Hello all,

I am currently migrating a server to a trio of machines using OpenBSD,
and ran into a bit of a design problem. Most of this is not OpenBSD
specific; I'll happily take this question elsewhere if told so, but it
would not exactly be the first non-OpenBSD-specific question here.

To start out with: the server is a typical do-everything-on-the-LAN
linux box. It handles firewalling, web serving, and quite a few
sensitive documents. I'm trying to separate it into a firewall, a web
server, and a third server for 'anything but web' which is the only one
with any more-or-less confidential data on it.

Since I'm a bit of a security hobbyist, I prefer the system to be at
least resistant to any known attack I can reasonably protect it from.

The main problem, right now, is file transfers. The old server serves
FTP over SSL. Both the data and the control stream are encrypted for
those accounts that are likely to handle confidential data. The problem
with encrypting the control stream, of course, is that it prevents
stateful firewalls - like the OpenBSD box in front - from working as
intended.

Switching to a different system is acceptable, but not preferred, as it
has taken quite a bit of effort to get all the users who should into
using FTP. (Then again, as long as it presents a GUI resembling an FTP
interface, it might as well be FTP to pretty much all of them.)

The users are a comparatively small group, which can be told to use a
different client if really required but will bitch and moan quite a
bit. They use Windows 98, XP, or Mac OS X. Additionally, I use OpenBSD.
The Windows users have been told to use CoreFTP; I use lftp on the rare
case that I need to access anything via FTP; and I have no idea what the
Mac users use, but I've not heard any complaints from the two of them.

I'm basically asking for recommendations on file transfers. I see a
couple of options:
- FTP without SSL
        This works well, and is very universally usable. The lack of any
kind of password, let alone data, protection makes it a little too
insecure for my tastes, though.
- FTP with SSL
        Requires tearing a big hole in the firewall, as ftp-proxy
understandably does not grok encrypted traffic, which also causes quite
a bit of insecurity.
        If allowing only passive FTP, the hole is less dangerous, but
still...
- SFTP
        This works well, but requires everyone to use a different
client. Additionally, it violates the principle of least privilige in
most implementations[1]. Requires another method for distributing
publicly available files, but this is not much of a problem - push the
files from the trusted server to the web server, and let httpd do its
thing.
- Collection of (PHP?) scripts on the web server
        This should work. It's not scriptable and not very usable from
anything but a browser. Additionally, webapps tend toward lots of
security holes, which is why it was decided to put the web server on a
separate box with no important data. So this breaks the security model,
either way (either there is a web server on the 'other server', or there
are important documents on the untrusted web server)
- WebDAV
        I've never used this. The Apache authentication features should
be plenty; however, Apache+mod_dav isn't quite as secure and carefree as
either stock ftpd or vsftpd. There are not that many clients, and
support is not quite universal. It's not quite FTP.

The other solution I can see is hacking ftp-proxy to catch any SSL-ish
commands, and then speak plain FTP to the server and FTP+SSL to the
client. This could get complicated fast, though, as it would probably
entail changing ftp-proxy from a simple inetd process to a full-fledged
daemon (to prevent the overhead of starting OpenSSL for each
connection), as well as tacking on a system to catch SSL and
authentication commands (as, for instance, the 'ftp' user should be
given free access without SSL, but the 'veryhighlypriviliged' user
should be required to use SSL for both control and data streams).

This does have a couple of advantages - it actually works on the
firewall, it's an interesting project, and it makes use of the installed
base. OTOH, there are some disadvantages, too - mostly that it is more
than a little complicated, and requires a fair bit of custom coding.

I am leaning a bit to the latter problem, mostly out of hobbyism, but
realise it is far from perfect. Which is why I though to sollicit some
input from misc@ first.

If you've made it through all this rambling, thanks for reading, at
least! I'll happily receive any replies.

                Joachim

[1] Though if I can get everyone to use public key authentication, I
could use the command= syntax in ~/.ssh/authorized_keys (where is this
documented, anyway?). If I point that to a simple binary that does a
chroot and then execs sftp-server, the problem shouldn't be too serious.

Reply via email to