TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Why should I firewall servers?

47 pointsby mcobrienover 14 years ago

6 comments

tptacekover 14 years ago
He's right; if you only have a single host, and you're very confident about the host-based tools you're using to restrict access (note: you're much better off with netfilter or pf than you are with TCP Wrappers), there's little to be gained from deploying an additional machine just to do access control.<p><i>But</i>, once you have two machines, it makes far better sense to centralize access control in a single place. With two machines, it's simply good engineering. As your stable of machines grows, it's less a style point and more a necessity. It's hard to keep a group of machines in sync with a single policy, and virtually impossible to avoid mistakes and windows of vulnerability over the long run.<p>An attacker that truly wants to target your network can continuously profile your network, and is more likely to spot your mistakes than you are. A sensible way to approach network security is to assume that there's always someone who's willing put forth the effort to break in.
评论 #1902372 未加载
评论 #1902441 未加载
评论 #1902340 未加载
ghshephardover 14 years ago
Anybody who has worked in a large organization, or heck, any company with more than 30-40 people in the systems (DB/Servers/Network/Syseng) infrastructure group also knows that firewalls have the advantage of "Defense in Depth." If a sysadmin runs a quick pfctl -F a while troubleshooting a problem, and neglects to restore the ruleset, the firewall team has them covered. And the firewall team will never, ever run pfctl -F a. They likely will require multiple-day advance notice to even add a new, very specific rule.<p>Also - having policy for the network guaranteed at a single chokepoint (Usually a ruleset that generates firewall configuration, that is then pushed onto hundreds of firewalls) is a big win. One spot to audit.<p>With all that said - if you are a tiny 2-3 person shop, you can probably get by without Load Balancers, Firewalls, or heck, most infrastructure out there. Just throw it all on AWS/slicehost/linode and harden your hosts to do the right thing.<p>But, when you get big, and have hundreds (thousands?) of hosts, and are tempted to run them yourself, you will have firewalls, and loadbalancers. Many of them, in fact.<p>Check out Margrave (<a href="http://www.cs.brown.edu/~sk/Publications/Papers/Published/nbfdk-margrave-firewall/" rel="nofollow">http://www.cs.brown.edu/~sk/Publications/Papers/Published/nb...</a> ) for some of the interesting stuff around formalizing policy inspection.
mike463over 14 years ago
Firewalls can protect you from a number of things because they deal with the entire stack at once, which tcpwrappers can't do.<p>They can detect and take action against denial of service attacks, port scans and probes for known vulnerabilities. They can manage incoming connections statefully.<p>They can block outgoing connections (big one there), including replies from the stack that give away information you don't want to give away.<p>They can also log what's going on.<p>Really, the ideal system only responds to the one port you're serving (and should stop that if you DOS or probe the system).
btillyover 14 years ago
This advice seems to me to be misguided.<p>Suppose you have a standard database backed website. With his procedure the database would wind up on the internet, exploitable by anyone who knows of a security flaw in it. Under standard operating procedures you'd have a firewall which the web servers are accessible to, and a second firewall that allows the web servers to connect to the database but for nobody else to. Now if someone on the internet knows of a problem in your database software, it is not easily exploitable.
评论 #1902942 未加载
ShabbyDooover 14 years ago
I didn't see any mention of a DMZ. What percentage of his company's servers are hardened in the way he describes? What about his users' desktops? There's got to be some point at which one declares that the "administrator" of a computer (an individual user with a laptop, even) must be protected from himself.<p>What I liked about his argument was that he was actively thinking about threats instead of applying a heuristic of "it's ok -- we have a firewall." With all this said (and asked), I'm no security expert.
Fluxxover 14 years ago
Am I missing something? If you have a server open to the internet, like a database server, it means it's open to brute force attacks. And who wants that?
评论 #1902935 未加载