Re: Firewall blocking desktop features

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Am 11.09.2013 23:18, schrieb Mateusz Marzantowicz:
> On 11.09.2013 17:24, Daniel J Walsh wrote:
>> On 09/11/2013 09:18 AM, Reindl Harald wrote:
>>>> The problem with this solution is potential conflicts in port numbers and
>>>> pps that just use random ports (Which I think should just not be allowed
>>>> to use the service and would require to disable the firewall.)
>>
>>> the real problem i described above
>>
>>> as long the is no way to get *predictable* which service/process is aksing
>>> for open a specific port and verify this on the system level this all is
>>> completly pointless
> 
> Interesting discussion but several things doesn't fit together for me:
> 
> 1. It's firewall's job to manage and keep track of opened ports and
> established connection so it also should be the piece of software that
> asks user if he wants to allow network traffic or not.

yes

> 2. Why you say there is no way for firewall to know which app is
> requesting specific port to be opened? There is a process name and path
> and it could be identified. 

could - well, "could" is not a working implementation

show a working implementation
firewall means iptables
yes, firewalld is nothing else than writing netfilter rules)

> It's also easy to maintain database of most commonly used binaries and 
> ports that they'd like to open/close. If you don't trust binaries on 
> your system it means it's already been compromised and firewall is then 
> useless

in case of *desktop features* most of the time you are speaking
about not so well known ports like 80,443,445

and what i fight against is the proposal someone brought in
this thread is that the *application defines* the message
which the user confirms to open a port - from security point
of view this is the most stupid way to go and will later end
in a nightmare

> 3. If you allow each app to ask for permission to open some port, it'll
> certainly be done in thousand different ways and lack of consistency
> isn't going to help users

*what*?

where do i say anything about 1000 different ways?
the *opposite* is what i claim all the time must happen

and what most people do not realize here is that the whole system
(netfilter, network stack, applications) need to work tight together
in the case of a request because the application layer still sends
data and you have to consider queue packets and after open the firewall
send them to the application or whatever you liked to do likely will fail

so with the current state of play there is a lot of infrastructure
missing for even loudly consider to implement "desktop firewalls"
as knwon from the windows world and honestly before there are done
mistakes i clearly say "do not touch it at all" simply because it
worked over decades, it is still working and before now one comes out
and says "but not comfortable enough" he should take a breath and
realize that if it comes to security it works *always* against of
comfort with *no* exceptions at all




Attachment: signature.asc
Description: OpenPGP digital signature

-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux