David Powell wrote:
> Will Young wrote:
>> Nicolas Williams wrote:
>>> The idea that a service describes its networking patterns so that IPF
>>> can take them into account is very neat, but not sufficient to get rid
>>> of packet filtering rules: not everything is a service under SMF
>>> management.
>>>
>> Right, I view the how they handle the policy they apply before and
>> after active service derived policy as their private choice:
>>
>>>> I don't think that point is sufficient to dismiss the lack of
>>>> abstraction for services manifest contents. Only the policy above and
>>>> bellow services can be a private API between ipfilter and vpanels.
>> I'm really only looking for all the static knowledge about the
>> services that I'm assuming will get buried in ipf_method(s), (like the
>> manifest is talking about ssh right now so we think this is in reference
>> to tcp port 22.) Without this kind of knowledge anything that tries to
>> get as much use as ipfilter out of the added data really can't without
>> knowing a lot of gibberish.
Currently, we use the {inetd | context}/{name | isrpc} properties to
provide service's static information. Given a service's name,
getservbyname(3SOCKET) allows us to get a service's port and protocol
information.
I'm in agreement with a more complete static information. At the moment,
however, we don't have enough knowledge to come up with a set of context
information and a rule generation mechanism that would for "every"
possible service.
>>
>> I certainly wouldn't complain if it was also easy to determine
>> how/if ipfilter was applying the data but there are plenty of other
>> things of equal importance we wont know without product specific
>> knowledge (i.e. the IPsec/IKE config.)
>
> I think Tony's intent is for the firewall configuration to be
> descriptive whenever possible. ipf_method is only meant as an escape
> hatch for cases when the IPFilter configuration required for the
> service gets complicated. This could be because the service's use of
> networking is inherently complicated, or because the needs of the
> service aren't obvious (e.g. when the port the service is using is a
> tunable buried in a service-specific config file).
Correct. This mechanism also allows client services such as nis/client
and ntp client to produce rules that permit their communication.
>
> As time goes on and we learn more about the kinds of exceptions that
> need to be made, the firewall context could be expanded to obviate
> certain classes of ipf_methods. Front-loading such an analysis,
> however, would be expensive and would most likely produce an over-
> engineered product.
>
_______________________________________________
networking-discuss mailing list
[email protected]