Darren Reed wrote:
> On 10/28/08 01:25, Tony Nguyen wrote:
>> Renee Danson wrote:
>>   
>>> Apologies for the delayed response...
>>>
>>> Thanks for reporting on our conversation, Tony; it's a good summary.
>>>
>>> On Wed, Oct 22, 2008 at 11:41:46AM -0700, Tony Nguyen wrote:
>>>   
>>>     
>>>> Tony Nguyen wrote:
>>>>     
>>>>       
>>>>> I had a conversation with Renee. As far as I know, a NWAM location has 
>>>>> an associated IPfilter policy that would be applied when the location is 
>>>>> activated.
>>>>>
>>>>> The long term solution should store a location's associated 
>>>>> configuration in a SMF profile. In this model, NWAM can consume 
>>>>> host-based firewall by delivering a location's IPfilter policy as a set 
>>>>> of firewall settings for all network services. Host-based firewall 
>>>>> simply obtains the firewall policies from the active profile and 
>>>>> generate the corresponding rules.
>>>>>
>>>>> The short term solution currently delivers the IPfilter configuration, a 
>>>>> set of rules in files to be loaded when a location is activated. The 
>>>>> team agreed to use the host-based firewall custom mode to activate 
>>>>> location specific IPfilter rules, setting Global policy to custom and 
>>>>> specifying the rules file. The other alternative is to 
>>>>> translate/generate firewall settings for all services when a location is 
>>>>> chosen. This  would better a better integration with host-based firewall 
>>>>> but requiring a secondary storage for different locations' policies.
>>>>>
>>>>>       
>>>>>         
>>>> A follow up thought. Avoid using the host-based firewall custom mode is 
>>>> preferred since that would prevent user from actually configure 
>>>> host-based firewall. I don't know how location IPfilter configuration is 
>>>> generated but an idea is to store the configuration as a set of 
>>>> services' firewall policy.
>>>>     
>>>>       
>>> I'd been thinking along these lines, as well.  When I first looked at
>>> your design, I was thinking about tighter integration, where nwam was
>>> able to take advantage of the UI you're creating, as well as the under-
>>> the-hood configuration details; and as we discussed, the challenge there
>>> is having the config data stored somewhere other than in the service
>>> properties, so that it can be applied when NWAM decides to activate the
>>> location, rather than immediately.
>>>
>>> But even if we can't initially use your UI, we can present the user
>>> with equivalent options through the nwam UI, and then apply appropriate
>>> properties at the right time so that the host-based firewall can consume
>>> them and generate the appropriate ipfilter policy.
>>>
>>> Is that what you had in mind?
>>>   
>>>     
>> Hi Renee,
>>
>> Yes, applying the appropriate set of property values for the active 
>> location is probably the best workaround until Enhanced Profiles is 
>> available. W.r.t the UI, ideally, NWAM UI would be integrated into 
>> Visual Panels and the Firewall UI is enhanced to support NWAM locations. 
>> We all know having duplicate functionality isn't appropriate but it's 
>> probably too late to undo the UI decision.
>>   
>
> At the moment the NWAM locations discussion seems to be more of less
> restricted to enforcing network access policies based on which network
> one connects to.
>
> Stepping beyond that, is it possible for NWAM locations to also apply
> a SMF template that results in services being enabled/disabled as
> appropriate?
The current SMF profiles feature may be the solution. See svccfg(1M), 
smf(5) and examples in /var/svc/profile.

> So, for example, if I connect to SWAN then I probably want NIS/LDAP
> to be enabled but when I connect at home, I want them disabled.
>
> This can effectively be mimic'd through the correct application of
> packet filters but a more thorough application of the security policy
> should result in the service being disabled.
>
> Does this fall within the balliwack of the work being done by those
> in the SMF group or NWAM?
If the desired long term goal is applying different sets of 
enabled/disabled services for different locations, presumably through 
the current SMF profile feature, is it reasonable to dedicate packet 
filter management to host-based firewall and prevent possible user 
confusion?

-tony

Reply via email to