On Wed, 12 Jun 2002, Dave Row wrote:

> For security reasons, I don't like the idea of tunneling OSPF through the
> firewall (via GRE or whatever), because there's no way for the firewall to
> apply policy to the tunnel traffic (if the tunnel were maliciously used to
> pass non-OSPF traffic, the firewall would be oblivious).

You can firewall at the tunnel endpoint to some extent as well.

> Many contributors out there seem to feel that passing routing info across a
> firewall is a "bad thing."  A firewall *is* a router (and by virtue, it has

$nitpick: Firewalls don't *have* to be routers, bridge mode firewalls 
exist.

> an obligation to participate in enterprise routing), but let's consider
> real-life needs, such as bringing B2B connections through your firewall (a
> "good thing").  If I have frame and VPN routers sitting on an isolated leg

I'm not sure that's always a "good thing"- I tend to prefer mutually 
exclusive demarcs with shared resources and replication mechanisms to 
tunneling external traffic into the network core.

> of the firewall, I *certainly* need to know about those routes as they pop
> up and down (static = "bad thing").  Although I do not terminate VPN
> connections *on* my firewalls, the firewall should be able to inject those
> routes into your routing environment, as well.

I'm not sure this follows- unless you terminate such routes redundantly in 
different physical locations, the routes should all go out the firewall, 
and having static routes to the firewall makes that easy (indication of 
link/route state doesn't *need* to be done inband.)  Dynamic routing adds 
an attackable layer to your infrastructure, and needs locking down pretty 
tightly (I prefer BGP4 to OSPF for this, mostly because I feel it gives 
more control- but I still wouldn't cross iBGP/eBGP groups on the firewall 
itself.)

> Now, I'm now trying to locate an OSPF product that can be installed *on* the
> firewall.  The Nokia implementation natively supports several routing
> protocols, but I'm running v4.1 SP5 on NT Enterprise.  I'm not concerned
> about the security implications, because it's easy enough to block OSPF
> on/from interfaces, hosts, nets, etc.  GateD *sounded* cool, until I learned
> that it's only available on Unix (comments withheld, so please point your
> flame throwers elsewhere).

I wouldn't run something like Gated on my best competitor's 
firewal infrastructure.  Given the complexities of OSPF, I'm pretty sure 
that would go on the same list- compromise of routing infrastructure is 
increasingly common, so relying on that to do protection around the 
firewall in a complex environment is dicey. 

> So, does anyone out there have a recommendation for (or any successes with)
> an OSPF module that can be installed under NT/2000?  Much appreciated.

Before I did that, I'd consider simpler solutions, like a client that 
watched the routing table on the router and re-fed the route into the 
infrastructure when it changed with its new location (assuming again that 
there were two different places the route had to go depending on link 
state.) That would  give a lot more control over implementation without 
introducing complex protocols and configuration issues to the equation.

There's also no reason you couldn't set up bridges/routers to bump the TTL 
up on hello and LSA packets if you want to pass it through the firewall.  I 
expect that'd be fairly trivial code to write if it's not easily done with 
something like netfilter/ipchains/pf/ipfw/ipfilter (heck you could just 
set the stacks on the bridges/routers to increment *every* TTL, place a 
bridge-mode kernel on a floppy and pop in a box on each side of the 
firewall.  The Linux Router Project kernel would probably be a good place 
to start for proof of concept- I'd expect something like chaging:

        if (iph->ttl <= 1)
                goto too_many_hops;

to:

 iph->ttl += 2;

(Assuming routing rather than bridging)

in net/ipv4/ip_forward.c on a 2.4.x kernel (or the appropriate stuff in a 
2.2 kernel if that's what LRP uses) would produce the appropriate 
results[1].

Lastly, you could probably try to compile ospfd (www.ospf.org) under 
CygWin (or indeed Gated) if you're stuck on running such a beast on the 
firewall itself.

Paul
[1] Quick glance only- so checking more carefully is appropriate, don't 
forget multicast routing, appropriate service nuking is necessary in 
anything sharing layer 2 with a firewall.
-----------------------------------------------------------------------------
Paul D. Robertson      "My statements in this message are personal opinions
[EMAIL PROTECTED]      which may have no basis whatsoever in fact."

-- 
Firewalls mailing list - [ [EMAIL PROTECTED] ]
To unsubscribe: http://www.isc.org/services/public/lists/firewalls.html

Reply via email to