Thanks Andrew. Good perspectives. I agree with everything you said.  
Middleboxes have lesser control due to end2end security protocols.

You might be surprised, but there are few legacy end devices that still require 
some protocol ALGs 😊 in the middleboxes.  In any case, I got the answer, that 
is,  VPP firewall is simpler stateful inspection firewall with no ALG support.



BTW, on some other subject I had similar type of discussion with end2end 
security:  5G UPF as defined by 3GPP has traffic redirection feature for HTTP 
and SIP. Intention of this feature to provide URL redirection. It requires deep 
inspection of the payload to get hold of URL and then apply the traffic 
redirection rule.  We were wondering whether this feature is valid as majority 
of HTTP transactions between UEs and Cloud services (or even among 
Micro-services) are HTTPS based.   I was told that in some segments, clear 
traffic is not so uncommon.



Thanks
Srini





-----Original Message-----
From: vpp-dev@lists.fd.io <vpp-dev@lists.fd.io> On Behalf Of Andrew Yourtchenko
Sent: Tuesday, July 14, 2020 1:13 PM
To: Addepalli, Srinivasa R <srinivasa.r.addepa...@intel.com>
Cc: vpp-dev@lists.fd.io
Subject: Re: [vpp-dev] Firewall/NAT support for complex applications such as 
SIP, FTP etc..



Hi Srini,



There is no "firewall" support in VPP, but rather a simple "stateful ACL", 
"stateless ACL", and "classifier" (the latter can operate on arbitrary 
bit-masked slice of the packet at fixed offsets).



ACL plugin deliberately provides only a very simple concept of "stateful" ACL 
with very loose tracking of UDP (simple idle timeout) and TCP (two-state idle 
timeout), with the state tracking being confined to a per-interface - inbound 
ACL creaated state affects the outbound ACL filtering and vice versa.



The reason for this is that with today's threat landscape there is really no 
"chewy inside" vs "crunchy outside", and this is why you see the leaders in the 
industry moving to various "zero trust" models.



In this light, implementing any ALG is a significant cost with much smaller 
benefits, even not talking about it being a DoS vector itself.



In the same vein - if an application-level protocol exposes the payload in 
cleartext in such a fashion that it allows to inspect its contents, it should 
not be used in any production network in 2020+.



For file transfers, SFTP/rsync/HTTPS provide perfectly usable options 
(depending on the scenario).



For SIP, STUN/ICE are the industry standard mechanisms.



--a



p.s. I spent nearly a decade in 2000s resolving complex issues involving ALGs 
on commercial firewalls, including those caused by interactions of different 
stacks and vendors.

That experience contributed to my design decisions.



On 7/14/20, Srini 
<srinivasa.r.addepa...@intel.com<mailto:srinivasa.r.addepa...@intel.com>> wrote:

> Hi VPP team,

>

> I understand that VPP has firewall and NAT support.

> Some protocols are complex sessions, where they have control and data

> connections.

> Few examples are SIP and FTP.

>

> In these protocols,  control connection service port is well known,

> but not the ports related to data connections.

> It is expectation to have SIP ALG and FTP ALG which interpret the

> control connection data, figure out the port on which data connections

> would be made and open temporary firewall holes to allow data

> connections. Linux IPTables support few ALGs, but it is in the Kernel.

>

> In that context, does VPP firewall/NAT feature support ALGs?  Sorry,

> if it is the question asked already. I tried to search, could not find

> the answer.

>

> Thanks in advance.

>

> Thanks

> Srini

>

>

>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.

View/Reply Online (#16965): https://lists.fd.io/g/vpp-dev/message/16965
Mute This Topic: https://lists.fd.io/mt/75504468/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub  [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to