Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding



Similar documents
Solution of Exercise Sheet 5

Stateful Firewalls. Hank and Foo

CS5008: Internet Computing

FIREWALL AND NAT Lecture 7a

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Firewalls P+S Linux Router & Firewall 2013

Topics NS HS12 2 CINS/F1-01

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

ΕΠΛ 674: Εργαστήριο 5 Firewalls

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

CIT 480: Securing Computer Systems. Firewalls

Protecting and controlling Virtual LANs by Linux router-firewall

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Cryptography and network security

Firewalls. Chien-Chung Shen

Firewalls. Ahmad Almulhem March 10, 2012

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

CIT 480: Securing Computer Systems. Firewalls

ELEN 689: Topics in Network Security: Firewalls. Ellen Mitchell Computing and Information Services 20 April 2006

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Chapter 15. Firewalls, IDS and IPS

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Network Address Translation (NAT)

Firewalls. Pehr Söderman KTH-CSC

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005

Chapter 8 Network Security

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

+ iptables. packet filtering && firewall

Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y / P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A

VLAN und MPLS, Firewall und NAT,

Internet Security Firewalls

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Firewalls with IPTables. Jason Healy, Director of Networks and Systems

Proxy Server, Network Address Translator, Firewall. Proxy Server

IP Firewalls. an overview of the principles

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Chapter 8 Security Pt 2

Network Security. Routing and Firewalls. Radboud University Nijmegen, The Netherlands. Autumn 2014

CIT 380: Securing Computer Systems

Linux Routers and Community Networks

Firewalls and Intrusion Detection

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Linux Network Security

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

How To Understand A Firewall

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewalls, IDS and IPS

Internet Security Firewalls

Firewall Design Principles Firewall Characteristics Types of Firewalls

Firewalls, Tunnels, and Network Intrusion Detection

A Study of Technology in Firewall System

CSE543 - Computer and Network Security Module: Firewalls

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Fig : Packet Filtering

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Types of Firewalls E. Eugene Schultz Payoff

CSCI 4250/6250 Fall 2015 Computer and Networks Security

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003

Insecure network services. Firewalls. Two separable topics. Packet filtering. Example: blocking forgeries. Example: blocking outgoing mail

Assignment 3 Firewalls

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

AppGate Personal Firewall 2.5.0

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

7. Firewall - Concept

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

The SpeedTouch and Firewalling

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

A Stateful Inspection of FireWall-1

Firewalls and System Protection

Safeguards Against Denial of Service Attacks for IP Phones

Firewall Firewall August, 2003

CSCE 465 Computer & Network Security

Development of a Network Intrusion Detection System

A S B

IPV6 FRAGMENTATION. The Case For Deprecation. Ron Bonica NANOG58

Introduction to Firewalls

Security: Attack and Defense

Network Defense Tools

Definition of firewall

Vanguard Applications Ware IP and LAN Feature Protocols. Firewall

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

Main functions of Linux Netfilter

How to protect your home/office network?

Firewalls. Chapter 3

Transcription:

Firewalls slide 1 configuring a sophisticated GNU/Linux firewall involves understanding iptables iptables is a package which interfaces to the Linux kernel and configures various rules for allowing packets and enter and leave the firewall iptables can be configured as both a packet Filtering Firewall and stateful firewall

Packet Filtering Firewall slide 2 packet filtering is usually achieved byexamining some of the following characteristics of a datagram protocol type, for example allow/disallow TCP, UDP, ICMP, DHCP packets source address, the machine that supposedly created the packet this can be spoofed

Packet Filtering Firewall slide 3 destination address the machine the packet to which is being sent protocol sub-type some protocol specific sub-type for example TCP s syn packet which is used to initiate a connection or allow ping to operate by allowing the ICMP sub-type (echorequest, echo-reply) packets iptables also allows you to filter packets based on their state

Stateful firewall slide 4 provides more control over which packets are allowed through and which are blocked than a stateless firewall it is fairly easy to spoof packets and get them to pass through a stateless firewall by contrast it is difficult to do the same across a stateful firewall astateful firewall must keep track of all connections in addition to the normal filtering by port, protocol, and IP address in the Linux statefull firewall (iptables) aconnection can either be in one of the following states: NEW, ESTABLISHED, RELATED, or INVALID

Superiority of a stateful firewall over astateless firewall slide 5 if a user wishes to browse the web then the firewall must allow incoming packets from any external <IP address:port 80> to your local <ip address: an unprivileged port> these packets can be forged and an attacker can create a false <return address:port 80> and sent it to your <local ip address: unprivileged port> problem is that the stateless firewall cannot defend against this attack

Asimple stateless attack slide 6 can take many forms, a simple attack which caused problems in the middle 1990s, is that of IP buffer overflow here the attacker takes advantage of the IP datagram structure sends three IP datagram fragments with illegal offsets and length values if the victim does not check the boundaries of the IP fragments then a buffer overflow will occur inside the kernel

Asimple stateless attack slide 7 key datagram field values for fragment 1: offset 0, length 40000 fragment 2: offset 40000, length 30000 recall that the maximum legal IPdatagram size is 65536 bytes result is that the victim will be asked to overwrite 70000-65536 bytes of memory

The stateful firewall slide 8 the stateful firewall keeps a track of all tcp connections made through the firewall the firewall knows which IP addresses are currently being connected to it also knows which unprivileged ports are used either side of the firewall it blocks any packet not using these IP addresses and port numbers and it tracks TCP flags (ack, syn, fin, data etc) removes port and ip address when it sees a TCP.fin occur

Attack example slide 9 using the same attack example the attacker can send the false fragments, but the stateful firewall will reject the packets unless the attacker correctly guesses the unprivileged port number and destination IP address stateful firewalls will forget about established connections if no activity occurs thus an attacker cannot attack a network idle machine an active web browser opens up a different tcp connection for each web page accessed and closes it immediately it is fetched the unprivileged port numbers are randomly chosen

Disadvantages of Stateful Firewalls slide 10 they are more complex that stateless firewalls require more memory and to track active connections are harder to administer than a stateless firewall some protocols cannot be firewalled by stateful inspection of TCP and IP

Ftp problem protocol for stateful firewalls slide 11 FTP is a problem for stateful firewalls because buried inside the FTP protocol the FTP client can request the server to send data to an <IP:PORT> combination IP is normally the client IP, but the port is any unprivileged port stateful firewalls are normally set up to block incoming tcp connections FTP and other similar protocols also causes problems for machines performing IP masquerading (or NAT) solution is for the firewall to understand more about the application level protocol often called application level firewalls

Application-level filters slide 12 modern firewalls are use application level filters these proxies can read the data part of each packet in order to make more intelligent decisions about the connection IRC or peer to peer file sharing protocols sometimes try to "hide" on HTTP ports while traditional stateful firewalls cannot detect this an application level firewall can detect and selectively block HTTP connections according to content

Application-level filters slide 13 application level filter based firewalls inspect each packet and decide whether it should be allowed to pass the firewall and continue travelling towards its destination, or be discarded some firewalls allow packets to pass according to the context of the connection, and not just the packet header characteristics this deep packet inspection provides a much finer grained control. nevertheless this can be defeated by application level protocols which encrypt their data

Application-level filters slide 14 examine squid http://en.wikipedia.org/wiki/ Squid_cache and web content filtering dans guardian http:// packages.debian.org/unstable/web/dansguardian the Linux kernel can be configured to act as a stateless or stateful firewall through the iptables http://www.netfilter.org program