2014-04-28 12:42 GMT+02:00 David Woodhouse <dw...@infradead.org>:

> On Mon, 2014-04-21 at 09:42 +0200, Reindl Harald wrote:
> > Am 21.04.2014 03:39, schrieb Lars Seipel:
> > > Nicely aligning with the current firewall thread I noticed that one of
> > > my machines was running the exim MTA for the last few days, dutifully
> > > listening on all interfaces
> >
> > and now it is *proven for sure* that disable the firewall
> > by default is the most dumb thing a distribution can do
>
> This doesn't make much sense to me.
>
> Take a look at the wording of the proposed change: "The current level of
> integration into the desktop and applications does not justify enabling
> the firewalld service by default."
>
> Now imagine the situation if we take the opposite approach — we *fix*
> the integration, and leave it enabled by default.
>
> Fixing the integration means that installing packages which need to
> listen on a network socket should Just Work™. That means they'll talk to
> firewalld somehow, to enable their ports.
>

No no no no no.  If you want a firewall "integrated" *that* way, you are
really better of uninstalling it or opening it up; it serves no purpose.

(Which is why I think opening up the firewall on Workstation might have
been the right thing to do; it was the other parts of the proposal to the
effect of "we'll make it secure later" that were a non-starter.)

Actually, I think the best way to fix this is with SELinux, rather than
> iptables. Why go for an overly complex solution where authorised
> processes have to prod a firewall dæmon to change the iptables
> configuration, when the kernel has a perfectly good "firewall" built in
> as a fundamental part of the IP stack?


More generally, an application- instead of port-based firewall
configuration might be interesting (aside from protecting "ownership" of
some well-known ports I suppose).  But that needs having a
security-relevant *concept* of an application, something we don't have on
the desktop with everything running as unconfined_t and ptrace() allowed,
and something we... sort of have but not enough, with PHP scripts running
in-process in the same domain as the main http server.
    Mirek
-- 
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Reply via email to