Re: Required firewall support

2005-03-25 Thread Steve Greenland
On 21-Mar-05, 12:39 (CST), David Weinehall <[EMAIL PROTECTED]> wrote: 
> On Sun, Mar 20, 2005 at 11:22:48AM -0600, Steve Greenland wrote:
> >
> > And that's what we do. But some other OSs (Solaris) do support strict
> > multihoming with a config parameter, it would be nice if Linux did.
> 
> netdev@oss.sgi.com <--- patches goes that way.
> linux-kernel@vger.kernel.org <--- or possibly that way.

It's been discussed and rejected in the past. The multi-homing RFC (I
forget which one) has unclear[1] wording on which behaviour is proper.

Steve

[1] Well, *I* (and others) don't think it's unclear. The trouble is
that many others also don't think it's unclear, but come to an opposite
conclusion.

-- 
Steve Greenland
The irony is that Bill Gates claims to be making a stable operating
system and Linus Torvalds claims to be trying to take over the
world.   -- seen on the net


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-21 Thread Thomas Bushnell BSG
Joel Aelwyn <[EMAIL PROTECTED]> writes:

> Either someone
> cares enough to write (or adapt) the management tools and it gets included,
> or they don't and it doesn't because nobody in their right mind would
> deploy it in any widespread fashion.

But the latter is already true, and irrelevant.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-21 Thread Joel Aelwyn
On Sun, Mar 20, 2005 at 11:22:48AM -0600, Steve Greenland wrote:
> On 19-Mar-05, 10:00 (CST), Matthias Urlichs <[EMAIL PROTECTED]> wrote: 
> > 
> > Umm, rp_filter is for rejecting packets whose *source* address is from the
> > wrong network.
> 
> Right. I know this. But what Joel was originally talking about was
> rejection of packets on interface A that are destined for an address on
> interface B; Joel seemed to be claiming that if this didn't happen by
> default, then the OS was a "toy"; I was pointing out that Linux itself
> fails this. 

Not precisely accurate; I claimed that having a way to *make it* a default
was a fairly important factor. Linux does fail it, which is part of why I
think the Linux network stack blows goats in a few ways (there are others,
not the topic of this conversation). Nor does it have to be on-by-default;
there are sane (to some views) reasons to have the Linux behavior, for
example, even if I don't agree with them as a default, but being able to
flip a switch so that it was the case would suffice.

Of course, since it has been claimed that the Hurd basically supports all
of the listed criteria anyway (or, at the very least, as many as Linux
does), I'm not sure why this thread is even still going. Either someone
cares enough to write (or adapt) the management tools and it gets included,
or they don't and it doesn't because nobody in their right mind would
deploy it in any widespread fashion.
-- 
Joel Aelwyn <[EMAIL PROTECTED]>   ,''`.
 : :' :
 `. `'
   `-


signature.asc
Description: Digital signature


Re: Required firewall support

2005-03-21 Thread David Weinehall
On Sun, Mar 20, 2005 at 11:22:48AM -0600, Steve Greenland wrote:
> On 19-Mar-05, 10:00 (CST), Matthias Urlichs <[EMAIL PROTECTED]> wrote: 
> > 
> > Umm, rp_filter is for rejecting packets whose *source* address is from the
> > wrong network.
> 
> Right. I know this. But what Joel was originally talking about was
> rejection of packets on interface A that are destined for an address on
> interface B; Joel seemed to be claiming that if this didn't happen by
> default, then the OS was a "toy"; I was pointing out that Linux itself
> fails this. 
> 
> > If you want to block accepting your own address as the *destination*, then
> > no, there's no config parameter for that. Use iptables rules. :-/
> 
> And that's what we do. But some other OSs (Solaris) do support strict
> multihoming with a config parameter, it would be nice if Linux did.

netdev@oss.sgi.com <--- patches goes that way.
linux-kernel@vger.kernel.org <--- or possibly that way.


Regards: David Weinehall
-- 
 /) David Weinehall <[EMAIL PROTECTED]> /) Northern lights wander  (\
//  Maintainer of the v2.0 kernel   //  Dance across the winter sky //
\)  http://www.acc.umu.se/~tao/(/   Full colour fire   (/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-21 Thread Sebastian Ley
* Wouter Verhelst wrote:

> Note that some packages, directly or indirectly, build-depend on
> packages containing daemons that will be started by default if
> installed. In that light, a firewall really is required to keep things
> safe.

IMO most notably, because many users will hit that:
KDE -> famd -> portmapper

While I would not judge on portmappers security, it is certainly not a service 
which most users need to have exposed to the internet, and so it shouldn't be 
by default.

Of course, the proper solution would be to a) do not make fam depend on 
portmapper or b) alter portmapper to listen for local connections only, 
neither of both has been implemented for some time now...

Sebastian

-- 
PGP-Key: http://www.mmweg.rwth-aachen.de/~sebastian.ley/public.key
Fingerprint: A46A 753F AEDC 2C01 BE6E  F6DB 97E0 3309 9FD6 E3E6


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-21 Thread Wouter Verhelst
On Thu, Mar 17, 2005 at 01:09:33PM +0100, Marc Haber wrote:
> On Wed, 16 Mar 2005 20:39:48 -0700, Joel Aelwyn <[EMAIL PROTECTED]>
> wrote:
> >* The first rule of securing a machine exposed to the wilds is "Deny by
> >  default, allow by need".
> 
> Which is pretty well accomplished by only running needed services.

Note that some packages, directly or indirectly, build-depend on
packages containing daemons that will be started by default if
installed. In that light, a firewall really is required to keep things
safe.

-- 
 EARTH
 smog  |   bricks
 AIR  --  mud  -- FIRE
soda water |   tequila
 WATER
 -- with thanks to fortune


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-20 Thread Steve Greenland
On 19-Mar-05, 10:00 (CST), Matthias Urlichs <[EMAIL PROTECTED]> wrote: 
> 
> Umm, rp_filter is for rejecting packets whose *source* address is from the
> wrong network.

Right. I know this. But what Joel was originally talking about was
rejection of packets on interface A that are destined for an address on
interface B; Joel seemed to be claiming that if this didn't happen by
default, then the OS was a "toy"; I was pointing out that Linux itself
fails this. 

> If you want to block accepting your own address as the *destination*, then
> no, there's no config parameter for that. Use iptables rules. :-/

And that's what we do. But some other OSs (Solaris) do support strict
multihoming with a config parameter, it would be nice if Linux did.

Steve

-- 
Steve Greenland
The irony is that Bill Gates claims to be making a stable operating
system and Linus Torvalds claims to be trying to take over the
world.   -- seen on the net


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-19 Thread Matthias Urlichs
Hi, Steve Greenland wrote:

> On 18-Mar-05, 03:28 (CST), Blars Blarson <[EMAIL PROTECTED]> wrote:
>> >Linux fails this. Even with forwarding disabled, it will accept packets
>> >for an address on interface A via interface B.
>> 
>> Enable rp_filter and it does reject such packets.
>> 
>> echo 1 >/proc/sys/net/ipv4/conf/${dev}/rp_filter
> 
> See, that's a nice theory, but it doesn't actually work.

Umm, rp_filter is for rejecting packets whose *source* address is from the
wrong network.

If you want to block accepting your own address as the *destination*, then
no, there's no config parameter for that. Use iptables rules. :-/

-- 
Matthias Urlichs   |   {M:U} IT Design @ m-u-it.de   |  [EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-18 Thread Thomas Bushnell BSG
Gunnar Wolf <[EMAIL PROTECTED]> writes:

> I agree that any Debian architecture needs to provide basic networking
> facilities, but I don't think firewalling is a real requirement. Yes,
> of course, we expect users to actually _run_ this architecture, and
> they will probably be connected to the network, and thus they can be
> at risk - But right now Debian installs are done with no firewalling
> rules on anyway.

Moreover, the question here is not what are good features to have, but
what are the features necessary for SCC (or ports, or whatever it's
called).  Non-released ports don't need buildds run by the Debian
system administrators, and don't need lots of them; the point is that
porting teams need to be making real progress to be in SCC, but not
done.

So I'm mostly fine with the requirements as written, but the question
still remains:

What features, exactly, are meant by "firewalling support" in the
requirement?  (I know what firewalling is as a general thing, but not
which specific features are desired.)

And, why is firewalling support essential for SCC?


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-18 Thread Gunnar Wolf
Joel Aelwyn dijo [Wed, Mar 16, 2005 at 08:39:48PM -0700]:
> Consider:
> 
> * SCC systems have buildds.
> 
> * Buildds must be network accessible.
> 
> * The first rule of securing a machine exposed to the wilds is "Deny by
>   default, allow by need".
> 
> Therefore, a box which does not provide basic firewalling capabilities
> (whether that's achieved by configurable ACLs, mind-reading the human
> traffic trigger, or pixies inspecting every packet) is thus not suitable
> for running a buildd on, and thus can never achieve SCC status.
> 
> Sorry, but being able to cope with a hostile environment *is* a requirement
> in today's network, and there isn't any real way around that fact. I have
> no clue where Hurd network filtering stands at the moment, so I can't
> comment on how far it is from having this feature. I wouldn't be willing to
> admin any such box that was plugged into a network using a ten foot pole,
> and I don't see why the DSA folks should be expected to either.

I would admin such a machine precisely by using a ten foot pole - That
ten foot pole can be materialized into a firewall-able machine sitting
between it and the network.

I agree that any Debian architecture needs to provide basic networking
facilities, but I don't think firewalling is a real requirement. Yes,
of course, we expect users to actually _run_ this architecture, and
they will probably be connected to the network, and thus they can be
at risk - But right now Debian installs are done with no firewalling
rules on anyway.

Greetings,

-- 
Gunnar Wolf - [EMAIL PROTECTED] - (+52-55)1451-2244 / 5554-9450
PGP key 1024D/8BB527AF 2001-10-23
Fingerprint: 0C79 D2D1 2C4E 9CE4 5973  F800 D80E F35A 8BB5 27AF


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-18 Thread Thomas Bushnell BSG
[EMAIL PROTECTED] (Marco d'Itri) writes:

> On Mar 17, Thomas Bushnell BSG <[EMAIL PROTECTED]> wrote:
> 
> > However, we are not expecting the DSA people to keep the system
> > secure; SCC non-released arches don't need to provide developer
> > machines.

> I do not believe that this is limited to debian hosts. If an OS lacks
> the basic security features needed to safely stay on the internet then I
> think it's obvious that it's not mature and useful enough to be worth
> keeping it in the archive.

Once more, we are lacking the actual information here.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-18 Thread Steve Greenland
On 18-Mar-05, 03:28 (CST), Blars Blarson <[EMAIL PROTECTED]> wrote: 
> >Linux fails this. Even with forwarding disabled, it will accept packets
> >for an address on interface A via interface B.
> 
> Enable rp_filter and it does reject such packets.
> 
> echo 1 >/proc/sys/net/ipv4/conf/${dev}/rp_filter

See, that's a nice theory, but it doesn't actually work. 

Maybe it's not clear what I'm talking about. Consider a machine with two
interfaces eth0, eth1. Define eth0 as 192.168.0.1 and eth1 as 10.0.0.1.
Disable forwarding, set rp_filter on all interfaces. From another
machine on 192.168.0/24, set your route for 10/8 to 192.168.0.1. Now
ping 10.0.0.1. For bonus points, do 'ifconfig eth1 down', and then ping
from the other machine again. Surprise!

(All with 2.4.18, maybe it's fixed in 2.6.)

Steve

-- 
Steve Greenland
The irony is that Bill Gates claims to be making a stable operating
system and Linus Torvalds claims to be trying to take over the
world.   -- seen on the net


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-18 Thread Blars Blarson
In article <[EMAIL PROTECTED]> [EMAIL PROTECTED] writes:
>On 17-Mar-05, 01:01 (CST), Joel Aelwyn <[EMAIL PROTECTED]> wrote: 
>> * The ability for an interface to receive, by default, only traffic that
>>   is destined for that interface. (Non-promiscuous mode; promiscuous mode
>>   availability is a big plus, but not required from the OS point of view)
>
>Linux fails this. Even with forwarding disabled, it will accept packets
>for an address on interface A via interface B.

Enable rp_filter and it does reject such packets.

echo 1 >/proc/sys/net/ipv4/conf/${dev}/rp_filter
-- 
Blars Blarson   [EMAIL PROTECTED]
http://www.blars.org/blars.html
With Microsoft, failure is not an option.  It is a standard feature.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-17 Thread Steve Greenland
On 17-Mar-05, 01:01 (CST), Joel Aelwyn <[EMAIL PROTECTED]> wrote: 
> * The ability for an interface to receive, by default, only traffic that
>   is destined for that interface. (Non-promiscuous mode; promiscuous mode
>   availability is a big plus, but not required from the OS point of view)

Linux fails this. Even with forwarding disabled, it will accept packets
for an address on interface A via interface B.

The rest of your points are valid for a *packet filter* firewall that
exists *between* the internet and a LAN (and/or DMZ). For a machine
that is directly connected, you can run only the services that you're
actually supporting, and use tcpwrappers et. al. to control access to
those, if you like. Packet filtering is basically irrelevant. And there
are other kinds of firewalls besides packet filters.

Steve

-- 
Steve Greenland
The irony is that Bill Gates claims to be making a stable operating
system and Linus Torvalds claims to be trying to take over the
world.   -- seen on the net


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-17 Thread Marco d'Itri
On Mar 17, Thomas Bushnell BSG <[EMAIL PROTECTED]> wrote:

> However, we are not expecting the DSA people to keep the system
> secure; SCC non-released arches don't need to provide developer
> machines.
I do not believe that this is limited to debian hosts. If an OS lacks
the basic security features needed to safely stay on the internet then I
think it's obvious that it's not mature and useful enough to be worth
keeping it in the archive.

-- 
ciao,
Marco


signature.asc
Description: Digital signature


Re: Required firewall support

2005-03-17 Thread Joel Aelwyn
On Thu, Mar 17, 2005 at 07:14:27PM +0100, Marc Haber wrote:
> On Thu, 17 Mar 2005 10:03:15 -0700, Joel Aelwyn <[EMAIL PROTECTED]>
> wrote:
> >On Thu, Mar 17, 2005 at 01:09:33PM +0100, Marc Haber wrote:
> >> I am routinely running systems without any packet filtering capability
> >> on the network, and they are perfectly able to cope. They just only
> >> accept network connections for needed services.
> >
> >And just how full of attempts to root SSH are your logs?
> 
> A lot. What's the problem?

http://www.cve.mitre.org/cve/refs/refmap/source-BUGTRAQ.html

Search for "ssh".

You didn't think those scripts the kiddies run appeared just to randomly
annoy folks running SSH, did you?

Yes, a local admin *can* just disable SSH when faced with a 0-hour
announcement. So can a remote admin. The latter, however, is forced to
choose between "risk a compromise" or "risk waiting until the local admin
can be present", if there isn't any firewall support.

If there is, they can slap on a temporary ACL limiting access to port 22
to certain machines that are trusted (maybe they run a different version
of SSH that isn't believed to be vulnerable, or maybe they're local to the
'remote' admin, whatever), and be reasonably confident that the script
kiddies won't be able to get *to* the SSH daemon to compromise it, until a
new SSH package can be built that addresses the vulnerability.

There are other concerns which may apply (such as determining whether the
SSH daemon has already been compromised, if you don't happen to have an
active root shell on the machine in question), but the point stands.
-- 
Joel Aelwyn <[EMAIL PROTECTED]>   ,''`.
 : :' :
 `. `'
   `-


signature.asc
Description: Digital signature


Re: Required firewall support

2005-03-17 Thread Marc Haber
On Thu, 17 Mar 2005 10:03:15 -0700, Joel Aelwyn <[EMAIL PROTECTED]>
wrote:
>On Thu, Mar 17, 2005 at 01:09:33PM +0100, Marc Haber wrote:
>> I am routinely running systems without any packet filtering capability
>> on the network, and they are perfectly able to cope. They just only
>> accept network connections for needed services.
>
>And just how full of attempts to root SSH are your logs?

A lot. What's the problem?

Greetings
Marc

-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Required firewall support

2005-03-17 Thread Thomas Bushnell BSG
Joel Aelwyn <[EMAIL PROTECTED]> writes:

> If you have all of the filtering rule support, then why is this even an
> issue? Write the user-space tool and you should be golden; you've got a
> useable firewalling implementation.
> 
> What's the problem?

Who said there was a problem?  I was asking exactly what support was
required.  You started talking on about what was a "toy os" and the
importance of this or that.

It is, however, a very low priority for development, and the people
who are likely to do the work would like to know exactly what is being
asked.

The secondary question, why is this important, is one that perhaps
only the people who were at the Vancouver meeting can explain, and
unless I've missed it, they have not.

> That means firewalling capabilities. It's flat ing insane to expect DSA
> folks to try to keep a system secure if it doesn't have basic firewalling.
> It's that simple, and it's backed by a couple of decades of best common
> practice by both network and systems administrators.

Are the DSA people using firewalling features now?  I can't see any
indication in the config files of the machines I checked when you so
confidently asserted they were, but I might have missed something.

However, we are not expecting the DSA people to keep the system
secure; SCC non-released arches don't need to provide developer
machines.

Thomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-17 Thread Joel Aelwyn
On Thu, Mar 17, 2005 at 01:09:33PM +0100, Marc Haber wrote:
> On Wed, 16 Mar 2005 20:39:48 -0700, Joel Aelwyn <[EMAIL PROTECTED]>
> wrote:
> >* The first rule of securing a machine exposed to the wilds is "Deny by
> >  default, allow by need".
> 
> Which is pretty well accomplished by only running needed services. A
> port without a services is an implicit "deny".
> 
> >Sorry, but being able to cope with a hostile environment *is* a requirement
> >in today's network, and there isn't any real way around that fact.
> 
> I am routinely running systems without any packet filtering capability
> on the network, and they are perfectly able to cope. They just only
> accept network connections for needed services.

And just how full of attempts to root SSH are your logs?

Just because you *can* cope with that (and there are situations where the
fastest patch is to slap an ACL on, say, port 22 until you can fix the real
problem, so that you neither lock yourself out of the box's remote access
nor leave it open to the kiddies) doesn't mean it is the optimal method, or
that DSA should be expected to work without fairly important security tools
when asked to keep a box secure.

Traffic control policy is a major part of layered security.
-- 
Joel Aelwyn <[EMAIL PROTECTED]>   ,''`.
 : :' :
 `. `'
   `-


signature.asc
Description: Digital signature


Re: Required firewall support

2005-03-17 Thread Joel Aelwyn
[ Please respect the list code of conduct; I don't request CCs, nor does  ]
[ my M-F-T get set as such. In other words, don't send them.  ]

On Thu, Mar 17, 2005 at 12:16:27AM -0800, Thomas Bushnell BSG wrote:
> Joel Aelwyn <[EMAIL PROTECTED]> writes:
> 
> > Fine, if you want to get pedantic, the following is a bare minimum of
> > capabilities I would expect from any network processing on a 'real'
> > (non-toy) network stack, where 'network stack' means everything between
> > hardware driver and delivery of data to a userland application. It's late,
> > so this may not be exhaustive.
> 
> The guidelines do not speak of "toy os".  It appears that you are not
> aware of why this requirement is listed in the guidelines, nor of why
> it would be important for the secondary archive, nor of what the
> actual practice is on buildds.  
> 
> Can we replace this with a thread involving people who do know these
> things?
> 
> The Hurd has had all the things listed on your schedule of filtering
> rules for longer than Linux has.  All that is necessary is simple
> user-space tools to implement them.  Do you have a specific tool that
> should run, or anything else?

If you have all of the filtering rule support, then why is this even an
issue? Write the user-space tool and you should be golden; you've got a
useable firewalling implementation.

What's the problem?

> > Unless marked as 'nice to have', everything above is a *must* for running
> > even basic firewall configurations on a host expected to face the Internet.
> > If you can do those, and configure them in some semi-sane fashion, then
> > you probably meet the expectations reasonable people would have for "basic
> > firewalling".
> 
> But what is not said here is why this particular feature is necessary
> for being in the secondary archive, as opposed to other features.  
> 
> To say, "a buildd must have that feature" is only sensible if the
> buildds are actually *using* such-and-such feature, and you, in fact,
> don't know that they are.

Allright, since your other email said it didn't have to be hooked up to the
w-b network, and seemed to miss the point:

To be sane to administer a system which is exposed to general Internet
traffic, including through a NAT or other proxy, it is important to be able
to control the policy for what traffic is actually passed to the userspace
applications, or routed to another network on router-capable OSes (note
that being able to route is not, AFAIK, a buildd requirement),

That means firewalling capabilities. It's flat ing insane to expect DSA
folks to try to keep a system secure if it doesn't have basic firewalling.
It's that simple, and it's backed by a couple of decades of best common
practice by both network and systems administrators.

If you want to avoid this situation, then I suggest you explain how you
intend to get things needing build from incoming to your buildd, and the
results back to incoming.

But you say you have this capability already, perhaps modulo userspace
tools to configure it. So get someone to bang them out, and you should
be good to go (or, heck, get the existing firewall config tools to
support whatever you use to configure this, if they aren't excessively
Linux-centric; at the very least, a workalike interface is a good place to
start).
-- 
Joel Aelwyn <[EMAIL PROTECTED]>   ,''`.
 : :' :
 `. `'
   `-


signature.asc
Description: Digital signature


Re: Required firewall support

2005-03-17 Thread Marc Haber
On Thu, 17 Mar 2005 13:52:23 +0100, Florian Weimer <[EMAIL PROTECTED]>
wrote:
>* Marc Haber:
>> I am routinely running systems without any packet filtering capability
>> on the network, and they are perfectly able to cope. They just only
>> accept network connections for needed services.
>
>This is a bit dangerous because any invocation of "apt-get install" or
>"apt-get upgrade" can start new server daemons.

I do not do that when I am directly on the 'net. otoh, policy-rc.d
exists, but is a little clumsy to use these days (remedy is in NEW).

Greetings
Marc

-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Required firewall support

2005-03-17 Thread Florian Weimer
* Marc Haber:

> I am routinely running systems without any packet filtering capability
> on the network, and they are perfectly able to cope. They just only
> accept network connections for needed services.

This is a bit dangerous because any invocation of "apt-get install" or
"apt-get upgrade" can start new server daemons.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-17 Thread Marc Haber
On Wed, 16 Mar 2005 20:39:48 -0700, Joel Aelwyn <[EMAIL PROTECTED]>
wrote:
>* The first rule of securing a machine exposed to the wilds is "Deny by
>  default, allow by need".

Which is pretty well accomplished by only running needed services. A
port without a services is an implicit "deny".

>Sorry, but being able to cope with a hostile environment *is* a requirement
>in today's network, and there isn't any real way around that fact.

I am routinely running systems without any packet filtering capability
on the network, and they are perfectly able to cope. They just only
accept network connections for needed services.

Greetings
Marc

-- 
-- !! No courtesy copies, please !! -
Marc Haber |   " Questions are the | Mailadresse im Header
Mannheim, Germany  | Beginning of Wisdom " | http://www.zugschlus.de/
Nordisch by Nature | Lt. Worf, TNG "Rightful Heir" | Fon: *49 621 72739834



Re: Required firewall support

2005-03-17 Thread Thomas Bushnell BSG
Joel Aelwyn <[EMAIL PROTECTED]> writes:

> Fine, if you want to get pedantic, the following is a bare minimum of
> capabilities I would expect from any network processing on a 'real'
> (non-toy) network stack, where 'network stack' means everything between
> hardware driver and delivery of data to a userland application. It's late,
> so this may not be exhaustive.

The guidelines do not speak of "toy os".  It appears that you are not
aware of why this requirement is listed in the guidelines, nor of why
it would be important for the secondary archive, nor of what the
actual practice is on buildds.  

Can we replace this with a thread involving people who do know these
things?

The Hurd has had all the things listed on your schedule of filtering
rules for longer than Linux has.  All that is necessary is simple
user-space tools to implement them.  Do you have a specific tool that
should run, or anything else?

> Unless marked as 'nice to have', everything above is a *must* for running
> even basic firewall configurations on a host expected to face the Internet.
> If you can do those, and configure them in some semi-sane fashion, then
> you probably meet the expectations reasonable people would have for "basic
> firewalling".

But what is not said here is why this particular feature is necessary
for being in the secondary archive, as opposed to other features.  

To say, "a buildd must have that feature" is only sensible if the
buildds are actually *using* such-and-such feature, and you, in fact,
don't know that they are.

Thomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-17 Thread Thomas Bushnell BSG
Joel Aelwyn <[EMAIL PROTECTED]> writes:

> For buildds, since I don't run one as either local or DSA admin, I couldn't
> tell you offhand. I know what I'd *expect* them to be doing, as general
> guidelines, which closely resembles what I do on servers I deploy facing
> the net, but I don't know what they *are* doing.

The SCC criteria do not require a buildd plugged in to the Debian w-b
system.

> I have no particular reason to believe that they aren't running a sane set
> of firewalling rules; in fact, I would assume that they are, but I don't
> feel impolite enough to annoy someone's HIDS log with random checking.

What is a "sane set of firewalling rules"?  Can you be more specific
and less vague?


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-16 Thread Joel Aelwyn
On Wed, Mar 16, 2005 at 07:49:23PM -0800, Thomas Bushnell BSG wrote:
> Joel Aelwyn <[EMAIL PROTECTED]> writes:
> 
> > If you really want this fixed, I suggest finding someone who is well versed
> > in both network security issues and Internet protocol fundamentals (not
> > just TCP or even just IP, but all the other lovely beasties out there) and
> > convincing them it's worth their time (I hear money is often an excellent
> > motivator). The issues involved with writing a serious, production-capable
> > network stack are really quite non-trivial (and yes, I *do* speak from
> > personal experience in this).
> 
> We have a network stack, thank you very much.
> 
> The question is: which specific features do you want?
> 
> "Deny by default" is all you mentioned, and that's already done.
> Next?

Fine, if you want to get pedantic, the following is a bare minimum of
capabilities I would expect from any network processing on a 'real'
(non-toy) network stack, where 'network stack' means everything between
hardware driver and delivery of data to a userland application. It's late,
so this may not be exhaustive.

* The ability to associate a network interface with an IP host address,
  including network/netmask information for that IP subnet, and capable
  of handling CIDR networks.

* The ability for an interface to receive, by default, only traffic that
  is destined for that interface. (Non-promiscuous mode; promiscuous mode
  availability is a big plus, but not required from the OS point of view)

* The ability to check all inbound and outbound traffic (as well as
  throughbound if the system is capable of operating as a router between
  multiple networks) on any interface against a series of filtering
  rules.

* Filtering rules must be able to match against any supported IP protocol,
  including protocol-specific information (ports for UDP and TCP, for
  example), as well as ICMP (including message types). IP packets must
  be able to be matched against source and destination network/host
  values, as well as additional IP information (such as TOS bits).

* Filtering rules must be able to accept, reject, or drop (silent reject)
  network packets. The ability to manipulate the network stack decisions
  further (adding routing information) is a bonus, as is the ability to
  trigger a sub-chain of rules for evaluation.

* The ability to log rejected or dropped traffic specifics.

* The ability to log per-rule traffic statistics (packet count is required;
  packet size total is nice; other statistics may be useful).

* The ability to match certain exceptionally useful flags in very
  common IP protocols (SYN, ACK, FIN, RST, etc, for TCP, as an example).

Unless marked as 'nice to have', everything above is a *must* for running
even basic firewall configurations on a host expected to face the Internet.
If you can do those, and configure them in some semi-sane fashion, then
you probably meet the expectations reasonable people would have for "basic
firewalling".

Or, in summary:

* The ability to talk to a modern (CIDR) IP network.

* The ability to look at the relevant header information on any protocol
  required to run as a buildd (includes IP, TCP, and UDP at the very least,
  quite possibly others I can't name offhand).

* The ability to accept, reject, or drop packets based on the above.

* The ability to monitor, both statistically and specifically, what the
  filtering rules are doing.

I'm fairly sure there are things I'm forgetting, as well, but if your
network stack can do the above, extending it to do anything I've forgotton
is unlikely to be problematic for any code with a remotely sane internal
architecture (hell, Linux can do it, and I don't consider the network
internals to be all that sane...)
-- 
Joel Aelwyn <[EMAIL PROTECTED]>   ,''`.
 : :' :
 `. `'
   `-


signature.asc
Description: Digital signature


Re: Required firewall support

2005-03-16 Thread Joel Aelwyn
On Wed, Mar 16, 2005 at 07:50:13PM -0800, Thomas Bushnell BSG wrote:
> Joel Aelwyn <[EMAIL PROTECTED]> writes:
> 
> > * SCC systems have buildds.
> > 
> > * Buildds must be network accessible.
> > 
> > * The first rule of securing a machine exposed to the wilds is "Deny by
> >   default, allow by need".
> 
> Exactly which firewalling are the existing buildds doing?  (I'm asking
> for information; if you don't know, then you don't know.)

For buildds, since I don't run one as either local or DSA admin, I couldn't
tell you offhand. I know what I'd *expect* them to be doing, as general
guidelines, which closely resembles what I do on servers I deploy facing
the net, but I don't know what they *are* doing.

I have no particular reason to believe that they aren't running a sane set
of firewalling rules; in fact, I would assume that they are, but I don't
feel impolite enough to annoy someone's HIDS log with random checking.

I also wouldn't expect details to be posted to the list; while security
through obscurity is not *sufficient*, there are times when it is *useful*.
-- 
Joel Aelwyn <[EMAIL PROTECTED]>   ,''`.
 : :' :
 `. `'
   `-


signature.asc
Description: Digital signature


Re: Required firewall support

2005-03-16 Thread Thomas Bushnell BSG
Joel Aelwyn <[EMAIL PROTECTED]> writes:

> * SCC systems have buildds.
> 
> * Buildds must be network accessible.
> 
> * The first rule of securing a machine exposed to the wilds is "Deny by
>   default, allow by need".

Exactly which firewalling are the existing buildds doing?  (I'm asking
for information; if you don't know, then you don't know.)

Thomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-16 Thread Thomas Bushnell BSG
Joel Aelwyn <[EMAIL PROTECTED]> writes:

> If you really want this fixed, I suggest finding someone who is well versed
> in both network security issues and Internet protocol fundamentals (not
> just TCP or even just IP, but all the other lovely beasties out there) and
> convincing them it's worth their time (I hear money is often an excellent
> motivator). The issues involved with writing a serious, production-capable
> network stack are really quite non-trivial (and yes, I *do* speak from
> personal experience in this).

We have a network stack, thank you very much.

The question is: which specific features do you want?

"Deny by default" is all you mentioned, and that's already done.
Next?


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-16 Thread Joel Aelwyn
On Wed, Mar 16, 2005 at 03:13:16PM -0800, Thomas Bushnell BSG wrote:
> [EMAIL PROTECTED] (Marco d'Itri) writes:
> 
> > On Mar 16, Thomas Bushnell BSG <[EMAIL PROTECTED]> wrote:
> > 
> > > One of the conditions for SCC is "fully functioning Unix, including
> > > DNS and firewall support."  What specifically is intended by "firewall
> > > support"?  
> > I think that simple ACLs are the bare minimum.
> 
> Ok, can you point me at the specific feature, and why is this feature
> important for packaging in SCC?

Consider:

* SCC systems have buildds.

* Buildds must be network accessible.

* The first rule of securing a machine exposed to the wilds is "Deny by
  default, allow by need".

Therefore, a box which does not provide basic firewalling capabilities
(whether that's achieved by configurable ACLs, mind-reading the human
traffic trigger, or pixies inspecting every packet) is thus not suitable
for running a buildd on, and thus can never achieve SCC status.

Sorry, but being able to cope with a hostile environment *is* a requirement
in today's network, and there isn't any real way around that fact. I have
no clue where Hurd network filtering stands at the moment, so I can't
comment on how far it is from having this feature. I wouldn't be willing to
admin any such box that was plugged into a network using a ten foot pole,
and I don't see why the DSA folks should be expected to either.

If you really want this fixed, I suggest finding someone who is well versed
in both network security issues and Internet protocol fundamentals (not
just TCP or even just IP, but all the other lovely beasties out there) and
convincing them it's worth their time (I hear money is often an excellent
motivator). The issues involved with writing a serious, production-capable
network stack are really quite non-trivial (and yes, I *do* speak from
personal experience in this).
-- 
Joel Aelwyn <[EMAIL PROTECTED]>   ,''`.
 : :' :
 `. `'
   `-


signature.asc
Description: Digital signature


Re: Required firewall support

2005-03-16 Thread Thomas Bushnell BSG
Adrian Bunk <[EMAIL PROTECTED]> writes:

> It seems what makes Thomas suspicous is that of all current ports of 
> Debian (Linux, *BSD, GNU/Hurd), the only one that might be affected is 
> GNU/Hurd - this requirement is therefore either void for all current 
> Debian ports or it was meant specifically against GNU/Hurd.

I'm not so much suspicious as simply asking what the requirement means
("firewalling support" could refer to many different features), and
also why it was added.  

I'm assuming that the requirements were written for their own sake,
because they represent important things that are relevant to the
particular cases they cover, and not because the authors of the
proposal were trying to achieve some pre-determined list of archs.

Thomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-16 Thread Adrian Bunk
On Thu, Mar 17, 2005 at 12:24:00AM +0100, Marco d'Itri wrote:
> On Mar 17, Thomas Bushnell BSG <[EMAIL PROTECTED]> wrote:
> 
> > > > One of the conditions for SCC is "fully functioning Unix, including
> > > > DNS and firewall support."  What specifically is intended by "firewall
> > > > support"?  
> > > I think that simple ACLs are the bare minimum.
> > Ok, can you point me at the specific feature, and why is this feature
> I think that the minimum is per-interface permit/deny ACLs which could
> match at least on IP protocol number, TCP/UDP ports and ICMP types.
> 
> > important for packaging in SCC?
> Because Debian should not waste resources to support a toy OS (in this
> case defined as one not secure enough to stay on the internet for real
> work).

The statement in the announcement was:
- the port must include basic unix functionality, e.g resolving
  DNS names and firewalling

"resolving DNS names" is obviouly required.
But why is "firewalling" required?

It's the question what a "toy OS" is, and whether a "toy OS" might be 
supported by Debian.

It seems what makes Thomas suspicous is that of all current ports of 
Debian (Linux, *BSD, GNU/Hurd), the only one that might be affected is 
GNU/Hurd - this requirement is therefore either void for all current 
Debian ports or it was meant specifically against GNU/Hurd.

Thomas' question is simply whether five of your six DPL candidates have 
signed that they want to kick GNU/Hurd even out of the proposed SCC 
archive or not.

Steve's announcement only listed actions without giving the rationale 
for each of them, and it would therefore be required that someone of the 
12 people who signed this announcement should clarify this point.

> ciao,
> Marco

cu
Adrian

-- 

   "Is there not promise of rain?" Ling Tan asked suddenly out
of the darkness. There had been need of rain for many days.
   "Only a promise," Lao Er said.
   Pearl S. Buck - Dragon Seed


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-16 Thread Marco d'Itri
On Mar 17, Thomas Bushnell BSG <[EMAIL PROTECTED]> wrote:

> > > One of the conditions for SCC is "fully functioning Unix, including
> > > DNS and firewall support."  What specifically is intended by "firewall
> > > support"?  
> > I think that simple ACLs are the bare minimum.
> Ok, can you point me at the specific feature, and why is this feature
I think that the minimum is per-interface permit/deny ACLs which could
match at least on IP protocol number, TCP/UDP ports and ICMP types.

> important for packaging in SCC?
Because Debian should not waste resources to support a toy OS (in this
case defined as one not secure enough to stay on the internet for real
work).

-- 
ciao,
Marco


signature.asc
Description: Digital signature


Re: Required firewall support

2005-03-16 Thread Thomas Bushnell BSG
[EMAIL PROTECTED] (Marco d'Itri) writes:

> On Mar 16, Thomas Bushnell BSG <[EMAIL PROTECTED]> wrote:
> 
> > One of the conditions for SCC is "fully functioning Unix, including
> > DNS and firewall support."  What specifically is intended by "firewall
> > support"?  
> I think that simple ACLs are the bare minimum.

Ok, can you point me at the specific feature, and why is this feature
important for packaging in SCC?

Thomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Required firewall support

2005-03-16 Thread Marco d'Itri
On Mar 16, Thomas Bushnell BSG <[EMAIL PROTECTED]> wrote:

> One of the conditions for SCC is "fully functioning Unix, including
> DNS and firewall support."  What specifically is intended by "firewall
> support"?  
I think that simple ACLs are the bare minimum.

> Those who felt this necessary, can you please describe which specific
> features you believe are necessary, and why?
Only a toy OS like Windows need an external firewall to protect them.

-- 
ciao,
Marco


signature.asc
Description: Digital signature


Required firewall support

2005-03-16 Thread Thomas Bushnell BSG

One of the conditions for SCC is "fully functioning Unix, including
DNS and firewall support."  What specifically is intended by "firewall
support"?  

Those who felt this necessary, can you please describe which specific
features you believe are necessary, and why?

Thomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]