Bill Sommerfeld wrote:
>> Maybe I should ask, what would you define as being an "overall
>> policy"?
>
> A single coherent source for "what should be allowed on this system"
> which comes from a single origin. You are likely to lose that coherance
> when you take the policy, salami-slice it, and spread it through a bunch
> of service properties.
I think the desired use case for this feature requires two things:
1. An overall policy, specified once by the system administrator, that
describes the maximum set of inbound and outbound network traffic that
is allowed.
2. Individual per-service rules that are automatically added and removed
when the corresponding services are enabled and disabled. These rules
cannot override the restrictions in the overall policy.
In order for the administrator to make meaningful predictions about the
behavior of the system, it's important for the per-service rules to be
subject to the limits prescribed by the overall policy.
After a cursory review of the design proposal, it seems possible to
configure the firewall in a way that obeys these rules. The question is:
Does this design ensure, or at least strongly encourage, a configuration
that does so? If not, it may be too flexible for the intended purpose.
Scott
_______________________________________________
networking-discuss mailing list
[email protected]