Re: [pfSense-discussion] Re: Newbie Q: security of php on perimeter firewall

2005-11-28 Thread Lists
Id say this is partially right, any misconfigured firewall can be
insecure and allow the php interface to be available, there is currently
no way to turn off/on the web process for administration either. and
currently you cant bind the process to listen on a specific interface.
So a default add rule allowing http/https in from wan might expose you.
pfSense is currently a default stance from what I can see. but it is
functional. Youd imagine by default it should be locked down a bit more.
its still a project that deserves merit, and its also why i build my own
version. Ive additional tweaks, not found in pfSense, though it is a
solid base to start from. Somethings in their simpler form need to be
tightened up, its alpha code so theres noway to tell what the plans are
for the future. make some suggestions to the list, see what happens. Im
sure there are a few tweaks that can be applied to lock down the
system a bit better. the web server is thttpd, but i see lighttpd also
in the cvs tree so they might be migrating to it. 


On Mon, 2005-11-28 at 13:30 +0500, sai wrote:
 While PHP does have some problems, it is mostly PHP software that is
 poorly written and so vulnerable. The PHP interface is not available
 to everyone (only admins) so even if PHP is vulnerable you have to get
 to it first.
 The webserver is not Apache but something much smaller...forget the name.
 
 If you didnt have an easy to use web interface, but had a cli, the
 security problems associated with mistakes made in configuration etc
 would be quite major.
 
 sai
 
 On 11/27/05, Sanjay Arora [EMAIL PROTECTED] wrote:
  Hi all
 
  Just joined the list. Am mostly using IPcop  other Linux flavours for
  perimeter firewalling. Needed ISP WAN-link balancing  failover, hence
  my search for a new option. Also have started experimenting with
  freebsd, so choice was limited to either freebsd or linux.
 
  Have downloaded the iso...will install on a Pentium III 550 MHz and
  revert with feedback within the week.
 
  My thought is that any perimeter firewall should be a minimal design.
  Would not having php on pfsence make it vulnerable to php
  vulnerabilities, as well as those of apache. Haven't exactly tried it,
  so really haven't the right to comment on it but would the community
  please comment on this and other similar issues inherent in this
  architecture design?
 
  With best regards  best wishes for the project.
  Sanjay.
 
 
 



[pfSense-discussion] pfsense update file damaged??

2005-11-28 Thread dny
the latest full update i can successfully download from pfsense.com/old is .90a
all version above that i download always gives error something.
i cant open the files after it's download.

i use getright to download.
coz, my connection is quite ugly here.
can never download anything 50meg without download manager to do resuming...

is it problem with me only?
or is the file really is damaged?

tnxrgds,
dny

--- http://bloglines.com/public/bacaan --- harini udah baca blom?

... but that which cometh out of the mouth,
this defileth a man.   Mat 15:11


Re: [pfSense-discussion] Re: Newbie Q: security of php on perimeter firewall

2005-11-28 Thread Bill Marquette
On 11/28/05, Lists [EMAIL PROTECTED] wrote:
 system a bit better. the web server is thttpd, but i see lighttpd also
 in the cvs tree so they might be migrating to it.

Actually it's mini_httpd (although we do have thttpd in the tree - not
sure why).  And yes, we're moving to lighttpd for FastCGI support
which should (and does) speed up the webGUI interface.

--Bill


Re: [pfSense-discussion] pfsense update file damaged??

2005-11-28 Thread Brian
Make sure you are not accidently choosing an ISO image from the firmware 
update page.  I did that by mistake once and it came back telling me the 
image was corrupt.  I then chose the proper image and all was well.


Scott Ullrich wrote:

No the images are not corrupted.   Where do you get the error, etc.


On 11/28/05, dny [EMAIL PROTECTED] wrote:


the latest full update i can successfully download from pfsense.com/old is .90a
all version above that i download always gives error something.
i cant open the files after it's download.

i use getright to download.
coz, my connection is quite ugly here.
can never download anything 50meg without download manager to do resuming...

is it problem with me only?
or is the file really is damaged?

tnxrgds,
dny

--- http://bloglines.com/public/bacaan --- harini udah baca blom?

... but that which cometh out of the mouth,
this defileth a man.   Mat 15:11








Re: [pfSense-discussion] Re: Newbie Q: security of php on perimeter firewall

2005-11-28 Thread Scott Ullrich
There are still a few other small ones.   In paticular with the status
queues screen + fast cgi.   When we kill pfctl somehow its signal is
being passed up and killing off the fast-cgi handler.

Woops.

On 11/28/05, Bill Marquette [EMAIL PROTECTED] wrote:
 On 11/28/05, Lists [EMAIL PROTECTED] wrote:
  well hell maybe i should do devel work for pfsense cause ive already
  migrated my build to lighttpd :) then when browsing the cvs trees
  noticed it was in there

 We had some problems with lighty when we first imported it - firmware
 upgrades didn't work on embedded due to a bug in their handling of
 large POSTs.  That's been fixed in a recent release, so we're moving
 back (that was the only bug that I know of, but it was kinda big ;-P)

 --Bill



RE: [pfSense-discussion] Re: Newbie Q: security of php on perimeter firewall

2005-11-28 Thread Paul M. Impellizzeri
Title: Re: [pfSense-discussion] Re: Newbie Q: security of php on perimeter
firewall








Is there any way we can reboot the mail
server now? It is running at 100% cpu but they are services that should
normally be runningI think we need to shake it out.





Paul











From: Scott Ullrich
[mailto:[EMAIL PROTECTED] 
Sent: Monday, November 28, 2005
1:27 PM
To: discussion@pfsense.com
Subject: Re: [pfSense-discussion]
Re: Newbie Q: security of php on perimeter firewall





There are
still a few other small ones. In paticular with the status
queues screen + fast cgi. When we kill pfctl somehow its signal is
being passed up and killing off the fast-cgi handler.

Woops.

On 11/28/05, Bill Marquette [EMAIL PROTECTED] wrote:
 On 11/28/05, Lists [EMAIL PROTECTED] wrote:
  well hell maybe i should do devel work for pfsense cause ive already
  migrated my build to lighttpd :) then when browsing the cvs trees
  noticed it was in there

 We had some problems with lighty when we first imported it - firmware
 upgrades didn't work on embedded due to a bug in their handling of
 large POSTs. That's been fixed in a recent release, so we're moving
 back (that was the only bug that I know of, but it was kinda big ;-P)

 --Bill










avast! Antivirus: Inbound message clean.
Virus Database (VPS): 0547-5, 11/26/2005Tested on: 11/28/2005 1:27:38 PMavast! - copyright (c) 1988-2005 ALWIL Software.




avast! Antivirus: Outbound message clean.
Virus Database (VPS): 0547-5, 11/26/2005Tested on: 11/28/2005 1:52:52 PMavast! - copyright (c) 1988-2005 ALWIL Software.






Re: [pfSense-discussion] Newbie Q: security of php on perimeter firewall

2005-11-28 Thread Chris Buechler

Sanjay Arora wrote:


Hi all

Just joined the list. Am mostly using IPcop  other Linux flavours for
perimeter firewalling. Needed ISP WAN-link balancing  failover, hence
my search for a new option. Also have started experimenting with
freebsd, so choice was limited to either freebsd or linux.

Have downloaded the iso...will install on a Pentium III 550 MHz and
revert with feedback within the week.

My thought is that any perimeter firewall should be a minimal design.
Would not having php on pfsence make it vulnerable to php
vulnerabilities, as well as those of apache. Haven't exactly tried it,
so really haven't the right to comment on it but would the community
please comment on this and other similar issues inherent in this
architecture design?

 



This part of the architecture has changed slightly from m0n0wall I 
believe, so if I go astray here, somebody kick me back into shape.  ;) 

Basically, you can't get to PHP without first being authenticated.  At 
this point, if you're authenticated, you have root access to the box.  
So who cares about any PHP vulnerabilities when you already have root 
access?  And, as others said, most PHP problems are from sloppy PHP 
code, not issues within PHP itself.  Besides, the ability to even 
attempt to login is restricted to LAN only by default, and if you're in 
a situation where you have to worry about what your internal users can 
attempt on the firewall, you can and should restrict that further.  It's 
not like PHP is doing the actual firewalling. 





Re: [pfSense-discussion] Newbie Q: security of php on perimeter firewall

2005-11-28 Thread Rainer Duffner

Chris Buechler wrote:


Sanjay Arora wrote:


Hi all

Just joined the list. Am mostly using IPcop  other Linux flavours for
perimeter firewalling. Needed ISP WAN-link balancing  failover, hence
my search for a new option. Also have started experimenting with
freebsd, so choice was limited to either freebsd or linux.

Have downloaded the iso...will install on a Pentium III 550 MHz and
revert with feedback within the week.

My thought is that any perimeter firewall should be a minimal design.
Would not having php on pfsence make it vulnerable to php
vulnerabilities, as well as those of apache. Haven't exactly tried it,
so really haven't the right to comment on it but would the community
please comment on this and other similar issues inherent in this
architecture design?

 



This part of the architecture has changed slightly from m0n0wall I 
believe, so if I go astray here, somebody kick me back into shape.  ;)
Basically, you can't get to PHP without first being authenticated.  At 
this point, if you're authenticated, you have root access to the box.  
So who cares about any PHP vulnerabilities when you already have root 
access?  And, as others said, most PHP problems are from sloppy PHP 
code, not issues within PHP itself.  Besides, the ability to even 
attempt to login is restricted to LAN only by default, and if you're 
in a situation where you have to worry about what your internal users 
can attempt on the firewall, you can and should restrict that 
further.  It's not like PHP is doing the actual firewalling.





As an addition to this:
If somebody doesn't like PHP on his firewall, he can just go back, 
install OpenBSD 3.8 and use vi to edit the rulesets and all the other 
configuration-options (VLANs, NAT, VPN etc. pp.).


Until there's a multi-user, multi-customer capable interface that allows 
several virtual firewalls to be administered by different 
clients/customers, I'm not going to worry about PHP-security one 
single second.


Firewalls, which are managed by a fat-client GUI also had their share of 
vulnerabilties precisely because the communication between the GUI and 
the firewall was badly designed or implemented.




cheers,
Rainer



Re: [pfSense-discussion] Unfork m0n0wall

2005-11-28 Thread Chris Buechler

Bennett wrote:


This answers one of my biggest questions about the fork.  I've been
fixated on the package system (though my previous mention of it was
brief), thinking it was a solution for both projects.  I had envisioned
moving everything that isn't a core feature into an optional module.
Instead of m0n0wall is too resource-intensive to run on microsystem X,
you get m0n0wall will run on microsystem X with features A, B, and C,
but not D.  I wasn't aware that m0n0wall's file system makes this whole
idea infeasible.  Perhaps I should troll the m0n0wall list...  :)

 



go for it.  You'd still get me replying to your messages, with the same 
stuff mostly.  :) 

But it'll never change to be a full blown hard drive install, and that's 
precisely where the split between the two is justified.  I personally 
think the embedded pfsense image should be dropped when/if m0n0wall gets 
on FreeBSD 6.  At that point, depending on where m0n0wall 1.3 ends up, 
it may very well be a wasted effort to put out an embedded image where 
that's m0n0wall's territory and where it excels. 




Still, I think moving EVERY non-core feature (e.g., captive portal, load
balancing, CARP, even VPN) into an optional module is the way to go for
pfSense.  Then, only the features a user needs are installed.  



Umm, no.  Virtually all of that is in-kernel stuff, so the only thing 
(most of it at least) you could add on would be the GUI pages.  No 
sense in separating that. 




I also got the impression from the pfSense FAQs (yes, I did do some
research before posting) that there was a bit more code sharing than
there actually is, so I thought the projects were not quite as separate
as they are.  I understand now that that is not the case, and hence my
concerns about patchy code were unjustified.  Furthermore, Colin said
it's a one-way street (which I assume goes from pfSense to m0n0?), 



No, the other way around actually.  I don't think a single line of 
pfsense code has made it into m0n0wall at this point.  That'll likely 
happen more once work on 1.3 gets going. 




so
there's no duplicated work since m0n0wall can incorporate, say, the
certificate manager that pfSense has already developed.  



well, not really for many of the things at this point.  the back end of 
the certificate manager is, iirc, almost as big as the entire m0n0wall 
image.  At any rate, it's far too large for the way the file system 
currently works.  that's true of many other things as well that I'm not 
recalling ATM.. 






Re: [pfSense-discussion] Newbie Q: security of php on perimeter firewall

2005-11-28 Thread Bill Marquette
On 11/28/05, Chris Buechler [EMAIL PROTECTED] wrote:
 This part of the architecture has changed slightly from m0n0wall I
 believe, so if I go astray here, somebody kick me back into shape.  ;)

*kick*

 Basically, you can't get to PHP without first being authenticated.  At
 this point, if you're authenticated, you have root access to the box.

These days, the auth is completely handled in PHP.  So it's certainly possible.

--Bill


Re: [pfSense-discussion] Newbie Q: security of php on perimeter firewall

2005-11-28 Thread Scott Ullrich
On 11/28/05, Bill Marquette [EMAIL PROTECTED] wrote:
 On 11/28/05, Chris Buechler [EMAIL PROTECTED] wrote:
  This part of the architecture has changed slightly from m0n0wall I
  believe, so if I go astray here, somebody kick me back into shape.  ;)

 *kick*

  Basically, you can't get to PHP without first being authenticated.  At
  this point, if you're authenticated, you have root access to the box.

 These days, the auth is completely handled in PHP.  So it's certainly 
 possible.

Yes, the moral of the story is to lock down the WebGUI to only trusted IP's.


Re: [pfSense-discussion] Newbie Q: security of php on perimeter firewall

2005-11-28 Thread Sanjay Arora
On Mon, 2005-11-28 at 15:43 -0500, Scott Ullrich wrote:
 On 11/28/05, Bill Marquette [EMAIL PROTECTED] wrote:
  On 11/28/05, Chris Buechler [EMAIL PROTECTED] wrote:
   This part of the architecture has changed slightly from m0n0wall I
   believe, so if I go astray here, somebody kick me back into shape.  ;)
 
  *kick*
 
   Basically, you can't get to PHP without first being authenticated.  At
   this point, if you're authenticated, you have root access to the box.
 
  These days, the auth is completely handled in PHP.  So it's certainly 
  possible.
 
 Yes, the moral of the story is to lock down the WebGUI to only trusted IP's.

Me?..I'm going to be paranoid and not allow access to WebGUI from the
WAN side at all. Anyways, the port 80 is going to be redirected to DMZ,
so its the only place anyone can get to playand hell ...thats where
php  apps...poorly coded or not...will be ;-((

However, I would like to make one request to the project design...users
be given easily configured  modular way to remove (i.e. not compile in)
services they do not want on the pfsense box, i.e. the ones that are not
basic to the basic firewall function  its GUI e.g. httpd, php  cgi.

Will pick up the thread again after evaluating myself.

With best regards.
Sanjay.




Re: [pfSense-discussion] Newbie Q: security of php on perimeter firewall

2005-11-28 Thread Dan Swartzendruber

At 07:32 PM 11/28/2005, you wrote:

Will pick up the thread again after evaluating myself.


Hmmm...  Psychiatrict problems?  :)





Re: [pfSense-discussion] Newbie Q: security of php on perimeter firewall

2005-11-28 Thread Scott Ullrich
On 11/28/05, Sanjay Arora [EMAIL PROTECTED] wrote:
 However, I would like to make one request to the project design...users
 be given easily configured  modular way to remove (i.e. not compile in)
 services they do not want on the pfsense box, i.e. the ones that are not
 basic to the basic firewall function  its GUI e.g. httpd, php  cgi.

Please see the thread titled Unfork m0n0wall.  In paticular, Chris's
response to removing non-base items.

Scott


Re: [pfSense-discussion] Newbie Q: security of php on perimeter firewall

2005-11-28 Thread Bill Marquette
On 11/28/05, Sanjay Arora [EMAIL PROTECTED] wrote:
 However, I would like to make one request to the project design...users
 be given easily configured  modular way to remove (i.e. not compile in)
 services they do not want on the pfsense box, i.e. the ones that are not
 basic to the basic firewall function  its GUI e.g. httpd, php  cgi.

Request evaluated.  W/out the webGUI, it wouldn't be pfSense, it'd be
FreeBSD.  So uhhh, just install FreeBSD and modify pf.conf by hand ;) 
You can then rewrite pfSense in shell and feel free not to include a
webGUI or use an XML config file (face it, it's not easy to parse that
in shell!).

Seriously, the whole point of pfSense is the GUI, if you don't want
it, and I mean this in the nicest way possible, you really really
don't want pfSense.

--Bill


Re: [pfSense-discussion] Newbie Q: security of php on perimeter firewall

2005-11-28 Thread Sanjay Arora
On Mon, 2005-11-28 at 20:13 -0600, Bill Marquette wrote:
 OK, apparently I can't read English...disregard (unless you choose not
 to of course).  Upon the 4th read of this, I deciphered the meaning,
 which wasn't all that difficult to figure out if I'd read it slower
 the first three times.  Erg.  *putting on the dunce cap*
 
 --Bill

Sorry Bill

Can't licence my proprietary cap to you ;-)

Best regards.
Sanjay.




Re: [pfSense-discussion] Unfork m0n0wall

2005-11-28 Thread Jim Thompson



Chris Buechler wrote:


Bennett wrote:


Perhaps I should troll the m0n0wall list...  :)


go for it.  You'd still get me replying to your messages, with the 
same stuff mostly.  :)


Chris won't be the only one, either.  :-)

But it'll never change to be a full blown hard drive install, and 
that's precisely where the split between the two is justified.  I 
personally think the embedded pfsense image should be dropped when/if 
m0n0wall gets on FreeBSD 6.  At that point, depending on where 
m0n0wall 1.3 ends up, it may very well be a wasted effort to put out 
an embedded image where that's m0n0wall's territory and where it excels.


depends on how much of the various packages (802.1x/WPA, plethora of 
wireless drivers, carp, altq, serial console, ...) are picked up in 
m0n0.   Each of these will serve to make m0n0 a larger, more complicated 
system, and Manuel will have to cut the baby somewhere.


So, I'd rather the embedded image (or at least the option to cut an 
embedded image) be kept.  Keeping it means testing it, too, so its 
likely that the image itself should be kept.


jim