Hi Scott, My internal network is “untrusted” because random strangers I barely know (but just enough to know they’re family and friends) wander onto it. The only reason it’s not entirely open is because my bandwidth is metered by the gigabyte and I’d get into trouble with the law of someone started surfing kiddie porn on it. The VPN server, running on the NAS (which is also the gateway) is only really there to make it easier to get to my internal machines from places where there’s no IPv6 connectivity, or as a way to get to my ad-blocking DNS server while I’m roaming and need some peace from the machinations of various worldly carriers and their silly traffic filtering policies and/or censorship. There is no filtering done at all; every host fights for itself, and defends itself, and nothing on my network fails to support authentication and encryption. The gateway allows anonymous port-knocking for any host to any other host, even to external hosts; all you need is a trusted (and valid) WPA2 RADIUS credential.
In other words, it’s the end-host security model, rather than the eggshell security model. I think that, in a world of IPv6 and mobility, this is probably the right long-term approach to adopt. Attacks against internal hosts are just as hard to pull off if you simply design your network so it makes no assumptions about the trustworthiness of other hosts, merely because they are on the “inside”. If you simply assume that any service will be accessible to the entire Internet, instead of to the hypothetical border provided by your firewall, it leads to all manner of sensible default configurations and paranoid security policies that are, really, entirely appropriate. Unsurprisingly, though, some people find this idea rather uncomfortable, because the logical (and correct) outcome of such a policy is to simply eliminate all firewalls. Yes I’m a heretic. But I’ll be careful. :) I still remember, with some fondness, when I had a non-NATed home network. Ah, now *that* was just wonderful. But we can do it again, if people just get on board with working IPv6 connectivity. Some people have argued that the simplest approach to solving this problem of untrusted devices is to set up second networks, much like you describe it. This works well, provided that you can communicate to your devices over the Internet. This is true for some IoT devices, but not all of them; printers and webcams being the obvious ones. Really, this is why you end up advocating for a secure-host posture in the first place: if you can’t trust your devices sufficiently to run them on your network, then it really doesn’t matter whether they’re firewalled or not, because they’ll give this hypothetical attacker access. Hence, buyer beware, and in the increasingly insecure IoT market, buyer had best not buy at all. I do hope this situation changes for the better, but at the very least, for now you can audit your device’s outgoing connections (read your DNS logs) and just make sure it’s not chattering away to anybody you wouldn’t expect it to be. A portscan here and there, after it’s configured and working, never goes amiss either: I discovered one device with completely open FTP and telnet access to the entire file system doing that, and it was a mobile device that I could never have defended if I’d not learned about it. That was a trial, but it did eventually get fixed by the vendor. So I guess, in all of this, what I’m saying is that, even though I completely understand where you’re coming from, the contemporary landscape makes it more important than ever to harden hosts. If you believe in defence in depth, then firewalls certainly won’t hurt either. Cheers, Sabahattin P.S.: the OpenBSD project maintains an ntpd that’s a thousand times easier to configure than the reference implementation and it doesn’t listen to the world by default. It’s only slightly less accurate, too. Check it out. -- The following information is important for all members of the Mac Visionaries list. If you have any questions or concerns about the running of this list, or if you feel that a member's post is inappropriate, please contact the owners or moderators directly rather than posting on the list itself. Your Mac Visionaries list moderator is Mark Taylor and your owner is Cara Quinn - you can reach Cara at caraqu...@caraquinn.com The archives for this list can be searched at: http://www.mail-archive.com/macvisionaries@googlegroups.com/ --- You received this message because you are subscribed to the Google Groups "MacVisionaries" group. To unsubscribe from this group and stop receiving emails from it, send an email to macvisionaries+unsubscr...@googlegroups.com. To post to this group, send email to macvisionaries@googlegroups.com. Visit this group at https://groups.google.com/group/macvisionaries. For more options, visit https://groups.google.com/d/optout.