Re: F21 System Wide Change: Workstation: Disable firewall

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2014-04-15 at 10:28 -0400, Christian Schaller wrote:
> ----- Original Message -----
> > From: "Reindl Harald" <h.reindl@xxxxxxxxxxxxx>
> > To: devel@xxxxxxxxxxxxxxxxxxxxxxx
> > Sent: Tuesday, April 15, 2014 11:40:20 AM
> > Subject: Re: F21 System Wide Change: Workstation: Disable firewall
> > 
> > 
> > Am 15.04.2014 11:32, schrieb drago01:
> > > On Tue, Apr 15, 2014 at 11:18 AM, Reindl Harald <h.reindl@xxxxxxxxxxxxx>
> > > wrote:
> 
> > allow any random application to open a unprivlieged
> > port which is reachable from outside is dangerous
> > 
> We already allow that and have for a long while. Any application bothering to support the firewalld dbus interface can open any port 
> they wish to.
> 
> There was a long thread about this on the desktop mailing list, and I was not in the 'disable the firewall' camp in that discussion,
> but nobody in that thread or here have articulated how the firewall exactly enhance security in the situation where we at the 
> same time need to allow each user to have any port they desire opened for traffic to make sure things like DLNA or Chromecast works.
> 
> The thread discussing this ended up with mostly being a discussion if the firewall would be a useful way to help users from accidentally 
> oversharing on a public network. Which is important and something we want to work on, but a lot less so than security issues.

There is plenty of prior art here.

What you need is clearly different "zones" that the user can configure
and associate to networks, with the default being that you trust nothing
and everything is firewalled when you roam a new network.

firewalld should grow a NetworkManager plugin so that configuration can
be changed on the fly based on which network NM tells firewalld a
specific interface is connected to.

Applications need to be prevented from being able to arbitrarily open
ports, that should be allowed only for a "trusted" zone. User
intervention should be needed to mark a zone as trusted, in all other
zones the user will have to select explicitly what applications are
allowed.

So the big work here is in the UI you need to build to present these
configurations to the user.

Until then you can present a very simplified UI that just has a big
button/switch that turns everything from "untrusted" to "trusted", with
the default being "untrusted" of course.

Simo.

-- 
Simo Sorce * Red Hat, Inc * New York

-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct





[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux