Subject: Re: security/9077: default packet filters for network service daemons
To: None <fair@clock.org>
From: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
List: tech-security
Date: 01/01/2000 15:04:56
by redmail.netbsd.org with SMTP; 1 Jan 2000 20:05:08 -0000
by orchard.arlington.ma.us (8.8.8/8.8.8) with ESMTP id PAA29784;
Sat, 1 Jan 2000 15:05:06 -0500 (EST)
by thunk.hamachi.org (8.8.8/8.8.8) with ESMTP id PAA04510;
Sat, 1 Jan 2000 15:04:56 -0500 (EST)
Message-Id: <200001012004.PAA04510@thunk.hamachi.org>
From: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
To: fair@clock.org
cc: gnats-bugs@gnats.netbsd.org, tech-security@netbsd.org
Subject: Re: security/9077: default packet filters for network service daemons
In-Reply-To: Message from fair@clock.org
of "Wed, 29 Dec 1999 20:59:54 PST." <19991230050004Z27461-26015+11@cesium.clock.org>
Date: Sat, 01 Jan 2000 15:04:56 -0500
> This PR is intended ... to elicit discussion
> from the community at large.
Even allowing service to the "local subnet" by default is excessively
liberal in many common cases.
Several cases come to mind:
- typical cable modem service where the demarc point is a
layer-2 bridge, since the "local subnet" may extend to include systems
outside the "site" (including your neighbors).
- mobile nodes (laptops, etc.) which may connect to suspect or
even potentially hostile networks.
- wireless subnets, where anyone within RF range can join the
network.
In other words, administrative boundaries != topological boundaries.
IMHO, the default "out of the box" config should run no network
services. If we're going to take the belt and suspenders approach (to
protect you even if you accidentally enable services you shouldn't
have), we should change the default configuration for services like
nfs, etc., to deny service to all remote systems until configured
otherwise, not to specially grant access to systems which appear to be
connected to the same wire.
- Bill