2014
DOI: 10.17487/rfc7288
|View full text |Cite
|
Sign up to set email alerts
|

Reflections on Host Firewalls

Abstract: In today's Internet, the need for firewalls is generally accepted in the industry, and indeed firewalls are widely deployed in practice. Unlike traditional firewalls that protect network links, host firewalls run in end-user systems. Often the result is that software may be running and potentially consuming resources, but then communication is blocked by a host firewall. It's taken for granted that this end state is either desirable or the best that can be achieved in practice, rather than (for example) an end… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
1

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Many privacy-sensitive devices support a "stealth mode" as discussed in Section 5 of [RFC7288] or are behind a network firewall that will drop unsolicited inbound traffic (e.g., TCP SYNs, ICMP Echo Requests, etc.) and thus no TCP RST or ICMP Echo Reply will be sent.…”
Section: Amount Of Entropy Needed In Global Addressesmentioning
confidence: 99%
“…Many privacy-sensitive devices support a "stealth mode" as discussed in Section 5 of [RFC7288] or are behind a network firewall that will drop unsolicited inbound traffic (e.g., TCP SYNs, ICMP Echo Requests, etc.) and thus no TCP RST or ICMP Echo Reply will be sent.…”
Section: Amount Of Entropy Needed In Global Addressesmentioning
confidence: 99%
“…This amounts to attack-surface reduction and is clearly beneficial --this is an advantage of the stealth mode defined in [RFC7288]. However, there are two issues with this advice.…”
Section: Randomized Hostnames As a Remedymentioning
confidence: 99%
“…Support for narrow granularity depends on how the application protocol client and server are designed, however. A typical endpoint-based firewall application may have less ability to make fine-grained decisions than an application that does its own blocking (see [RFC7288] for further discussion).…”
Section: Granularitymentioning
confidence: 99%