Jeffrey Hutzelman wrote:
> --On Wednesday, August 27, 2008 05:51:36 PM -0700 Bill Sommerfeld 
> <sommerfeld at sun.com> wrote:
>
>> On Wed, 2008-08-27 at 17:03 -0700, Darren Reed wrote:
>>> On 08/27/08 16:37, Bill Sommerfeld wrote:
>>> > Unless I'm mistaken, the spec as written would allow *any* service
>>> > administrator to inject essentially arbitrary rules into the global
>>> > ipf.conf.
>>
>>> Given David's replies, do you still see that as being possible?
>>
>> The spec needs to make it clear that it is unsafe to delegate access to
>> these properties.
>>
>> smf could probably use a mechanism to make it harder to screw up access
>> to critical properties like this.
>>
>>> Maybe I should ask, what would you define as being an "overall
>>> policy"?
>>
>> A single coherent source for "what should be allowed on this system"
>> which comes from a single origin.  You are likely to lose that coherance
>> when you take the policy, salami-slice it, and spread it through a bunch
>> of service properties.
>
> It's not a bad model for the same packages and smf services that 
> provide a service to contain the required firewall rules, such that 
> those rules are installed when the service is installed, and enabled 
> when the service is enabled.  However, that only works when the rules 
> are written according to a coherent model such that they don't 
> conflict with each other or leave gaps that do unsafe things.
Hi Jeffrey,

Agree. A service is expected to only generate rules relevant to its 
network traffic.
> I am very wary of a model that permits any service administrator to 
> inject arbitrary ipf rules.  This is a problem even if you trust that 
> no service admin is malicious (a big leap), because ipf rules may 
> interact with each other in complex ways that the service admins may 
> be unable to predict.
Yes, as Bill mentioned, some protection for firewall policy 
configuration, perhaps more specific property group authorization to 
assign to "firewall" administrator.

Thanks,
-tony

Reply via email to