[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: simple security
On Wed, 24 Mar 2010, Mark Townsley wrote:
On 3/23/10 3:02 PM, Lee Howard wrote:
The simple-security draft represents the best practice we know of for
securing home networks.
It's not a best-practice, it's a best-guess.
Simple-security is being not being practiced at all on the vast majority of
IPv6 residential connections today.
I experience is different. The IPv6 capable CPEs mostly supporting some
form of firewalling. The dumb one's (only with 6to4) are not.
Advanced users know how to manually poke holes in firewalls, run the right
version of UPnP or NAT-PMP running, etc. Non-advanced users do not. It's the
non-advanced users that need protocols to "just work".
Firewalls make networking more frustrating, particularly for the non-advanced
users.
Non-firewalling might cause even more frustration. You might remember case
of pre SP2 Windows XP: you cannot update win XP without firewall since by
the time you started to download SP ar patches your operating system was
already compromised.... You might expect something similar in the future
over IPv6 also.. There is a need for firewalling! The location of the
firewall is a different story.
Yes, I know there are still OSes that will be compromised in a matter of
seconds on the open Internet. These, however, do not run IPv6. With IPv6, we
are really talking about Vista, Win 7, linux, and macosx. All ship with IPv6
firewalls (except linux I suppose), and far more secure IP stacks vs. that of
ten years ago. All have tethers back home for updates, in the event that a
new exploit is found. These firewalls are far more adaptive and secure than
the "IPv6 simple-security" firewall.
I don't want any of these new IPv6-enabled OSes to think for a moment that
they can let their guard down just because they are plugged into a firewalled
residential gateway "most of the time".
I think differently. I wrote one of my previous e-mail. Think about ipv6
capable, but somehow limited or crap devices:
- no longer supported but know to be vulnerable devices, servers
- devices without access control
You need firewalling on these case at the CPE or with dedicated firewall.
Bad analogy. The O-ring problem wasn't because of a hacker, it was
human/engineering error in a complex system. A bug. Rather than protecting
against bugs, firewalls increase the possibility of having more bugs.
No. Firewall can give time and possibility to fix some bugs later
(unfortunately sometimes this time-window is infinite...)
"simple-security" is "simple-minded". It is based on a security-model that is
rapidly becoming obsolete, and comes at the cost of complexity in both the
RG, the host, and the applications that have to try and work despite all the
various rules for having their packets dropped.
As simple minded as the current CPE. The residential gateway users are
familiar with the the current IPv4 NAT behaviour. What they usuaally
expecting - something similar for IPv6:
1. longer IP address? - understandable, but I don't care.
2. No NAT? - ok I get reasonable amount of subnet from my provider - If
CPE copes with it, I don't mind.
3. No firewall? - what a hell? what will protect my extra-precious-hacked
NAS? - They will sell a separate firewall for me? - No thanks!
Best Regards,
Janos Mohacsi