[ale] Firewalld is incomplete
Jim Kinney
jim.kinney at gmail.com
Sun Jan 27 13:53:37 EST 2019
Anyone that can attack a Linux box by futzing with firewalld is already a guru and had root before you installed that OS. :-)
On January 27, 2019 1:45:41 PM EST, Alex Carver via Ale <ale at ale.org> wrote:
>On 2019-01-27 09:47, Solomon Peachy wrote:
>> On Sun, Jan 27, 2019 at 09:18:28AM -0800, Alex Carver via Ale wrote:
>>> Perhaps but it seems like overkill to have a Python script (at the
>>> moment I'm overlooking the imposed need to run an interpreter on
>your
>>> firewall) managing iptables when, according to the documentation,
>any
>>> rule that isn't a very simple one has to use what firewalld calls
>"rich
>>> rules" which look exactly like a more verbose version of an iptables
>>> command. It seems if you're going to have to issue a command that
>looks
>>> just like an iptables command then why not cut the middleman and run
>>> iptables? It already shows in the flow chart that it's just a
>wrapper
>>> to iptables anyway (no direct access to the kernel).
>>
>> The purpose of firewalld is to abstract away the specific network
>> interfaces, operational modes, and firewall implementation from
>> applications (&| services) that only care about firewalling enough to
>
>> say "allow in the packets I care about" or "set my laptop up to be a
>> hotspot using my tethered cell phone"
>>
>> For "workstation" or "server" systems, it's quite useful. It's also
>> good enough for a typical home gateway user, who only cares about
>> automatically NATting the system's internet connection. Beyond that,
>ie
>> for "router" systems, it's not so terribly useful.
>
>The documentation does appear to show that it really is intended to
>control only basic inbound connections but I would argue that missing
>outbound configurations doesn't make it overly useful for workstations
>or servers which need outbound rules.
>
>>
>> (firewalld is inadequate to replace what I'm using for my home
>> gateway, but couple of years back it gained sufficient utility to
>> automagically power my camper trailer's hotspot, including
>> properly interacting with the VPN back to home...)
>
>It certainly wouldn't work for my router. What is it that it does for
>you in your trailer configuration that wasn't possible before it
>existed?
>
>>
>> It's different from UPnP in that there's deliberately no *remote*
>> interface that allows arbitrary ports opened in the firewall. All
>> command and configuration is localhost (via dbus) only.
>
>Fair enough, as long as only local the that does help some but it does
>still add an attack surface even if root isn't compromised.
>
>>
>> (If the local system is sufficiently compromised to allow twiddlling
>of
>> firewalld, then it's sufficiently compromised to twiddle
>iptables/etc
>> directly..)
>
>That's half true. If the local system has a user account (but not
>root)
>compromised then they don't have access to iptables since it requires
>root. A dbus interface can have a compromise or access vector
>independent of root because the user account could have been granted
>access to dbus (whether accidentally or for some other purpose). I see
>plenty of configuration examples just searching for dbus non-root to
>see
>that it's possible to do. It just makes for an extra attack surface
>which makes me nervous (nevermind that it's an entire python script so
>you're depending on ptyhon to be safe).
>_______________________________________________
>Ale mailing list
>Ale at ale.org
>https://mail.ale.org/mailman/listinfo/ale
>See JOBS, ANNOUNCE and SCHOOLS lists at
>http://mail.ale.org/mailman/listinfo
--
Sent from my Android device with K-9 Mail. All tyopes are thumb related and reflect authenticity.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mail.ale.org/pipermail/ale/attachments/20190127/7ab26b08/attachment.html>
More information about the Ale
mailing list