Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski pxk@cs.rutgers.edu



Similar documents
Firewalls and System Protection

Internet Security Firewalls

Firewalls. Chapter 3

CMPT 471 Networking II

Firewalls. Network Security. Firewalls Defined. Firewalls

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Internet Security Firewalls

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Security Technology: Firewalls and VPNs

FIREWALL AND NAT Lecture 7a

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

12. Firewalls Content

A S B

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Firewalls, IDS and IPS

Network Security. Internet Firewalls. Chapter 13. Network Security (WS 2002): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

CIT 480: Securing Computer Systems. Firewalls

CIT 480: Securing Computer Systems. Firewalls

CSCI Firewalls and Packet Filtering

Overview. Firewall Security. Perimeter Security Devices. Routers

INTRODUCTION TO FIREWALL SECURITY

Packet filtering and other firewall functions

Firewalling and Network Security I -Linux. Jeff Muday Academic Computing Specialist Wake Forest University

Introduction to Firewalls Open Source Security Tools for Information Technology Professionals

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CSCE 465 Computer & Network Security

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

What would you like to protect?

Cisco PIX vs. Checkpoint Firewall

Content Distribution Networks (CDN)

Network Security. Chapter 13. Internet Firewalls. Network Security (WS 07/08): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

FIREWALL ARCHITECTURES

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewall Firewall August, 2003

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Firewalls. Ahmad Almulhem March 10, 2012

Chapter 9 Firewalls and Intrusion Prevention Systems

Firewalls. Chien-Chung Shen

Chapter 15. Firewalls, IDS and IPS

Cornerstones of Security

Firewalls (IPTABLES)

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Firewall Design Principles

Guideline on Firewall

Firewalls CSCI 454/554

- Introduction to Firewalls -

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

allow all such packets? While outgoing communications request information from a

Implementing Network Address Translation and Port Redirection in epipe

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

1. Firewall Configuration

FIREWALLS & CBAC. philip.heimer@hh.se

Solution of Exercise Sheet 5

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Proxy Server, Network Address Translator, Firewall. Proxy Server

Computer Security: Principles and Practice

CS5008: Internet Computing

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Network Security. Raj Jain. The Ohio State University. Columbus, OH Raj Jain 31-1

Cryptography and network security

Computer Security DD2395

Chapter 20. Firewalls

ΕΠΛ 674: Εργαστήριο 5 Firewalls

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Topics NS HS12 2 CINS/F1-01

Overview - Using ADAMS With a Firewall

IPv6 Firewalls. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok. Last updated 17 th May 2016

Overview - Using ADAMS With a Firewall

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Multi-Homing Security Gateway

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

GregSowell.com. Mikrotik Security

Firewall Defaults and Some Basic Rules

+ iptables. packet filtering && firewall

Firewall Design Principles Firewall Characteristics Types of Firewalls

Lecture 23: Firewalls

Firewalls 1 / 43. Firewalls

Introduction of Intrusion Detection Systems

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Transcription:

Distributed Systems Firewalls: Defending the Network Paul Krzyzanowski pxk@cs.rutgers.edu Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License.

inetd Most UNIX systems ran a large number of tcp services as dæmons e.g., rlogin, rsh, telnet, ftp, finger, talk, Later, one process, inetd, was created to listen to a set of ports and then spawn the service on demand pass sockets as standard in/standard out file descriptors servers don t run unless they are in use

TCP wrappers (tcpd) Plug-in replacement to inetd Restrict access to TCP services Allow only specified machines to execute authorized services Monitor and log requests Specify rules in two files: hosts.allow and hosts.deny access: grant access if service:client in /etc/hosts.allow deny access if service:client in /etc/hosts.deny otherwise allow access support for booby traps (honeypots)

Firewalls Isolate trusted domain of machines from the rest of the untrusted world move all machines into a private network disconnect all other systems untrusted users not allowed not acceptable we want to be connected Solution: protect the junction between a trusted internal network of computers from an external network with a firewall

Firewalls Two major approaches to building firewalls: packet filtering proxies

Packet filtering Selective routing of packets Between internal and external hosts By routers, kernel modules, or firewall software Allow or block certain types of packets Screening router determine route and decide whether the packet should be routed

Packet filtering: screening router Filter by IP source address, IP destination address TCP/UDP source port, TCP/UDP destination port Protocol (TCP, UDP, ICMP, ) ICMP message type interface packet arrives on destination interface Allow or block packets based on any/all fields Block any connections from certain systems Disallow access to dangerous services IP packet data

Packet filtering Stateless inspection filter maintains no state each packet examined on its own

Packet filtering Stateful inspection keep track of TCP connections (SYN, SYN/ACK packets) e.g. no rogue packets when connection has not been established related ports: allow data ports to be opened for FTP sessions Port triggering (outbound port triggers other port access to be redirected to the originating system) Generally used with NAT (Network Address Translation) limit rates of SYN packets avoid SYN flood attacks Other application-specific filtering Drop connections based on pattern matching Rewrite port numbers in data stream

Packet filtering Screening router allows/denies access to a service cannot protect operations within a service

Packet filtering: rules Src addr=42.15.0.0/16, dest port=* Reject everything from 42.15.*.* Src addr=192.168.1.0/24, dest port=25 Accept email (port 25) requests from 192.168.1.* Dest addr=192.168.1.0/24, dest port=* Reject all other requests from 192.168.1.* Src addr=128.6.0.0/16, Dest addr=192.168.2.3, dest port=22 Accept ssh (port 22) requests from 128.6.*.* to 192.168.2.3 Reject Accept Reject Accept Dest addr=192.168.2.2, dest port=80 Accept Accept web (port 80) requests to a server at 192.168.2.2 * Reject

Proxy services Application or server programs that run on firewall host dual-homed host bastion host Take requests for services and forward them to actual services provide replacement connections and act as gateway services Application-level gateway Stateful inspection and protocol validation

Proxy services Proxies are effective in environments where direct communication is restricted between internal and external hosts dual-homed machines and packet filtering

Proxy example Checkpoint Software Technologies Firewall-1 mail proxy: mail address translation: rewrite From: redirect To: drop mail from given address strip certain mime attachments strip Received info on outbound mail drop mail above given size perform anti-virus checks on attachments does not allow outsiders direct connection to a local mailer

Dual-homed host architecture Built around dual-homed host computer Disable ability to route between networks packets from Internet are not routed directly to the internal network services provided by proxy users log into dual-homed host to access Internet user accounts present security problems Internet dual-homed host internal network internal machines

Screened host architecture Provides services from a host attached to internal network Security provided by packet filtering only certain operations allowed (e.g. deliver email) outside connections can only go to bastion host allow internal hosts to originate connections over Internet if bastion host is compromised Internet bastion host screening router internal network internal machines

Screened subnet architecture Add extra level of isolation for internal network Place any externally visible machines on a separate perimeter network (DMZ) Internet exterior router interior router DMZ network bastion hosts externally-visible services internal network internal machines

Screened subnet architecture Exterior router (access router) protects DMZ and internal network from Internet generally allow anything outbound that you need block incoming packets from Internet that have forged source addresses allow incoming traffic only for bastion hosts/services. Interior router (choke router) protects internal network from Internet and DMZ does most of packet filtering for firewall allows selected outbound services from internal network limit services between bastion host and internal network

Single router DMZ Interface 1 Internal Internet exterior router Interface 2 DMZ DMZ network bastion hosts externally-visible services internal network internal machines

Firewalling principles It is easier to secure one or a few machines than a huge number of machines on a LAN Focus effort on bastion host(s) since only they are accessible from the external network All traffic between outside and inside must pass through a firewall Deny overall Turn everything off, then allow only what you need Private network should never see security attacks Be prepared for attacks from within Infected machines

The end