Re: Cons?: Directed Pinholes

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, 2004-08-22 at 23:25, Antony Stone wrote:
> On Sunday 22 August 2004 6:14 pm, Sanjay Arora wrote:
> 
> > Can someone please tell me about the downside of implementing directed
> > pinholes in the firewall between DMZ & Green subnet.
> 
> By "Green subnet" I'm going to assume you mean your internal, private LAN...
> 
Yes

> Selective access to/from Internet from/to DMZ
> Selective access to DMZ from internal LAN
> Selective access to Internet from internal LAN
> 
Hmmm..Well I have read that...but many firewalls like ipcop..the one
that I am using, seem to give unrestricted outbound connections, so I
thought that unrestricted outbound was not dangerous.

Can you point out some types of attacks/compromises/resources on
unrestricted outbound connections or the kind of problems it creates.

> It should *not* allow any access *from* machine/s on the DMZ to machines on 
> the internal LAN - the connections should always be initiated from the 
> inside.
> 
> The reason is: the DMZ machines are the only ones accessible from the 
> Internet, therefore they are the ones which might be broken into / 
> compriomised in some way (eg an application buffer overrun attack etc), and 
> you don't want someone who gets root on there to have any access to your 
> internal private systems, so the firewall doesn't allow connections initiated 
> from the DMZ, only ones initiated from the trusted side.
> 
I agree (pinholes)...and I thought so..and somebody on fedora list
suggested directed pinholes assessable from one ip address only and
since my dmz has private address space 192.168.x.x, IPs from there are
not routable to anyone outside my network, I thought that even if
someone broke into it...he would not be able to route the packets back.
Now that I think about it...anyone who has gained root would be able to
setup sort of reverse proxy...and my solution would be blown apart.

However, I have one query...if one can gain access from a directed
pinhole, which allows access from a specific ip address and port, cannot
one gain access into the network from the connections opened from
inside? Can you/anyone point out some resources on this.

Are stateful firewalls then inadequate as complete solution to security,
leaving aside user mistakes/misconfigurations. Some pointers to reading
on this would be appreciated.

> If you haven't read "Building Internet Firewalls" by Chapman & Zwicky, I 
> recommend it - also "Practical Unix & Internet Security" by Garfinkel & 
> Spafford.

Thanks for the recommendation...I will check it out.


Thank you very much for taking the time to guide me.

With best regards.
Sanjay.




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux