* Query: Can Netfilter inspect xml soap traffic
@ 2008-03-25 15:01 william fitzgerald
2008-03-25 16:42 ` Grant Taylor
0 siblings, 1 reply; 9+ messages in thread
From: william fitzgerald @ 2008-03-25 15:01 UTC (permalink / raw)
To: netfilter
Dear Netfilter Experts,
Can Netfilter/iptables inspect xml/soap messages as xml based firewalls do?
Does the Layer-7 module have enough "smarts" to inspect web service
messages.
I am asking in regard to the role of Network Access Control firewalls
such as iptables within a dedicated enterprise web service SOA environment.
I have seen some posts that suggest that firewalls are now obsolete,
particularly NACs, in regard to web services (everything is over http
hence less effect restrictions).
However, my opinion is that its not as simple as opening ports 80 and
443 to tunnel SOAP messages.
For example, I may want to restrict IP ranges, maybe I have some
business partners and I only want them accessing the web service. Or
maybe I need to control DoS attacks to web services.
I think if iptables has also the ability to deep packet inspect xml
messages it then demonstrates that there is still an importance for NAC
based firewalls.
All pointers to documentation and your comments are welcome.
I look forward to your support,
regards,
Will.
--
William M. Fitzgerald,
PhD Student,
Telecommunications Software & Systems Group,
ArcLabs Research and Innovation Centre,
Waterford Institute of Technology,
WIT West Campus,
Carriganore,
Waterford.
Office Ph: +353 51 302937
Mobile Ph: +353 87 9527083
Web: www.williamfitzgerald.org
www.linkedin.com/in/williamfitzgerald
www.ryze.com/go/wfitzgerald
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Query: Can Netfilter inspect xml soap traffic
2008-03-25 15:01 Query: Can Netfilter inspect xml soap traffic william fitzgerald
@ 2008-03-25 16:42 ` Grant Taylor
2008-03-25 17:04 ` william fitzgerald
0 siblings, 1 reply; 9+ messages in thread
From: Grant Taylor @ 2008-03-25 16:42 UTC (permalink / raw)
To: Mail List - Netfilter
On 03/25/08 10:01, william fitzgerald wrote:
> Can Netfilter/iptables inspect xml/soap messages as xml based
> firewalls do?
Is NetFilter / IPTables capable of inspecting layer 7 traffic, yes.
However it will probably be much more difficult to do than you might
think. I would expect it to be much like trying to write a regular
expression in assembly verses trying to do it in Perl. It can be done,
but...
One thing to keep in mind is that the Layer-7 module only looks at some
of the packet. Here is a quote from the website:
"... l7-filter only looks at the first 10 packets or 2kB of each
connection, whichever is smaller. ..."
> Does the Layer-7 module have enough "smarts" to inspect web service
> messages.
I don't think the "smarts" you are referring to are (or should be) in
the Layer-7 module. Keep in mind that the Layer-7 module is a match
extension as in does this packet have this data at layer 7. The logic
behind what to do with what match(es) and how to chain them together to
make decisions there on (IMHO) should *NOT* be in the Layer-7 module,
but rather in how you build your rules.
You will need to take in to account all the variances in the traffic
that could happen. When speaking SMTP, I can either HELO or EHLO with
either a name or an IP. Thus with in the first few packets you already
have four different possibilities *IF* I play by the rules. Your
pattern will have to be very flexible.
> I am asking in regard to the role of Network Access Control firewalls
> such as iptables within a dedicated enterprise web service SOA
> environment.
You may have better luck taking the packet and passing it to user space
and writing an application layer gateway (a.k.a. ALG) and having the ALG
do the business logic of the filtering for you.
> I have seen some posts that suggest that firewalls are now obsolete,
> particularly NACs, in regard to web services (everything is over http
> hence less effect restrictions).
Firewalls are GREAT at filtering on layer 2 or layer 3 (depending what
they are designed for. If you want to filter on a higher layer, you
need to use something that is designed to filter on that layer.
> However, my opinion is that its not as simple as opening ports 80 and
> 443 to tunnel SOAP messages.
You don't "just open ports". You "open ports and send them in to the
next layer of security". Layer 3 firewall in front of your ALG and then
let the ALG deal with what it knows about with out worrying about other
nasty things.
> For example, I may want to restrict IP ranges, maybe I have some
> business partners and I only want them accessing the web service. Or
> maybe I need to control DoS attacks to web services.
A layer 2 or layer 3 filter in front of the ALG will do this wonderfully
with out the ALG having to know about allowed and / or banned IP
address(es) and / or range(s).
> I think if iptables has also the ability to deep packet inspect xml
> messages it then demonstrates that there is still an importance for
> NAC based firewalls.
You can deep inspect to a point, but not as deep as you may be thinking.
> All pointers to documentation and your comments are welcome.
Reply (on or off list) if you'd like to continue the discussion of the
business logic.
Grant. . . .
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Query: Can Netfilter inspect xml soap traffic
2008-03-25 16:42 ` Grant Taylor
@ 2008-03-25 17:04 ` william fitzgerald
2008-03-25 17:25 ` Grant Taylor
` (2 more replies)
0 siblings, 3 replies; 9+ messages in thread
From: william fitzgerald @ 2008-03-25 17:04 UTC (permalink / raw)
To: Grant Taylor; +Cc: Mail List - Netfilter
Thank you Grant for your speedy reply.
My argument is that it appears to me that (secure) Enterprise Web
Service applications, particularly those involving access control, are
typically focused at the application-domain only, rather than taking a
more holistic approach to also include the underlying infrastructure
(for example, firewalls). As a result, infrastructure configurations may
unintentionally hinder and prohibit the normal operation of the Web Service.
Thus, the ideal firewall configuration is one that is aligned with the
application supported by the system, that is, it permits valid
application traffic, and, preferably, no more and no less.
What I presume is that Web Service developers assume the underlying
infrastructure is magically available. Also there seems to be a tendency
to tunnel (for example SOAP) over http or https.
From this point of view, Semantic Web developers may form the opinion
that firewalls are redundant as they typically have ports 80 and 443
accessible (and forward traffic to specialized user-space programs for
further packet processing). Maybe they are correct! Have you any comments?
In my opinion, deploying a network level firewall (such as Linux
Netfilter) provisioned for Enterprise Web Services is not simply about
opening port 80 on the server for all traffic; one may wish to deny
certain nodes (IP addresses, etc.), only accept HTTP traffic from some
nodes, require other nodes to use HTTPS and also deal with HTTP traffic
that is tunneled through proxies available on other ports.
While low level infrastructure such as firewalls may not solve all
security issues ( as good as an application based XML firewall would) in
regard to Web Service applications, I believe they have a role to play
in applying the belt-and-braces approach to security best practices.
What I am really looking for is some concrete documents, publications,
administrator experience that helps support my gut feelings of the role
of Network Access Controls (NAC's) within an enterprise SOA environment.
If anyone feels I should resubmit this email under another heading for
example:
"Is Netfilter obsolete in an Enterprise Web Service Environment" please
let me know.
Looking forward to comments on this, albeit tomorrow before I can reply
again.
regards,
Will.
Grant Taylor wrote:
> On 03/25/08 10:01, william fitzgerald wrote:
>> Can Netfilter/iptables inspect xml/soap messages as xml based
>> firewalls do?
>
> Is NetFilter / IPTables capable of inspecting layer 7 traffic, yes.
> However it will probably be much more difficult to do than you might
> think. I would expect it to be much like trying to write a regular
> expression in assembly verses trying to do it in Perl. It can be done,
> but...
>
> One thing to keep in mind is that the Layer-7 module only looks at some
> of the packet. Here is a quote from the website:
>
> "... l7-filter only looks at the first 10 packets or 2kB of each
> connection, whichever is smaller. ..."
>
>> Does the Layer-7 module have enough "smarts" to inspect web service
>> messages.
>
> I don't think the "smarts" you are referring to are (or should be) in
> the Layer-7 module. Keep in mind that the Layer-7 module is a match
> extension as in does this packet have this data at layer 7. The logic
> behind what to do with what match(es) and how to chain them together to
> make decisions there on (IMHO) should *NOT* be in the Layer-7 module,
> but rather in how you build your rules.
>
> You will need to take in to account all the variances in the traffic
> that could happen. When speaking SMTP, I can either HELO or EHLO with
> either a name or an IP. Thus with in the first few packets you already
> have four different possibilities *IF* I play by the rules. Your
> pattern will have to be very flexible.
>
>> I am asking in regard to the role of Network Access Control firewalls
>> such as iptables within a dedicated enterprise web service SOA
>> environment.
>
> You may have better luck taking the packet and passing it to user space
> and writing an application layer gateway (a.k.a. ALG) and having the ALG
> do the business logic of the filtering for you.
>
>> I have seen some posts that suggest that firewalls are now obsolete,
>> particularly NACs, in regard to web services (everything is over http
>> hence less effect restrictions).
>
> Firewalls are GREAT at filtering on layer 2 or layer 3 (depending what
> they are designed for. If you want to filter on a higher layer, you
> need to use something that is designed to filter on that layer.
>
>> However, my opinion is that its not as simple as opening ports 80 and
>> 443 to tunnel SOAP messages.
>
> You don't "just open ports". You "open ports and send them in to the
> next layer of security". Layer 3 firewall in front of your ALG and then
> let the ALG deal with what it knows about with out worrying about other
> nasty things.
>
>> For example, I may want to restrict IP ranges, maybe I have some
>> business partners and I only want them accessing the web service. Or
>> maybe I need to control DoS attacks to web services.
>
> A layer 2 or layer 3 filter in front of the ALG will do this wonderfully
> with out the ALG having to know about allowed and / or banned IP
> address(es) and / or range(s).
>
>> I think if iptables has also the ability to deep packet inspect xml
>> messages it then demonstrates that there is still an importance for
>> NAC based firewalls.
>
> You can deep inspect to a point, but not as deep as you may be thinking.
>
>> All pointers to documentation and your comments are welcome.
>
> Reply (on or off list) if you'd like to continue the discussion of the
> business logic.
>
>
>
>
> Grant. . . .
> --
> To unsubscribe from this list: send the line "unsubscribe netfilter" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
>
--
William M. Fitzgerald,
PhD Student,
Telecommunications Software & Systems Group,
ArcLabs Research and Innovation Centre,
Waterford Institute of Technology,
WIT West Campus,
Carriganore,
Waterford.
Office Ph: +353 51 302937
Mobile Ph: +353 87 9527083
Web: www.williamfitzgerald.org
www.linkedin.com/in/williamfitzgerald
www.ryze.com/go/wfitzgerald
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Query: Can Netfilter inspect xml soap traffic
2008-03-25 17:04 ` william fitzgerald
@ 2008-03-25 17:25 ` Grant Taylor
2008-03-25 17:33 ` Grant Taylor
2008-03-25 19:56 ` Benny Amorsen
2 siblings, 0 replies; 9+ messages in thread
From: Grant Taylor @ 2008-03-25 17:25 UTC (permalink / raw)
To: Mail List - Netfilter
On 03/25/08 12:04, william fitzgerald wrote:
> Thank you Grant for your speedy reply.
*nod*
> My argument is that it appears to me that (secure) Enterprise Web
> Service applications, particularly those involving access control, are
> typically focused at the application-domain only, rather than taking a
> more holistic approach to also include the underlying infrastructure
> (for example, firewalls). As a result, infrastructure configurations may
> unintentionally hinder and prohibit the normal operation of the Web
> Service.
Possibly...
> Thus, the ideal firewall configuration is one that is aligned with the
> application supported by the system, that is, it permits valid
> application traffic, and, preferably, no more and no less.
*nod*
> What I presume is that Web Service developers assume the underlying
> infrastructure is magically available. Also there seems to be a tendency
> to tunnel (for example SOAP) over http or https.
Agreed...
> From this point of view, Semantic Web developers may form the opinion
> that firewalls are redundant as they typically have ports 80 and 443
> accessible (and forward traffic to specialized user-space programs for
> further packet processing). Maybe they are correct! Have you any comments?
I think people forget that firewalls are filtering 65,533 other ports
for TCP as well as other protocols too. The firewalls filter out other
cruft (if you will) so that developers are free to concentrate on what
they know, the web app, with out worrying about the rest of the cruft.
I also think a firewall should go so far as to filter out all traffic to
the web server ports that is not valid, i.e. various types of attacks
and things that are in an invalid date. These are the types of things
that firewalls are *VERY GOOD* at doing that are much harder to do on a
higher layer. I would much rather let an IPTables firewall or a Cisco
PIX (or what ever you would like) filter out invalid TCP traffic
*BEFORE* it gets to the web server. This will (should) at least
(significantly) reduce the exposure of the web server to malicious
packets that may other wise hinder normal operation.
> In my opinion, deploying a network level firewall (such as Linux
> Netfilter) provisioned for Enterprise Web Services is not simply about
> opening port 80 on the server for all traffic; one may wish to deny
> certain nodes (IP addresses, etc.), only accept HTTP traffic from some
> nodes, require other nodes to use HTTPS and also deal with HTTP traffic
> that is tunneled through proxies available on other ports.
I think you need to look at things in layers (not related to OSI).
- Have the first layer do your basic allow / deny based on source IP.
- Have your next layer do basic protocol validation as well as SPI.
- Have your next layer do some filtering of content and take action as
necessary.
- This may be a form of proxy or front end web server that will
pass traffic on to the back end or redirect people to different URLs.
- Have the back end do a more thorough analysis and subsequent
processing of traffic.
> While low level infrastructure such as firewalls may not solve all
> security issues ( as good as an application based XML firewall would) in
> regard to Web Service applications, I believe they have a role to play
> in applying the belt-and-braces approach to security best practices.
If you directly pass *ALL* TCP port 80 traffic in to an XML firewall,
you are exposing the firewall to a lot more than it would other wise be
exposed to. Most ALGs also take more processing overhead to do their
filtering. Thus having the ALG do the filtering for all traffic will
incur more processing over head than having the firewall filter some of
the traffic thus reducing the amount of traffic that the ALG has to
process thus reducing the processing resources consumed by the ALG.
> What I am really looking for is some concrete documents, publications,
> administrator experience that helps support my gut feelings of the role
> of Network Access Controls (NAC's) within an enterprise SOA environment.
Good luck finding that.
> If anyone feels I should resubmit this email under another heading for
> example:
> "Is Netfilter obsolete in an Enterprise Web Service Environment" please
> let me know.
I don't think you should re-word the subject as such. Your question(s)
are more along the lines of whether or not a simple layer 2 / layer 3
firewall still has any place in the current B2B market, not whether or
not NetFilter / IPTables is obsolete or not. Focus on the real
question(s) and problem(s).
> Looking forward to comments on this, albeit tomorrow before I can reply
> again.
*nod*
Grant. . . .
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Query: Can Netfilter inspect xml soap traffic
2008-03-25 17:04 ` william fitzgerald
2008-03-25 17:25 ` Grant Taylor
@ 2008-03-25 17:33 ` Grant Taylor
2008-03-25 17:35 ` Grant Taylor
2008-03-25 19:56 ` Benny Amorsen
2 siblings, 1 reply; 9+ messages in thread
From: Grant Taylor @ 2008-03-25 17:33 UTC (permalink / raw)
To: Mail List - Netfilter
On 03/25/08 12:04, william fitzgerald wrote:
> Thus, the ideal firewall configuration is one that is aligned with the
> application supported by the system, that is, it permits valid
> application traffic, and, preferably, no more and no less.
Not directly related to your question(s), but still appropriate.
I would like to see developers write their applications with
documentation (be it auto generated or not) that indicates what type of
traffic (and parameters there on) they expect to see and need to
function correctly. I'd like to then take said documentation and use it
to build rules for a simple ALG that will pass any valid requests in to
the back end application while correctly handling erroneous traffic. I
think said ALGs could easily function as a proxy with some simple rules
as to what is and is not allowed to pass through the ALG.
The next step is to educate the ALG about traffic flow from resource to
resource (read: page to page) and define how to handle improper traffic
flow. If someone tries to jump further in, should we go to an error
page, or should we send them back to the start page?
I think these types of ALGs would significantly reduce the security
problems with these types of applications. Or at least if there was an
SQL injection vulnerability in a given back end, it could be filtered by
an ALG by simply checking for valid characters in a particular object
property. The ALG could either scrub (remove) the object property or it
could fall back to an errant condition and redirect elsewhere, or it
could conditionally do both depending on the previous history of the
client. Say for example if you or I accidentally enter an inappropriate
character in a string and get redirected back to the form to correct the
error verses an SQL injection script trying different things against the
page.
These are the types of things that ALGs can do that is very difficult to
implement in the back end code.
Grant. . . .
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Query: Can Netfilter inspect xml soap traffic
2008-03-25 17:33 ` Grant Taylor
@ 2008-03-25 17:35 ` Grant Taylor
0 siblings, 0 replies; 9+ messages in thread
From: Grant Taylor @ 2008-03-25 17:35 UTC (permalink / raw)
To: Mail List - Netfilter
On 03/25/08 12:33, Taylor, Grant wrote:
> I would like to see developers write their applications with
> documentation (be it auto generated or not) that indicates what type of
> traffic (and parameters there on) they expect to see and need to
> function correctly. I'd like to then take said documentation and use it
> to build rules for a simple ALG that will pass any valid requests in to
> the back end application while correctly handling erroneous traffic. I
> think said ALGs could easily function as a proxy with some simple rules
> as to what is and is not allowed to pass through the ALG.
Note: I don't think that the rules for the ALG should be auto generated
on demand from the original code or class as this will be a performance
hit for systems. These rules need to be defined in a batch operation.
Now that batch operation could load the back end class and call a method
that will return what it is expecting to dynamically build the rules
once a night or when ever things are updated.
Grant. . . .
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Query: Can Netfilter inspect xml soap traffic
2008-03-25 17:04 ` william fitzgerald
2008-03-25 17:25 ` Grant Taylor
2008-03-25 17:33 ` Grant Taylor
@ 2008-03-25 19:56 ` Benny Amorsen
2008-03-25 20:13 ` Grant Taylor
2 siblings, 1 reply; 9+ messages in thread
From: Benny Amorsen @ 2008-03-25 19:56 UTC (permalink / raw)
To: netfilter
william fitzgerald <wfitzgerald@tssg.org> writes:
> "Is Netfilter obsolete in an Enterprise Web Service Environment"
> please let me know.
The discussion about whether packet filters really deserve the word
"firewall" applied to them goes back at least as far as mid 90's. You
can probably find flame wars with Gauntlet and Raptor Eagle/Symantec
Enterprise Firewall on one side and Firewall-1 and PIX on the other.
Anyway, with the Level-7 match or Deep Packet Inspection or whichever
buzz words you prefer, packet filters are closer in capabilities than
ever before. At the same time application level proxies are faster
than ever before. It's hard to pick a winner.
/Benny
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Query: Can Netfilter inspect xml soap traffic
2008-03-25 19:56 ` Benny Amorsen
@ 2008-03-25 20:13 ` Grant Taylor
2008-03-26 16:39 ` william fitzgerald
0 siblings, 1 reply; 9+ messages in thread
From: Grant Taylor @ 2008-03-25 20:13 UTC (permalink / raw)
To: Mail List - Netfilter
On 03/25/08 14:56, Benny Amorsen wrote:
> Anyway, with the Level-7 match or Deep Packet Inspection or whichever
> buzz words you prefer, packet filters are closer in capabilities than
> ever before. At the same time application level proxies are faster
> than ever before. It's hard to pick a winner.
Very good point.
I suppose one thing to think about is who is going to maintain what.
Developers would probably be able to maintain (add / change / delete
rules) an ALG better where as network administration staff would
probably be able to maintain a hardware firewall better. Of course, why
not use some of each. Use the hardware firewall for the lower end
simpler aspects of it while using the ALG for the higher end more
specific aspects. Let the hardware ASICs do what they do best while
letting the ALG do what it does best.
Grant. . . .
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: Query: Can Netfilter inspect xml soap traffic
2008-03-25 20:13 ` Grant Taylor
@ 2008-03-26 16:39 ` william fitzgerald
0 siblings, 0 replies; 9+ messages in thread
From: william fitzgerald @ 2008-03-26 16:39 UTC (permalink / raw)
Cc: Mail List - Netfilter
Thanks Benny and Grant,
I whole heartily agree that the term "firewall" is overloaded.
We also now have the term UTM's (Unified Threat Management appliances)
used to drift away from the "firewall" term but is essentially the same
thing (access control via firewall, ids, av etc).
A lot of focus in relation to web services is on xml firewalls (or other
relevant ALG's). There seems to be no role for network-level firewalls
like Netfilter (that can also filter to a degree at layer 7).
I still stand over the idea that:
"deploying a network level firewall provisioned for Enterprise Web
Services is not simply about opening port 80 on the server for all
traffic; one may wish to deny certain nodes (IP addresses, etc.), only
accept HTTP traffic from some nodes, require other nodes to use HTTPS
and also deal with HTTP traffic that is tunneled through proxies
available on other ports."
But I have found no examples in literature. The above is something that
an XML firewall cannot do.
Is there anyone out there that can give a typical enterprise web service
scenario/architecture that justifies network level firewall protection?
What is actual practice? Surely is not just a simple firewall rule:
iptables -A FORWARD -p tcp --dport http -j ACCEPT
Surely its more complicated than what the application developers suggest
is required.
For example: only permit a business partners subnet to and from a
specific web service.
iptables -A FORWARD -i eth0 -s 193.1.1.0/0 -d -p tcp --dport http -j ACCEPT
iptables -A FORWARD -o eth1 -s 192.168.1.1 -d 192.168.1.1 -p tcp --sport
http -j ACCEPT
an other example might be to limit dos attacks at a network level to an
enterprise web service:
iptables -A FORWARD -i eth0 -d 192.168.1.1-p tcp -dport http --syn -m
limit --limit 5/s -j ACCEPT
any other examples of protecting web services at a network level are
welcome?
I realize the firewalls are prone to "tunnel" problems over 80 and 443,
in that how can we decipher what is genuine http traffic, soap, skype
and so forth. DPI helps to an extent.
What happens if you are running both a standard web server and a web
service that both use port 80? Would it be normal practice to assign a
different port for example 8080 to the web service.
Surely Web Services don't have to operate over 80 and 443!
If anyone knows of any documentation that specifically includes the
importance of firewalls (in particular, network firewalls) in an SOA
please let me know.
In terms of compliance standards like HIPPA, PCI DSS and so forth a
firewall is mandatory even though some people are calling for an end to
firewalls using the term "de-perimeterization".
regards,
Will.
Grant Taylor wrote:
> On 03/25/08 14:56, Benny Amorsen wrote:
>> Anyway, with the Level-7 match or Deep Packet Inspection or whichever
>> buzz words you prefer, packet filters are closer in capabilities than
>> ever before. At the same time application level proxies are faster
>> than ever before. It's hard to pick a winner.
>
> Very good point.
>
> I suppose one thing to think about is who is going to maintain what.
> Developers would probably be able to maintain (add / change / delete
> rules) an ALG better where as network administration staff would
> probably be able to maintain a hardware firewall better. Of course, why
> not use some of each. Use the hardware firewall for the lower end
> simpler aspects of it while using the ALG for the higher end more
> specific aspects. Let the hardware ASICs do what they do best while
> letting the ALG do what it does best.
>
>
>
> Grant. . . .
> --
> To unsubscribe from this list: send the line "unsubscribe netfilter" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
>
--
William M. Fitzgerald,
PhD Student,
Telecommunications Software & Systems Group,
ArcLabs Research and Innovation Centre,
Waterford Institute of Technology,
WIT West Campus,
Carriganore,
Waterford.
Office Ph: +353 51 302937
Mobile Ph: +353 87 9527083
Web: www.williamfitzgerald.org
www.linkedin.com/in/williamfitzgerald
www.ryze.com/go/wfitzgerald
^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2008-03-26 16:39 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-03-25 15:01 Query: Can Netfilter inspect xml soap traffic william fitzgerald
2008-03-25 16:42 ` Grant Taylor
2008-03-25 17:04 ` william fitzgerald
2008-03-25 17:25 ` Grant Taylor
2008-03-25 17:33 ` Grant Taylor
2008-03-25 17:35 ` Grant Taylor
2008-03-25 19:56 ` Benny Amorsen
2008-03-25 20:13 ` Grant Taylor
2008-03-26 16:39 ` william fitzgerald
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox