Firewall Design Principles Firewall Characteristics Types of Firewalls



Similar documents
Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Firewalls CSCI 454/554

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Proxy Server, Network Address Translator, Firewall. Proxy Server

Firewalls (IPTABLES)

Intranet, Extranet, Firewall

Chapter 20. Firewalls

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Chapter 9 Firewalls and Intrusion Prevention Systems

Computer Security: Principles and Practice

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

Computer Security DD2395

Lecture 23: Firewalls

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Firewalls. Mahalingam Ramkumar

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

Security threats and network. Software firewall. Hardware firewall. Firewalls

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Security Technology: Firewalls and VPNs

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Cryptography and network security

CSCE 465 Computer & Network Security

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Internet Security Firewalls

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

CSCI Firewalls and Packet Filtering

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Topics NS HS12 2 CINS/F1-01

CMPT 471 Networking II

IPv6 Firewalls. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok. Last updated 17 th May 2016

Internet Security Firewalls

ΕΠΛ 674: Εργαστήριο 5 Firewalls

What would you like to protect?

12. Firewalls Content

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

FIREWALLS CHAPTER The Need for Firewalls Firewall Characteristics Types of Firewalls

Types of Firewalls E. Eugene Schultz Payoff

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Network Security. Internet Firewalls. Chapter 13. Network Security (WS 2002): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

Internet Firewalls Policy Development and Technology Choices

Network Security: From Firewalls to Internet Critters Some Issues for Discussion

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Firewalls. Ahmad Almulhem March 10, 2012

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Internet Firewalls and Security. A Technology Overview

Network Security and Firewalls. A Summary

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewalls. Chapter 3

Proxy firewalls.

Fig : Packet Filtering

Chapter 8 Security Pt 2

Chapter 6: Network Access Control

Network Security. Chapter 13. Internet Firewalls. Network Security (WS 07/08): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

1. Firewall Configuration

Internet infrastructure. Prof. dr. ir. André Mariën

CS5008: Internet Computing

Introduction of Intrusion Detection Systems

Computer Security DD2395

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Firewall Firewall August, 2003

A S B

How To Understand A Firewall

CIT 480: Securing Computer Systems. Firewalls

CIT 480: Securing Computer Systems. Firewalls

Firewalls Overview and Best Practices. White Paper

allow all such packets? While outgoing communications request information from a

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Special Issues for Penetration testing of Firewall

Firewalls and Intrusion Detection

Cornerstones of Security

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Intro to Firewalls. Summary

CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Network Security Policy

Firewalls, IDS and IPS

- Introduction to Firewalls -

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y / P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A

Internet Firewalls and Security

Application Firewalls

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

Solution of Exercise Sheet 5

Firewall Architecture

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall

Transcription:

Firewall Design Principles Firewall Characteristics Types of Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for these slides. Fall 2008 CS 334: Computer Security 1 Fall 2008 CS 334: Computer Security 2 Effective means of protection a local system or network of systems from network-based security threats while affording access to the outside world via WANs or the Internet Information systems undergo a steady evolution (from small LAN`s to Internet connectivity) Strong security features for all workstations and servers not established Systems provide many services by default Many workstations provide remote access to files and configuration databases (for ease of management and file sharing) Even if configured only for specific users, they can sometimes be tricked into providing services they shouldn t E.g. missing bounds check in input parsers Also, users sometimes forget to close temporary holes E.g. leaving file system remote mountable for file sharing Fall 2008 CS 334: Computer Security 3 Fall 2008 CS 334: Computer Security 4 Firewalls enforce policies that centrally manage access to services in ways that workstations should, but don t Which services? Finger telnet: requires authentication, but password sent in clear rlogin: similar to telnet, but uses IP address based authentication (Bad!) ftp: Tricky because two connections, control channel from sender, and data connection from receiver. (passive ftp has both sender originated) X Windows ICMP The firewall is inserted between the premises network and the Internet Aims: Establish a controlled link Protect the premises network from Internet-based attacks Provide a single choke point Fall 2008 CS 334: Computer Security 5 Fall 2008 CS 334: Computer Security 6 1

Design goals: All traffic from inside to outside must pass through the firewall (physically blocking all access to the local network except via the firewall) Only authorized traffic (defined by the local security policy) will be allowed to pass The firewall itself is immune to penetration (use of trusted system with a secure operating system) Four general techniques: Service control Determines the types of Internet services that can be accessed, inbound or outbound Direction control Determines the direction in which particular service requests are allowed to flow Fall 2008 CS 334: Computer Security 7 Fall 2008 CS 334: Computer Security 8 User control Controls access to a service according to which user is attempting to access it Behavior control Controls how particular services are used (e.g. filter e-mail) Cannot protect against attacks that bypass the firewall E.g. an internal modem pool Firewall does not protect against internal threats Firewall cannot protect against transfer of virus infected programs Too many different apps and operating systems supported to make it practical to scan all incoming files for viruses Fall 2008 CS 334: Computer Security 9 Fall 2008 CS 334: Computer Security 10 Three common types of Firewalls: Packet-filtering routers Application-level gateways Circuit-level gateways (Bastion host) Packet-filtering Router Fall 2008 CS 334: Computer Security 11 Fall 2008 CS 334: Computer Security 12 2

Packet-filtering Router Applies a set of rules to each incoming IP packet and then forwards or discards the packet Filter packets going in both directions The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header Two default policies (discard or forward) Advantages: Simplicity Transparency to users High speed Disadvantages: Difficulty of setting up packet filter rules Lack of Authentication Who really sent the packet? Fall 2008 CS 334: Computer Security 13 Fall 2008 CS 334: Computer Security 14 Can be clever: Allow connections initiated from inside network to outside, but not initiated from outside. Traffic flows both way, but if firewall only allows incoming packets with ACK set in TCP header, this manages the issue. Problem: some apps require outside node to initiate connection with inside node (e.g. ftp, Xwindows), even if original request initiated by inside node. Solution (sort of): allow packets from outside if they are connecting to high port number. Fall 2008 CS 334: Computer Security 15 Fall 2008 CS 334: Computer Security 16 Changes filtering rules dynamically (by remembering what has happened in recent past) Example: Connection initiated from inside node S to outside IP address D. For short time allow incoming connections from D to appropriate ports (I.e. ftp port). In practice, much more caution Stateful filter notices the incoming port requested by S and only allows connections from D to that port. Requires parsing ftp control packets Possible attacks and appropriate countermeasures IP address spoofing Discard packet with inside source address if it arrives on external interface Source routing attacks Discard all source routed packets Fall 2008 CS 334: Computer Security 17 Fall 2008 CS 334: Computer Security 18 3

Possible attacks and appropriate countermeasures Tiny fragment attacks Intruder uses IP fragment option to create extremely small IP packets that force TCP header information into separate packet fragments Discard all packets where protocol type is TCP and IP fragment offset is small Application-level Gateway Fall 2008 CS 334: Computer Security 19 Fall 2008 CS 334: Computer Security 20 Application-level Gateway Also called proxy server Acts as a relay of application-level traffic Can act as router, but typically placed between two packet filtering firewalls (for total of three boxes) Two firewalls are routers that refuse to forward anything from the global net that is not to gateway, and anything to global net that is not from gateway. Sometimes called a bastion host (we use the term differently) Advantages: Higher security than packet filters Only need to scrutinize a few allowable applications Easy to log and audit all incoming traffic Disadvantages: Additional processing overhead on each connection (gateway as splice point) Fall 2008 CS 334: Computer Security 21 Fall 2008 CS 334: Computer Security 22 Circuit-level Gateway Circuit-level Gateway Stand-alone system or Specialized function performed by an Application-level Gateway Sets up two TCP connections The gateway typically relays TCP segments from one connection to the other without examining the contents Fall 2008 CS 334: Computer Security 23 Fall 2008 CS 334: Computer Security 24 4

Circuit-level Gateway The security function consists of determining which connections will be allowed Typically use is a situation in which the system administrator trusts the internal users Bastion Host A system identified by the firewall administrator as a critical strong point in the network s security The bastion host serves as a platform for an application-level or circuit-level gateway Fall 2008 CS 334: Computer Security 25 Fall 2008 CS 334: Computer Security 26 In addition to the use of simple configuration of a single system (single packet filtering router or single gateway), more complex configurations are possible We won t go into these Assume all bad guys are on outside, and everyone inside can be trusted. Firewalls can be defeated if malicious code can be injected into corporate network E.g. trick someone into launching an executable from an email message or into downloading something from the net. Often make it difficult for legitimate users to get their work done. Misconfiguration, failure to recognize new app Fall 2008 CS 334: Computer Security 27 Fall 2008 CS 334: Computer Security 28 If firewall allows anything through, people figure out how to do what they need by disguising their traffic as allowed traffic E.g. file transfer by sending it through email. If size of emails limited, then user breaks them into chunks, etc. Firewall friendly traffic (e.g. using http for other purposes) Defeats effort of sysadmin to control traffic Less efficient than not using http Chapman, D., and Zwicky, E. Building Internet Firewalls. O Reilly, 1995 Cheswick, W., and Bellovin, S. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley, 2000 Fall 2008 CS 334: Computer Security 29 Fall 2008 CS 334: Computer Security 30 5