[identity profile] jarad.livejournal.com posting in [community profile] techrecovery
A customer came to me with this one. It's been some time since someone bugged about about some insane recommendation from Steve Gibson. Take a look. So, rather than use a firewall, proper network structure, authentication of end user devices, intrusion detection etc., his idea of good security is to use two NAT routers in a cascade.

I can't find the words to describe the kind of loathing I have for this man.

Date: 2009-08-01 09:49 am (UTC)
From: [identity profile] kuang.livejournal.com
I always found his disk tools useful when I was responsible for a graphic design lab full of ZIP drives, but in most other respects he's one step away from a tinfoil hat.

Date: 2009-08-01 10:29 am (UTC)
From: [identity profile] gholam.livejournal.com
I wonder how is he going to handle IPv6 transition.

Date: 2009-08-01 11:30 am (UTC)
ext_8716: (Default)
From: [identity profile] trixtah.livejournal.com
What is this IPv6 of which you speak? Now that everything is NAT'd, there is no need for stupid IP6, because there are now unlimited addresses for everything!!!1!

Date: 2009-08-01 11:29 am (UTC)
ext_8716: (lulz)
From: [identity profile] trixtah.livejournal.com
That's fucking hilarious, in a sick kind of way. Because NAT FIXES EVERYTHING OMGBBQ!11!

Date: 2009-08-01 12:59 pm (UTC)
From: [identity profile] poly-scott.livejournal.com
O.o

Wow. Just - wow. Brain hurts now.

Is it possible he's just trolling?

This is a whole new level of crazy for him. Far worse than the crap about Windows allowing access to raw ports, or the ranting about various firewall products.

Date: 2009-08-01 03:00 pm (UTC)
From: [identity profile] mouser.livejournal.com
No, he's serious. Skimming the article, I don't THINK he's saying "Use this IN PLACE of firewall, authentication of end user devices, intrusion detection, etc." I think he meant IN ADDITION.

Yea, it's kinda goofy but in very specific circumstances I *kinda* see what he means. Kind of ignores a lot of other options, though.

Oh, and you can just point him at the date on the bottom and quote "We've come a long way baby!"
Edited Date: 2009-08-01 03:02 pm (UTC)

Date: 2009-08-01 01:49 pm (UTC)
From: [identity profile] preserver3.livejournal.com
"Where are your missiles, I would like to see them, and can I come and count them?"

I would like to find people who use this security, and take away their internet.



Date: 2009-08-01 05:09 pm (UTC)
From: [identity profile] tanetris.livejournal.com
I'm looking at the article, and all it seems to be saying is that a second NAT router can be used to (help) secure one part of your network from another, and certainly doesn't tout it as a catch-all security solution... Seems more customer-interpretation-stupid than author-stupid.

(note: I am not trying to defend Steve Gibson, as I have not heard of him prior to today)

Date: 2009-08-01 05:44 pm (UTC)
From: [identity profile] adamjaskie.livejournal.com
It's customer-interpretation-stupid of a dubious "solution" to a problem the customer doesn't have; a problem which may exist in reality, but for which there are better solutions. Namely, if you need such a setup, you shouldn't be using cheapo Linksys NAT boxes.

Date: 2009-08-01 07:07 pm (UTC)
From: [identity profile] jill-idle.livejournal.com
gibson is getting with the times. I heard him say he'll actually start using virus protection soon.

Date: 2009-08-01 09:48 pm (UTC)
jecook: "Feathers" McGraw from Wallace and Grommit (GROMMIT!!!!)
From: [personal profile] jecook
... That's and interesting way to make the customer buy more hardware then they need AND gives them a false sense of security to boot...

Date: 2009-08-02 10:36 pm (UTC)
From: [identity profile] vxo.livejournal.com
Good Fucking Luck if you ever want a port listenable... OUCH.

Ow, ow, ow, owwwwwww. Fail.

Date: 2009-08-03 08:24 am (UTC)
From: [identity profile] tecknow.livejournal.com
I listen to "Security Now" mostly for the book recommendations, but that's not important.

That page seems to be a relic from an earlier incarnation of someone asking how to set up a public network at their home without exposing their personal machines to their guests. He eventually reached the conclusion that a Y shaped topology is better than the one on the page you found. Whatever you or I may think of it, that's also the answer that the professors who study "networking" around here would give.

Profile

techrecovery: (Default)
Elitist Computer Nerd Posse

April 2017

S M T W T F S
      1
2345678
91011121314 15
16171819202122
23242526272829
30      

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Mar. 24th, 2026 09:44 pm
Powered by Dreamwidth Studios