Bill Sommerfeld wrote:
>> Maybe I should ask, what would you define as being an "overall
>> policy"?
> 
> A single coherent source for "what should be allowed on this system"
> which comes from a single origin.  You are likely to lose that coherance
> when you take the policy, salami-slice it, and spread it through a bunch
> of service properties.  

I think the desired use case for this feature requires two things:

1. An overall policy, specified once by the system administrator, that 
describes the maximum set of inbound and outbound network traffic that 
is allowed.

2. Individual per-service rules that are automatically added and removed 
when the corresponding services are enabled and disabled. These rules 
cannot override the restrictions in the overall policy.

In order for the administrator to make meaningful predictions about the 
behavior of the system, it's important for the per-service rules to be 
subject to the limits prescribed by the overall policy.

After a cursory review of the design proposal, it seems possible to 
configure the firewall in a way that obeys these rules. The question is: 
Does this design ensure, or at least strongly encourage, a configuration 
that does so? If not, it may be too flexible for the intended purpose.

        Scott

Reply via email to