On Tuesday 09 April 2002 01:18, Henrik Nordstrom wrote:
> But this thread is about how we can provide UPnP port mapping within
> iptables/netfilter in a sensible manner, not how poor the reality of
> Internet security actually is when you do not trust your clients at
> all. I say providing UPnP with a adequate level of security for the
> scope where UPnP is useful is entirely possible.

I had the sense that Brian was only arguing against UPnP because of his 
security fears. But you are right, back to topic...

> From what have been told by Brian Murrel about his network I don't
> think UPnP is anything he should or need to be running. The scope of
> UPnP port mapping is relatively small networks with a NAT gateway and
> no internal routers. For anything outside this scope the protocol is
> highly unsuitable by design. As a rule of thumb one can say that if
> you have a NAT:ed network where it is likely more than one client at
> a time needs to run the same application requiring inverse-NAT for
> incoming connections then UPnP is likely not the tool for the job.
>
> If you don't have a NAT:ed network, then UPnP port mapping plays no
> role.

I browsed the spec and you are right.
The aspect of UPnP which we are talking about have the goal to control those 
little hardware boxes which brings a few PCs over a dialup connection with 
NAT to the internet.
If i understand the spec correct, a UPnP deamon have also to provide control 
over your ppp-deamon. The main aspect of the spec is configuring and 
controling your dialup connection and the posibility to configure 
port-forwarding is additional. At this commands is mentioned that the deamon 
also have to configure the firewall, if one is implemented :-), according to 
forwared ports.

If i'm not wrong ctnetlink will provide what a UPnP deamon needs to support 
this port-farwding requests. Port reservation isn't really a problem because 
the only case when a UPnP deamon can reject such port-forwading request is, 
when the same tuple of external IP, port and destination IP and port is used 
by another internal host. Even if all ports on the NAT-Device are occupied 
the deamon isn't allowed to reject such a request....

My comment: great spec, very realistic ;-)))
I would say much fun for the programmers of an UPnP deamon for linux.

To be serious: security isn't an aspect of the spec. So if you follow the spec 
it will end in a deamon which serves every request it's receiving (the 
nightmare not only of Brian Murrel :-).
But with the information you get with a request it will be hard to deceide how 
to process with it. Also it should definatly be implemented with a minimal 
ruleset to add at least a minimum of security.

Regards
  Nils Ohlmeier


Reply via email to