Firewall Wizards mailing list archives
Re: Time for a new FWTK?
From: Craig Brozefsky <craig () onshore com>
Date: Fri, 28 Nov 1997 11:43:22 -0600
On Fri, 28 Nov 1997, Bennett Todd wrote:
1997-11-27-04:09:30 Craig Brozefsky:Tho for some reaons I think that this "reactive" securty software has a long way to go from pipe dream, to effective software tool.If you haven't done so yet, I encourage you to take a look at Network Flight Recorder[1]. I'm reading the manuals now. It looks like a pretty nifty piece of work.
I got the source and spent a few days going over it. I'm pleased that the decided to release the source code, for this version at least.
It's early to say yet whether this implementation will be the successful pioneer that carries us through this next revolution, but it certainly shows the direction.
I don't think NFR is positioned as a replacement for firewalls, or whatever the fruit of the last "revolution" was.
Network Flight Recorder is a packet sniffer. It has various layers of filtering; there are all sorts of highly-efficient built-in filters and data reduction elements, and there's a general-purpose programming language in which you can write more; then you get to choose what data gets logged and details about how it should be retained. Then you've got your query programs and alert monitors.
The extension language is hardly "general purpose" but it does seem suitable for the present. The choice of what data to log is largely based upon your policy needs, so I don't see this as some kinda omniscient network watchman who detects attacks in progress, and shuts them down, but rather as a way to monitor particular aspects of your security policy in a centralized, manageable fashion.
It looks like the kind of flexible tool that will fairly quickly produce the answer to the hard question ``what do you _look_ for, to catch attacks in the act''.
My remarks that "reactive" software is a pipe dream, were not predicated on the inability to monitor succesfully from within a framework, but rather that the ability to monitor for a well defined attack (port scan, SMTP DEBUG, unauthothorized logins) is one thing, but that protection from unknown attack vectors is another. NFR and others like it are definetly welcome tools, and please don't take my comments as an attempt ot belittle them, but I don't see them as a 'revolution' because their principles have been practiced for awhile already. I don't think there is an answer to that question either, "what do you _look_ for, to catch attacks in the act" and I think that such a goal is misdirected because the vectors of attack are so varied. Craig Brozefsky craig () onshore com onShore Inc. http://www.onshore.com/~craig Development Team p_priority=PFUN+(p_work/4)+(2*p_cash) I hear my inside, the mechanized hum of another world - Steely Dan
Current thread:
- RE: Time for a new FWTK? Stout, William (Nov 26)
- <Possible follow-ups>
- RE: Time for a new FWTK? Bret Watson (Nov 26)
- RE: Time for a new FWTK? Craig Brozefsky (Nov 27)
- Re: Time for a new FWTK? Bennett Todd (Nov 28)
- Re: Time for a new FWTK? Craig Brozefsky (Nov 28)
- Re: Time for a new FWTK? Marcus J. Ranum (Nov 28)
- New firewall paradigms, anyone ? Darren Reed (Nov 28)
- Re: New firewall paradigms, anyone ? Marcus J. Ranum (Nov 28)
- RE: Time for a new FWTK? Craig Brozefsky (Nov 27)
- RE: Time for a new FWTK? Bret Watson (Nov 28)
- RE: Time for a new FWTK? Marcus J. Ranum (Nov 28)
- Re: Time for a new FWTK? Mike Shaver (Nov 29)
