Darren Reed wrote: > On 10/28/08 01:25, Tony Nguyen wrote: >> Renee Danson wrote: >> >>> Apologies for the delayed response... >>> >>> Thanks for reporting on our conversation, Tony; it's a good summary. >>> >>> On Wed, Oct 22, 2008 at 11:41:46AM -0700, Tony Nguyen wrote: >>> >>> >>>> Tony Nguyen wrote: >>>> >>>> >>>>> I had a conversation with Renee. As far as I know, a NWAM location has >>>>> an associated IPfilter policy that would be applied when the location is >>>>> activated. >>>>> >>>>> The long term solution should store a location's associated >>>>> configuration in a SMF profile. In this model, NWAM can consume >>>>> host-based firewall by delivering a location's IPfilter policy as a set >>>>> of firewall settings for all network services. Host-based firewall >>>>> simply obtains the firewall policies from the active profile and >>>>> generate the corresponding rules. >>>>> >>>>> The short term solution currently delivers the IPfilter configuration, a >>>>> set of rules in files to be loaded when a location is activated. The >>>>> team agreed to use the host-based firewall custom mode to activate >>>>> location specific IPfilter rules, setting Global policy to custom and >>>>> specifying the rules file. The other alternative is to >>>>> translate/generate firewall settings for all services when a location is >>>>> chosen. This would better a better integration with host-based firewall >>>>> but requiring a secondary storage for different locations' policies. >>>>> >>>>> >>>>> >>>> A follow up thought. Avoid using the host-based firewall custom mode is >>>> preferred since that would prevent user from actually configure >>>> host-based firewall. I don't know how location IPfilter configuration is >>>> generated but an idea is to store the configuration as a set of >>>> services' firewall policy. >>>> >>>> >>> I'd been thinking along these lines, as well. When I first looked at >>> your design, I was thinking about tighter integration, where nwam was >>> able to take advantage of the UI you're creating, as well as the under- >>> the-hood configuration details; and as we discussed, the challenge there >>> is having the config data stored somewhere other than in the service >>> properties, so that it can be applied when NWAM decides to activate the >>> location, rather than immediately. >>> >>> But even if we can't initially use your UI, we can present the user >>> with equivalent options through the nwam UI, and then apply appropriate >>> properties at the right time so that the host-based firewall can consume >>> them and generate the appropriate ipfilter policy. >>> >>> Is that what you had in mind? >>> >>> >> Hi Renee, >> >> Yes, applying the appropriate set of property values for the active >> location is probably the best workaround until Enhanced Profiles is >> available. W.r.t the UI, ideally, NWAM UI would be integrated into >> Visual Panels and the Firewall UI is enhanced to support NWAM locations. >> We all know having duplicate functionality isn't appropriate but it's >> probably too late to undo the UI decision. >> > > At the moment the NWAM locations discussion seems to be more of less > restricted to enforcing network access policies based on which network > one connects to. > > Stepping beyond that, is it possible for NWAM locations to also apply > a SMF template that results in services being enabled/disabled as > appropriate? The current SMF profiles feature may be the solution. See svccfg(1M), smf(5) and examples in /var/svc/profile.
> So, for example, if I connect to SWAN then I probably want NIS/LDAP > to be enabled but when I connect at home, I want them disabled. > > This can effectively be mimic'd through the correct application of > packet filters but a more thorough application of the security policy > should result in the service being disabled. > > Does this fall within the balliwack of the work being done by those > in the SMF group or NWAM? If the desired long term goal is applying different sets of enabled/disabled services for different locations, presumably through the current SMF profile feature, is it reasonable to dedicate packet filter management to host-based firewall and prevent possible user confusion? -tony