I generally agree with your comments below including the reference to UPnP.


On 8/3/11 5:02 PM, "Wouter Cloetens" <wouter.cloet...@softathome.com>
wrote:

>On 03/08/11 03:45, Brzozowski, John wrote:
>> On 8/2/11 9:20 PM, "Shane Amante"<sh...@castlepoint.net>  wrote:
>>> On Aug 2, 2011, at 5:08 PM, Brzozowski, John wrote:
>>>> On 8/2/11 8:28 AM, "Keith Moore"<mo...@network-heretics.com>  wrote:
>>>>> On Aug 2, 2011, at 4:22 AM, Philip Homburg wrote:
>>>>> The idea that a firewall should automatically know what "it has to
>>>>>do"
>>>>> strikes me as utterly bizarre.   I realize that there's a desire to
>>>>> minimize the configuration burden for unsophisticated users (and
>>>>>agree
>>>>> with that), but the idea that the firewall knows better than the user
>>>>> what his security policy should be seems ridiculous.
>>>> [jjmb] I agree Keith that having a firewall automatically know
>>>> what to do is a tall order. I also think the is more than a
>>>> desire to ease configuration burden, this is a must since most
>>>> users on the Internet have very basic technical skills.
>
>[...]
>
>My take on firewalls is that devices, or more precisely software
>installed on devices, must request for services to be opened. UPnP IGDv2
>is capable of doing this today for IPv6, just as UPnP IGDv1 does it for
>IPv4.
>I see no other way to make firewalling scalable (working for every
>service at every hop), sturdy (not fall over due to misconfiguration),
>and working without user interaction.
>
>>> And, we'd need to decide if this is something a device in the home can
>>> 'dynamically' request from the CPE-router/FW via, say, DHCPv6 or if
>>>there
>>> are better options ...
>
>> Another interesting scenario where part of a delegated is interested
>> or required to be firewalled while others not. I do not think we are
>> limited ourselves. I think advanced users will still have the ability
>> to do as they please and we are making sure not so advanced are not
>> unknowingly exposed.
>>
>> As I mentioned earlier, I think there may be an opportunity for some
>> protocol development in this space.
>
>I'm not a big fan of the UPnP protocol, but it already fills some of
>this space. Others could be considered, e.g. PCP.
>
>My take on this, and every single technical element in the scope of
>homenet's problem space, is that the challenge is symmetry: to make
>every protocol and delegation work upstream and downstream from every
>router.
>I would bet that every CPE router will contain a firewall. All available
>IPv4 CPE routers today do, and my customers all require the same for IPv6.
>
>UPnP IGDv2 (or another protocol) can be extended to allow opening all
>ports in all protocols for a prefix that is delegated to a downstream
>router, (or announced by a downstream router or whatever).
>
>So, thinking about our "tall order" here...
>
>Scenario 1: the downstream router implements its own firewall. The
>upstream router's firewall allows all traffic from and to that router to
>pass through, assuming the downstream router will handle it.
>Scenario 2: the downstream router does not implement its own firewall,
>or is not aware that the upstream router already implements a firewall,
>and relays firewall service requests to the upstream router.
>Scenario 3: the downstream router implements its own firewall. The
>upstream router's firewall, by policy, denies all traffic from and to
>that router, or, in the more likely SPI case, denies all new connections
>to that router's prefix. The downstream router must not only serve
>requests by hosts on its own downstream interface, but relay those
>requests to the upstream router.
>Scenario 3a: same as 3, but the downstream router starts by requesting
>to allow all traffic to and from its prefix to release the upstream
>router of the burden of firewalling, like in scenario 1.
>... and more scenarios imaginable.
>
>Upstream and downstream capability detection is one challenge, so the
>right behaviour for the right scenario can be picked.
>All of this must be subject to override by policies set by the user or
>the provider. That's another challenge; the user must be able to
>determine at what level which policy makes his application fail.
>It all has to be secure. You don't want a malware agent to be able to
>pose as a downstream CPE router and punching a /64-size (or bigger) hole
>in the firewall.
>
>bfn, Wouter
>_______________________________________________
>homenet mailing list
>homenet@ietf.org
>https://www.ietf.org/mailman/listinfo/homenet

_______________________________________________
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to