Re: selecting old machines for firewall/router use

2011-02-23 Thread Andrew McGlashan

Hi,

Paul Fraser wrote:
On Tue, Feb 22, 2011 at 10:41, Nate Bargmann n...@n0nb.us 
mailto:n...@n0nb.us wrote:


Not only that but as we move to IPv6 there is no such thing as NAT.


Oh, how I wish that were true... The IPv6 spec includes NAT.


Well  NAT does have it's advantages, one being that it can act as a 
reasonably good barrier as a NATural firewall.  Sure, it's not perfect, 
but if you have every device with IPv6 (or v4 for that matter) being 
addressable from any location, then personal firewalls will become much 
more important.


An unpatched machine [for whatever reason], behind NAT has a fighting 
chance, but one which is directly addressable from the Internet is much 
more vulnerable to attack.


--
Kind Regards
AndrewM

Andrew McGlashan
Broadband Solutions now including VoIP


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Archive: http://lists.debian.org/4d6500bd.7000...@affinityvision.com.au



Re: selecting old machines for firewall/router use

2011-02-23 Thread Sven Hoexter
On Wed, Feb 23, 2011 at 11:42:37PM +1100, Andrew McGlashan wrote:

 Well  NAT does have it's advantages, one being that it can act
 as a reasonably good barrier as a NATural firewall.  Sure, it's not
 perfect, but if you have every device with IPv6 (or v4 for that
 matter) being addressable from any location, then personal firewalls
 will become much more important.

Fix the border gateway. It's a strange myth that suddenly with IPv6
all the security falls down. I'd recommend [1] for a good overview of
the NAT and security implications, and for this case here section 4.2.

Since most of these routers used at home need at least a firmware update
there's the chance to roll out some stateful firewall for IPv6 as a default.
I see some oportunity here to get back to kind of a 'real' internet.

On the other hand a lot of these devices seem to be Linux based nowdays,
Linux 2.4.x that is, so I guess only the diverse hardware it's running on
holds back mass exploitation. :-/

Sven

[1] http://tools.ietf.org/html/draft-ietf-v6ops-nap-06
-- 
And I don't know much, but I do know this:
With a golden heart comes a rebel fist.
 [ Streetlight Manifesto - Here's To Life ]


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110223130936.GC2058@marvin



Re: selecting old machines for firewall/router use

2011-02-23 Thread Pascal Hambourg
Andrew McGlashan a écrit :
 
 Well  NAT does have it's advantages, one being that it can act as a 
 reasonably good barrier as a NATural firewall.

This is a common misconception. I cannot tell about other NAT's, but
Netfilter NAT is not a barrier at all.

 but if you have every device with IPv6 (or v4 for that matter) being 
 addressable from any location,

NAT does not prevent this. Private (for IPv4) or unique local (for IPv6)
addressing prevents it.

 then personal firewalls will become much more important.
 
 An unpatched machine [for whatever reason], behind NAT has a fighting 
 chance, but one which is directly addressable from the Internet is much 
 more vulnerable to attack.

This is not correct. A stateful packet filter replacing the NAT at the
border will just do the job.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d650856.6010...@plouf.fr.eu.org



Re: selecting old machines for firewall/router use

2011-02-23 Thread Andrew McGlashan

Hi,

Pascal Hambourg wrote:

Andrew McGlashan a écrit :
Well  NAT does have it's advantages, one being that it can act as a 
reasonably good barrier as a NATural firewall.


This is a common misconception. I cannot tell about other NAT's, but
Netfilter NAT is not a barrier at all.


It's a good start with private addressing as alluded to below.

but if you have every device with IPv6 (or v4 for that matter) being 
addressable from any location,


NAT does not prevent this. Private (for IPv4) or unique local (for IPv6)
addressing prevents it.


Yes, this is what you typically have with NAT, private addresses that 
are not Internet routeable.



then personal firewalls will become much more important.

An unpatched machine [for whatever reason], behind NAT has a fighting 
chance, but one which is directly addressable from the Internet is much 
more vulnerable to attack.


This is not correct. A stateful packet filter replacing the NAT at the
border will just do the job.


Of course, most [if not all?] NAT implementations also have SPI 
[stateful packet inspection] feature as well; And many routers have the 
ability to add firewall rules with port forwarding as required on top of 
NAT / SPI setup.



And from the further reading referenced in the other response [1]

  I highlight an excellent point here:
quote
It must be noted that even a firewall doesn't fully secure
a network. Many attacks come from inside or are at a layer
higher than the firewall can protect against. In the final
analysis, every system has to be responsible for its own
security, and every process running on a system has to be
robust in the face of challenges like stack overflows etc.
What a firewall does is prevent a network administration
from having to carry unauthorized
traffic, and in so doing reduce the probability of certain
kinds of attacks across the protected boundary.
/quote

Particularly, every machine has to be responsible ... , well, that 
illustrates quite well that a firewall and port forwarding alone are not 
enough for security when servicing ports.  But again, it is a good 
start.  Sure, any services provided must be kept as secure as possible 
and admins need to keep an eye out for security advisories for such 
services.


Very glad to see that NAT might not be needed in the whole scheme of 
things; However, I take it that return conversation needs to know the 
public IPv6 address and also encapsulate the private address -- thus 
exposing the private ULA range?  With NAT, the actual, in use private 
range is not necessarily divulged, is it?



[1] http://tools.ietf.org/html/draft-ietf-v6ops-nap-06#section-4.1

--
Kind Regards
AndrewM

Andrew McGlashan
Broadband Solutions now including VoIP


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Archive: http://lists.debian.org/4d651a54.4080...@affinityvision.com.au



Re: selecting old machines for firewall/router use

2011-02-23 Thread Andrew McGlashan

Andrew McGlashan wrote:

And from the further reading referenced in the other response [1]


I see a problem with the following:

   quote
   At the same time, this tracking is per address.  In environments
   where the goal is tracking back to the user, additional external
   information will be necessary correlating a user with an address.  In
   the case of short lifetime privacy address usage, this external
   information will need to be based on more stable information such as
   the layer 2 media address.
   /quote

If layer 2 media address, means MAC, then these are easily spoofed, 
that might present a problem with the short lifetime privacy address usage.



[1] http://tools.ietf.org/html/draft-ietf-v6ops-nap-06#section-4.1



--
Kind Regards
AndrewM

Andrew McGlashan
Broadband Solutions now including VoIP


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Archive: http://lists.debian.org/4d651c6c.5080...@affinityvision.com.au



Re: selecting old machines for firewall/router use

2011-02-23 Thread Steven Ayre
On 22 February 2011 00:45, Stan Hoeppner s...@hardwarefreak.com wrote:

 shawn wilson put forth on 2/21/2011 6:05 PM:
  On Mon, Feb 21, 2011 at 6:45 PM, Stan Hoeppner s...@hardwarefreak.com
 wrote:
 
  Pascal Hambourg put forth on 2/21/2011 3:51 PM:
  Stan Hoeppner a écrit :
 
  You only need one
  NIC in your firewall box when using a switch.  You simply plug
  everything into the switch including the DSL modem and the Netgear.
  Bind both the public and private IP addresses to the same NIC in the
  firewall using a virtual NIC: i.e. eth0 and eth0:1.
 
  This is a wrong idea because the firewall can be by-passed, leaving a
  hole in the LAN security.
 
  Would you mind explaining why you believe this?

  well, if you fill up a switch's arp cache, it starts acting like a hub.
 at
  that point data goes everywhere.


Anything to a MAC in the cache will go to the right place, anything not in
the cache is broadcast.

If the cache is full, since nothing new can be added to the cache a MAC's
location can't be added and any data sent to that MAC will continue to be
broadcasted on all ports.

Since cache entries also expire, if an entry isn't refreshed in time it'll
get removed from the cache. If the cache fills back up before that MAC's
location gets readded then data sent to that MAC will also start to be
broadcasted.

It'd need a large number of ARP packets (an attack) to manage to fill the
cache up though... whether that data can get onto the network in the first
place is another matter.


 Would you mind pointing the list to the document that verifies your claim?

  supposedly, there is also a way to 'pivot' past a nat device - i haven't
  looked into this, so i can't speak to this much...

 Again, would you mind pointing us to a document that verifies this?

 I ask because neither are true, and I'd like to see the source of your
 misinformation.

 --
 Stan


 --
 To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact
 listmas...@lists.debian.org
 Archive: http://lists.debian.org/4d630722.1030...@hardwarefreak.com




Re: selecting old machines for firewall/router use

2011-02-23 Thread Henrique de Moraes Holschuh

On Wed, 23 Feb 2011, Andrew McGlashan wrote:
 An unpatched machine [for whatever reason], behind NAT has a
 fighting chance, but one which is directly addressable from the

The protection offered by NAT is equivalent to a statefull firewall that
only allow sessions to be initiated by the inside[1]  Only, a firewall is
likely to do a better job of securing the network than a NAT gateway.

Nobody ever proposed directly attaching networks to the wide internet
without border protection.  That has nothing to do with NAT.

And that unpatched machine has no fighting chance at all, NAT or no NAT,
unless:

 1. none of its inside neighbours will attack it
 2. all the upgrade paths are safe
 3. nothing else is done while it is upgrading itself.

(2) can be quite difficult if any of the important software wants to open a
browser, and there are ads in the pages for example.  (3) depends on user
awareness.


[1] iptables -I FORWARD -i external interface -m conntrack --ctstate
NEW -j DROP  (or something like that).

-- 
  One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie. -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110223193636.ga13...@khazad-dum.debian.net



Re: selecting old machines for firewall/router use

2011-02-22 Thread Paul Fraser
On Tue, Feb 22, 2011 at 10:41, Nate Bargmann n...@n0nb.us wrote:

 Not only that but as we move to IPv6 there is no such thing as NAT.


Oh, how I wish that were true... The IPv6 spec includes NAT.

P.


Re: selecting old machines for firewall/router use

2011-02-22 Thread Henrique de Moraes Holschuh
On Wed, 23 Feb 2011, Paul Fraser wrote:
 On Tue, Feb 22, 2011 at 10:41, Nate Bargmann n...@n0nb.us wrote:
  Not only that but as we move to IPv6 there is no such thing as NAT.
 
 Oh, how I wish that were true... The IPv6 spec includes NAT.

Which RFC?

-- 
  One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie. -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/2011030938.gb15...@khazad-dum.debian.net



Re: selecting old machines for firewall/router use

2011-02-22 Thread shawn wilson
On Feb 22, 2011 6:10 PM, Henrique de Moraes Holschuh h...@debian.org
wrote:

 On Wed, 23 Feb 2011, Paul Fraser wrote:
  On Tue, Feb 22, 2011 at 10:41, Nate Bargmann n...@n0nb.us wrote:
   Not only that but as we move to IPv6 there is no such thing as NAT.
 
  Oh, how I wish that were true... The IPv6 spec includes NAT.

 Which RFC?

Lmgtfy - 4684 and 5902 - don't know off hand, you'll have to do some reading
to see for sure...


Re: selecting old machines for firewall/router use

2011-02-22 Thread Henrique de Moraes Holschuh
On Tue, 22 Feb 2011, shawn wilson wrote:
 On Feb 22, 2011 6:10 PM, Henrique de Moraes Holschuh h...@debian.org
 wrote:
  On Wed, 23 Feb 2011, Paul Fraser wrote:
   Oh, how I wish that were true... The IPv6 spec includes NAT.
 
  Which RFC?
 
 Lmgtfy - 4684 and 5902 - don't know off hand, you'll have to do some reading
 to see for sure...

RFC 5902 is about *thoughts* on IPv6 NAT.  RFC 4684 is about something else
entirely.

AFAIK by the start of 2011 IPv6 NAT was still not in any RFC or serious
proposal.  It might well one day be, and it will be a sad day, and yet
another major mistake to add to the damn big stinking pile of crap that is
has been accumulating under the IPv6 rug for a while now.

I still wonder what kind of weed these people are smoking when they think
any leaf AS is going to accept non-provider-independent address space,
though.  It is the reality already in all RIRs.

It will be easier to just scale the routers.

-- 
  One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie. -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110223010957.ga23...@khazad-dum.debian.net



Re: selecting old machines for firewall/router use

2011-02-21 Thread Nate Bargmann
* On 2011 20 Feb 22:06 -0600, Stan Hoeppner wrote:
 Some consumer wireless routers don't like to do DHCP pass through, and
 won't serve DHCP when configured as a bridge, in which case the Linux
 firewall will have to serve DHCP.  If the wireless router won't pass
 DHCP from the wired to wireless segments while in bridge mode, then
 you're in a catch 22.  Some simply can't be configured as bridges at all
 (access points--APs).  In this case, you'll have to run the Netgear in
 router mode and run multiple RFC 1918 subnets, one for wireless traffic
 and one for wired, and you'll have to setup the firewall to perform
 routing as well as packet filtering.

I found that one does not necessarily need specific bridging support in
the router firmware to make one a simple AP.  What I've done with three
different router models--two Linksys and one Netgear--was to disable the
internal DHCP server and connect the uplink cable to one of the switch
ports rather than the WAN port.  In that configuration they have worked
well by simply passing DHCP and other network protocols.  These have
been models with four wired LAN ports, a wired WAN port, and wireless.
This has the nice effect of my wireless being on the same subnet as my
wired LAN and the wireless clients are directly accessable with ping and
other protocols creating a seemless network.

 You've got your work cut out for you, and it will be a painful learning
 curve if you use the trial and error method of setting it up.  All your
 machines may be unable to access the net while you're changing your
 network architecture, which means no access to troubleshooting docs or
 forum help.
 
 Thus, you need to have researched _everything_ and have a solid step by
 step migration plan in place _before_ you change a single thing.  If all
 clients were wired desktop machines and you didn't have the wireless
 Netgear in the mix it may be easier.  You've got a lot of research to do.

Indeed.  In my experience, the DNSmasq and Shorewall packages are
amongst the easiest ways to set up a DHCP server with caching DNS and
iptables firewall.  If an IPv6 tunnel configures or an IPv6 address is provided 
by the upstream ISP, then the shorewall6 package will be needed.

This can be a very fun project for a learning experience so long as
others aren't having a network outage during the transition.  Have fun!

- Nate 

-- 

The optimist proclaims that we live in the best of all
possible worlds.  The pessimist fears this is true.

Ham radio, Linux, bikes, and more: http://n0nb.us/index.html


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110221131718.ga6...@n0nb.us



Re: selecting old machines for firewall/router use

2011-02-21 Thread shawn wilson
On Sun, Feb 20, 2011 at 9:26 PM, Greg Madden gomadtr...@gci.net wrote:



 On Sunday 20 February 2011 03:03:35 pm Nate Bargmann wrote:
  * On 2011 20 Feb 14:22 -0600, Elmer E. Dow wrote:
   Greetings:
  
   I'd like to set up a network with a firewall for my home computers
   for security, control and convenience (file sharing), as well as to
   learn about networking. We have the Internet entering via a Motorola
   DSL modem and it currently passes data through a NetGear wireless
   router. I'd like to construct my own firewall/router to connect our
   three active machines and also use the NetGear for wireless access
   when needed.
 
  Reusing old hardware is fine.  Be sure that you're not going to spend as
  much or more getting the hardware into an old computer as you might with
  a router capable of running OpenWRT or similar.  Last year I bought an
  Asus WL-500 GP from New Egg for about $60.  Granted, one must read specs
  carefully if more memory/hardware capability is required.  Not to be
  overlooked are the space and energy requirements of an old desktop
  versus a modern router capable of running an embedded Linux
  distribution.
 
 +1

 ditch the old computer , todays routers with dd-wrt or openwrt are more
 reliable
 and cheaper to run.  Buffalo routers come with dd-wrt pre-installed.

 Your netgear router may be supported by dd-wrt, some are. If it has wired
 ports
 along with the wireless it could be fine.


 really? i'd be truly interested if you can show me a peace of hardware that
can do what vyatta can do on old pc hardware. in fact, i'll give you a $500
finders fee if you can find me hardware that does what vyatta can do for
under $500 hell, if you can find anything for under $2k, i'll be
impressed - i think the asa 5525 has the ids capabilities for ~2500 or
something like that which is the closest and cheapest i think you'll find.

that said, i still use a fon for a wifi bridge to my network which runs wrt
(err, sorta) and i highly recommend these devices for everything wifi (even
business networks - no poe though).


Re: selecting old machines for firewall/router use

2011-02-21 Thread Andrei Popescu
On Lu, 21 feb 11, 07:17:18, Nate Bargmann wrote:
 * On 2011 20 Feb 22:06 -0600, Stan Hoeppner wrote:
  Some consumer wireless routers don't like to do DHCP pass through, and
  won't serve DHCP when configured as a bridge, in which case the Linux
  firewall will have to serve DHCP.  If the wireless router won't pass
  DHCP from the wired to wireless segments while in bridge mode, then
  you're in a catch 22.  Some simply can't be configured as bridges at all
  (access points--APs).  In this case, you'll have to run the Netgear in
  router mode and run multiple RFC 1918 subnets, one for wireless traffic
  and one for wired, and you'll have to setup the firewall to perform
  routing as well as packet filtering.
 
 I found that one does not necessarily need specific bridging support in
 the router firmware to make one a simple AP.  What I've done with three
 different router models--two Linksys and one Netgear--was to disable the
 internal DHCP server and connect the uplink cable to one of the switch
 ports rather than the WAN port.  In that configuration they have worked
 well by simply passing DHCP and other network protocols.  These have
 been models with four wired LAN ports, a wired WAN port, and wireless.
 This has the nice effect of my wireless being on the same subnet as my
 wired LAN and the wireless clients are directly accessable with ping and
 other protocols creating a seemless network.

+1

Just don't forget to make sure the router's internal IP address is 
different from any other machine on the network. Easiest way for me was 
to just use different sub-nets. Example: leave the router on 192.168.1.1 
and build my own network on 192.158.0.XXX

Regards,
Andrei
-- 
Offtopic discussions among Debian users and developers:
http://lists.alioth.debian.org/mailman/listinfo/d-community-offtopic


signature.asc
Description: Digital signature


Re: selecting old machines for firewall/router use

2011-02-21 Thread Pascal Hambourg
Andrei Popescu a écrit :
 
 Just don't forget to make sure the router's internal IP address is 
 different from any other machine on the network.

Just like any other device. Nothing special here.

 Easiest way for me was 
 to just use different sub-nets. Example: leave the router on 192.168.1.1 
 and build my own network on 192.158.0.XXX

This is unnecessary, and makes it hard to manage the device.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d62dda5.7080...@plouf.fr.eu.org



Re: selecting old machines for firewall/router use

2011-02-21 Thread Pascal Hambourg
Stan Hoeppner a écrit :
 
 You only need one
 NIC in your firewall box when using a switch.  You simply plug
 everything into the switch including the DSL modem and the Netgear.
 Bind both the public and private IP addresses to the same NIC in the
 firewall using a virtual NIC: i.e. eth0 and eth0:1.

This is a wrong idea because the firewall can be by-passed, leaving a
hole in the LAN security.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d62de67.4050...@plouf.fr.eu.org



Re: selecting old machines for firewall/router use

2011-02-21 Thread Pascal Hambourg
Adrian Levi a écrit :
 
 I'd also suggest a static ip configuration with a setup like this, as
 you'll only have one computer at the end of each ethernet segement you
 won't gain anything from DHCP, you'd need a subnet declaration for
 each nic and a pool statement.

Ethernet cards can be bridged together to form one LAN, with one subnet.
But an easier solution would be to use a cheap dumb switch, or the extra
LAN ports of the internal switch of the wifi router now set up and used
as an access point.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d62df78.8000...@plouf.fr.eu.org



Re: selecting old machines for firewall/router use

2011-02-21 Thread Andrei Popescu
On Lu, 21 feb 11, 22:48:21, Pascal Hambourg wrote:
 
  Easiest way for me was 
  to just use different sub-nets. Example: leave the router on 192.168.1.1 
  and build my own network on 192.158.0.XXX
 
 This is unnecessary, and makes it hard to manage the device.

Ok, but IMVHO it would be a good idea to make sure the DHCP server does 
not allocate the router's IP to some other host.

Regards,
Andrei
-- 
Offtopic discussions among Debian users and developers:
http://lists.alioth.debian.org/mailman/listinfo/d-community-offtopic


signature.asc
Description: Digital signature


Re: selecting old machines for firewall/router use

2011-02-21 Thread Pascal Hambourg
Andrei Popescu a écrit :
 
 Ok, but IMVHO it would be a good idea to make sure the DHCP server does 
 not allocate the router's IP to some other host.

Of course, like any other statically assigned address. Again, nothing
special here.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d62e313.9060...@plouf.fr.eu.org



Re: selecting old machines for firewall/router use

2011-02-21 Thread Stan Hoeppner
Pascal Hambourg put forth on 2/21/2011 3:51 PM:
 Stan Hoeppner a écrit :

 You only need one
 NIC in your firewall box when using a switch.  You simply plug
 everything into the switch including the DSL modem and the Netgear.
 Bind both the public and private IP addresses to the same NIC in the
 firewall using a virtual NIC: i.e. eth0 and eth0:1.
 
 This is a wrong idea because the firewall can be by-passed, leaving a
 hole in the LAN security.

Would you mind explaining why you believe this?

The DSL modem is an ethernet to ATM bridge and the connection to the
DSLAM is point-to-point.  So, with my recommended setup, while in theory
broadcast packets could reach the other end, typically the DSLAM is
going to instantly drop any such packets as they have no valid
destination.  Thus, nothing on the public side of the bridge is going to
know the MAC addresses of internal hosts except the DSLAM, so there's no
chance of things like an ARP attack.

For this to be a real security issue, any attack must start below the IP
level, eliminating any threat from a remote internet host.  The attacker
would have to be a telco employee generating attack packets from the
DSLAM itself.  The odds of this are probably lower than being struck by
lighting while being attacked by a shark.

Remember, the OP has xDSL service, _not_ cable.  If he'd said cable, I'd
not have recommended what I did, as cable is a shared medium, and
broadcast traffic is seen by other customers' equipment on the same
segment.  What I proposed is perfectly safe for xDSL.  For a cable
situation, you should have two physical NICs in the firewall to
eliminate the possibility of broadcast traffic and things like ARP attacks.

-- 
Stan


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d62f904.3040...@hardwarefreak.com



Re: selecting old machines for firewall/router use

2011-02-21 Thread shawn wilson
On Mon, Feb 21, 2011 at 6:45 PM, Stan Hoeppner s...@hardwarefreak.comwrote:

 Pascal Hambourg put forth on 2/21/2011 3:51 PM:
  Stan Hoeppner a écrit :
 
  You only need one
  NIC in your firewall box when using a switch.  You simply plug
  everything into the switch including the DSL modem and the Netgear.
  Bind both the public and private IP addresses to the same NIC in the
  firewall using a virtual NIC: i.e. eth0 and eth0:1.
 
  This is a wrong idea because the firewall can be by-passed, leaving a
  hole in the LAN security.

 Would you mind explaining why you believe this?

 well, if you fill up a switch's arp cache, it starts acting like a hub. at
that point data goes everywhere.

supposedly, there is also a way to 'pivot' past a nat device - i haven't
looked into this, so i can't speak to this much...


Re: selecting old machines for firewall/router use

2011-02-21 Thread Nate Bargmann
* On 2011 21 Feb 18:14 -0600, shawn wilson wrote:
 supposedly, there is also a way to 'pivot' past a nat device - i haven't
 looked into this, so i can't speak to this much...

Not only that but as we move to IPv6 there is no such thing as NAT.  New
network device installations should be taking IPv6 into account,  Of
course any use of later Linux distributions assure IPv6 support.

Even though the WRT55AG is not specifically IPv6 capable nor are the
Ubiquity devices I have on my LAN, as they are operating as bridges they
pass IPv6 just fine.  They just can't be assigned an IPv6 address up to
this point.

- Nate 

-- 

The optimist proclaims that we live in the best of all
possible worlds.  The pessimist fears this is true.

Ham radio, Linux, bikes, and more: http://n0nb.us/index.html


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110222004104.gc19...@n0nb.us



Re: selecting old machines for firewall/router use

2011-02-21 Thread John Hasler
Stan writes:
 For this to be a real security issue, any attack must start below the
 IP level...

Or from the inside.  If none of the machines on the LAN are running
Windows you're probably ok.
-- 
John Hasler


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/871v30lxwe@thumper.dhh.gt.org



Re: selecting old machines for firewall/router use

2011-02-21 Thread Stan Hoeppner
shawn wilson put forth on 2/21/2011 6:05 PM:
 On Mon, Feb 21, 2011 at 6:45 PM, Stan Hoeppner s...@hardwarefreak.comwrote:
 
 Pascal Hambourg put forth on 2/21/2011 3:51 PM:
 Stan Hoeppner a écrit :

 You only need one
 NIC in your firewall box when using a switch.  You simply plug
 everything into the switch including the DSL modem and the Netgear.
 Bind both the public and private IP addresses to the same NIC in the
 firewall using a virtual NIC: i.e. eth0 and eth0:1.

 This is a wrong idea because the firewall can be by-passed, leaving a
 hole in the LAN security.

 Would you mind explaining why you believe this?

 well, if you fill up a switch's arp cache, it starts acting like a hub. at
 that point data goes everywhere.

Would you mind pointing the list to the document that verifies your claim?

 supposedly, there is also a way to 'pivot' past a nat device - i haven't
 looked into this, so i can't speak to this much...

Again, would you mind pointing us to a document that verifies this?

I ask because neither are true, and I'd like to see the source of your
misinformation.

-- 
Stan


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d630722.1030...@hardwarefreak.com



Re: selecting old machines for firewall/router use

2011-02-21 Thread Stan Hoeppner
John Hasler put forth on 2/21/2011 6:24 PM:
 Stan writes:
 For this to be a real security issue, any attack must start below the
 IP level...
 
 Or from the inside.  If none of the machines on the LAN are running
 Windows you're probably ok.

How is this a security issue?  Broadcast packets coming from the
customer that hit the DSLAM are instantly dropped.  Even if you have
Windows machines there's no issue.  Again, we're talking about xDSL here
not cable.  The DSLAM acts as a broadcast packet firewall.

xDSL + broadcast  = no problem
cable + broadcast = potential problem

-- 
Stan


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d630872.3020...@hardwarefreak.com



Re: selecting old machines for firewall/router use

2011-02-21 Thread John Hasler
I wrote:
 Or from the inside.  If none of the machines on the LAN are running
 Windows you're probably ok.

Stan writes:
 How is this a security issue?  Broadcast packets coming from the
 customer that hit the DSLAM are instantly dropped.

Nothing to do with the DSLAM.  These routers usually expose a Web
interface on the LAN side.  Malware on a Windows machine on the LAN
could break into the router.

-- 
John Hasler


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/87wrkskg37@thumper.dhh.gt.org



Re: selecting old machines for firewall/router use

2011-02-21 Thread Stan Hoeppner
John Hasler put forth on 2/21/2011 7:34 PM:
 I wrote:
 Or from the inside.  If none of the machines on the LAN are running
 Windows you're probably ok.
 
 Stan writes:
 How is this a security issue?  Broadcast packets coming from the
 customer that hit the DSLAM are instantly dropped.
 
 Nothing to do with the DSLAM.  These routers usually expose a Web
 interface on the LAN side.  Malware on a Windows machine on the LAN
 could break into the router.

You're confusing
Windows malware can potentially acceess router admin interface

with
Windows malware can automatically subvert the router

Setting a strong password thwarts such a thing, and one should be
setting such a password anyway.

On the flip side, this same router _is_ the default NAT+SPI firewall
for the vast majority of home users.  They don't have a separate Linux
firewall box in the middle.  So I guess you're saying they're all
totally vulnerable to this fanciful malware you describe, which can
access the admin page of any and all home routers instantly and make any
changes it wishes?

In your scenario, how would this differ from the admin interface of
SmoothWall, IPCop, etc?  The admin interfaces of all such firewalls fall
across a wide spectrum of TCP ports.  Does your malware scan them all?
If the consumer hardware router is vulnerable to this fanciful malware
of yours then Smoothy, IPCop, etc, are as well.  Yes?  If you say no,
please explain the technical difference, as I don't see one.

-- 
Stan


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d631dfe.8020...@hardwarefreak.com



Re: selecting old machines for firewall/router use

2011-02-20 Thread Adrian Levi
On 21 February 2011 06:02, Elmer E. Dow elmere...@att.net wrote:
 Greetings:

Snipped

 300 Mhz processor
 boot manager on 3.5-inch diskette so it can boot from diskette, CD or hard
 drive
 ethernet jack on motherboard
 5 pci slots
 4 isa slots
 (I have a pci nic and 2 isa nics on hand, plus there's that built-in jack on
 the board)

 I'm leaning toward using the above machine since it has both pci and isa
 slots for nics (and an ethernet jack on the motherboard) so I won't have to
  buy a switch right away. I'll be able to connect the firewall/router box
 direct to the networked machines. (Will I need crossover cables?) However,
 it's the slowest of the bunch and I suspect that those isa nics might be
 very slow and problematic. Would I be best off just buying a network switch
 or replacing the isa nics with pci nics? Would one of my faster old machines
 be a more practical choice here? I have the following available:

Throw in the ISA nics, they will be fine abeit most probably limited
to 10Mbit, fine for internet but probably a bit tedious transferring
anything larger than a couple of gigs. You'll be wanting 100Mbit
pretty fast.

Yes you will need crossover cables.

I'd also suggest a static ip configuration with a setup like this, as
you'll only have one computer at the end of each ethernet segement you
won't gain anything from DHCP, you'd need a subnet declaration for
each nic and a pool statement. It would be much easier to configure
with static ip's.

Something else to look into is to make sure your cable modem is
plugged into one of the 10Mbit nics unless your internet connection
goes faster than 1M Byte per sec you won't notice any speed gain, save
any 100Mbit nics you have for your client machines.

Some programs you can have a look at running are:
Apache - Local intranet webserver for a homepage shared across machines,
Samba - Share files across windows / linux machines,
Squid - Caching proxy server - save some download bandwith,
Bind - Run your own caching name server,

Hook it all up and have a play ;-)

Adrian

-- 
24x7x365 != 24x7x52 Stupid or bad maths?
erno hm. I've lost a machine.. literally _lost_. it responds to
ping, it works completely, I just can't figure out where in my
apartment it is.


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/AANLkTi=joisnwnbeaomgzl7kl7cwoz4s7mveewe4c...@mail.gmail.com



Re: selecting old machines for firewall/router use

2011-02-20 Thread John Hasler
Elmer writes:
 300 Mhz processor boot manager on 3.5-inch diskette so it can boot
 from diskette, CD or hard drive

That'll work fine as long as it has enough RAM to install Debian.
-- 
John Hasler


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/8762sel8hf@thumper.dhh.gt.org



Re: selecting old machines for firewall/router use

2011-02-20 Thread Nate Bargmann
* On 2011 20 Feb 14:22 -0600, Elmer E. Dow wrote:
 Greetings:
 
 I'd like to set up a network with a firewall for my home computers
 for security, control and convenience (file sharing), as well as to
 learn about networking. We have the Internet entering via a Motorola
 DSL modem and it currently passes data through a NetGear wireless
 router. I'd like to construct my own firewall/router to connect our
 three active machines and also use the NetGear for wireless access
 when needed.

Reusing old hardware is fine.  Be sure that you're not going to spend as
much or more getting the hardware into an old computer as you might with
a router capable of running OpenWRT or similar.  Last year I bought an
Asus WL-500 GP from New Egg for about $60.  Granted, one must read specs
carefully if more memory/hardware capability is required.  Not to be
overlooked are the space and energy requirements of an old desktop
versus a modern router capable of running an embedded Linux
distribution.

I have my OpenWRT router working as an IPv4 DHCP server for my LAN and
caching DNS server with DNSmasq.  It also handles the IPv6 tunnel I have
and serves as the IPv6 router and address configurator with the radvd
package.  As it is a limited platform with only vi available for an
editor, I have it setup so I can mount the file system with sshfs, fuse,
and sftp-server so I can do most of its management from my desktop.  

As I prefer to use a WRT55AG for 802.11a access, I disabled the
WL500GP's 802.11b/g wireless so I cannot comment on its performance.

While there is value in re-purposing old hardware, going this route has
been a gain all the way around for me.  It may be something to consider.

- Nate 

-- 

The optimist proclaims that we live in the best of all
possible worlds.  The pessimist fears this is true.

Ham radio, Linux, bikes, and more: http://n0nb.us/index.html


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110221000335.gd4...@n0nb.us



Re: selecting old machines for firewall/router use

2011-02-20 Thread Greg Madden


On Sunday 20 February 2011 03:03:35 pm Nate Bargmann wrote:
 * On 2011 20 Feb 14:22 -0600, Elmer E. Dow wrote:
  Greetings:
 
  I'd like to set up a network with a firewall for my home computers
  for security, control and convenience (file sharing), as well as to
  learn about networking. We have the Internet entering via a Motorola
  DSL modem and it currently passes data through a NetGear wireless
  router. I'd like to construct my own firewall/router to connect our
  three active machines and also use the NetGear for wireless access
  when needed.

 Reusing old hardware is fine.  Be sure that you're not going to spend as
 much or more getting the hardware into an old computer as you might with
 a router capable of running OpenWRT or similar.  Last year I bought an
 Asus WL-500 GP from New Egg for about $60.  Granted, one must read specs
 carefully if more memory/hardware capability is required.  Not to be
 overlooked are the space and energy requirements of an old desktop
 versus a modern router capable of running an embedded Linux
 distribution.

+1

ditch the old computer , todays routers with dd-wrt or openwrt are more 
reliable 
and cheaper to run.  Buffalo routers come with dd-wrt pre-installed.

Your netgear router may be supported by dd-wrt, some are. If it has wired ports 
along with the wireless it could be fine.

-- 
Peace,

Greg


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201102201726.13826.gomadtr...@gci.net



Re: selecting old machines for firewall/router use

2011-02-20 Thread Stan Hoeppner
Elmer E. Dow put forth on 2/20/2011 2:02 PM:
 Greetings:
 
 I'd like to set up a network with a firewall for my home computers for
 security, control and convenience (file sharing), as well as to learn
 about networking. We have the Internet entering via a Motorola DSL modem
 and it currently passes data through a NetGear wireless router. I'd like
 to construct my own firewall/router to connect our three active machines
 and also use the NetGear for wireless access when needed.

You may have a devil of a time setting up a dedicated Linux firewall
machine and reconfiguring the Netgear to function properly as a wireless
ethernet bridge instead of an IP router.  It may or not not be able to
depending on which model you have.  Since you have wireless clients (I
assume laptops) you'll still want/need DHCP.  So you'll have to decide
who serves DHCP, the Linux firewall or the Netgear.

Some consumer wireless routers don't like to do DHCP pass through, and
won't serve DHCP when configured as a bridge, in which case the Linux
firewall will have to serve DHCP.  If the wireless router won't pass
DHCP from the wired to wireless segments while in bridge mode, then
you're in a catch 22.  Some simply can't be configured as bridges at all
(access points--APs).  In this case, you'll have to run the Netgear in
router mode and run multiple RFC 1918 subnets, one for wireless traffic
and one for wired, and you'll have to setup the firewall to perform
routing as well as packet filtering.

You've got your work cut out for you, and it will be a painful learning
curve if you use the trial and error method of setting it up.  All your
machines may be unable to access the net while you're changing your
network architecture, which means no access to troubleshooting docs or
forum help.

Thus, you need to have researched _everything_ and have a solid step by
step migration plan in place _before_ you change a single thing.  If all
clients were wired desktop machines and you didn't have the wireless
Netgear in the mix it may be easier.  You've got a lot of research to do.

 I'm leaning toward using the above machine since it has both pci and isa
 slots for nics (and an ethernet jack on the motherboard) so I won't have
 to  buy a switch right away.

An 8 port 10/100 FDX Rosewill desktop switch is $10 at Newegg, other
brands around the same price ranging from 4-8 ports.  You only need one
NIC in your firewall box when using a switch.  You simply plug
everything into the switch including the DSL modem and the Netgear.
Bind both the public and private IP addresses to the same NIC in the
firewall using a virtual NIC: i.e. eth0 and eth0:1.  Plenty of docs on
the web to teach you this.

 e-machines
 1.7 Ghz processor
 ethernet jack on motherboard
 3 pci slots
 It seems like this one would have the greatest energy costs. I'd need to
 buy more pci nics, too.

This most likely uses a Celeron chip.  This box will use no more juice
than the others, maybe a little less actually, due to the smaller
feature size of the CPU silicon and the newer lower voltage memory.  I
wouldn't worry about power draw.  All these machines will be very
similar, within 20% of each other tops.

 Which would be most suitable as a firewall/router? I'm thinking that any
 will work, but the e-machines box will be the most expensive to operate.
 And most of the above machines will require me to get more nics or
 purchase a switch. Any other things that I should consider?

Your selection criteria should be solely based on which of these
machines has proven to be most reliable.  If you acquired them used or
for any reason don't have such information available, go with the
youngest box.  Before entrusting it with all of your internet traffic,
I'd thoroughly beat on the network interface to make sure it's solid.
Check for problems using ifconfig:

~$ ifconfig eth0
eth0  Link encap:Ethernet  HWaddr 00:90:27:65:01:69
  inet addr:192.168.100.9  Bcast:192.168.100.255
Mask:255.255.255.0
  UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
  RX packets:2350006 errors:0 dropped:0 overruns:0 frame:0
  TX packets:2708546 errors:0 dropped:0 overruns:0 carrier:0
  collisions:0 txqueuelen:1000
  RX bytes:629009753 (599.8 MiB)  TX bytes:1874802396 (1.7 GiB)

Ideally you should see zeros in the same places as above.  If you see
values above zero that means you have errors at the ethernet level.
This points to a bad NIC, cable, or switch port.

-- 
Stan


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d61e478.4080...@hardwarefreak.com



Re: selecting old machines for firewall/router use

2011-02-20 Thread Stan Hoeppner
John Hasler put forth on 2/20/2011 3:08 PM:
 Elmer writes:
 300 Mhz processor boot manager on 3.5-inch diskette so it can boot
 from diskette, CD or hard drive
 
 That'll work fine as long as it has enough RAM to install Debian.

Not to mention disk space.  Even though the OP asked on this list, I'm
guessing he'd be better off with something like IPCop instead of a
regular distro.  I get the feeling he's not up to manually configuring
iptables rules.

-- 
Stan


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d61e536.80...@hardwarefreak.com