CS 5410 - Computer and Network Security: Firewalls

Similar documents
CS Computer and Network Security: Firewalls

CSC574 - Computer and Network Security Module: Firewalls

CIS 433/533 - Computer and Network Security Firewalls

CSE543 - Computer and Network Security Module: Firewalls

Module: Firewalls. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

+ iptables. packet filtering && firewall

Firewalls. Chien-Chung Shen

Linux firewall. Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users

Chapter 7. Firewalls

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

Linux Routers and Community Networks

Linux Firewalls (Ubuntu IPTables) II

Computer Firewalls. The term firewall was originally used with forest fires, as a means to describe the

Netfilter. GNU/Linux Kernel version 2.4+ Setting up firewall to allow NIS and NFS traffic. January 2008

CIT 480: Securing Computer Systems. Firewalls

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

CIT 480: Securing Computer Systems. Firewalls

Intro to Linux Kernel Firewall

Assignment 3 Firewalls

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Linux Firewall Wizardry. By Nemus

Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN

Linux: 20 Iptables Examples For New SysAdmins

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Network security Exercise 9 How to build a wall of fire Linux Netfilter

Firewall implementation and testing

Netfilter / IPtables

Linux Networking: IP Packet Filter Firewalling

Firewalls (IPTABLES)

How To Understand A Firewall

Network Security Exercise 10 How to build a wall of fire

Definition of firewall

Firewall Firewall August, 2003

Main functions of Linux Netfilter

Network Security Management

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Optimisacion del ancho de banda (Introduccion al Firewall de Linux)

Firewalls. Pehr Söderman KTH-CSC

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

ipchains and iptables for Firewalling and Routing

TECHNICAL NOTES. Security Firewall IP Tables

Building a Home Gateway/Firewall with Linux (aka Firewalling and NAT with iptables )

Lab Objectives & Turn In

How to Turn a Unix Computer into a Router and Firewall Using IPTables

Protecting and controlling Virtual LANs by Linux router-firewall

Focus on Security. Keeping the bad guys out

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Linux Firewall. Linux workshop #2.

How to Secure RHEL 6.2 Part 2

Open Source Bandwidth Management: Introduction to Linux Traffic Control

Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC.

Matthew Rossmiller 11/25/03

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

How to protect your home/office network?

FIREWALL AND NAT Lecture 7a

Firewall Configuration and Assessment

Topics NS HS12 2 CINS/F1-01

Introduction to Firewalls Open Source Security Tools for Information Technology Professionals

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu (Amd66) On Ubuntu 4.5 On A Windows Box

Project 2: Firewall Design (Phase I)

CSCE 465 Computer & Network Security

Worksheet 9. Linux as a router, packet filtering, traffic shaping

ΕΠΛ 674: Εργαστήριο 5 Firewalls

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Security Technology: Firewalls and VPNs

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

allow all such packets? While outgoing communications request information from a

Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC.

Manuale Turtle Firewall

Overview. Firewall Security. Perimeter Security Devices. Routers

Packet filtering with Linux

Firewalls. October 23, 2015

Com.X Router/Firewall Module. Use Cases. White Paper. Version 1.0, 21 May Far South Networks

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Firewalls. Firewall types. Packet filter. Proxy server. linux, iptables-based Windows XP s built-in router device built-ins single TCP conversation

Evaluation guide. Vyatta Quick Evaluation Guide

FIREWALLS & CBAC. philip.heimer@hh.se

Telematics. 14th Tutorial - Proxies, Firewalls, P2P

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Linux Home Networking II Websites At Home

Using VyOS as a Firewall

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

INTRODUCTION TO FIREWALL SECURITY

CSCI Firewalls and Packet Filtering

Linux Cluster Security Neil Gorsuch NCSA, University of Illinois, Urbana, Illinois.

Packet Filtering Firewall

Linux MDS Firewall Supplement

IPv6 Firewalls. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok. Last updated 17 th May 2016

Packet Filtering using the ADTRAN OS firewall has two fundamental parts:

Network Defense Tools

Stateful Firewalls. Hank and Foo

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

GregSowell.com. Mikrotik Security

This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.

Transcription:

CS 5410 - Computer and Network Security: Firewalls Professor Kevin Butler Fall 2015

Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire, heat and structural collapse. 2

Filtering: Firewalls Filtering traffic based on policy Policy determines what is acceptable traffic Access control over traffic Accept or deny Application May perform other duties Logging (forensics, SLA) Flagging (intrusion detection) QoS (differentiated services) Network Link 3

IP Firewall Policy Specifies what traffic is (not) allowed Maps attributes to address and ports Example: HTTP should be allowed to any external host, but inbound only to webserver 4

X-Listing Blacklisting - specifying specific connectivity that is explicitly disallowed E.g., prevent connections from badguys.com Whitelisting - specifying specific connectivity that is explicitly allowed E.g., allow connections from goodguys.com These is useful for IP filtering, SPAM mitigation, 5

Stateful, Proxy, and Transparent Single packet contains insufficient data to make access control decision Stateful: allows historical context consideration Firewall collects data over time e.g., TCP packet is part of established session Firewalls can affect network traffic Transparent: appear as a single router (network) Proxy: receives, interprets, and reinitiates communication (application) Transparent good for speed (routers), proxies good for complex state (applications) 6

DMZ (De-militarized Zone) Zone between LAN and Internet (public facing) Mail Server Accounting Internet LAN LAN Web Server Customer Database 7

Practical Issues and Limitations Network layer firewalls are dominant DMZs allow multi-tiered fire-walling Tools are widely available and mature Personal firewalls gaining popularity Issues Network perimeters not quite as clear as before E.g., telecommuters, VPNs, wireless, Every access point must be protected E.g., this is why war-dialing/war-driving is effective Hard to debug, maintain consistency and correctness Often seen by non-security personnel as impediment E.g., Just open port X so I can use my wonder widget SOAP - why is this protocol an issue? 8

The Wool firewall study.. 12 error classes No default policy, automatic broad tools NetBIOS (the very use of the Win protocol deemed error) Portmapper protocols Use of any wildcards Lack of egress rules Interesting questions: Is the violation of Wool s errors really a problem? ICMP comments? Why do you think more expensive firewalls had a higher occurrence of errors? Take away: configurations are bad 9

Practical Firewall Implementations Primary task is to filter packets But systems and requirements are complex Consider All the protocols and services Stateless vs. stateful firewalls Network function: NAT, forwarding, etc. Practical implementation: Linux iptables http://www.netfilter.org/documentation/howto/packetfiltering-howto.html http://linux.web.cern.ch/linux/scientific3/docs/rhel-rg-en-3/chiptables.html 10

Netfilter hook Series of hooks in Linux network protocol stack An iptable rule set is evaluated at each PREROUTING : before routing INPUT : inbound to local destination FORWARD : inbound but routed off host OUTPUT : outbound to remote destination POSTROUTING : after routing Preroute Routing Forward Postroute Input Output 11

iptables Concepts The iptables firewall looks in the firewall table to seek if the chain associated with the current hook matches a packet, and executes the target if it does. Table: allows policies to be cleanly separated by purpose (default: -t filter, also: -t nat, -t mangle and -t raw ) Each table as a set of default chains. Chain: list of rules associated with the chain identifier, e.g., hook name (INPUT, OUTPUT, etc) Match: when all a rule s field match the packet Target: operation to execute on a packet given a match 12

Table/Chain Traversal http://www.linuxtopia.org/linux_firewall_iptables/c951.html 13

iptables Commands iptables [-t <table_name>] <cmd> <chain> <plist> Commands Append rule to end or specific location in chain (-A) Delete a specific rule in a chain (-D) Replace a rule (-R) Flush a chain (-F) List a chain (-L) Set a default chain policy (-P) Create a new user-specified chain (-N) Remove an empty (user-specified) chain (-X) 14

iptables Rule Parameters Things you can match on Destination/Source IP address range and netmask Protocol of packet ICMP, TCP, etc Fragmented only Incoming/outgoing interface Target on rule match 15

Test it out PING on localhost ping -c 1 127.0.0.1 Add iptables rule to block iptables -A INPUT -s 127.0.0.1 -p icmp -j DROP Try ping Delete the rule iptables -D INPUT 1 iptables -D INPUT -s 127.0.0.1 -p icmp -j DROP iptables -F INPUT 16

Testing Use loopback to test the rules locally on your machine IP address 127.0.0.1 ICMP submit ping requests to 127.0.0.1 as above TCP submit requests to 127.0.0.1 at specific port server nc -l 3750 listen at port 3750 client nc -p 3000 localhost 3750 send from port 3000 to localhost at port 3750 17

Per Protocol Options Specialized matching options for rules Specific to protocol TCP Source/destination ports SYN TCP flags 18

Targets Define what to do with the packet at this time ACCEPT/DROP QUEUE for user-space application LOG any packet that matches REJECT drops and returns error packet RETURN enables packet to return to previous chain <user-specified> passes packet to that chain ## Create chain which blocks new connections, except if coming from inside. # iptables -N block # iptables -A block -m state --state ESTABLISHED,RELATED -j ACCEPT # iptables -A block -m state --state NEW -i! ppp0 -j ACCEPT # iptables -A block -j DROP ## Jump to that chain from INPUT and FORWARD chains. # iptables -A INPUT -j block # iptables -A FORWARD -j block 19

Examples iptables -A INPUT -s 200.200.200.2 -j ACCEPT iptables -A INPUT -s 200.200.200.1 -j DROP iptables -A INPUT -s 200.200.200.1 -p tcp -j DROP iptables -A INPUT -s 200.200.200.1 -p tcp --dport telnet -j DROP iptables -A INPUT -p tcp --destination-port telnet -i ppp0 -j DROP 20

Example: Host Firewall Assume you have a host with one network interface (eth0). You are running SSH (port 22) and want to allow access by external hosts. You are also running Apache for Web development, and only want it to be accessed by other hosts on the LAN (10.0.2.0/24) # iptables -F INPUT # iptables -F OUTPUT # iptables -F FORWARD # iptables -P INPUT DROP # iptables -P OUTPUT ACCEPT # iptables -P FORWARD DROP # iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT # iptables -A INPUT -i eth0 -m state --state NEW --dport 22 -j ACCEPT # iptables -A INPUT -i eth0 -m state --state NEW -s 10.0.2.0/24 --dport 80 -j ACCEPT 21

Example: Gateway/DMZ Firewalls Assume you have two firewalls (FW1 and FW2), each with two ethernet interfaces (eth0 and eth1). FW1 protects the DMZ, and FW2 protects the LAN eth0 FW1 eth1 FW2 eth0 eth1 Define an iptables policy for FW1 that: Allows new Internet traffic to reach port 80 on 10.0.1.13 Does not allow traffic to reach the LAN (10.0.2.0/24) Define an iptables policy for FW2 that Allows internal hosts to reach the webserver, but nothing else in the DMZ (10.0.1.0/24), and can reach the larger Internet Prevents DMZ hosts from initiating connections to LAN 22

Example: Gateway/DMZ Firewalls FW1 Policy # iptables -F INPUT # iptables -F OUTPUT # iptables -F FORWARD # iptables -P INPUT DROP # iptables -P OUTPUT DROP # iptables -P FORWARD DROP # iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT # iptables -A FORWARD -i eth0 -o eth1 -m state --state NEW -d 10.0.1.13 --dport 80 -j ACCEPT # iptables -A FORWARD -i eth1 -o eth0 -j ACCEPT FW2 Policy # iptables -F INPUT # iptables -F OUTPUT # iptables -F FORWARD # iptables -P INPUT DROP # iptables -P OUTPUT DROP # iptables -P FORWARD DROP # iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT # iptables -A FORWARD -i eth1 -o eth0 -m state --state NEW -d 10.0.1.13 --dport 80 -j ACCEPT # iptables -A FORWARD -i eth1 -o eth0 -d! 10.0.1.0/24 -j ACCEPT 23