> So, what does the user want again?
> ------------------------------------------------------
> ------------------ 
> ----
> The opinions expressed in this message are mine,
> not those of Caltech, JPL, NASA, or the US
> Government.
> Henry.B.Hotz at jpl.nasa.gov, or hbhotz at oxy.edu
> 
> 
> _______________________________________________
> security-discuss mailing list
> security-discuss at opensolaris.org
> 

The user (me) wants to have a set of rules in the firewall that are enabled
only after the client (a user at some random IP address) has successfully
used some form of two-factor authentication.

It would be nice to be able to configure a dedicated host as a firewall
with a defined set of interfaces as public/private or internal/external
and allow authenticated IP addresses to send packets from one side
to the other.

This leaves the rules invulnerable to spoofing during the time when no IP
addresses have been authenticated.

Also, this arrangement provides a level of flexibility such that "authenticated"
users can come in from various address spaces without a priori knowledge
of where said users are going to be.

The term "authenticated" can be debated, but it is meant here as:

  [i]Distinct from any user on the Internet simply because
  they were able to know something and have something
  at the right time.[/i]

Often this has the desired effect of limiting a service from "any IP address"
to "any IP address from which a user has authenticated"

Authenticating an IP address is a means of raising the bar and making
the attacker work a little harder, but it is understood that if the attacker is
also at the right place and time (e.g. on a multi-user system which has been
authenticated) then the service which was inaccessible can now be
accessed.

The attacker in this scenario is forced to attack clients which authenticate
to the firewall because the firewall simply drops all packets from
non-authenticated IP addresses.

Some thought must also be given to how and when such rules are disabled.
Various options might be available such as:

  1. Strict time limit after initial authentication
  2. Disable after specified time limit during which no traffic has traversed 
the filter.
  3. Enabled/Disabled at a given time of day ( 2PM to 4PM PST)


I hope that clears up what I was thinking, but many words usually bring
many troubles.


Dale
 
 
This message posted from opensolaris.org

Reply via email to