Ralph,
This is an increasingly important topic - I would like to see cloud infrastructure workloads (especially virtual machines) sandboxed by default and pinholes created for requisite services. For bonus points the ability to specify application level parameters such as allowable HTTP verbs and URL regexps would be helpful. I also think this would be a worthy extension for OCCI at some point in the future (as this is a sensible place for such configuration).
I fear that this specific implementation could be a little on the complex side and would prefer to see something like a simple text protocol (e.g. ufw) over SSL/HTTPS, though I admit I haven't fully considered the security model.
I would suggest this is something we can discuss together after the implementable draft is done next month.
Sam
Dear all,
my name is Ralph Niederberger. I am one of the chairs of the FVGA-WG at
OGF. We are currently investigating in designing a new protocol for
dynamic opening of ports within firewalls by authorized user applications.
Sorry for crossposting to all of the infrastructure-area mailing lists, but I would
like to get feedback from all of you concerning a draft protocol we are just
preparing within our group. And because our area-directors did not provide me with
information on an infrastructure-area mailing list, where I could send it once, I had to
send it to all RG/WGs
The draft description I have appended to this email.
It would be very helpful, if you could comment on this proposal, so that the
Firewall Virtualisation for Grid Applications - Work Group can work on
your comments at the next OGF meeting.
We know that there are many other developments, which already have tried to
solve this issue, but have not seen any solution, which is widely used and/or
provides a similar easy to use interface and broad range of usability.
Our intention is to get as much as possible feedback, so that we can decide as
soon as possible, if the direction we are going is the right one or if we have missed
anything important.
Dependent on your feedback, we would like to go for this solution or change the
draft accordingly.
Then we would like to start the following steps in parallel:
a.) Getting in touch with IETF for standardization issues.
b.) Implementation of a first very limited prototype (showing that it works as suggested).
Step b could be separated into different parts:
b1.) prototype implementation for linux iptables
b2.) prototype in close cooperation with a Firewall developer (-> a first FiTP aware firewall).
Anyone having contact to these guys would be fine.
b3.) Communication prototypes for out of band signalling, i.e. for firewalls which are FiTP
unaware. So the auth server has to start a subroutine for firewall configuration (via CLI,
special firewall managament software, https, ...)
b3 could be done for several firewall systems, e.g. Cisco Pix, Checkpoint, ...
Here we would need experts having access to those kinds of firewalls within test environments.
Next steps are very dependent on the outcome of steps a.) and b.) above.
I would like to thank you all in advance for your feedback.
best regards
Ralph Niederberger
--
***************************************************
Ralph Niederberger
Juelich Supercomputing Centre
Institute for Advanced Simulation
Phone: +49 2461 61-4772
Fax: +49 2461 61-6656
E-Mail: r.niederberger@fz-juelich.de
WWW: http://www.fz-juelich.de/jsc/
JSC is the coordinator of the
John von Neumann Institute for Computing
and member of the
Gauss Centre for Supercomputing
***************************************************
Forschungszentrum Jülich GmbH
52425 Jülich
Sitz der Gesellschaft: Jülich
Eingetragen im Handelsregister des Amtsgerichts Düren Nr. HR B 3498
Vorsitzende des Aufsichtsrats: MinDirig'in Bärbel Brumme-Bothe
Geschäftsführung: Prof. Dr. Achim Bachem (Vorsitzender),
Dr. Ulrich Krafft (stellv. Vorsitzender), Prof. Dr. Harald Bolt,
Dr. Sebastian M. Schmidt
***************************************************
_______________________________________________
occi-wg mailing list
occi-wg@ogf.org
http://www.ogf.org/mailman/listinfo/occi-wg