Re: Transparent bridge firewall with bridge-nf

2003-10-31 Thread Benjamin Goedeke
On Thu, 2003-10-30 at 08:53, Norbert Preining wrote:

> Our bridged/fw was running 160 day with code from there. Now I have
> installed a new kernel (2.4.22) with the current ebtables code
> (ebtables.sf.net) which can do even more, although I don't need it. But
> ebtables is the code in 2.6 and actively maintained, while the
> bridge.sf.net code is not maintained anymore.
> Go for it. It is easy, one patch. And then you can do ALL (contrary to
> the opinion of another reply) you can do with iptables on the forward
> table. 

That's what I thought. In fact I've got a test setup going where I use
iptables exclusively. The ebtables code for filtering on the link layer
sounds nice but I don't see any need for that. What makes the bridge
setup appealing to me is that I can simplify the routing tables. The
network looks something like this (excuse my pittyful ascii arts
skills):


 
 |   Internet   |
   
|
--
-.-.-.-.-.-.-.-.-.-.| Campus |
|   | abc.def.0.0/16 |
.   --
|  |
. ...
| .   |  Bridge  |  .
. .     .
  __|__    |.
 / \  tr0|  |eth0  |.
 |  || F| LAN  (abc.def.131.0/24)   .
 |  || W|   .
 \_/    .
 abc.def.130.0/24 . .
  ...


Everything inside the dotted rectangle is our network. The people on the
left (abc.def.130.0/24) are an associated institute and we share some
servers. Both us and them have gateways to the campus network which
obviously creates a loop (along the dash-dotted line). Could this call
for trouble?

> The one obvious advantage is that the bridge doesn't have an IP address
> Well, not necessary. Ours have a IP adress, but is completely closed
> from the outside, while I can log in from the inside.

Well, obviously you will need an IP to do remote administration of the
machine but we have a physically separate private net for that. So the
bridge will get a third nic with a 192... IP address and an ssh server
listening on that interface. But the bridge interface itself won't have
an IP.

And for something actually debian related: Do you know of a woody
backport of the ebtables package? Although I don't need it right away
some of the things descibed on ebtables.sf.net sound like they could
come in handy sometime.

Cheers,
Ben



Re: Transparent bridge firewall with bridge-nf

2003-10-31 Thread Benjamin Goedeke
On Thu, 2003-10-30 at 08:53, Norbert Preining wrote:

> Our bridged/fw was running 160 day with code from there. Now I have
> installed a new kernel (2.4.22) with the current ebtables code
> (ebtables.sf.net) which can do even more, although I don't need it. But
> ebtables is the code in 2.6 and actively maintained, while the
> bridge.sf.net code is not maintained anymore.
> Go for it. It is easy, one patch. And then you can do ALL (contrary to
> the opinion of another reply) you can do with iptables on the forward
> table. 

That's what I thought. In fact I've got a test setup going where I use
iptables exclusively. The ebtables code for filtering on the link layer
sounds nice but I don't see any need for that. What makes the bridge
setup appealing to me is that I can simplify the routing tables. The
network looks something like this (excuse my pittyful ascii arts
skills):


 
 |   Internet   |
   
|
--
-.-.-.-.-.-.-.-.-.-.| Campus |
|   | abc.def.0.0/16 |
.   --
|  |
. ...
| .   |  Bridge  |  .
. .     .
  __|__    |.
 / \  tr0|  |eth0  |.
 |  || F| LAN  (abc.def.131.0/24)   .
 |  || W|   .
 \_/    .
 abc.def.130.0/24 . .
  ...


Everything inside the dotted rectangle is our network. The people on the
left (abc.def.130.0/24) are an associated institute and we share some
servers. Both us and them have gateways to the campus network which
obviously creates a loop (along the dash-dotted line). Could this call
for trouble?

> The one obvious advantage is that the bridge doesn't have an IP address
> Well, not necessary. Ours have a IP adress, but is completely closed
> from the outside, while I can log in from the inside.

Well, obviously you will need an IP to do remote administration of the
machine but we have a physically separate private net for that. So the
bridge will get a third nic with a 192... IP address and an ssh server
listening on that interface. But the bridge interface itself won't have
an IP.

And for something actually debian related: Do you know of a woody
backport of the ebtables package? Although I don't need it right away
some of the things descibed on ebtables.sf.net sound like they could
come in handy sometime.

Cheers,
Ben


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Transparent bridge firewall with bridge-nf

2003-10-30 Thread Norbert Preining
On Mit, 29 Okt 2003, Benjamin Goedeke wrote:
> http://bridge.sf.net to replace the firewall once the transition to

Our bridged/fw was running 160 day with code from there. Now I have
installed a new kernel (2.4.22) with the current ebtables code
(ebtables.sf.net) which can do even more, although I don't need it. But
ebtables is the code in 2.6 and actively maintained, while the
bridge.sf.net code is not maintained anymore.

Go for it. It is easy, one patch. And then you can do ALL (contrary to
the opinion of another reply) you can do with iptables on the forward
table. Very nice and easy. (There were restrictions in the code for
linux 2.2, but in 2.4 they are lifted). On the ebtables page there are
also lots of interesting articles on the general setup, interaction etc.

It is in 2.6, it is stable (160 days up, reboot only for new kernel).

> The one obvious advantage is that the bridge doesn't have an IP address

Well, not necessary. Ours have a IP adress, but is completely closed
from the outside, while I can log in from the inside.

Another advantage: If you have a broken bridge you just plug in a
crossed out cable and everything is running still fine (although without
a firewall), while you reboot or fix the bridge. With NAT this is
impossible.

Best wishes

Norbert

---
Norbert Preining  Technische Universität Wien
gpg DSA: 0x09C5B094  fp: 14DF 2E6C 0307 BE6D AD76  A9C0 D2BF 4AA3 09C5 B094
---
`If there's anything more important than my ego around, I
want it caught and shot now.'
 --- Zaphod.
 --- Douglas Adams, The Hitchhikers Guide to the Galaxy



Re: Transparent bridge firewall with bridge-nf

2003-10-30 Thread Norbert Preining
On Mit, 29 Okt 2003, Benjamin Goedeke wrote:
> http://bridge.sf.net to replace the firewall once the transition to

Our bridged/fw was running 160 day with code from there. Now I have
installed a new kernel (2.4.22) with the current ebtables code
(ebtables.sf.net) which can do even more, although I don't need it. But
ebtables is the code in 2.6 and actively maintained, while the
bridge.sf.net code is not maintained anymore.

Go for it. It is easy, one patch. And then you can do ALL (contrary to
the opinion of another reply) you can do with iptables on the forward
table. Very nice and easy. (There were restrictions in the code for
linux 2.2, but in 2.4 they are lifted). On the ebtables page there are
also lots of interesting articles on the general setup, interaction etc.

It is in 2.6, it is stable (160 days up, reboot only for new kernel).

> The one obvious advantage is that the bridge doesn't have an IP address

Well, not necessary. Ours have a IP adress, but is completely closed
from the outside, while I can log in from the inside.

Another advantage: If you have a broken bridge you just plug in a
crossed out cable and everything is running still fine (although without
a firewall), while you reboot or fix the bridge. With NAT this is
impossible.

Best wishes

Norbert

---
Norbert Preining  Technische Universität Wien
gpg DSA: 0x09C5B094  fp: 14DF 2E6C 0307 BE6D AD76  A9C0 D2BF 4AA3 09C5 B094
---
`If there's anything more important than my ego around, I
want it caught and shot now.'
 --- Zaphod.
 --- Douglas Adams, The Hitchhikers Guide to the Galaxy


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Transparent bridge firewall with bridge-nf

2003-10-29 Thread Blars Blarson
In article <[EMAIL PROTECTED]> 
[EMAIL PROTECTED] writes:
>I administer a LAN that will soon be moved from private to public IP
>space. The LAN is inside a university network and as such in a rather
>hostile environment.

Another alternative is a proxy-arp firewall.  See
http://www.blars.org/sapaf.html for some information on how to do this
without needing multiple subnets.

The bridging code was too experimental for me at the time I implemented 
a firewall with over 200 computers on 5 segments.

-- 
Blars Blarson   [EMAIL PROTECTED]
http://www.blars.org/blars.html
With Microsoft, failure is not an option.  It is a standard feature.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Transparent bridge firewall with bridge-nf

2003-10-29 Thread Blars Blarson
In article <[EMAIL PROTECTED]> 
[EMAIL PROTECTED] writes:
>I administer a LAN that will soon be moved from private to public IP
>space. The LAN is inside a university network and as such in a rather
>hostile environment.

Another alternative is a proxy-arp firewall.  See
http://www.blars.org/sapaf.html for some information on how to do this
without needing multiple subnets.

The bridging code was too experimental for me at the time I implemented 
a firewall with over 200 computers on 5 segments.

-- 
Blars Blarson   [EMAIL PROTECTED]
http://www.blars.org/blars.html
With Microsoft, failure is not an option.  It is a standard feature.



Re: Transparent bridge firewall with bridge-nf

2003-10-29 Thread Dariush Pietrzak
> as opposed to a setup with a firewall+router.
 With Linux there are few problems with transparent firewalling setup - ie,
normal iptables don't work with such setup to well, you need to use special
bridge-iptables, ebtables IIRC. One drawback to that is that you can't do
everything your'e used to do with iptables, you need to limit yourself to
relatively simpler rules ( if all you need is filter out some ports then
there's not limitation here ).
{ Similiar setup using OpenBSD is very clean and works flawlessly out of the
box ( and using standard pf ) }

> and remains invisible at the cost of giving away the real IP addresses
 I don't think being invisible is that much of security measure, it sure is
nice, but the real kick in being invisible is that you can firewall your
users without changing infrastructure, you can put your firewall about anywhere.
 Being invisible doesen't make you invulnerable (as all comic readers know;),
if you've got snort on your firewall and there's a bug in it's parsing code,
you're still going to be sorry...

> keep hiding the real IP addresses of the servers or to hide the firewall
 I don't get it, what do you accomplish by hiding real IP address of
something? Incoming-blocking firewalling is just a byproduct of NAT,
wouldn't you prefer the real thing?

-- 
Dariush Pietrzak,
Key fingerprint = 40D0 9FFB 9939 7320 8294  05E0 BCC7 02C4 75CC 50D9



Re: Transparent bridge firewall with bridge-nf

2003-10-29 Thread Dariush Pietrzak
> as opposed to a setup with a firewall+router.
 With Linux there are few problems with transparent firewalling setup - ie,
normal iptables don't work with such setup to well, you need to use special
bridge-iptables, ebtables IIRC. One drawback to that is that you can't do
everything your'e used to do with iptables, you need to limit yourself to
relatively simpler rules ( if all you need is filter out some ports then
there's not limitation here ).
{ Similiar setup using OpenBSD is very clean and works flawlessly out of the
box ( and using standard pf ) }

> and remains invisible at the cost of giving away the real IP addresses
 I don't think being invisible is that much of security measure, it sure is
nice, but the real kick in being invisible is that you can firewall your
users without changing infrastructure, you can put your firewall about anywhere.
 Being invisible doesen't make you invulnerable (as all comic readers know;),
if you've got snort on your firewall and there's a bug in it's parsing code,
you're still going to be sorry...

> keep hiding the real IP addresses of the servers or to hide the firewall
 I don't get it, what do you accomplish by hiding real IP address of
something? Incoming-blocking firewalling is just a byproduct of NAT,
wouldn't you prefer the real thing?

-- 
Dariush Pietrzak,
Key fingerprint = 40D0 9FFB 9939 7320 8294  05E0 BCC7 02C4 75CC 50D9


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]