On 08/19/08 14:12, Nicolas Williams wrote:
> On Tue, Aug 19, 2008 at 10:17:36AM +0200, Enrico Perla wrote:
>   
>> I guess (James will correct if I miss something :P) that the idea here is to
>> create an high-level meta-language. Pretty much what happens with binary
>> analysis: you create a meta-language and an interpreter for that language
>> and than you just have to "port" the different machine codes (UltraSPARC,
>> x86, PPC, etc) to that meta-language and you can investigate them with
>> standard (and tested) primitives.
>>     
>
> There's a low-level packet filtering language called BPF (BSD Packet
> Filter).  Like DTrace, it doesn't allow for looping -- you can only
> branch forward in a BPF program.
>
> That's probably too low-level a language for use by firewall management
> applications -- decoding a BPF program into rules that can be displayed
> is difficult, akin to decompiling a binary executable.
>   

BPF only gives you packet matching.
It doesn't tell you whether or not to do logging, drop (or pass) the 
packet, etc.
A firewall rule is more than just "does it match?"

Darren

-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<http://mail.opensolaris.org/pipermail/security-discuss/attachments/20080819/cd3131d4/attachment.html>

Reply via email to