summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorrobertdavidgraham <robert_david_graham@yahoo.com>2013-11-10 00:08:48 -0500
committerrobertdavidgraham <robert_david_graham@yahoo.com>2013-11-10 00:08:48 -0500
commitaff29d0c572bd181c122ad070ac8c31daa4f47e4 (patch)
treeffb60902ed7f96f7c4bd54079046e61d552f4cb2
parentcd34f56cb09bea06974f0d00ac6593521478eb55 (diff)
parent50e937d2ec570fbd220d012780e710ddd32f4d60 (diff)
downloadisowall-aff29d0c572bd181c122ad070ac8c31daa4f47e4.zip
isowall-aff29d0c572bd181c122ad070ac8c31daa4f47e4.tar.gz
isowall-aff29d0c572bd181c122ad070ac8c31daa4f47e4.tar.bz2
Merge branch 'master' of https://github.com/robertdavidgraham/isowall
-rw-r--r--README.md21
1 files changed, 21 insertions, 0 deletions
diff --git a/README.md b/README.md
index b5b22d0..9c46c3c 100644
--- a/README.md
+++ b/README.md
@@ -2,6 +2,9 @@ isowall
=======
This is a mini-firewall that completely isolates a target device from the local network.
+This is for allowing infected machines Internet access, but without endangering the
+local network.
+
# Building
@@ -78,3 +81,21 @@ Inbound packets must have the following conditions:
* if an ARP packet, then the source IPv4 address must equal that `external.router.ip`
* if an ARP packet, then must be a "reply"
+
+# Security Guarantee
+
+There is no guarantee, of course, but this program has pretty good security.
+
+The security rests on the fact that there is **no IP stack bound to adapters**.
+What that means is that the infected targetted cannot touch the firewall
+machine in any way, except as allowed within the `is_allowed()` function.
+That function represents the majority of the attack surface for the firewall
+machine. And, as you can tell from reading the function, it contains almost
+no functionality, meaning that the attack surface is very small indeed.
+
+There are a few theoretical attacks that might happen at the physical layer,
+but for the most part, we don't have to worry about them.
+
+
+
+