diff options
author | robertdavidgraham <robert_david_graham@yahoo.com> | 2013-11-10 00:08:48 -0500 |
---|---|---|
committer | robertdavidgraham <robert_david_graham@yahoo.com> | 2013-11-10 00:08:48 -0500 |
commit | aff29d0c572bd181c122ad070ac8c31daa4f47e4 (patch) | |
tree | ffb60902ed7f96f7c4bd54079046e61d552f4cb2 | |
parent | cd34f56cb09bea06974f0d00ac6593521478eb55 (diff) | |
parent | 50e937d2ec570fbd220d012780e710ddd32f4d60 (diff) | |
download | isowall-aff29d0c572bd181c122ad070ac8c31daa4f47e4.zip isowall-aff29d0c572bd181c122ad070ac8c31daa4f47e4.tar.gz isowall-aff29d0c572bd181c122ad070ac8c31daa4f47e4.tar.bz2 |
Merge branch 'master' of https://github.com/robertdavidgraham/isowall
-rw-r--r-- | README.md | 21 |
1 files changed, 21 insertions, 0 deletions
@@ -2,6 +2,9 @@ isowall ======= This is a mini-firewall that completely isolates a target device from the local network. +This is for allowing infected machines Internet access, but without endangering the +local network. + # Building @@ -78,3 +81,21 @@ Inbound packets must have the following conditions: * if an ARP packet, then the source IPv4 address must equal that `external.router.ip` * if an ARP packet, then must be a "reply" + +# Security Guarantee + +There is no guarantee, of course, but this program has pretty good security. + +The security rests on the fact that there is **no IP stack bound to adapters**. +What that means is that the infected targetted cannot touch the firewall +machine in any way, except as allowed within the `is_allowed()` function. +That function represents the majority of the attack surface for the firewall +machine. And, as you can tell from reading the function, it contains almost +no functionality, meaning that the attack surface is very small indeed. + +There are a few theoretical attacks that might happen at the physical layer, +but for the most part, we don't have to worry about them. + + + + |