OneiricDesktopNetworkEnhancementsSpec

Differences between revisions 1 and 16 (spanning 15 versions)
Revision 1 as of 2008-05-18 13:50:58
Size: 2345
Editor: 194
Comment: resurrect based on copy at https://gaia.lbl.gov/virBui/SpecTemplate
Revision 16 as of 2011-06-15 14:59:54
Size: 6826
Editor: eth0
Comment: + draft answers from Mathieu
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
## page was copied from SpecTemplate
Line 2: Line 3:

 * '''Launchpad Entry''': UbuntuSpec:desktop-o-desktop-network-enhancements
 * '''Created''': 2011-05-24
 * '''Contributors''': mathieu-tl, jdstrand, broder
 * '''Packages affected''': network-manager, network-manager-gnome, indicator-network
Line 5: Line 11:
This should provide an overview of the issue/functionality/change proposed here. Focus here on what will actually be DONE, summarising that so that other people don't have to read the whole spec. See also CategorySpec for examples. This is somewhat of a catch-all for the most important features that we wish to land to improve usability of NetworkManager. Adding proxy and firewall support were discussed at UDS-O, and so was IPv6 (briefly) in this spec, and a little more in detail in the IPv6 health-check spec.
Line 9: Line 15:
This section should include a paragraph describing the end-user impact of this change. It is meant to be included in the release notes of the first release in which it is implemented. (Not all of these will actually be included in the release notes, at the release manager's discretion; but writing them is a useful exercise.)

It is mandatory.
A number of enhancements to NetworkManager have been done in Oneiric. In particular, IPv6 addresses are now requested by default, although their presence remains optional to bring up an interface. Proxy and firewall configuration support, integrated with an user's connection to form per-network "profiles" have been added. Firewall and proxy are off by default.
Line 15: Line 19:
This should cover the _why_: why is this change being proposed, what justifies it, where we see this justified. It's getting more common to require proxy configurations in some environments to access the Internet; and doing proxy configuration manually when the network location changes tends to be cumbersome.
Line 17: Line 21:
== Use Cases == Host-based firewalls are very common in Windows environments, and increasingly more common on Linux as the myths of being "unbreakable" and virus-free vanish. Furthermore, IPv6 support brings back the requirement of using host-based firewalls due to the somewhat direct access of systems to the Internet via autoconfiguration; which makes network-wide firewalling complex.

== User stories ==

Bob needs to use a proxy at work to browse the web, yet doesn't use one at home. Right now he has to manually bring up the proxy configuration dialog and change his settings, remembering to change them back when he's in the other location.

John is worried about the security of his data. He runs a webserver on his system and SSH to share files with his coworkers and connect to his system remotely from within the office, but he doesn't want those to be exposed to the internet when he is at home. He uses ufw which he has to remember to turn off and on when he changes locations.
Line 21: Line 31:
Firewall support: as a first pass we'll assume the simplest possible settings to be exposed to the users. What this means is providing a way to turn on or off the firewalling on a per-network basis, and exposing presets from UFW to open specific applications.

Proxy support: GNOME already has the concept of profiles for proxy settings. We can safely assume it sufficient to match profiles to connections as a 1:1 relationship, and making sure we keep a "default" proxy setting which enables to proxy.
Line 23: Line 37:
You can have subsections that better describe specific parts of the issue. Proxy settings already exist in System Settings. Ubuntu should not have multiple interfaces to proxy settings.

Second draft of a firewall settings design:

{{attachment:settings-firewall.png}} {{attachment:settings-firewall-exception.png}}

Questions that could alter this design:
 * Does System Settings have a Security panel? If so, maybe this should move there, but with a button here linking to it. ''not yet''
 * How long does the firewall take to start or stop? (0.1 seconds? 2 seconds? 10 seconds?) ''near-instantaneous''
 * Does stopping the firewall involve interrupting any current connections? ''don't think so, not unless they should be blocked''
 * Is blocking outgoing connections at all useful enough to show at the top level like this? ''yes''
 * Does Ubuntu have any “essential” incoming connections? (Mac OS X identifies “DHCP, Bonjour, and IPSec” as essential.) ''need answer from security team''
 * Does Ubuntu have any “essential” outgoing connections? ''Need answer from security team. Web browsing, e-mail, Avahi?''

When complete, this specification will move to https://wiki.ubuntu.com/Networking#Firewall
Line 27: Line 55:
This section should describe a plan of action (the "how") to implement the changes discussed. Could include subsections like:
Line 31: Line 57:
Should cover changes required to the UI, or specific UI that is required to implement this Should include one extra page per "feature": may be tabs, one "Proxy", one "Firewall", and expose as few settings as possible to make it really simple to configure (or ignore).
Line 35: Line 61:
Code changes should include an overview of what needs to change, and in some cases even the specific details. Discussed proxy implementation with Dan Williams (dcbw). Proxy support will require keeping track of proxy settings in an object such as NMSettingsProxy. It may be necessary to get at least WPAD, which is already retrieved from DHCP, to integrate into this (since it's proxy auto-detection). This would likely end up an additional section in the configuration file:

{{{
[proxy]
profile=Home
}}}

Firewall implementation would likely rather be done as a plugin, since it's very distro-specific. In our case, using UFW, speaking in DBUS to UFW to turn on or off firewalling and choosing settings (or choosing a specific profile at the UFW level, pending implementation there).
Line 39: Line 72:
Include:
 * data migration, if any
 * redirects from old URLs to new ones, if any
 * how users will be pointed to the new way of doing things, if necessary.
There is no previous data to migrate. Users will be presented with extra tabs which should make the configuration both discoverable, and very much out of the way from those who don't need it.
Line 46: Line 76:
It's important that we are able to test new features, and demonstrate them to users. Use this section to describe a short plan that anybody can follow that demonstrates the feature is working. This can then be used during testing, and to show off after release. {{{
It's important that we are able to test new features, and demonstrate them to users. Use this section to describe a short plan that anybody can follow that demonstrates the feature is working. This can then be used during testing, and to show off after release. Please add an entry to http://testcases.qa.ubuntu.com/Coverage/NewFeatures for tracking test coverage.
Line 49: Line 80:
}}}
Line 50: Line 82:
== Outstanding Issues == == Unresolved issues ==
Line 52: Line 84:
{{{
Line 53: Line 86:
}}}
Line 56: Line 90:
Use this section to take notes during the BoF; if you keep it in the approved spec, use it for summarising what was discussed and note any options that were rejected. {{{
#uds-o #track #topic
What should we have in NetworkManager?
  * discussion about integrating firewall profiles into NM
  * UFW does not support profiles, but can be added
Upstream is dropping nm-applet, moving to gnome-shell
  * first option is to for nm-applet
  * second option is move to network-indicator, with NM as backend, and add UFW as an extension
UFW profiles
  * home - trust all machines on the network
  * not home - other case
  * per connection network setting?
    - e.g on wired, always enable firewall; on wireless XYZ, enable firewall, on wireless ZYX, disable firewall
    -different proxy settings for different connections.
1st pass:
- enable/disable
- ports/application profiles
- alpha 1 on and off
- [ACTION] jdstrand - add profile support by alpha 2
Possibly:
- on or off depending on connection
- profiles per connection (network manager doesn't have it)
- default profile
- profile based on the connection
}}}
  • Launchpad Entry: desktop-o-desktop-network-enhancements

  • Created: 2011-05-24

  • Contributors: mathieu-tl, jdstrand, broder

  • Packages affected: network-manager, network-manager-gnome, indicator-network

Summary

This is somewhat of a catch-all for the most important features that we wish to land to improve usability of NetworkManager. Adding proxy and firewall support were discussed at UDS-O, and so was IPv6 (briefly) in this spec, and a little more in detail in the IPv6 health-check spec.

Release Note

A number of enhancements to NetworkManager have been done in Oneiric. In particular, IPv6 addresses are now requested by default, although their presence remains optional to bring up an interface. Proxy and firewall configuration support, integrated with an user's connection to form per-network "profiles" have been added. Firewall and proxy are off by default.

Rationale

It's getting more common to require proxy configurations in some environments to access the Internet; and doing proxy configuration manually when the network location changes tends to be cumbersome.

Host-based firewalls are very common in Windows environments, and increasingly more common on Linux as the myths of being "unbreakable" and virus-free vanish. Furthermore, IPv6 support brings back the requirement of using host-based firewalls due to the somewhat direct access of systems to the Internet via autoconfiguration; which makes network-wide firewalling complex.

User stories

Bob needs to use a proxy at work to browse the web, yet doesn't use one at home. Right now he has to manually bring up the proxy configuration dialog and change his settings, remembering to change them back when he's in the other location.

John is worried about the security of his data. He runs a webserver on his system and SSH to share files with his coworkers and connect to his system remotely from within the office, but he doesn't want those to be exposed to the internet when he is at home. He uses ufw which he has to remember to turn off and on when he changes locations.

Assumptions

Firewall support: as a first pass we'll assume the simplest possible settings to be exposed to the users. What this means is providing a way to turn on or off the firewalling on a per-network basis, and exposing presets from UFW to open specific applications.

Proxy support: GNOME already has the concept of profiles for proxy settings. We can safely assume it sufficient to match profiles to connections as a 1:1 relationship, and making sure we keep a "default" proxy setting which enables to proxy.

Design

Proxy settings already exist in System Settings. Ubuntu should not have multiple interfaces to proxy settings.

Second draft of a firewall settings design:

settings-firewall.png settings-firewall-exception.png

Questions that could alter this design:

  • Does System Settings have a Security panel? If so, maybe this should move there, but with a button here linking to it. not yet

  • How long does the firewall take to start or stop? (0.1 seconds? 2 seconds? 10 seconds?) near-instantaneous

  • Does stopping the firewall involve interrupting any current connections? don't think so, not unless they should be blocked

  • Is blocking outgoing connections at all useful enough to show at the top level like this? yes

  • Does Ubuntu have any “essential” incoming connections? (Mac OS X identifies “DHCP, Bonjour, and IPSec” as essential.) need answer from security team

  • Does Ubuntu have any “essential” outgoing connections? Need answer from security team. Web browsing, e-mail, Avahi?

When complete, this specification will move to https://wiki.ubuntu.com/Networking#Firewall

Implementation

UI Changes

Should include one extra page per "feature": may be tabs, one "Proxy", one "Firewall", and expose as few settings as possible to make it really simple to configure (or ignore).

Code Changes

Discussed proxy implementation with Dan Williams (dcbw). Proxy support will require keeping track of proxy settings in an object such as NMSettingsProxy. It may be necessary to get at least WPAD, which is already retrieved from DHCP, to integrate into this (since it's proxy auto-detection). This would likely end up an additional section in the configuration file:

[proxy]
profile=Home

Firewall implementation would likely rather be done as a plugin, since it's very distro-specific. In our case, using UFW, speaking in DBUS to UFW to turn on or off firewalling and choosing settings (or choosing a specific profile at the UFW level, pending implementation there).

Migration

There is no previous data to migrate. Users will be presented with extra tabs which should make the configuration both discoverable, and very much out of the way from those who don't need it.

Test/Demo Plan

It's important that we are able to test new features, and demonstrate them to users.  Use this section to describe a short plan that anybody can follow that demonstrates the feature is working.  This can then be used during testing, and to show off after release. Please add an entry to http://testcases.qa.ubuntu.com/Coverage/NewFeatures for tracking test coverage.

This need not be added or completed until the specification is nearing beta.

Unresolved issues

This should highlight any issues that should be addressed in further specifications, and not problems with the specification itself; since any specification with problems cannot be approved.

BoF agenda and discussion

#uds-o #track #topic
What should we have in NetworkManager?
  * discussion about integrating firewall profiles into NM
  * UFW does not support profiles, but can be added
Upstream is dropping nm-applet, moving to gnome-shell
  * first option is to for nm-applet
  * second option is move to network-indicator, with NM as backend, and add UFW as an extension
UFW profiles
  * home - trust all machines on the network
  * not home - other case
  * per connection network setting?
    - e.g on wired, always enable firewall; on wireless XYZ, enable firewall, on wireless ZYX, disable firewall
    -different proxy settings for different connections.
1st pass:
- enable/disable
- ports/application profiles
- alpha 1 on and off
- [ACTION] jdstrand - add profile support by alpha 2
Possibly:
- on or off depending on connection
- profiles per connection (network manager doesn't have it)
- default profile
- profile based on the connection


CategorySpec

OneiricDesktopNetworkEnhancementsSpec (last edited 2011-08-05 15:24:29 by mpt)