Firewalls

Differences between revisions 7 and 8
Revision 7 as of 2005-04-28 08:16:26
Size: 1068
Editor: intern146
Comment: rearrange assigned monkeys
Revision 8 as of 2005-04-29 01:52:40
Size: 1797
Editor: intern146
Comment: Rationale and use cases
Deletions are marked like this. Additions are marked like this.
Line 12: Line 12:
 * Status: BrainDump, UduBof, DistroSpecification, NewSpec  * Status: BrainDump, DistroSpecification, NewSpec
Line 22: Line 22:
Line 26: Line 27:
Ubuntu should be as secure as possible whilst remaining usable and featureful. To combine these two goals, we require a functional firewall admin tool.
We should enable users to effectively and simply enable and disable services such as web or file serving, and allow peer-to-peer services such as BitTorrent.
Line 27: Line 31:

 1. Charles wishes to protect his machine, which is directly on the internet, from attackers.
    He wishes to be able to continue to use his peer-to-peer clients.
 2. William wishes to enable his machine, which is directly conected to the internet, to serve
    web pages to his friends, whilst remaining protected otherwise.
 3. Harry wishes to share the connection on his computer to the rest of his family.

Firewalls

Status

Introduction

Firewalls & Security are important to end-users. Also, when users migrate from other operating systems (and even Linux distributions), there is a sense of wanting a Firewall Management tool. An example of this is how the nice utility that is shipped in Mac OS X, where settings can be turned on and off with the click of the button.

Rationale

Ubuntu should be as secure as possible whilst remaining usable and featureful. To combine these two goals, we require a functional firewall admin tool. We should enable users to effectively and simply enable and disable services such as web or file serving, and allow peer-to-peer services such as BitTorrent.

Scope and Use Cases

  1. Charles wishes to protect his machine, which is directly on the internet, from attackers.
    • He wishes to be able to continue to use his peer-to-peer clients.
  2. William wishes to enable his machine, which is directly conected to the internet, to serve
    • web pages to his friends, whilst remaining protected otherwise.
  3. Harry wishes to share the connection on his computer to the rest of his family.

Implementation Plan

Data Preservation and Migration

Packages Affected

User Interface Requirements

Outstanding Issues

UDU BOF Agenda

UDU Pre-Work

Firewalls (last edited 2008-08-06 16:27:41 by localhost)