Ben Nagy <[EMAIL PROTECTED]> wrote:
> 
> > >So if the packets have been intentionally fiddled with in
> > > some way
> > > the 'fiddled' packet will get to the server.
> 
> Absolutely right.

If the filter does not drop them.  There is no reason that the filter
cannot detect the fiddling and drop packets.  A stateful filter is
capable of "remembering" things about previous packets it has seen with
regard to a particular "conversation".

> Please, _do_ try to moderate your tone and be a bit polite.

My tone was not meant to be impolite.  Maybe to the point, but not
impolite.  My appologies if it came across that way.

> without you
> verbally slapping people about.

I was not verbally slapping anyone.  I was pointing out the responder
that the query was about stateful packet filters which are much more
powerful than "regular ol'" packet filters.

> Strictly speaking, a stateful packet filter only keeps state (duh).
> This
> means that an SPF is supposed to know everything about the TCP/IP
> rules for
> the flow of data between the internal and external hosts.

Indeed!

> However, SPFs
> aren't really supposed to look at application level data - and indeed
> they
> usually don't.

On the contrary.  The first protocol that I am sure most SPF developers
implement is FTP (I have some insight, I wrote an SPF for Linux :-). 
That by definition means looking into the packets' data at the
application level because it is at the application level that FTP
negotiates the "data channel".

> There are some hybrids that look at the application data of
> the first few packets of a flow but (IMO) these should be called
> something
> different to avoid confusion.

There maybe some filter/proxy hybrids out there but that is not what I
am talking about.  There are more and more protocols that require a
(stateful) filter to look into the application level to properly allow
access to the application while keeping the rest of the security policy
intact.  I do not define this a proxying at all however.

> So, essentially, by using a SPF you trade-off some security for a
> reasonable
> speed / RAM saving.

I disagree.  You don't necessarily trade off on security with a packet
filter.  I will agree that it performs a different job than proxying,
but that does not necessarily mean it is less secure.

> Of course in theory, an ALG will subject a packet to much closer
> application
> level scrutiny than any SPF ever could due to the speed/RAM problem.

What speed/RAM problem?

> In
> practice, however, it's damn near impossible to write an effective ALG
> for
> lots of the protocols streaming in and out of networks now (notably
> HTTP). 

HTTP is a bad example.  It is a very simple protocol that in fact a
proxy can do a very effective job with.  FTP, or ICQ, or RealAudio, etc.
are protocols where proxying is more difficult mainly due to the
client's need to know there is a proxy involved and react differently.

> However the key point that Darryl made is that an ALG (Application
> Level
> Gateway - Proxy if you like) terminates the IP connection and forms a
> new
> one to the internal hosts. This _ensures_ that no "fiddled" packets
> get
> through.

This is true.

> If FW-1 is anything to judge the current state-of-the art for SPFs
> by, you don't have anywhere near that kind of assurance with current
> SPF
> implementations.

Is FW-1 the benchmark by which current SPFs should be judged?

b.

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to