Simon Hobson wrote:
> <soapbox mode>
> NAT is also fundamentally broken in ANY implementation, it is BAD, to 
> be avoided whenever you have enough public IPs to avoid it. It's an 
> evil cludge invented to avoid having to fix the real problem (lack of 
> addresses), and a second effect of it's invention has been to delay 
> implementation of the proper fix because too many people think it IS 
> the fix. Along with NAT you need Application Level Gateways (ALGs) 
> for the many protocols it breaks (including FTP and SIP), and for SIP 
> it's far from trivial to build an ALG - in fact it's impractical to 
> build a universal ALG that will work in all possible situations 
> because it requires an intimate knowledge of how the network appears 
> to the client which may not be the same as how it appears to the 
> gateway.
>
> The security is useful, but no more than you can get with any half 
> decent firewall.
>   

    <snipped for Brevity>

    Forgive me for posting on this topic, I want to clarify a few things 
in the hopes that novices will take notice.

    For all the arguing you kids are doing regarding NAT, the following 
remains true and "less than expert" admins should know about it.

    NAT, for all it's faults, does a decent job of keeping outsiders 
from connecting to an internal network. Having access to a true class c 
that you can use for lan/wan purposes on face value seems nice. But when 
security mistakes are made in that context it can lead to unfettered 
access to to the internal infrastructure. Not only that, but you also 
multiply the number of security breach possibilities because now your 
internal network electronics, printers, fax machines, IP cameras, <name 
your esoteric device here> have to be hardened to the same level of a 
server (which would be behind a firewall anyhow).

    I don't know about anyone else, but I certainly don't relish the 
idea of having to add IP cameras, printers, and Windows machines to the 
weekly security audit .... I've got 36 servers to watch- that's enough 
security worry. I certainly wouldn't want the *majority* of IT people 
I've worked with saddled with making sure a firewall was adequately 
protecting a UPS. They just don't have the protocol knowledge.

    So be careful here, some guy with good intentions is going to take 
your "technically correct" opinions, misconfigure a firewall for 240 
devices on a class c, and 3 million people will have lost their credit 
card info- all because some cracker figured out how to script a 
dictionary attack through a Logitech Webcam.

    Remember the audience.

--
Michael Cozzi
[EMAIL PROTECTED]

-------------------------------------------------------------------------
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to