James Carlson wrote:
> Tony Nguyen writes:
>> James Carlson wrote:
>> - support IPfilter configuration generated by other tools. Our framework 
>> should satisfy the needs of most casual users. However, advanced users 
>> can always use tools such as FirewallBuilder to generate IPfilter rules 
>> that can be consumed by the proposed framework.
> 
> They could import those rule sets only as batches of custom IP Filter
> rules, and not as higher level policies, right?

Correct.

> 
>>>     If no viable standards exist, and we don't want to create one for
>>>     some reason, is it at least possible to synchronize policy among
>>>     cooperating Solaris machines?  I see only "system-wide" as the
>>>     largest grouping described in the document.
>> Synchronize? Do you mean configuring a policy and populate that policy 
>> to other machines?
> 
> Yes.  Suppose I own more than one machine at a single site.  I'd like
> to make sure that my machines at least have a consistent set of base
> policies for my site.  I may need to "tweak" one or two of the
> machines for the needs of special applications, but I certainly don't
> want to redo all of this configuration work on each one or (worse)
> deal with rolling out changes across the machines by logging into each
> one, entering a GUI, and redoing a series of mouse clicks.
> 
> If I recall correctly, managing multiple machines was one of the (now
> lost) features of Sun Screen.
> 

understand

>>>     Has any investigation been done on interoperability and deployment
>>>     with multiple machines?
>> Can you clarify?
>>
>> I've run it on my desktop and multiple lap machines and some preliminary 
>> tests with CIFS server/client.
> 
> No, that's not what I meant.
> 
> I meant the ability of a system administrator to set the same or
> similar policies on multiple machines; not just Solaris, but AIX,
> Linux, BSD, Windows -- all the things a real site would likely have.
> 
> Especially in security, having consistent policies is a key benefit.
> That's why (for instance) many of our customers use either sudo or a
> third party product.  It's not that they don't recognize the benefits
> of our more flexible product or better integration, but that they
> value consistency across platforms, which we don't deliver, and are
> often willing to pick a less-capable product to get it.
> 
> This goes back to the question regarding comparisons with other
> available solutions: who is the user, and how do the needs among users
> differ?
> 
>>>     Would it be possible to have something like "tcpdmatch" for this
>>>     tool?
>>>
>> Very good suggestion and would be really helpful for testing. At this 
>> point, I don't think we'll include this in our initial integration but 
>> it will be on my list of enhancements.
> 
> OK; sure.
> 
> Enrico Perla writes:
>>> I believe such standard doesn't yet exist since IPfilter rules are quite
>>> flexible. Darren will correct if I'm wrong :^)
>>>
>> I guess (James will correct if I miss something :P) that the idea here is to
>> create an high-level meta-language. Pretty much what happens with binary
>> analysis: you create a meta-language and an interpreter for that language
>> and than you just have to "port" the different machine codes (UltraSPARC,
>> x86, PPC, etc) to that meta-language and you can investigate them with
>> standard (and tested) primitives.
> 
> Exactly.  The policy rules that this project proposes are already such
> a language, although not exactly expressed that way.
> 
> Notably, it's a restricted language.  If you want to do something
> "fancy," you have to supply custom IP Filter expressions to do it.  I
> don't expect a common language to do everything (nice if it could, but
> not expected), but there ought to be parts that everyone can do or
> there's not much point in creating a higher-level language.
> 
>> It might be worth a try for not too obscure configurations.
>> The advantage is that the tool would be quickly ported to all the systems,
>> it could understand the state of different boxes with different operating
>> systems on them and it might be very handy in migration : users with a
>> working configuration on FreeBSD or Linux might just import that
>> configuration in the framework, install OpenSolaris and export it.
> 
> Yes.  In fact, that's what some of the other firewall-building systems
> have already done.  Part of my question here is whether that'd ever be
> appropriate for the tool being proposed, and what the target user
> looks like.
> 
> If the answer is "this isn't for people with more than one or two
> systems to manage, or with non-Solaris systems on hand" then that's
> fine.  I think it helps to have a clear scope, though.
> 

Most of the discussion is around the target users and project scope. 
I'll revised the document to clarify those points.

The proposed project aims to provide framework that enables non-admin 
users to configure firewall on their OpenSolaris laptops and/or 
desktops. The Visual Panels project relies on this framework to provide 
a firewall configuration tool. Our goal here isn't a general firewall 
configuration tool which FirewallBuilder is a good solution though quite 
complex, IMHO :^)

Policy synchronization across multiple machines is a really good 
suggestion that I'll investigate.

Thanks you both for the valuable comments,
-tony

Reply via email to