Subject: Re: ipfilter loading.
To: Jonathan Stone <jonathan@DSG.Stanford.EDU>
From: Darren Reed <darrenr@arbld.unimelb.edu.au>
List: tech-kern
Date: 04/29/1997 18:07:22
In some email I received from Jonathan Stone, sie wrote:
[...]
> Accidents and smiconfigurations do happen. An earlier incarnation of
> this debate happened the same day that a major Internet vendor
> accidentally goofed and a gaping hole in their firewall.  I am not
> making this up.  So I want the default configuration to be as safe as
> possible.  A default of `No firewall at all' just doesn't cut it for me.

Just to add some more thoughts to this, if the box running ipfilter crashs,
corrupting /etc/ipf.conf and/of ipf, you're left vulnerable.  Will this
happen you ask.  More likely than the kernel becoming corrupted, at least
in my expereience with ipfilter.

[...]
> >From a security standpoint, being less secure is a misfeature, a _bug_.
> 
> >        (2) The previous default rule when ipfilter was enabled was
> >            "all pass"
> 
> No, it wasn't, not in the versions I've been using.

Up until very recently, the behaviour was to not match (i.e. block) all
packets.  This changed because it was causing more problems...although
I am thinking I should revert to the old behaviour, having read your and
Matt's comments (I'm a security weenie so of course that's my primary
concern).

This is configurable, but I'm thinking it should say something about the
default "rule" being used when it initialises itself.

I guess there are two schools of thought here on whether or not it should
be "on" by default.

Being an LKM aside (this is mainly a development aide), I could argue that
it isn't just "another feature" but really meant to be an integrated part
of IP in the kernel.  The only reason it should be "viewed" as a runtime
feature is because it has been developed by a 3rd party.