Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Space Junk Chain Reaction (Score 0) 150

People don't understand how important GPS is these days. Loran has been more or less shuttered, so there's no real backup. The part that really scares me is that oil rigs are held stationary by massive rotors. Those rotors are controlled by GPS. If they lose signal, imagine every oil rig on earth suddenly snapping off the top of the oil pipelines that are below them. Imagine hundreds of deepwater horizon style events across the entire world.

Comment Re:Space Junk Chain Reaction (Score 1) 150

I'm not a fan of that thinking. A military space race will essentially lead to a new cold war. The last one wasn't very fun. Scientific progress doesn't get the praise it deserves when half the world thinks it will lead to their imminent destruction. Hell, Sputnik had kids hiding under school desks when they should have been celebrating a landmark for our species.

Comment Re:You are doing it wrong. (Score 2) 348

No, a firewall is an application, a process that brokers all incoming and outgoing communications and maintains a state table of those inbound and outbound connections. The key there is that it maintains a state table. TCPd is a shim process that acts between inetd and the actual application. It is not a firewall. It doesn't drop packets. It doesn't maintain a state table, so it can't, for instance, handle reflexive policies or tell whether or not a dialog has been established. It does handle access control for applications based on IP. However, there's a difference between a firewall saying "you aren't on my allowed hosts list, DROP" and inetd saying "packets accepted, looks like you want to launch application X, tcpd, is that cool? No? ok, sorry, not allowed. SIGTERM." In the end you get similar results, but they're significantly different processes.

This is why I strongly disagree with the idea that firewalls are always needed. They're just another tool, and there are other tools that do similar things.

Comment Re:You are doing it wrong. (Score 1) 348

I think you should read the oracle documentation I posted pointing out how oracle functions before you make assumptions about what we are doing (http://docs.oracle.com/cd/B28359_01/network.111/b28316/concepts.htm). We aren't using oracle by choice, it is bundled inside a vendor's application and configured as they need it configured. Hardware is based on their specs. Software is configured based on their specs to maintain support. We are blocking the ports at the network level using a firewall. We are also blocking the ports at a local level using hosts.allow and hosts.deny. You don't NEED to use a firewall process to block things. Tcpd reads hosts.allow/hosts.deny every time a connection comes in and determines whether or not a host is allowed, and also what services are allowed from that host.

Comment Re:It depends (Score 1) 348

Right, we'll tell them and get told "hey, thanks, but Deutsch telekom doesn't want to change, so we're not implementing it." We've tried. We aren't their largest customer by a longshot, and so long as they are providing critical infrastructure for several governments, they're going to move to change things at glacial speeds.

Comment Re:It depends (Score 1) 348

Or they are apps that have been around for 20+ years on solaris, predating stuff like SElinux. They've updated somewhat frequently, but a lot of core technology hasn't changed. Also, the move from unix to linux introduces some interesting issues that show linux's relative immaturity in comparison. For example, linux doesn't handle network multihoming very well in comparison. You can only stipulate a single default gateway normally - you have to set up a workaround by adding additional routing tables, bind each to an interface, create rule and route files, etc, which to my knowledge don't play nice with a number of linux security features. IPTables is notorious for having issues with multihomed linux servers. Point is, saying "you aren't using a firewall and that is wrong!" is a blanket statement that has many exceptions for different situations.

Given the vendor supports infrastructure for several national governments, I don't think they're likely to change very quickly. I actually just checked the vendor's website - as of release 20, they now support SElinux in permissive mode. Still not supported on enforcing mode.

Comment Re:Its Fine. (Score 1) 348

Correct - for all of our telephony servers KSH is set to the default (some weird carry over from the way the vendor software reconfigures linux to act more like earlier solaris did). So, whenever users log in, they're using ksh. Usually folks use their own accounts thanks to centralized auth or they get nastygrams.

Slashdot Top Deals

Real Users are afraid they'll break the machine -- but they're never afraid to break your face.

Working...