Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH Lectures notes for 2010 - KTH

20.01.2014 Views

MBONE through firewalls http://www.cs.virginia.edu/~mngroup/projects/firewalls/ Their firewall features: • Source host checking (allowing only certain hosts to transmit through the firewall, or denying specific hosts) • Destination port checking • Packet contents (unwrapping encapsulated IP) • Regulating bandwidth allocated to a specific multicast group’s traffic Their Mbone gateway is based on a modified multicast routing daemon. hole MBONE Intranet join join join SOCKS+Mrouted-gw Figure 8: Firewall and internet gateway Maguire MBONE through firewalls 12: 18 of 30 maguire@kth.se 2010.03.21 Internetworking/Internetteknik

Secure Mailer (aka Postfix) Wietse Venema’s attempt to provide an alternative to the widely-used Sendmail program 70% of all mail sent via the Internet is sent via Sendmail “Security. Postfix uses multiple layers of defense to protect the local system against intruders. Almost every Postfix daemon can run in a chroot jail with fixed low privileges. There is no direct path from the network to the security-sensitive local delivery programs - an intruder has to break through several other programs first. Postfix does not even trust the contents of its own queue files, or the contents of its own IPC messages. Postfix avoids placing sender-provided information into shell environment variables. Last but not least, no Postfix program is set-uid.” [18] Maguire Secure Mailer (aka Postfix) 12: 19 of 30 maguire@kth.se 2010.03.21 Internetworking/Internetteknik

Secure Mailer (aka Postfix)<br />

Wietse Venema’s attempt to provide an alternative to the widely-used Sendmail<br />

program<br />

70% of all mail sent via the Internet is sent via Sendmail<br />

“Security. Postfix uses multiple layers of defense to protect the local<br />

system against intruders. Almost every Postfix daemon can run in a<br />

chroot jail with fixed low privileges. There is no direct path from the<br />

network to the security-sensitive local delivery programs - an intruder<br />

has to break through several other programs first. Postfix does not<br />

even trust the contents of its own queue files, or the contents of its<br />

own IPC messages. Postfix avoids placing sender-provided<br />

in<strong>for</strong>mation into shell environment variables. Last but not least, no<br />

Postfix program is set-uid.” [18]<br />

Maguire Secure Mailer (aka Postfix) 12: 19 of 30<br />

maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!