home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!usc!news
- From: tsudik@pollux.usc.edu (Gene Tsudik)
- Newsgroups: comp.protocols.tcp-ip
- Subject: Firewall usage
- Date: 28 Jul 1992 02:44:34 -0700
- Organization: University of Southern California, Los Angeles, CA
- Lines: 55
- Sender: tsudik@pollux.usc.edu (Gene Tsudik)
- Distribution: world
- Message-ID: <l7a5o2INNngi@pollux.usc.edu>
- NNTP-Posting-Host: pollux.usc.edu
-
-
- In article <1992Jul28.010344.9414@PA.dec.com> mogul@pa.dec.com (Jeffrey Mogul)
- writes:
-
- >In article <JTW.92Jul27142002@pmws.lcs.mit.edu> jtw@lcs.mit.edu
- >(John Wroclawski) writes:
- >>Dave [Clark's] second point is that perhaps it is time to rethink the core
- >>architecture of the internet (or its follow-on) to specifically
- >>-include- mechanism to separate organizational policy functions (such
- >>as authentication, logging, and access control) from the actual
- >>service functions running on the typical host.
- >
- >Actually, I think this approach was (in embryonic form, at least)
- >suggested several years ago by Deborah Estrin, who developed the
- >concept of Visa protocols. In this model, "border" routers pass
-
- Visa protocol addresses only end-to-end (in terms of domains, not hosts) access
- control/authentication issues. Control of transit traffic is also quite
- important and will (may) become more so in the future. Charging for providing
- transit services may well become the chief reason for implementing
- transit "hurdles" (the term "firewall" doesn't really apply here).
- For details, see "Secure Control of Transit Internetwork Traffic" (D. Estrin &
- G. Tsudik), Computer Networks and ISDN Systems, October 1991.
-
- >only those packets deemed allowable by an Access Control Server (ACS).
- >Instead of requiring each packet to pass through an ACS on the way
- >in or out of an organization, the end hosts get cryptographically-
- >sealed thingies (visas) to stick onto their packets. This allows
- >a distributed implementation, but also allows the ACS to set whatever
- >policy is desired. The downside is that the cryptographic stuff could
- >be rather costly, and the whole model depends on every external-access
- >host implementing the mechanism. For details, see
- > Deborah Estrin, Jeffrey C. Mogul, and Gene Tsudik.
- > Visa Protocols for Controlling Inter-Organization Datagram Flow.
- > IEEE Journal on Selected Areas in Communication 7(4):486-498, May, 1989.
-
- A more up-to-date Visa protocol description can be obtained via anonymous
- FTP from jerico.usc.edu (pub/gene/new-visa.ps.Z).
-
- >....
- >From time to time, I (hidden behind a firewall) find Digital's policies
- >to be a major pain; I still don't use services such as WAIS because of
-
- Ditto for IBM (imho).
-
- >the extra effort involved. But, I (and my coworkers) no longer spend
- >a significant part of our time either tracking down intruders, or
- >explaining to the corporate security types why they shouldn't shut down
- >our gateway complex.
- >
- --
- ----------------------
- Gene Tsudik
- Spiritually at the University of Southern Califlower
- Physically at the IBM Zurich Research Laboratory
-