On Monday 08 April 2002 18:03, Nils Ohlmeier wrote:

> Brian you always wrote about trusting your clients. <sarcastic> If
> you do not trust your clients don't connect them to the internet.
> </sarcastic> How do you know in detail what your clients send or
> receive over connections to port 80? I assume that nearly all
> readers of this mailing list would be able to write trojans which
> sends all your confidental compay data through firewalls or even
> ALGs.

I agree. Writing a trojan that opens a backdor into your network 
using random HTTP requests to random (hacked) hosts on the Internet 
is not very complex, and can be made in such manner that it cannot 
easily be spotted in the "normal" HTTP noice.

If you are in the situation that trojans are likely to be executed on 
your client computers then you are fucked. Period. Any security 
scheme discussed in precense of trojans widespread on the client 
computers is pointless, except unplugging and powering off all 
computers and ask the users to go back to use pen and paper 
(oldfashion typewriters is also OK).

But this thread is about how we can provide UPnP port mapping within 
iptables/netfilter in a sensible manner, not how poor the reality of 
Internet security actually is when you do not trust your clients at 
all. I say providing UPnP with a adequate level of security for the 
scope where UPnP is useful is entirely possible.

>From what have been told by Brian Murrel about his network I don't 
think UPnP is anything he should or need to be running. The scope of 
UPnP port mapping is relatively small networks with a NAT gateway and 
no internal routers. For anything outside this scope the protocol is 
highly unsuitable by design. As a rule of thumb one can say that if 
you have a NAT:ed network where it is likely more than one client at 
a time needs to run the same application requiring inverse-NAT for 
incoming connections then UPnP is likely not the tool for the job.

If you don't have a NAT:ed network, then UPnP port mapping plays no 
role.

Regards
Henrik

Reply via email to