?-----Original Message----- From: Mark Jones
Sent: Friday, February 04, 2011 2:54 PM
To: [email protected]
Subject: [pfSense Support] Firewall security compromised by auxillary programs?

Well, I hear of people running pfSense in a VM, and I wonder how do you avoid exposing the host OS to the network? How can a firewall be run in a VM and not leave the host OS hanging out to be attacked? Or, go the otherway and put the VM in the FreeBSD used by pfSense since there is plenty of excess CPU and memory to do the trick. Only getting vmware to run on pfSense FreeBSD might be difficult (I haven't actually tried it) given the very few pieces of FreeBSD that are present in a pfSense environment.

Yes, I agree that having a jabber server on the firewall is less secure than not having a jabber server, but I question it being less secure than having it on my internal server. If it is on the pfSense box and becomes compromised, the hacker will need pfSense skills to get any further, then they will need an additional set of skills to get at my primary servers. If I open the ports that the jabber server uses, then they have access to my primary servers via the jabber server software because the firewall is permitting connections into and out of the network on those ports.

Admittedly running log digesting software increases the attack surface if those program actually use networking services, but if they are self-contained, the attack surface doesn't change. Adding a website (like say the pfSense PHP website interface) increases my exposure as well, but yet we do it to facilitate easy configuration.....

If this analysis is wrong, please someone point out where it is wrong. This assumes that the jabber server only opens the ports for XMPP and nothing else, no management ports etc.....
--------------------------------------------------------------------------------------------------------------------




I currently run my pfSense firewall inside VMware Server on a Windows 2003 box. I set it up with 2 dedicated physical NICs for pfSense for WAN and LAN as well as 1 virtual NIC for all other VMs.

the 2 Physical NICs have every protocol/program/connector turned OFF on them except the VMware bridge, meaning that as far as windows sees, there's nothing on the interface to talk to. aka, by default, the host system has ZERO network connectivity for itself.

the Virtual interface is used for a virtual network on the server for all other VMs that need network access as well as internet access for the server itself.

inside PfSense I have the virtual interface set up as opt1 and put in rules so that opt1 and LAN can communicate with each unhindered. This also means that anything on the physical LAN network wanting to talk to the physical server host has to pass thru the firewall first, meaning I can put rules in place if need be to filter on internal side.


overall this gives my network a single server that handles both my Windows file share, FreeBSD hosting servers and my firewall while keeping them all properly set up separately on a logical network level and yet physically on the same hardware. It is also set up in VMware that if the system crashes, the pfSense VM will be rebooted automatically. I have even created a VM with snort running that tapped into the same physical interfaces parallel to pfSense and has granted me some awesome level packet capture as it will run bus speed with only a single interface instead of 2 for physical install (you do have to manually disable transmission on the listening interface though inside the VM, which varies by OS)

if you have the resources, I would actually recommend use of VMware ESXi as the host since it lets you configure virtual switches and gives much tighter control over how the VMs and logical systems are configured.


doing it the other way and running jails/VM inside the firewall I feel is a really bad idea as nothing should ever be run under a firewall host. you could have a glitch and have a jail cause a kernel panic and crash the host.

-Sean

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Commercial support available - https://portal.pfsense.org

Reply via email to