
> make a difference in large companies, but that doesn't really come in to 
> play here.

This company just happens to be the oldest and largest services firm
in the world.  I'll stop at that.  The switch wasn't about saving money.
It was about stability and security.  Cost reduction was an added bonus :) 
 
> You've made a good argument for using OpenBSD as a redundant firewall or 
> access point, but that's more Cisco's domain than Microsoft's.  Maybe 
> find out if you can set up a redundant file server using OpenBSD/CARP, 
> and compare that to active/passive Windows server clustering.

I know that Bob Beck has one such solution.  It's on my list of things
to do ;)  I'm sure that someone has done a comparison but the point is  
that it can be done if need be. 

> Avoid relying on cheap hardware to make your cost point.  OpenBSD runs 
> well on "real", modern servers.  Managers at mid/large companies aren't 
> going to want to hear about how you pulled machines out of the trash and 
> now the business depends on them, even if they're 4x redundant.

Good point.  Most of the people in attendance at the talk commented 
positively on this very point.  They were quite impressed with what 
could be done using OpenBSD and more so when I showed them what could
be done using those very little commell boxes that I used in the demo :)  

> Slide 3: The first two paragraphs only preach to the converted.  Maybe 
> add a fourth bullet point, "Your competitors are probably saving money 
> using it", depending on your audience.

Excellent suggestion.  Thanks for that.

Once again, thanks for your comments and your time :)

Cheers,

Mark Uemura
OpenBSD Support Japan Inc.
www.openbsd-support.com

Reply via email to