-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 12.08.2009 10:50, Ferenc Wagner wrote:
> Matthias Buecher / Germany <m...@maddes.net> writes:
> 
>> When compiling a kernel prepared for all packages, then bridge
>> firewalling is enabled inside the kernel.
> 
> Rather, I think you get the "problem" when you start the firewall.
> 
>> This leads to "unexpected" behaviour for newbies and normal users: they
>> can not access other devices on the LAN.
> 
> Well, I'd expect a firewall to filter traffic, actually.  It's more
> alarming that a couple of packets can slip through, as the Trac ticket
> #5640 shows.
> 
>> Therefore disable bridge firewalling in sysctl.conf to avoid newbiw
>> problems.
> 
> I'm not sure that less security by default is a good idea.  Especially
> via changing a long time Linux default.  If you don't want a firewall,
> why install and start it?

I agree that in general "less security by default" is not a good idea,
but in this special case it makes sense.

* bridge firewalling is not on by default (see [1]). it just gets
activated when compiling the OpenWrt kernel from trunk with all packages.

* the kernel mostly is compiled from trunk with all packages (seems also
true for the official snapshot), to be prepared for future uses (e.g.
kmod-tun for VPN) and to be able to use the official OpenWrt package
repository.
  if a kernel is used that wasn't compiled with all packages, then this
causes errors/crashes with several packages from the OpenWrt repository
(see #5341 for OpenVPN).

* bridge firewalling is an additional kernel firewall for bridges. when
disabled, this doesn't mean that iptables is not working.

* the typical bridge in OpenWrt is the LAN switch of a router. so it's
mainly an additional security for interal threads, not external threads.

* the typical default behaviour of a router/switch is: allow all LAN
traffic and all outgoing WAN traffic, block all incoming WAN traffic.


The other "but" is the user side:
* Although I have some Linux experience and work as a programmer it took
me over 3 mandays to find the solution. A normal user will be totally lost.
* Someone who wants "bridge firewalling" will find it within some
minutes as he knows what he is looking for.


So in my eyes "bridge firewalling" is an extra security option for
experts, that have/want to protect the LAN ports against each others.
Therefore I would add these settings to the trunk, just like the already
existing more "insecure" settings (e.g. "net.ipv4.ip_forward=1" for VPN).


About the slip-through packets:
This only happens when starting the kernel, the bridge firewalling (not
iptables) seems to be enabled after the network.
So for some seconds some packets may not be "bridge firewalled" on startup.


[1] Linux bridge firewalling:
http://www.linuxfoundation.org/en/Net:Bridge#Kernel_Configuration
-----BEGIN PGP SIGNATURE-----
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkqCu+EACgkQUXXT+9wZdbWg4ACgg9/cRrDQRR5BaTinXfSqK7w1
tPwAoL5seirtRQcMcrvcQUleO2EUpR4r
=zgN7
-----END PGP SIGNATURE-----
_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel

Reply via email to