Re: [pfSense-discussion] Unfork m0n0wall

2005-11-28 Thread Chris Buechler

Bennett wrote:


This answers one of my biggest questions about the fork.  I've been
fixated on the package system (though my previous mention of it was
brief), thinking it was a solution for both projects.  I had envisioned
moving everything that isn't a core feature into an optional module.
Instead of m0n0wall is too resource-intensive to run on microsystem X,
you get m0n0wall will run on microsystem X with features A, B, and C,
but not D.  I wasn't aware that m0n0wall's file system makes this whole
idea infeasible.  Perhaps I should troll the m0n0wall list...  :)

 



go for it.  You'd still get me replying to your messages, with the same 
stuff mostly.  :) 

But it'll never change to be a full blown hard drive install, and that's 
precisely where the split between the two is justified.  I personally 
think the embedded pfsense image should be dropped when/if m0n0wall gets 
on FreeBSD 6.  At that point, depending on where m0n0wall 1.3 ends up, 
it may very well be a wasted effort to put out an embedded image where 
that's m0n0wall's territory and where it excels. 




Still, I think moving EVERY non-core feature (e.g., captive portal, load
balancing, CARP, even VPN) into an optional module is the way to go for
pfSense.  Then, only the features a user needs are installed.  



Umm, no.  Virtually all of that is in-kernel stuff, so the only thing 
(most of it at least) you could add on would be the GUI pages.  No 
sense in separating that. 




I also got the impression from the pfSense FAQs (yes, I did do some
research before posting) that there was a bit more code sharing than
there actually is, so I thought the projects were not quite as separate
as they are.  I understand now that that is not the case, and hence my
concerns about patchy code were unjustified.  Furthermore, Colin said
it's a one-way street (which I assume goes from pfSense to m0n0?), 



No, the other way around actually.  I don't think a single line of 
pfsense code has made it into m0n0wall at this point.  That'll likely 
happen more once work on 1.3 gets going. 




so
there's no duplicated work since m0n0wall can incorporate, say, the
certificate manager that pfSense has already developed.  



well, not really for many of the things at this point.  the back end of 
the certificate manager is, iirc, almost as big as the entire m0n0wall 
image.  At any rate, it's far too large for the way the file system 
currently works.  that's true of many other things as well that I'm not 
recalling ATM.. 






Re: [pfSense-discussion] Unfork m0n0wall

2005-11-28 Thread Jim Thompson



Chris Buechler wrote:


Bennett wrote:


Perhaps I should troll the m0n0wall list...  :)


go for it.  You'd still get me replying to your messages, with the 
same stuff mostly.  :)


Chris won't be the only one, either.  :-)

But it'll never change to be a full blown hard drive install, and 
that's precisely where the split between the two is justified.  I 
personally think the embedded pfsense image should be dropped when/if 
m0n0wall gets on FreeBSD 6.  At that point, depending on where 
m0n0wall 1.3 ends up, it may very well be a wasted effort to put out 
an embedded image where that's m0n0wall's territory and where it excels.


depends on how much of the various packages (802.1x/WPA, plethora of 
wireless drivers, carp, altq, serial console, ...) are picked up in 
m0n0.   Each of these will serve to make m0n0 a larger, more complicated 
system, and Manuel will have to cut the baby somewhere.


So, I'd rather the embedded image (or at least the option to cut an 
embedded image) be kept.  Keeping it means testing it, too, so its 
likely that the image itself should be kept.


jim


[pfSense-discussion] Unfork m0n0wall

2005-11-27 Thread Bennett
I've been looking for an open source firewall.  I found m0n0wall, IPCop,
and few others.  I thought m0n0wall was great, but then I came across
pfSense, and it was even better, picking up where m0n0wall left off.
 
However, this fork of m0n0wall is a bit unnerving.  Yes, I know you have
radically different goals, but you also have similar goals and will
face similar issues.  This fork detracts from BOTH projects because
you've effectively cut the manpower for each project roughly in half
(since everyone could be working on one project instead of two) while
doubling the work (since each project will be duplicating work).  And
let's not forget the user base is split, too, so each project has half
the support and testers.
 
Even if you're sharing some code so you're not both reinventing the
wheel, you still have to merge disjoint code as m0n0wall tries to add
pfSense enhancements into their code and vice versa.  As a programmer, I
know what all this patching is going to do to the code.  As you exchange
code back and forth, m0n0wall is going to have some pfSense-specific
code that they'll patch to retrofit into m0n0wall and then give it back
to pfSense who will add some patches to the m0n0wall
patches...Eventually, this bloated mess of patches is so convoluted that
no one knows how it works and you're on your way to security holes and
compromised networks.
 
Thus, either you've doubled the work with half the developers/testers or
you've doomed the code to buggy patches on top of patches.  This makes
me question the founders of pfSense...Did they not foresee this when
they decided to fork?  And these short-sighted individuals are who I am
counting on to protect my valuable network?  Or is this some sort of ego
thing?  Did the other m0n0wall programmers hurt their feelings so they
ran off and made their own little project?  Or maybe the m0n0wall
developers are unreasonable jerks and so pfSense politely forked rather
than bash heads.  But those unreasonable developers are the ones who
wrote the original m0n0wall code that you're using...
 
It seems a wiser course of action would be to NOT FORK and instead focus
on incorporating an enhanced packaging system within m0n0wall that would
allow users to install/uninstall features on-demand.  Thus,
m0n0wall/pfSense could still be installed on embedded systems with a
streamlined core, and then expanded with additional functionality as
needed.  (You could have your cake and eat it, too, but without the
fork).  ;)  In addition, removing unused features will help minimize
exposure to security holes.
 
So, having said all that, why should I consider pfSense for my firewall
when it's written by a bunch of unreasonable jerks and short-sighted
egoists who are churning out a insecure, bloated spaghetti?  (Please
don't get me wrong--I plan on using pfSense to secure my network and
most likely at least two of my clients' networks, too.  I'm just looking
for answers to quell my concerns.)

--Bennett


Re: [pfSense-discussion] Unfork m0n0wall

2005-11-27 Thread Jim Thompson



Bennett wrote:


I've been looking for an open source firewall.  I found m0n0wall, IPCop,
and few others.  I thought m0n0wall was great, but then I came across
pfSense, and it was even better, picking up where m0n0wall left off.

However, this fork of m0n0wall is a bit unnerving.  Yes, I know you have
radically different goals, but you also have similar goals and will
face similar issues.  This fork detracts from BOTH projects because
you've effectively cut the manpower for each project roughly in half
(since everyone could be working on one project instead of two) while
doubling the work (since each project will be duplicating work).  And
let's not forget the user base is split, too, so each project has half
the support and testers.
 

You're assuming that pfSense has half the users and testers, an 
assumption that I find unlikely in view of pfSense's current status (it 
has yet to be released as a production version, though that day is coming.)



Even if you're sharing some code so you're not both reinventing the
wheel, you still have to merge disjoint code as m0n0wall tries to add
pfSense enhancements into their code and vice versa.  

Where the goals of pfSense and m0n0(wall) are similar, this could be 
true, but the goals are more different than similar.   Manuel (whom I 
don't profess to speak for, so I'm willing to be corrected) wants 
m0n0wall to continue to focus on small(er) embedded systems (such as the 
Soekris and PC Engines boards, along with old(er) PCs), with limited CPU 
(486 equivalents clocked at 100MHz), memory (sometimes as little as 
64MB) and storage (there is great reluctance to increase the CF image 
beyond current the 8MB 'cap'), while making no sacrifices to performance 
(normally expressed in terms of throughput) on these platforms.


Thus, the fallback to 4.11 for the 1.2 series release after FreeBSD 
5.3 failed to live up to the performance metrics of the 4.11-based releases.


Manuel describes it quite well here:  
http://doc.m0n0.ch/handbook/faq-goals.html


pfSense shares none of these constraints.   Indeed, in direct opposition 
to m0n0wall, pfSense *is* intended to be an enterprise-ready firewall, 
and *is* targeted at a class of machines with more capacity that the 
constraint envelope chosen for m0n0wall.  Quoting the pfSense FAQ:


pfSense requires a machine with at least a 133 MHz processor but we 
suggest using a 400+ MHz machine. 128+ MB of RAM and a 1 GB minimum 
hard drive space is recommended.


(pfSense can be run with less than this, of course).


As a programmer, I
know what all this patching is going to do to the code.  As you exchange
code back and forth, m0n0wall is going to have some pfSense-specific
code that they'll patch to retrofit into m0n0wall and then give it back
to pfSense who will add some patches to the m0n0wall
patches...Eventually, this bloated mess of patches is so convoluted that
no one knows how it works and you're on your way to security holes and
compromised networks.
 


You haven't proved your assumption here.  (I haven't disproved it either.)


Thus, either you've doubled the work with half the developers/testers or
you've doomed the code to buggy patches on top of patches.  This makes
me question the founders of pfSense...Did they not foresee this when
they decided to fork?  And these short-sighted individuals are who I am
counting on to protect my valuable network?  Or is this some sort of ego
thing?  Did the other m0n0wall programmers hurt their feelings so they
ran off and made their own little project?  Or maybe the m0n0wall
developers are unreasonable jerks and so pfSense politely forked rather
than bash heads.  But those unreasonable developers are the ones who
wrote the original m0n0wall code that you're using...

It seems a wiser course of action would be to NOT FORK and instead focus
on incorporating an enhanced packaging system within m0n0wall that would
allow users to install/uninstall features on-demand.  Thus,
m0n0wall/pfSense could still be installed on embedded systems with a
streamlined core, and then expanded with additional functionality as
needed.  (You could have your cake and eat it, too, but without the
fork).  ;)  In addition, removing unused features will help minimize
exposure to security holes.

So, having said all that, why should I consider pfSense for my firewall
when it's written by a bunch of unreasonable jerks and short-sighted
egoists who are churning out a insecure, bloated spaghetti?  


this is a troll.   I won't feed the troll.


(Please don't get me wrong--I plan on using pfSense to secure my network and
most likely at least two of my clients' networks, too.  I'm just looking
for answers to quell my concerns.)


My suggestion is that you try to be more polite.

Jim



Re: [pfSense-discussion] Unfork m0n0wall

2005-11-27 Thread Colin Smith
* Bennett [EMAIL PROTECTED] [2005-11-27 01:58:17 -0600]:

 However, this fork of m0n0wall is a bit unnerving.  Yes, I know you have
 radically different goals, but you also have similar goals and will
 face similar issues.  This fork detracts from BOTH projects because
 you've effectively cut the manpower for each project roughly in half
 (since everyone could be working on one project instead of two) while
 doubling the work (since each project will be duplicating work).  And
 let's not forget the user base is split, too, so each project has half
 the support and testers.

pfSense and m0n0wall are in a few respects very similar projects, but there are 
also several important differences that would make merging back into m0n0wall's 
codebase very difficult and quite probably harmful. m0n0wall has always 
targeted embedded systems where resources are at a premium, which is why Manuel 
is generally more conservative when it comes to adding or changing major pieces 
of code.

In contrast, pfSense targets machines that are not quite as minimal. Making 
this assumption about the machines that pfSense will be installed on allows us 
to implement amenities such as the package system, wizards, SSH, and so on. 
These are all things that would be very difficult to squeeze into m0n0wall's 
base without compromising one of that project's main goals.

 Even if you're sharing some code so you're not both reinventing the
 wheel, you still have to merge disjoint code as m0n0wall tries to add
 pfSense enhancements into their code and vice versa.  As a programmer, I
 know what all this patching is going to do to the code.  As you exchange
 code back and forth, m0n0wall is going to have some pfSense-specific
 code that they'll patch to retrofit into m0n0wall and then give it back
 to pfSense who will add some patches to the m0n0wall
 patches...Eventually, this bloated mess of patches is so convoluted that
 no one knows how it works and you're on your way to security holes and
 compromised networks.

Though we occasionally merge bugfixes and features from m0n0wall, to the best 
of my knowledge this has mostly been a 'one-way street'. At this point much of 
our base code has diverged significantly from the original m0n0wall codebase, 
and many of the features we have worked on since the fork will likely not make 
it back into m0n0 for the reasons described above.

 Thus, either you've doubled the work with half the developers/testers or
 you've doomed the code to buggy patches on top of patches.  This makes
 me question the founders of pfSense...Did they not foresee this when
 they decided to fork?  And these short-sighted individuals are who I am
 counting on to protect my valuable network?  Or is this some sort of ego
 thing?  Did the other m0n0wall programmers hurt their feelings so they
 ran off and made their own little project?  Or maybe the m0n0wall
 developers are unreasonable jerks and so pfSense politely forked rather
 than bash heads.  But those unreasonable developers are the ones who
 wrote the original m0n0wall code that you're using...

As I've already stated, there's really no reason to fear that pfSense is going 
to collapse under the weight of the patches we're forced to juggle, because 
there aren't many to begin with.

Also, it is my understanding that Scott and Chris originally forked because of 
Manuel's (obvious) resistance to taking his project in an entirely new 
direction. Few if any bridges were burned. It most certainly was not an 'ego 
thing'.

Skipping past the troll at the end,
Colin


pgp3MFmHTBd4f.pgp
Description: PGP signature


RE: [pfSense-discussion] Unfork m0n0wall

2005-11-27 Thread alan walters
I agree completely with cloin we use both monowall and pfsense.
Pfsense is great if you have some good hardware but monowall is great on
embedded platforms lightweight reliable and not to feature loaded.

Great for transpernet bridging 801.b aps and clients. Super for
replacing that home firewall with something robust.

Pfsense is feature packed and takes a lot longer to get a good working
configuration, lots of extra packages and tweaks for those enterprise
firewall solutions. Great for datacenter work or large lans.

Also I am subscribed to both lists and find the problems on each list
and the utilizations are very different.

Just my two cents worth.

-Original Message-
From: Colin Smith [mailto:[EMAIL PROTECTED] 
Sent: Sunday, November 27, 2005 4:32 PM
To: discussion@pfsense.com
Subject: Re: [pfSense-discussion] Unfork m0n0wall

* Bennett [EMAIL PROTECTED] [2005-11-27 01:58:17 -0600]:

 However, this fork of m0n0wall is a bit unnerving.  Yes, I know you
have
 radically different goals, but you also have similar goals and will
 face similar issues.  This fork detracts from BOTH projects because
 you've effectively cut the manpower for each project roughly in half
 (since everyone could be working on one project instead of two) while
 doubling the work (since each project will be duplicating work).  And
 let's not forget the user base is split, too, so each project has half
 the support and testers.

pfSense and m0n0wall are in a few respects very similar projects, but
there are also several important differences that would make merging
back into m0n0wall's codebase very difficult and quite probably harmful.
m0n0wall has always targeted embedded systems where resources are at a
premium, which is why Manuel is generally more conservative when it
comes to adding or changing major pieces of code.

In contrast, pfSense targets machines that are not quite as minimal.
Making this assumption about the machines that pfSense will be installed
on allows us to implement amenities such as the package system, wizards,
SSH, and so on. These are all things that would be very difficult to
squeeze into m0n0wall's base without compromising one of that project's
main goals.

 Even if you're sharing some code so you're not both reinventing the
 wheel, you still have to merge disjoint code as m0n0wall tries to add
 pfSense enhancements into their code and vice versa.  As a programmer,
I
 know what all this patching is going to do to the code.  As you
exchange
 code back and forth, m0n0wall is going to have some pfSense-specific
 code that they'll patch to retrofit into m0n0wall and then give it
back
 to pfSense who will add some patches to the m0n0wall
 patches...Eventually, this bloated mess of patches is so convoluted
that
 no one knows how it works and you're on your way to security holes and
 compromised networks.

Though we occasionally merge bugfixes and features from m0n0wall, to the
best of my knowledge this has mostly been a 'one-way street'. At this
point much of our base code has diverged significantly from the original
m0n0wall codebase, and many of the features we have worked on since the
fork will likely not make it back into m0n0 for the reasons described
above.

 Thus, either you've doubled the work with half the developers/testers
or
 you've doomed the code to buggy patches on top of patches.  This makes
 me question the founders of pfSense...Did they not foresee this when
 they decided to fork?  And these short-sighted individuals are who I
am
 counting on to protect my valuable network?  Or is this some sort of
ego
 thing?  Did the other m0n0wall programmers hurt their feelings so they
 ran off and made their own little project?  Or maybe the m0n0wall
 developers are unreasonable jerks and so pfSense politely forked
rather
 than bash heads.  But those unreasonable developers are the ones who
 wrote the original m0n0wall code that you're using...

As I've already stated, there's really no reason to fear that pfSense is
going to collapse under the weight of the patches we're forced to
juggle, because there aren't many to begin with.

Also, it is my understanding that Scott and Chris originally forked
because of Manuel's (obvious) resistance to taking his project in an
entirely new direction. Few if any bridges were burned. It most
certainly was not an 'ego thing'.

Skipping past the troll at the end,
Colin



Re: [pfSense-discussion] Unfork m0n0wall

2005-11-27 Thread Bill Marquette
On 11/27/05, Bennett [EMAIL PROTECTED] wrote:
 I've been looking for an open source firewall.  I found m0n0wall, IPCop,
 and few others.  I thought m0n0wall was great, but then I came across
 pfSense, and it was even better, picking up where m0n0wall left off.

I think you just summarized the fork right here.  Picking up where
m0n0wall left off - if this was m0n0 with a few patches here and
there, it wouldn't pick up where m0n0 left off, it'd be m0n0+patches.

 patches...Eventually, this bloated mess of patches is so convoluted that
 no one knows how it works and you're on your way to security holes and
 compromised networks.

m0n0 has a concept of a single administrator (as currently does
pfSense).  Unless the OS or web server has a remote vulnerability I
don't see any merit to your claim.  We are adding xmlrpc functionality
which will over time increase the security risk of an exposed GUI, but
until multiple administrators are added, that's not much of a risk
increase (same auth code).

 Thus, either you've doubled the work with half the developers/testers or
 you've doomed the code to buggy patches on top of patches.  This makes
 me question the founders of pfSense...Did they not foresee this when
 they decided to fork?  And these short-sighted individuals are who I am
 counting on to protect my valuable network?  Or is this some sort of ego
 thing?  Did the other m0n0wall programmers hurt their feelings so they
 ran off and made their own little project?  Or maybe the m0n0wall
 developers are unreasonable jerks and so pfSense politely forked rather
 than bash heads.  But those unreasonable developers are the ones who
 wrote the original m0n0wall code that you're using...

Never used m0n0, so I can't really speak about the original fork.  I
can however say why I started submitting patches to pfSense and not
m0n0.  pfSense uses pf, a filter software that I am comfortable with,
like, and has features far greater than ipfilter has.  I stumbled onto
pfSense after purchasing a 4801 and finding that the only embedded
firewall project ran ipfilter, which I didn't want to run, and had
started to write my own (for myself, it would have NEVER been
released).  To be frank, I work on pfSense BECAUSE it uses pf.  If
m0n0 switched today, I'd probably still stick with pfSense
development, I know the codebase pretty well, I like it's openness.  I
also see a lot of issues in the codebase, stuff that I'd like to
rewrite, stuff that once rewritten will have zero chance in hell of
being backported to m0n0 or receiving further updates from m0n0. 
Again, an example of how the fork is going it's own way and developing
it's own code, not just patches.


 So, having said all that, why should I consider pfSense for my firewall
 when it's written by a bunch of unreasonable jerks and short-sighted
 egoists who are churning out a insecure, bloated spaghetti?  (Please
 don't get me wrong--I plan on using pfSense to secure my network and
 most likely at least two of my clients' networks, too.  I'm just looking
 for answers to quell my concerns.)

I've got a better idea.  After all you've said, why are you choosing
pfSense over m0n0?  What have we done right that's made you want to
choose pfSense over m0n0?  I assume we've done _something_ right for
you to choose an alpha project over a released product.

--Bill


Re: [pfSense-discussion] Unfork m0n0wall

2005-11-27 Thread Scott Ullrich
On 11/27/05, Bennett [EMAIL PROTECTED] wrote:

Email address created just to troll us.   I already see issues.

 I've been looking for an open source firewall.  I found m0n0wall, IPCop,
 and few others.  I thought m0n0wall was great, but then I came across
 pfSense, and it was even better, picking up where m0n0wall left off.

 However, this fork of m0n0wall is a bit unnerving.  Yes, I know you have
 radically different goals, but you also have similar goals and will
 face similar issues.  This fork detracts from BOTH projects because
 you've effectively cut the manpower for each project roughly in half
 (since everyone could be working on one project instead of two) while
 doubling the work (since each project will be duplicating work).  And
 let's not forget the user base is split, too, so each project has half
 the support and testers.

I suggest reading through the m0n0wall archives.  A lot of ideas that
are in pfSense have been shot down.  You haven't done you're homework.

 Even if you're sharing some code so you're not both reinventing the
 wheel, you still have to merge disjoint code as m0n0wall tries to add
 pfSense enhancements into their code and vice versa.  As a programmer, I
 know what all this patching is going to do to the code.  As you exchange
 code back and forth, m0n0wall is going to have some pfSense-specific
 code that they'll patch to retrofit into m0n0wall and then give it back
 to pfSense who will add some patches to the m0n0wall
 patches...Eventually, this bloated mess of patches is so convoluted that
 no one knows how it works and you're on your way to security holes and
 compromised networks.

See above.  Manuel is very conservative of what he adds (which is
good, because his goals are different).   Either way, our codebase in
a lot of areas are quite different now.

 Thus, either you've doubled the work with half the developers/testers or
 you've doomed the code to buggy patches on top of patches.  This makes
 me question the founders of pfSense...Did they not foresee this when
 they decided to fork?  And these short-sighted individuals are who I am
 counting on to protect my valuable network?  Or is this some sort of ego
 thing?  Did the other m0n0wall programmers hurt their feelings so they
 ran off and made their own little project?  Or maybe the m0n0wall
 developers are unreasonable jerks and so pfSense politely forked rather
 than bash heads.  But those unreasonable developers are the ones who
 wrote the original m0n0wall code that you're using...

That is not true, a lot of our developers have never even used
m0n0wall.  Of course Chris and I thought a lot of these items through
when we decided to do this.  Chris did write 90% of the manual.  
Question:  Why do you keep using words like unreasonable and jerks? 
Please show me some material that hvae gotten your panties in an
uproar.  At this point you are now our king troll. We should find a
name for you.

 It seems a wiser course of action would be to NOT FORK and instead focus
 on incorporating an enhanced packaging system within m0n0wall that would
 allow users to install/uninstall features on-demand.  Thus,
 m0n0wall/pfSense could still be installed on embedded systems with a
 streamlined core, and then expanded with additional functionality as
 needed.  (You could have your cake and eat it, too, but without the
 fork).  ;)  In addition, removing unused features will help minimize
 exposure to security holes.

Reread my first response.   Packaging had been discussed MANY times on
the m0n0wall list.   Nobody seemed to keen about it.

 So, having said all that, why should I consider pfSense for my firewall
 when it's written by a bunch of unreasonable jerks and short-sighted
 egoists who are churning out a insecure, bloated spaghetti?  (Please
 don't get me wrong--I plan on using pfSense to secure my network and
 most likely at least two of my clients' networks, too.  I'm just looking
 for answers to quell my concerns.)

Here we go again.  Unreasonable jerks.   So I guess you're referring
to me.Again, what has got your panties in an uproar?   At this
point I would rather you go use IPCOP.  Throw on the Sesame Street
theme on your favorite 45 player and don't look back.

Good day.


Re: [pfSense-discussion] Unfork m0n0wall

2005-11-27 Thread Chris Buechler

Colin Smith wrote:


Also, it is my understanding that Scott and Chris originally forked because of 
Manuel's (obvious) resistance to taking his project in an entirely new 
direction. Few if any bridges were burned. It most certainly was not an 'ego 
thing'.

 



I won't bother responding to most of this, but I will say this much.  
Someone emailed Manuel (m0n0wall founder and primary developer) and me 
(primary m0n0wall list poster and doc writer, as well as co-founder of 
this project) suggesting we merge the projects and not split efforts.  
Manuel replied before I got a chance to, and he's on the same page as 
us.  Paraphrasing what Manuel said, the goals of the project are 
significantly different enough that it makes sense to keep them 
separate.  m0n0wall's focus on embedded platforms leaves it with a file 
system that isn't suitable for a packaging system, and while it might 
change slightly for version 1.3, it will still not be suitable for most 
packages because it will never be a normal file system. 

Manuel is a stickler for doing things the *right* way, which is what has 
made m0n0wall a killer project.  But that's also left a lot of users out 
in the cold, without the ability to do things they want or need to do.  
Manuel's stance is these things don't belong on a firewall (whatever 
they might be).  And I agree.  Things like ntop, various network 
management tools, and all kinds of similar things, don't belong on a 
firewall in an ideal network environment.  But, when you look at a 
network that only has maybe 3-5 machines, or maybe even up to 10-20, 
segregating these services leaves you in a situation where you have more 
servers and administrative machines than end user machines (or at least 
an unacceptably expensive ratio).  It's better to have these things on 
the firewall than to not have them at all, when you have no other 
feasible options (for non-technical reasons, usually cost). 

In short, Manuel agrees with what we're doing, we obviously agree with 
what we're doing, and there's absolutely no animosity between the 
projects, so there really isn't any room for argument. 





Re: [pfSense-discussion] Unfork m0n0wall

2005-11-27 Thread Lists
plainly said if you unforked pfSense and M0n0wall you would essentially
not have alot of what both offer because then they would not be reaching
such diverse goals, both projects are good, and have solidbasis to
exists, its like saying unfork BSD... theres a purpose for them to
exists, and other ides will grow from these projects im sure, even a NAS
system has grown from m0n0wall. If you dont like what they are doing
create your own, or add to whats missing for what you need, hence the
reason i track both projects and have a customized build.

On Sun, 2005-11-27 at 16:42 -0500, Chris Buechler wrote:
 Colin Smith wrote:
 
 Also, it is my understanding that Scott and Chris originally forked because 
 of Manuel's (obvious) resistance to taking his project in an entirely new 
 direction. Few if any bridges were burned. It most certainly was not an 'ego 
 thing'.
 
   
 
 
 I won't bother responding to most of this, but I will say this much.  
 Someone emailed Manuel (m0n0wall founder and primary developer) and me 
 (primary m0n0wall list poster and doc writer, as well as co-founder of 
 this project) suggesting we merge the projects and not split efforts.  
 Manuel replied before I got a chance to, and he's on the same page as 
 us.  Paraphrasing what Manuel said, the goals of the project are 
 significantly different enough that it makes sense to keep them 
 separate.  m0n0wall's focus on embedded platforms leaves it with a file 
 system that isn't suitable for a packaging system, and while it might 
 change slightly for version 1.3, it will still not be suitable for most 
 packages because it will never be a normal file system. 
 
 Manuel is a stickler for doing things the *right* way, which is what has 
 made m0n0wall a killer project.  But that's also left a lot of users out 
 in the cold, without the ability to do things they want or need to do.  
 Manuel's stance is these things don't belong on a firewall (whatever 
 they might be).  And I agree.  Things like ntop, various network 
 management tools, and all kinds of similar things, don't belong on a 
 firewall in an ideal network environment.  But, when you look at a 
 network that only has maybe 3-5 machines, or maybe even up to 10-20, 
 segregating these services leaves you in a situation where you have more 
 servers and administrative machines than end user machines (or at least 
 an unacceptably expensive ratio).  It's better to have these things on 
 the firewall than to not have them at all, when you have no other 
 feasible options (for non-technical reasons, usually cost). 
 
 In short, Manuel agrees with what we're doing, we obviously agree with 
 what we're doing, and there's absolutely no animosity between the 
 projects, so there really isn't any room for argument. 
 
 



RE: [pfSense-discussion] Unfork m0n0wall

2005-11-27 Thread Bennett
First off, let me apologize if I was too offensive.  I wasn't
trolling--that was my imagination playing devil's advocate, and meant to
be rhetorical.  As I am beginning to understand the fork, these wild
ideas have no justification (well, maybe one or two still do...).  :)

Chris Buechler wrote:
 m0n0wall's focus on embedded platforms leaves it with a file
 system that isn't suitable for a packaging system, and while
 it might change slightly for version 1.3, it will still not
 be suitable for most packages because it will never be a
 normal file system. 

This answers one of my biggest questions about the fork.  I've been
fixated on the package system (though my previous mention of it was
brief), thinking it was a solution for both projects.  I had envisioned
moving everything that isn't a core feature into an optional module.
Instead of m0n0wall is too resource-intensive to run on microsystem X,
you get m0n0wall will run on microsystem X with features A, B, and C,
but not D.  I wasn't aware that m0n0wall's file system makes this whole
idea infeasible.  Perhaps I should troll the m0n0wall list...  :)

Still, I think moving EVERY non-core feature (e.g., captive portal, load
balancing, CARP, even VPN) into an optional module is the way to go for
pfSense.  Then, only the features a user needs are installed.  The other
features aren't there, and so they can't be used to comprise the system.
In addition, a robust package system would open the door for third-party
development of items beyond the scope of a firewall, like antispam and
antivirus filters, or even just simple packages end-users could write to
customize their system, like automatically dialing a pager number if the
WAN goes down.  As the community grows, there could even be some sort of
certification for modules that pass security tests so users know which
modules are deemed safe.

But I digress.  Let me get back to the original thread.

I also got the impression from the pfSense FAQs (yes, I did do some
research before posting) that there was a bit more code sharing than
there actually is, so I thought the projects were not quite as separate
as they are.  I understand now that that is not the case, and hence my
concerns about patchy code were unjustified.  Furthermore, Colin said
it's a one-way street (which I assume goes from pfSense to m0n0?), so
there's no duplicated work since m0n0wall can incorporate, say, the
certificate manager that pfSense has already developed.  (But the
workforce/testers are still divided into whatever their respective
ratios are.)

You have all done a good job in answering my concerns.  Very
enlightening.  And thanks for your speedy replies.  It shows the pfSense
community is alive and active, which further sets my mind at ease.  I'll
hold off on responding to everyone's comments individually, except
please let me do one intentional troll:

TROLL
Scott, you've got it all wrong.  In my overactive imagination,
unreasonable jerks would refer to Manuel while you would be one of the
short-sighted egoists.  :)
/TROLL

--Bennett


RE: [pfSense-discussion] Unfork m0n0wall

2005-11-27 Thread Espen Johansen
I think you need to read thru the code.
What is pfsense/monowall ? In simple terms it's freebsd 6.x and freebsd 4.x
with a web gui and some minor patches. Each creates a bunch of firewall
rules for either ipfilter (m0n0) or pf (pfsense).
The OS is more or less a stock freebsd with a bunch of stuff removed, pluss
a different installer and some minor patches.
So the only security flaws you will find will in most cases be rules that
are created wrong and thus exposes the firewall in some unfortunate way (I
would say that this will be very rare). Or it will be exposed services like
ssh or the minihttpd or whatever package(s) you install. There is a reason a
lot of addons are packages and not in the base.
So basically you have a OS and some addons, and on top you have a GUI so
that the end user will not have to play with a bunch of config files.
Everything PFsense does can be done with freebsd6 and programs available for
it.
If you read thru the code you would know this by now.
And merging m0n0 that creates a ipfilter config with pfsense that creates a
pf config would not be smart at all.

-lsf

 -Original Message-
 From: Bennett [mailto:[EMAIL PROTECTED]
 Sent: 27. november 2005 08:58
 To: discussion@pfsense.com
 Subject: [pfSense-discussion] Unfork m0n0wall
 
 I've been looking for an open source firewall.  I found m0n0wall, IPCop,
 and few others.  I thought m0n0wall was great, but then I came across
 pfSense, and it was even better, picking up where m0n0wall left off.
 
 However, this fork of m0n0wall is a bit unnerving.  Yes, I know you have
 radically different goals, but you also have similar goals and will
 face similar issues.  This fork detracts from BOTH projects because
 you've effectively cut the manpower for each project roughly in half
 (since everyone could be working on one project instead of two) while
 doubling the work (since each project will be duplicating work).  And
 let's not forget the user base is split, too, so each project has half
 the support and testers.
 
 Even if you're sharing some code so you're not both reinventing the
 wheel, you still have to merge disjoint code as m0n0wall tries to add
 pfSense enhancements into their code and vice versa.  As a programmer, I
 know what all this patching is going to do to the code.  As you exchange
 code back and forth, m0n0wall is going to have some pfSense-specific
 code that they'll patch to retrofit into m0n0wall and then give it back
 to pfSense who will add some patches to the m0n0wall
 patches...Eventually, this bloated mess of patches is so convoluted that
 no one knows how it works and you're on your way to security holes and
 compromised networks.
 
 Thus, either you've doubled the work with half the developers/testers or
 you've doomed the code to buggy patches on top of patches.  This makes
 me question the founders of pfSense...Did they not foresee this when
 they decided to fork?  And these short-sighted individuals are who I am
 counting on to protect my valuable network?  Or is this some sort of ego
 thing?  Did the other m0n0wall programmers hurt their feelings so they
 ran off and made their own little project?  Or maybe the m0n0wall
 developers are unreasonable jerks and so pfSense politely forked rather
 than bash heads.  But those unreasonable developers are the ones who
 wrote the original m0n0wall code that you're using...
 
 It seems a wiser course of action would be to NOT FORK and instead focus
 on incorporating an enhanced packaging system within m0n0wall that would
 allow users to install/uninstall features on-demand.  Thus,
 m0n0wall/pfSense could still be installed on embedded systems with a
 streamlined core, and then expanded with additional functionality as
 needed.  (You could have your cake and eat it, too, but without the
 fork).  ;)  In addition, removing unused features will help minimize
 exposure to security holes.
 
 So, having said all that, why should I consider pfSense for my firewall
 when it's written by a bunch of unreasonable jerks and short-sighted
 egoists who are churning out a insecure, bloated spaghetti?  (Please
 don't get me wrong--I plan on using pfSense to secure my network and
 most likely at least two of my clients' networks, too.  I'm just looking
 for answers to quell my concerns.)
 
 --Bennett



RE: [pfSense-discussion] Unfork m0n0wall

2005-11-27 Thread Bennett
Bill Marquette wrote:
 I've got a better idea.  After all you've said, why are you 
 choosing pfSense over m0n0?  What have we done right that's 
 made you want to choose pfSense over m0n0?  I assume we've 
 done _something_ right for you to choose an alpha project 
 over a released product.

Actually, I AM going with m0n0wall at one of my clients, because: (1)
they're running a Pentium with 32MB (which I suppose only serves to
justify the fork), and (2) because pfSense is still alpha.  Once pfSense
is stable, I'll probably switch them to pfSense because pfSense has a
certificate manager for their VPN and CARP for failover that they
requested.

As for me at home, I'm currently choosing pfSense over m0n0wall for
largely superficial reasons, like the certificate manager and better
aliases.  However, I'm also thinking long-term here.  I recognize that
m0n0wall will always be more limited than pfSense because of its more
restrictive requirements.  Hence, I expect pfSense will ultimately have
more features that I anticipate my clients will need.  I run it at home
so I can muck up my own network before screwing up my clients'.

I'd like to know that the product I plan on convincing my clients to use
is going to be around in few years.  That's why I posted initially.  I
wanted to know more about the fork.  I wanted to know that it wasn't
some half-baked spin-off that will never come to fruition, and possibly
even killing off m0n0wall by splitting the community so thin that
neither project has the support it needs to continue.  In a nutshell,
THAT was my concern, and, thanks to your responses, I know this is NOT
the case.

Again, thank you all for your replies.

--Bennett


RE: [pfSense-discussion] Unfork m0n0wall

2005-11-27 Thread Bennett
Espen Johansen wrote:
 I think you need to read thru the code.
...
 If you read thru the code you would know this by now.

Surely you're joking.  Are you saying anyone who has questions about
m0n0wall or pfSense should just read the code instead asking questions
to the people who actually wrote the code?  Who exactly do you think is
using pfSense?  Yes, I am a programmer, but my Unix experience is
limited to 1 semester in college many moons ago where I wrote a
simplistic client/server daemon, and my network programming experience
is limited to sockets.  I could probably figure everything out
eventually, but you're also suggesting that I read the source to
m0n0wall, which I don't plan on using, and compare it to pfSense.  So
now I'm supposed to read the source to every system I plan to use, plus
ones I'm not planning to use before I ask questions about any of them?
If I did all that, I would wouldn't have time to troll discussion
groups, would I?  (Or am I obtuse and that's the whole point?)

--Bennett