Tony Nguyen writes:
> Hi Darren and all,
> 
> As part of the Visual Panels project,
> 
> http://opensolaris.org/os/project/vpanels
> 
> we're proposing a generic firewall framework for Solaris. The framework 
> utilizes IPfilter to provide a simple mechanism to configure a firewall 
> on Solaris systems.

This looks pretty nifty.  I have a few high-level questions about it,
though:

  - There are a bunch of open source firewall construction toolkits
    and 'ease of use' GUIs around for doing this sort of work,
    including several for IP Filter.  (I think FirewallBuilder is a
    popular one, but there seem to be others as well, and I'm no
    expert in that marketplace.  I've always just edited the files by
    hand.)

    I didn't see any mention of these other systems in this document.
    Would it be possible to add a section that addresses how this new
    feature compares to one or two of the known popular existing
    tools, and (longer term) how we plan to keep ours viable and what
    issues users may have in transitioning over from one of the
    others?

  - Related to that: are there any standards (formal or otherwise) for
    policy rule languages?  It seems to me that having consistent
    policy rules across multiple machines (not just Solaris) would be
    an important goal for administrators, and being able to speak some
    common language would be an important step to achieving that.

    If no viable standards exist, and we don't want to create one for
    some reason, is it at least possible to synchronize policy among
    cooperating Solaris machines?  I see only "system-wide" as the
    largest grouping described in the document.

    Has any investigation been done on interoperability and deployment
    with multiple machines?

  - One of the big high-level problems with IP Filter (as it is with
    _all_ firewall software) is visualizing how the rules perform.
    That is, being able to ask "what if?" questions concerning traffic
    from other hosts.  (Something like: "which rules would match if I
    received a TCP SYN packet for destination address a.b.c.d and port
    25 from host foo.bar.com, and what would be the resulting action
    taken by the system?")

    As someone who uses this stuff frequently, this is often a sore
    point.  It can be hard to determine whether you've gotten
    everything just right unless you log into some remote system and
    start attacking your original machine.

    Would it be possible to have something like "tcpdmatch" for this
    tool?

-- 
James Carlson, Solaris Networking              <james.d.carlson at sun.com>
Sun Microsystems / 35 Network Drive        71.232W   Vox +1 781 442 2084
MS UBUR02-212 / Burlington MA 01803-2757   42.496N   Fax +1 781 442 1677

Reply via email to