Peter Memishian writes:
> 
>  > In any event, I wasn't arguing against a strict default.  I was
>  > arguing against violating explicit admin-specified filtering policy
>  > merely because some local service needing an exemption is enabled.
>  > Explicit configuration of filters should trump services.
> 
> This was my thinking as well -- but it seems to be an intentional design
> decision with per-socket IPsec policy overrides.

Assuming that we're going to keep these eerily similar things
distinct, I think that overriding IPsec policy and IPsec-related
filtering could be a separate concern from overriding IP Filter rules.

At least with IP Filter, the whole point is to drop (or possibly
modify and redirect) packets based on the packet contents.  It's a
general purpose "what things do I allow in networking?" issue.

With IPsec, though, it's a means to an end: setting up IPsec policy.
It's not the first place I'd expect a user to land if he was trying to
block particular services in general.

Thus (maybe) there's a distinction to draw between allowing services
to configure one but not the other.

>  The argument that the
> admin both set the original policy and started the application that
> conflicted with it (and thus got what he wanted with minimal fuss) made
> some sense to me back in simpler times, but with the level of complexity
> and feature integration today, I find it hard to defend.

+1

-- 
James Carlson, Solaris Networking              <james.d.carlson at sun.com>
Sun Microsystems / 35 Network Drive        71.232W   Vox +1 781 442 2084
MS UBUR02-212 / Burlington MA 01803-2757   42.496N   Fax +1 781 442 1677

Reply via email to