[101771] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: request for help w/ ATT and terminology

daemon@ATHENA.MIT.EDU (Brandon Galbraith)
Thu Jan 17 18:56:42 2008

Date: Thu, 17 Jan 2008 17:50:33 -0600
From: "Brandon Galbraith" <brandon.galbraith@gmail.com>
To: "Joe Greco" <jgreco@ns.sol.net>
Cc: Valdis.Kletnieks@vt.edu, nanog@merit.edu
In-Reply-To: <200801172136.m0HLaUiA022308@aurora.sol.net>
Errors-To: owner-nanog@merit.edu


------=_Part_3332_11463805.1200613833870
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

On 1/17/08, Joe Greco <jgreco@ns.sol.net> wrote:
>
>
> Wow, as far as I can tell, you've pretty much condemned most firewall
> software and devices then, because I'm really not aware of any serious
> ones that will successfully implement rules such as "allow from
> 123.45.67.0/24" via DNS.  Besides, if you've gone to the trouble of
> acquiring your own address space, it is a reasonable assumption that
> you'll be able to rely on being able to tack down services in that
> space.  Being expected to walk through every bit of equipment and
> reconfigure potentially multiple subsystems within it is unreasonable.
>
> Taking, as one simple example, an older managed ethernet switch, I see
> the IP configuration itself, the SNMP configuration (both filters and
> traps), the ACL's for management, the time server IP, etc.  I guess if
> you feel that Bay Networks equipment was a bad buy, you're welcome to
> that opinion.  I can probably dig up some similar Cisco gear.
>
> ... JG
>

Agreed. I'd see a huge security hole in letting someone put
host.somewhere.net in a firewall rule in a PIX/ASA/etc. as opposed to an IP,
especially since it's rare to see DNSSEC in production.

-brandon

------=_Part_3332_11463805.1200613833870
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

On 1/17/08, <b class="gmail_sendername">Joe Greco</b> &lt;<a href="mailto:jgreco@ns.sol.net">jgreco@ns.sol.net</a>&gt; wrote:<div><span class="gmail_quote"></span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<br>Wow, as far as I can tell, you&#39;ve pretty much condemned most firewall<br>software and devices then, because I&#39;m really not aware of any serious<br>ones that will successfully implement rules such as &quot;allow from
<br><a href="http://123.45.67.0/24">123.45.67.0/24</a>&quot; via DNS.&nbsp;&nbsp;Besides, if you&#39;ve gone to the trouble of<br>acquiring your own address space, it is a reasonable assumption that<br>you&#39;ll be able to rely on being able to tack down services in that
<br>space.&nbsp;&nbsp;Being expected to walk through every bit of equipment and<br>reconfigure potentially multiple subsystems within it is unreasonable.<br><br>Taking, as one simple example, an older managed ethernet switch, I see
<br>the IP configuration itself, the SNMP configuration (both filters and<br>traps), the ACL&#39;s for management, the time server IP, etc.&nbsp;&nbsp;I guess if<br>you feel that Bay Networks equipment was a bad buy, you&#39;re welcome to
<br>that opinion.&nbsp;&nbsp;I can probably dig up some similar Cisco gear.<br><br>... JG<br></blockquote></div><br>Agreed. I&#39;d see a huge security hole in letting someone put <a href="http://host.somewhere.net">host.somewhere.net
</a> in a firewall rule in a PIX/ASA/etc. as opposed to an IP, especially since it&#39;s rare to see DNSSEC in production.<br><br>-brandon<br>

------=_Part_3332_11463805.1200613833870--


home help back first fref pref prev next nref lref last post