firewalls cs591 topics in internet security november 15 1999 steve miskovitz, steve peckham, kan...

29
Firewalls CS591 Topics in Internet Security November 15 1999 Steve Miskovitz, Steve Peckham, Kan Hayashi

Post on 22-Dec-2015

214 views

Category:

Documents


1 download

TRANSCRIPT

Firewalls

CS591 Topics in Internet Security

November 15 1999

Steve Miskovitz, Steve Peckham, Kan Hayashi

Outline

• Overview/Motivation

• Packet Filtering

• Application Gateway

Overview/Motivation

• Why Do We Need Firewalls?

• Design Issues

• Firewall Characteristics

• Typical Setups/Analysis

Why Do We Need Firewalls?

• Prevent unauthorized access to private networks

• Prevent unauthorized export of private information

Design Issues

• That which is not expressly permitted is prohibited– firewall is designed to block everything, services

are enabled on a case-by-case basis– can be seen as a hindrance by users

• That which is not expressly prohibited is permitted– reactive, must predict what kinds of actions would

compromise the security of the firewall

Firewall Characteristics

• Damage Control– If the firewall is compromised or destroyed

what kinds of threats does it leave the private network open to?

• Zones of Risk– How large is the zone of risk during normal

operation?

Firewall Characteristics

• Failure Mode– If the firewall is broken into or destroyed, how easy

is it to detect?– How much information is retained to analyze the

attack?

• Ease of Use– How much of an inconvenience is the firewall?

• Stance– Permissive or prohibitive?

Typical Setups

• Screening Router

• Dual Homed Gateway

• Screened Host Gateway

• Screened Subnet

Screening Router

• Basic router with some kind of packet filtering capability– Typically will be able to block traffic between

networks or specific hosts on an IP level

Analysis of Screening Router

• Damage control is difficult because you would need to examine every host for traces of a break-in

• Zone of risk is the all the hosts on the private network because direct communication is permitted

• Usually set up as permissive

Analysis of Screening Router

• In the case of destruction of the firewall it is very hard to trace because commercial routers generally do not keep logs

• Can fairly easily get around the screening using tunnelling

• Popular because they allow fairly free access from any point in the private network

Dual Homed Gateway

• Has a system on both the private network and the Internet , with TCP/IP forwarding disabled

Analysis of Dual Homed Gateway

• Often used and easy to implement

• Hosts on the private network can communicate with the gateway, as can hosts on the Internet, but direct traffic between the networks is blocked

• If the gateway is compromised then the whole private network is accessible

• Zone of risk is only the gateway host

Analysis of Dual Homed Gateway

• Permissiveness dependant on the stance of the gateway– logins on gateway is permissive– application gateways is prohibitive

• Can be adapted more easily to keep logs which can help with tracing what went wrong and which machines on the private network were compromised

Screened Host Gateway

• Combines a screening router and a dual homed gateway. The screening router is configured such that the gateway is the only system reachable from the Internet

Analysis of Screened Host Gateway

• Can be configured to block traffic to the gateway on certain ports, permitting only a small number of services to communicate with it

• Generally very secure, while fairly easy to implement

• Router is configured to only permit Internet access to the gateway

Analysis of Screened Host Gateway

• Zone of risk is the gateway and the router

• Gateway can be on the private network so connectivity is good for local users

• Stance is dependant upon the gateway

• Similar to a dual homed gateway

Screened Subnet

• An isolated subnet is created, between the private network and the Internet– isolate the private network using screening

routers with varying levels of filtering

Analysis of Screened Subnet

• Generally, both the Internet and the private network have access to the subnet but traffic across the screened subnet is blocked

• Usually configured with one host as the sole point of access on the subnet

• Zone of risk is host and any screening routers that connect the subnet

• Appealing for firewalls that use routing to reinforce the existing screening

Analysis of Screened Subnet

• Forces all services to be provided by application gateways

• Strongly prohibitive

• Much harder to break into since you need to compromise multiple systems

• Can be an inconvenience since hosts that are not addressed correctly cannot use the firewall properly

Packet FilteringOverview

• Control data traffic using header of each packet– source IP address– destination IP address– etc

• Screened (Host, Subnet) Setups

Static Packet Filtering

• “Static” = “doors” are open at all times

• Advantages– Low overhead / High throughput

– Inexpensive or free

– Good for traffic management

• Disadvantages– Allows dangerous direct connections

– Leaves holes open

– Unsuitable for complex environment

– No user authentication

Dynamic Packet Filtering

• “Dynamic” = opens and closes “doors” according packet header data

• Can keep track of context information about a session. (stateful filtering)

• Advantages– Only temporarily opens holes in Network Perimeter

– Low overhead / High throughput

– Supports almost any service

• Disadvantages– Allows direct IP connections

– No user authentication (requires application gateway)

Application GatewaysOverview

• First Generation vs. Second Generation (transparent)

• TCP connection state and sequencing are maintained.

• Prevents direct access to services on the internal network.

• Outgoing traffic appears to be coming from the firewall rather than the internal network.

• Works on an application (or service) level.

Application GatewaysLawyer Example

A

B

B’sLawyer Approved

Message

UnapprovedMessage

Application GatewaysExample of masking internal network

C lien t 1 C lien t 2 ... C lien t i

F irew a ll

E xte rn a l N e tw ork

Application GatewaysAdvantages

• Doesn’t allow direct connections between internal and external hosts (proxy).

• Supports user-level authentication.

• Ability to analyze application specific commands inside traffic.

• Can keep logs of traffic.

Application GatewaysDisadvantages

• Takes time to check requests.

• Doesn’t support every type of connection.

References

• Thinking About Firewalls V2.0: Beyond Perimeter Security (1997)– http://www.clark.net/pub/mjr/pubs/think/

index.htm

• Application Gateways and Stateful Inspection: A Brief Note Comparing and Contrasting (Avolio & Blask 1998)– http://www.avolio.com/apgw+spf.html