Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Permissive firewall policy detected #203

Open
fshmcallister opened this issue Dec 23, 2019 · 6 comments
Open

Permissive firewall policy detected #203

fshmcallister opened this issue Dec 23, 2019 · 6 comments

Comments

@fshmcallister
Copy link
Contributor

We found permissive firewall policy present on {devices}. Please consider change it to more restrictive one.

as part of #198

@fshmcallister
Copy link
Contributor Author

fshmcallister commented Dec 23, 2019

TITLE
Permissive firewall policy detected

change to a more restrictive policy

TL;DR

Permissive firewall policy detected on [DEVICE/NODE/ENDPOINT(S)]. Permissive firewall policies permit all traffic unless otherwise specified. Note that you can have different firewall policies for ingoing (ingress) and outgoing (egress) traffic, so check both. Consider changing your policy to be more restrictive, either by implementing rules to your permissive policy, or setting it to restrictive.

FAQ

Firewall policies typically come in two modes: permissive (sometimes known as passive) or restrictive. Permissive policies permit all traffic unless otherwise specified, but these rules can be complex to implement depending on the firewall provider. Restrictive policies essentially do the opposite, they deny all traffic unless otherwise specified. This is the most secure option as it requires manual editing of the access control list.

In order to be as secure as possible, configure your policy to be as specific as possible. Your source IP address, target IP address, and destination port for traffic should be specified and the range of such should be minimal. Avoid using any where possible, the only scenario where this can't be the case is if you have a service that should be available to all internet users. So you may want to configure access to your HTTPS address as any, but ensure access to other backend services such as a database is limited.

Alternatively, implement more rules to your permissive policy (although this is still not recommended). Both ingress and egress traffic can be configured to go through different firewall policies. Make sure to check both for security weaknesses.

@fshmcallister fshmcallister changed the title Permissive firewall policy detected #201 Permissive firewall policy detected Dec 23, 2019
@AlEsmail
Copy link
Contributor

Good job. Wait for Viktor to confirm ok.

@vpetersson
Copy link
Collaborator

Note that you can have different firewall policies for ingoing and outgoing traffic

"Note that you can have different firewall policies for incoming (ingress) and outgoing traffic (egress)."

@vpetersson
Copy link
Collaborator

Good @fshmcallister

@fshmcallister
Copy link
Contributor Author

updated original post to include ingress and egress

@fshmcallister
Copy link
Contributor Author

fshmcallister commented Jan 27, 2020

TITLE
Permissive firewall policy detected

TL;DR

Permissive firewall policy detected. Permissive firewall policies permit all traffic unless otherwise specified. Note that you can have different firewall policies for incoming (ingress) and outgoing (egress) traffic, so check both. Consider changing your policy to be more restrictive, either by implementing rules to your permissive policy, or setting it to restrictive.

FAQ

Firewall policies typically come in two modes: permissive (sometimes known as passive) or restrictive. Permissive policies permit all traffic unless otherwise specified, but these rules can be complex to implement depending on the firewall provider. Restrictive policies essentially do the opposite, they deny all traffic unless otherwise specified. This is the most secure option as it requires manual editing of the access control list.

In order to be as secure as possible, configure your policy to be as specific as possible. Your source IP address, target IP address, and destination port for traffic should be specified and the range of such should be as minimal as possible. Avoid using 'any' where possible, the only scenario where this can't be the case is if you have a service that should be available to all internet users. So you may want to configure access to your port 80/tcp (HTTP) or 443/tcp (HTTPS) to 'any', but ensure access to other back-end services such as a database is limited.

Alternatively, implement more rules to your permissive policy (although this is still not recommended). Both ingress and egress traffic can be configured to go through different firewall policies. Make sure to check both for security weaknesses.

You can configure your firewall directly using the WoTT Dashboard either on a per-node basis (available under the Security tab) or using a group policy.

Code Snippet

Not applicable.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants