> Our approach to the first problem lies with the No-Net Location.  When first
 > coming up (i.e. upon enable of the nwam service), before a location has been
 > selected, the No-Net location will be activated.  This location will install
 > strict security policy, only allowing through the traffic necessary for
 > configuration (e.g. dhcp, router discovery, dns, ldap).
 > 
 > There are several ways to implement this policy:
 > 
 >   1) create ipsec rules that only allow packets related to the needed
 >      services through
 > 
 >   2) create ipfilter rules that do the same
 > 
 >   3) create ipsec rules that block everything, and modify the apps that need
 >      to pass traffic (e.g. dhcpagent) to set up bypass rules for themselves
 > 
 >   Option 3 is the cleanest in terms of the policy that needs to be created;
 >   the down side, though, is that several different daemons/apps will need to
 >   be modified to set up bypass policy.

Perhaps I'm misunderstanding part of the proposal, but having hardcoded
policy in applications that cannot be overridden (e.g., by an admin who
never wants to let DHCP through for a certain environment) seems bad.
Or are there IPsec commands that would allow the daemon/app overrides to
themselves be overridden?  Also, can the daemon/app overrides be seen
using some admin tool?

--
meem

Reply via email to