home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.protocols.tcp-ip
- Path: sparky!uunet!haven.umd.edu!decuac!hussar.dco.dec.com!mjr
- From: mjr@hussar.dco.dec.com (Marcus J. Ranum)
- Subject: Re: Firewall usage (was: Re: ping works, but ftp/telnet get "no route)
- Message-ID: <1992Jul31.140039.28094@decuac.dec.com>
- Sender: news@decuac.dec.com (USENET News System)
- Nntp-Posting-Host: hussar.dco.dec.com
- Organization: Digital Equipment Corporation, Washington ULTRIX Resource Center
- References: <17011@ulysses.att.com> <1992Jul31.000924.7528@decuac.dec.com> <nvi8dlo@rhyolite.wpd.sgi.com>
- Date: Fri, 31 Jul 1992 14:00:39 GMT
- Lines: 42
-
- >The meaning I infer for "piggy-back blockin" seems formally
- >impossible. Does it mean preventing people from using permitted
- >facilities for impermissible things? Such as piggy-backing a full
- >featured "gateway" on top of rlogin?
-
- Right. I was referring to using one service to piggy-back another
- one. Such as running an interactive login session over an FTP command
- stream. ;) Or tunnelling X-windows packets in a telnet session. In general
- one may need to block that kind of thing, especially in the case where
- the piggy-backing is being done to make an unsecure protocol (like X)
- available.
-
- I'm not a theorist of any type, so I can't say anything about
- formalisms. ;) On the other hand, I do know that ad hack methods can
- go a long way towards preventing these kinds of things, *if it is necessary*.
- Not all sites will *care* about preventing people from tunnelling X over
- telnet, for example. At that point the problem ceases to be a technical
- one, and becomes a policy matter - and many of the gateway admins I know
- don't set the policy; they are just stuck with enforcing it.
-
- My telnet application gateway, for example, has a rate limiter
- in it that will adjust the baud rate of an outgoing telnet session to
- a (low) settable value. That way you can run an interactive session nicely,
- but if you try to run kermit over it, it'll be unacceptably slow. My
- FTP application gateway has rate limiting on the command stream, and also
- fires off warnings if commands are sent over the command stream that are
- not recognizable telnet commands. Yes, one could encode X packets in the
- pathnames of "GET" commands, but then the rate limiter will choke you.
- All these interesting events are logged.
-
- The main thing here is not to subscribe to some (imho useless)
- formal model of security, but to just try to be reasonable and to make
- sure that if someone does Something Bad to your gateway, it leaves
- tracks that you can follow. Gateway admins are often in a really nasty
- spot - they have to enforce sets of rules that sometimes don't make
- a whole lot of sense. I try to enforce them sensibly, and to do anything
- I can to make sure that if someone launches a *real* attack on my gateway,
- I'll have a chance of catching them, or at least I'll have enough
- information about what happened that I can deduce what they were
- trying to do, and check for holes.
-
- mjr.
-