Re: Design proposal for a better ACL language

2016-06-14 Thread Eric S. Raymond
Mark Atwood : > It is possible to write an iptables kernel loadable module that can do > application level filtering, and the ntp packet format even lends itself to > it. > > However, we will not go down that route. It would be Linux-only, it would > be outside of our remit and outside of our cur

Re: Design proposal for a better ACL language

2016-06-14 Thread Mark Atwood
It is possible to write an iptables kernel loadable module that can do application level filtering, and the ntp packet format even lends itself to it. However, we will not go down that route. It would be Linux-only, it would be outside of our remit and outside of our current hot skill-set, it wou

Re: Design proposal for a better ACL language

2016-06-14 Thread Gary E. Miller
Yo Achim! On Tue, 14 Jun 2016 20:39:35 +0200 Achim Gratz wrote: > Daniel Franke writes: > >> Are there other good ACL languages that we can steal the spec or > >> implementation from > > > > Most of the features we want to match on (basically everything > > except IP/port) are NTP-specific, so

Re: Design proposal for a better ACL language

2016-06-14 Thread Daniel Franke
On 6/14/16, Achim Gratz wrote: > Sorry for the sidetracking, but while you mention iptables: if we can > presume the existence of a packet filter in the OS, would it perhaps > make sense to not implement that part of the filtering in ntpd and leave > it to that filter? No, because most of the tim

Re: Design proposal for a better ACL language

2016-06-14 Thread Achim Gratz
Daniel Franke writes: >> Are there other good ACL languages that we can steal the spec or >> implementation from > > Most of the features we want to match on (basically everything except > IP/port) are NTP-specific, so not directly. But a lot of my design was > inspired by iptables. Sorry for the

Re: Design proposal for a better ACL language

2016-06-14 Thread Daniel Franke
> I'm significantly concerned about part 3. In any transition like > this, there is a *lot* of potential for subtle bugs due to ontological > mismatches between the new and old ways of doing things. It's going > to be a defect attractor, potentially a very nasty one with security > impact (as in,

Re: Design proposal for a better ACL language

2016-06-14 Thread Eric S. Raymond
Daniel Franke : > On 6/13/16, Mark Atwood wrote: > > > Are there other good ACL languages that we can steal the spec or > > implementation from > > Most of the features we want to match on (basically everything except > IP/port) are NTP-specific, so not directly. But a lot of my design was > ins

Re: Design proposal for a better ACL language

2016-06-14 Thread Daniel Franke
On 6/13/16, Mark Atwood wrote: > Are there other good ACL languages that we can steal the spec or > implementation from Most of the features we want to match on (basically everything except IP/port) are NTP-specific, so not directly. But a lot of my design was inspired by iptables. > How hard w

Re: Design proposal for a better ACL language

2016-06-13 Thread Mark Atwood
I like the idea of a better defined ACL language Are there other good ACL languages that we can steal the spec or implementation from How hard will it be to implement this and make sure that implementation is not itself an attack surface It is important that the language be readable and writable b

Design proposal for a better ACL language

2016-06-10 Thread Daniel Franke
Remove the following existing configuration commands: * discard * restrict * controlkey * requestkey * trustedkey And replace them with a directive named 'rule', with the following EBNF syntax: rule = 'rule', {predicate}, disposition, [key] predicate = ['not'], atom atom = 'source', CIDR-BLOCK