BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] Port Scanning



On 8/1/24 10:29, Dan Ritter wrote:
> Zero Trust means that you don't*grant*  access based on the
> sender's IP.

I like my version better: Design and build your system so that every 
node is secure enough to sit on today's open internet.

The idea of granting access based on the other node's IP address is 
completely stupid. The fact that it is the standard way of doing things 
doesn't change the fact that it is stupid. Timidly suggesting, in 2024, 
"don't grant access based on the sender's IP" is wildly insufficient.

"Oh, but we still need to be behind a firewall. Because we can't keep 
track of what software we are running and what ports it listens on for 
what purposes."

I suppose I don't get to say what other people mean by zero trust, but I 
will hold to what I think they *should* mean:

 ?????? Design your system so that it does not need a
 ?????? firewall. Only once the firewall is superfluous is
 ?????? it no longer an embarrassment.

I'm not saying that granting access based on the other node's IP address 
has *always* been completely stupid.

Back in ancient times computers used to be about getting something to 
work for the first time ever, about getting it to work at all. Telnet 
was first defined in RFC-206, back in 1973 (three years before even 
TCP). There were so few telnet servers in the world that the RFC listed 
them all. Security was not a big consideration, yet something tells me 
that even those 20-something original telnet servers were going to 
require a username and password before letting someone in to do much.

RSA's design for public key cryptography was published in 1977, nearly 
50-years ago (I remember reading about it at the time in Scientific 
American). Ken Thompson's described backdooring the C compiler in 1984. 
Cypherpunks were getting going by 1985. The Morris Worm was 1988.

We have known computer security is a problem for a *very* long time.

The first edition of /Applied Cryptography/ came out in 1994 (I still 
have my copy), the first version of ssh was written in 1995: We have had 
powerful tools for a very long time.

Basing security on sender's IP has been childish for decades. That it is 
only now maybe dawning on the industry that this was possibly a mistake 
is embarrassing. And why has it taken so long? "Because we have a firewall!"


But what does a naysayer like me know? Look at the results. The experts 
have done a great job! It's not like we still worry about computer 
security anymore. They figured it out. Don't pay any attention to me.


-kb, the Kent who does think it is okay to put something in front of a 
server for load balancing and fighting DDoS attacks, even if it also has 
firewall features.