Transcript
Page 1: Firewall Defense against Covert Channels

Firewall Defense Against Covert Channels

Rich Savacool

Chief Security Officer

Page 2: Firewall Defense against Covert Channels

Why protect against covert channels?

• Ponemon [1]: Data breaches on the rise, costly– 94% C-levels report data attacked within last 6 months

– $204 per user record in 2009

– Data breach laws ensure negative publicity

• 2008 CSI [2]: Perimeter defenses– 94% Network-layer firewalls

– 69% Intrusion Detection Systems (IDS)

– 54% Intrusion Prevention Systems (IPS)

– 53% Application-layer firewalls

• Covert channels represent threat to confidentiality

Page 3: Firewall Defense against Covert Channels

Information Hiding

• Goals of information hiding– Confidentiality – Disclosure

– Integrity – Alteration

– Availability – Destruction

• Three main branches– Cryptography

– Steganography

– Metaferography (Covert Channels)

Page 4: Firewall Defense against Covert Channels

Cryptography

Cryptography – encryption– From the Greek κρυπτό (kryptos)

– Means “hidden” writing [3]

– Scrambles the message text

– Writing in plain view, though unreadable

Page 5: Firewall Defense against Covert Channels

Examples of Cryptography

Skytale (transposition)Confederate CipherDisc (substitution)

Page 6: Firewall Defense against Covert Channels

Examples of Cryptography (cont.)GNU Privacy Guard (gpg)

Page 7: Firewall Defense against Covert Channels

Steganography

Steganography – stego– From the Greek στεγανό (steganos)

– Means “covered” writing [4]

– Hides the message within another message

– Presence of a message concealed

Page 8: Firewall Defense against Covert Channels

Examples of SteganographyMasked letter

Page 9: Firewall Defense against Covert Channels

Examples of Steganography (cont.)

Image w/ embedded msgOriginal image

Page 10: Firewall Defense against Covert Channels

Examples of Steganography (cont.)

Letter from California governor Arnold Schwarzenegger [5]

Page 11: Firewall Defense against Covert Channels

Metaferography

Metaferography – covert channels– From the Greek μεταφέρό (metaferos)

– Means “carried” writing [3]

– Covert channels refers to specific implementation of metaferography

– Hides the message within a carrier

– Presence of a message concealed

Page 12: Firewall Defense against Covert Channels

Examples of MetaferographyCovert channels

– Wax tablets warning of Persian invasion

– Tattooed message on shaved scalp of slave

– Invisible ink used for counter-intelligence in WWII

– Microdot printing also used in spycraft during WWII

http://www.americainwwii.com/images/cloakcamera.jpg

http://en.wikipedia.org/wiki/Wax_tablet

Page 13: Firewall Defense against Covert Channels

OSI Network Model

Layer 7 — Application

Layer 6 — Presentation

Layer 5 — Session

Layer 4 — Transport

Layer 3 — Network

Layer 2 — Data Link

Layer 1 — Physical

Page 14: Firewall Defense against Covert Channels

Network-layer Firewalls

• Example: Check Point, PIX, Sonicwall, Juniper

• Prevent network-layer attacks

– spoofing

– flooding

– port scanning

• While some have add-ons for HTTP or SMTP, protection primarily limited to network attacks

• Previous research indicates not effective in detecting or preventing covert channels

Page 15: Firewall Defense against Covert Channels

Network-layer Firewalls (cont.)Check Point Firewall-1 Management GUI

Page 16: Firewall Defense against Covert Channels

Application-layer Firewalls

• Example: McAfee, ISA, Palo Alto

• Prevent application-layer attacks– Javascript attacks

– ActiveX attacks

– FTP bounce

• Offer strong protection against user-based attacks

• Require constant updates as applications evolve

• Previous research indicates limited success with L3 covert channels ― no success with L7 channels

Page 17: Firewall Defense against Covert Channels

Application-layer Firewalls (cont.)McAfee Enterprise Firewall Management GUI

Page 18: Firewall Defense against Covert Channels

Covert channel tools• Covert_tcp

– network-layer storage channel– uses IPID, ISN, or ACK fields

• CCTT– application-layer storage channel– TCP/IP tunneling through TCP, UDP, HTTP POST, or HTTP CONNECT

messages• Wsh

– application-layer storage channel– remote shell using HTTP POST requests

• Leaker/Recover– application-layer timing channel– timestamps of specially-encoded HTTP GET requests to attacker's web

server

Page 19: Firewall Defense against Covert Channels

Covert_tcp

Page 20: Firewall Defense against Covert Channels

CCTT

Page 21: Firewall Defense against Covert Channels

Wsh

Page 22: Firewall Defense against Covert Channels

Leaker/Recover

Page 23: Firewall Defense against Covert Channels

Demo

Page 24: Firewall Defense against Covert Channels

Firewall Defenses• Perform strict protocol enforcement (prevent HTTP

CONNECT over 21/tcp)

• Disable unused services or protocol features– Ex. if you do not need HTTP POST, turn it off

• Using a proxy will re-write any network-layer header-based channels

• Beware of generic socket-based protocols such as telnet

• Do not just rely on vendor-provided signatures – sample and analyze traffic

• Create custom signatures to deal with automated attacks

Page 25: Firewall Defense against Covert Channels

Final Thoughts

• Signatures require a priori knowledge of channel– antivirus/malware “arms” race

• Need heuristic or behavioral detection if unknown

• Next generation firewall will also need to understand applications, not just application-layer

• Existing IDS/IPS on firewall unlikely to replace NIDS/NIPS appliances in short-term

• Long-term trend of perimeter consolidation expected to continue

Page 26: Firewall Defense against Covert Channels

References1. Ponemon Institute, LLC. (2010, January). 2009 annual study: Cost of a

data breach. Retrieved from PGP Corporation website: http://www.encryptionreports.com/download/Ponemon_COB_2009_US.pdf

2. Richardson, R. (2008). Computer Security Institute (CSI). 2008 CSI Computer Crime and Security Survey. Retrieved from http://www.cse.msstate.edu/~cse6243/readings/CSIsurvey2008.pdf

3. Kypros-Net lexicon [Greek-English Dictionary]. (n.d.). Retrieved March 20, 2009, from http://www.kypros.org/cgi-bin/lexicon

4. Gilbert, R. (2001, October 10). Steganography (noun). Message posted to http://www.rbgilbert.com/log/ronslog022.html

5. Woo, S. (2009, October 27). Schwarzenegger’s veto message delivers another message [Web log post]. Retrieved from Washington Wire: http://blogs.wsj.com/washwire/2009/10/27/schwarzeneggers-veto-message-delivers-another-message/

Page 27: Firewall Defense against Covert Channels

Questions?


Top Related