On 21-Mar-05, 12:39 (CST), David Weinehall <[EMAIL PROTECTED]> wrote:
> On Sun, Mar 20, 2005 at 11:22:48AM -0600, Steve Greenland wrote:
> >
> > And that's what we do. But some other OSs (Solaris) do support strict
> > multihoming with a config parameter, it would be nice if Linux did.
>
> netdev
Joel Aelwyn <[EMAIL PROTECTED]> writes:
> Either someone
> cares enough to write (or adapt) the management tools and it gets included,
> or they don't and it doesn't because nobody in their right mind would
> deploy it in any widespread fashion.
But the latter is already true, and irrelevant.
-
On Sun, Mar 20, 2005 at 11:22:48AM -0600, Steve Greenland wrote:
> On 19-Mar-05, 10:00 (CST), Matthias Urlichs <[EMAIL PROTECTED]> wrote:
> >
> > Umm, rp_filter is for rejecting packets whose *source* address is from the
> > wrong network.
>
> Right. I know this. But what Joel was originally tal
On Sun, Mar 20, 2005 at 11:22:48AM -0600, Steve Greenland wrote:
> On 19-Mar-05, 10:00 (CST), Matthias Urlichs <[EMAIL PROTECTED]> wrote:
> >
> > Umm, rp_filter is for rejecting packets whose *source* address is from the
> > wrong network.
>
> Right. I know this. But what Joel was originally tal
* Wouter Verhelst wrote:
> Note that some packages, directly or indirectly, build-depend on
> packages containing daemons that will be started by default if
> installed. In that light, a firewall really is required to keep things
> safe.
IMO most notably, because many users will hit that:
KDE ->
On Thu, Mar 17, 2005 at 01:09:33PM +0100, Marc Haber wrote:
> On Wed, 16 Mar 2005 20:39:48 -0700, Joel Aelwyn <[EMAIL PROTECTED]>
> wrote:
> >* The first rule of securing a machine exposed to the wilds is "Deny by
> > default, allow by need".
>
> Which is pretty well accomplished by only running
On 19-Mar-05, 10:00 (CST), Matthias Urlichs <[EMAIL PROTECTED]> wrote:
>
> Umm, rp_filter is for rejecting packets whose *source* address is from the
> wrong network.
Right. I know this. But what Joel was originally talking about was
rejection of packets on interface A that are destined for an a
Hi, Steve Greenland wrote:
> On 18-Mar-05, 03:28 (CST), Blars Blarson <[EMAIL PROTECTED]> wrote:
>> >Linux fails this. Even with forwarding disabled, it will accept packets
>> >for an address on interface A via interface B.
>>
>> Enable rp_filter and it does reject such packets.
>>
>> echo 1 >/p
Gunnar Wolf <[EMAIL PROTECTED]> writes:
> I agree that any Debian architecture needs to provide basic networking
> facilities, but I don't think firewalling is a real requirement. Yes,
> of course, we expect users to actually _run_ this architecture, and
> they will probably be connected to the ne
Joel Aelwyn dijo [Wed, Mar 16, 2005 at 08:39:48PM -0700]:
> Consider:
>
> * SCC systems have buildds.
>
> * Buildds must be network accessible.
>
> * The first rule of securing a machine exposed to the wilds is "Deny by
> default, allow by need".
>
> Therefore, a box which does not provide ba
[EMAIL PROTECTED] (Marco d'Itri) writes:
> On Mar 17, Thomas Bushnell BSG <[EMAIL PROTECTED]> wrote:
>
> > However, we are not expecting the DSA people to keep the system
> > secure; SCC non-released arches don't need to provide developer
> > machines.
> I do not believe that this is limited to
On 18-Mar-05, 03:28 (CST), Blars Blarson <[EMAIL PROTECTED]> wrote:
> >Linux fails this. Even with forwarding disabled, it will accept packets
> >for an address on interface A via interface B.
>
> Enable rp_filter and it does reject such packets.
>
> echo 1 >/proc/sys/net/ipv4/conf/${dev}/rp_fil
In article <[EMAIL PROTECTED]> [EMAIL PROTECTED] writes:
>On 17-Mar-05, 01:01 (CST), Joel Aelwyn <[EMAIL PROTECTED]> wrote:
>> * The ability for an interface to receive, by default, only traffic that
>> is destined for that interface. (Non-promiscuous mode; promiscuous mode
>> availability is
On 17-Mar-05, 01:01 (CST), Joel Aelwyn <[EMAIL PROTECTED]> wrote:
> * The ability for an interface to receive, by default, only traffic that
> is destined for that interface. (Non-promiscuous mode; promiscuous mode
> availability is a big plus, but not required from the OS point of view)
Linu
On Mar 17, Thomas Bushnell BSG <[EMAIL PROTECTED]> wrote:
> However, we are not expecting the DSA people to keep the system
> secure; SCC non-released arches don't need to provide developer
> machines.
I do not believe that this is limited to debian hosts. If an OS lacks
the basic security feature
On Thu, Mar 17, 2005 at 07:14:27PM +0100, Marc Haber wrote:
> On Thu, 17 Mar 2005 10:03:15 -0700, Joel Aelwyn <[EMAIL PROTECTED]>
> wrote:
> >On Thu, Mar 17, 2005 at 01:09:33PM +0100, Marc Haber wrote:
> >> I am routinely running systems without any packet filtering capability
> >> on the network,
On Thu, 17 Mar 2005 10:03:15 -0700, Joel Aelwyn <[EMAIL PROTECTED]>
wrote:
>On Thu, Mar 17, 2005 at 01:09:33PM +0100, Marc Haber wrote:
>> I am routinely running systems without any packet filtering capability
>> on the network, and they are perfectly able to cope. They just only
>> accept network
Joel Aelwyn <[EMAIL PROTECTED]> writes:
> If you have all of the filtering rule support, then why is this even an
> issue? Write the user-space tool and you should be golden; you've got a
> useable firewalling implementation.
>
> What's the problem?
Who said there was a problem? I was asking ex
On Thu, Mar 17, 2005 at 01:09:33PM +0100, Marc Haber wrote:
> On Wed, 16 Mar 2005 20:39:48 -0700, Joel Aelwyn <[EMAIL PROTECTED]>
> wrote:
> >* The first rule of securing a machine exposed to the wilds is "Deny by
> > default, allow by need".
>
> Which is pretty well accomplished by only running
[ Please respect the list code of conduct; I don't request CCs, nor does ]
[ my M-F-T get set as such. In other words, don't send them. ]
On Thu, Mar 17, 2005 at 12:16:27AM -0800, Thomas Bushnell BSG wrote:
> Joel Aelwyn <[EMAIL PROTECTED]> writes:
>
> > Fine, if you want to get ped
On Thu, 17 Mar 2005 13:52:23 +0100, Florian Weimer <[EMAIL PROTECTED]>
wrote:
>* Marc Haber:
>> I am routinely running systems without any packet filtering capability
>> on the network, and they are perfectly able to cope. They just only
>> accept network connections for needed services.
>
>This is
* Marc Haber:
> I am routinely running systems without any packet filtering capability
> on the network, and they are perfectly able to cope. They just only
> accept network connections for needed services.
This is a bit dangerous because any invocation of "apt-get install" or
"apt-get upgrade" c
On Wed, 16 Mar 2005 20:39:48 -0700, Joel Aelwyn <[EMAIL PROTECTED]>
wrote:
>* The first rule of securing a machine exposed to the wilds is "Deny by
> default, allow by need".
Which is pretty well accomplished by only running needed services. A
port without a services is an implicit "deny".
>Sorr
Joel Aelwyn <[EMAIL PROTECTED]> writes:
> Fine, if you want to get pedantic, the following is a bare minimum of
> capabilities I would expect from any network processing on a 'real'
> (non-toy) network stack, where 'network stack' means everything between
> hardware driver and delivery of data to
Joel Aelwyn <[EMAIL PROTECTED]> writes:
> For buildds, since I don't run one as either local or DSA admin, I couldn't
> tell you offhand. I know what I'd *expect* them to be doing, as general
> guidelines, which closely resembles what I do on servers I deploy facing
> the net, but I don't know wha
On Wed, Mar 16, 2005 at 07:49:23PM -0800, Thomas Bushnell BSG wrote:
> Joel Aelwyn <[EMAIL PROTECTED]> writes:
>
> > If you really want this fixed, I suggest finding someone who is well versed
> > in both network security issues and Internet protocol fundamentals (not
> > just TCP or even just IP,
On Wed, Mar 16, 2005 at 07:50:13PM -0800, Thomas Bushnell BSG wrote:
> Joel Aelwyn <[EMAIL PROTECTED]> writes:
>
> > * SCC systems have buildds.
> >
> > * Buildds must be network accessible.
> >
> > * The first rule of securing a machine exposed to the wilds is "Deny by
> > default, allow by n
Joel Aelwyn <[EMAIL PROTECTED]> writes:
> * SCC systems have buildds.
>
> * Buildds must be network accessible.
>
> * The first rule of securing a machine exposed to the wilds is "Deny by
> default, allow by need".
Exactly which firewalling are the existing buildds doing? (I'm asking
for inf
Joel Aelwyn <[EMAIL PROTECTED]> writes:
> If you really want this fixed, I suggest finding someone who is well versed
> in both network security issues and Internet protocol fundamentals (not
> just TCP or even just IP, but all the other lovely beasties out there) and
> convincing them it's worth
On Wed, Mar 16, 2005 at 03:13:16PM -0800, Thomas Bushnell BSG wrote:
> [EMAIL PROTECTED] (Marco d'Itri) writes:
>
> > On Mar 16, Thomas Bushnell BSG <[EMAIL PROTECTED]> wrote:
> >
> > > One of the conditions for SCC is "fully functioning Unix, including
> > > DNS and firewall support." What spec
Adrian Bunk <[EMAIL PROTECTED]> writes:
> It seems what makes Thomas suspicous is that of all current ports of
> Debian (Linux, *BSD, GNU/Hurd), the only one that might be affected is
> GNU/Hurd - this requirement is therefore either void for all current
> Debian ports or it was meant specifica
On Thu, Mar 17, 2005 at 12:24:00AM +0100, Marco d'Itri wrote:
> On Mar 17, Thomas Bushnell BSG <[EMAIL PROTECTED]> wrote:
>
> > > > One of the conditions for SCC is "fully functioning Unix, including
> > > > DNS and firewall support." What specifically is intended by "firewall
> > > > support"?
On Mar 17, Thomas Bushnell BSG <[EMAIL PROTECTED]> wrote:
> > > One of the conditions for SCC is "fully functioning Unix, including
> > > DNS and firewall support." What specifically is intended by "firewall
> > > support"?
> > I think that simple ACLs are the bare minimum.
> Ok, can you point
[EMAIL PROTECTED] (Marco d'Itri) writes:
> On Mar 16, Thomas Bushnell BSG <[EMAIL PROTECTED]> wrote:
>
> > One of the conditions for SCC is "fully functioning Unix, including
> > DNS and firewall support." What specifically is intended by "firewall
> > support"?
> I think that simple ACLs are
On Mar 16, Thomas Bushnell BSG <[EMAIL PROTECTED]> wrote:
> One of the conditions for SCC is "fully functioning Unix, including
> DNS and firewall support." What specifically is intended by "firewall
> support"?
I think that simple ACLs are the bare minimum.
> Those who felt this necessary, ca
35 matches
Mail list logo