Application Firewalls



Similar documents
Network Security - ISA 656 Application Firewalls

12. Firewalls Content

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Chapter 9 Firewalls and Intrusion Prevention Systems

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Firewalls 1 / 43. Firewalls

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

CSCI Firewalls and Packet Filtering

Computer Security: Principles and Practice

Firewalls CSCI 454/554

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Computer Security DD2395

Firewall Design Principles Firewall Characteristics Types of Firewalls

Internet Security Firewalls

Proxy Server, Network Address Translator, Firewall. Proxy Server

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

CSCE 465 Computer & Network Security

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Firewalls (IPTABLES)

Proxies. Chapter 4. Network & Security Gildas Avoine

Lecture 23: Firewalls

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010

Cryptography and network security

Cisco PIX vs. Checkpoint Firewall

CMPT 471 Networking II

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Types of Firewalls E. Eugene Schultz Payoff

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Internet Security Firewalls

Stateful Inspection Technology

Security threats and network. Software firewall. Hardware firewall. Firewalls

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Gateway Security at Stateful Inspection/Application Proxy

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Xerox Multifunction Devices. Network Configuration. Domain 2. Domino Server 2. Notes. MIME to Notes. Port. Domino. Server 1.

allow all such packets? While outgoing communications request information from a

Security Technology: Firewalls and VPNs

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

A S B

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

1 You will need the following items to get started:

Firewalls. Chapter 3

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Introduction to Computer Security Benoit Donnet Academic Year

Overview. Firewall Security. Perimeter Security Devices. Routers

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Firewalls. Mahalingam Ramkumar

Internet infrastructure. Prof. dr. ir. André Mariën

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Networking for Caribbean Development

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Chapter 20. Firewalls

From Network Security To Content Filtering

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Gateways Using MDaemon 6.0

Internet Security [1] VU Engin Kirda

Fig : Packet Filtering

Lesson 5: Network perimeter security

SIP and VoIP 1 / 44. SIP and VoIP

Nuclear Plant Information Security A Management Overview

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

CIT 480: Securing Computer Systems. Firewalls

Overview - Using ADAMS With a Firewall

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY

Overview - Using ADAMS With a Firewall

CS5008: Internet Computing

Guideline on Firewall

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Guardian Digital Secure Mail Suite Quick Start Guide

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

What would you like to protect?

PART D NETWORK SERVICES

Network Security - ISA 656 Firewalls & NATs

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Configuration Guide BES12. Version 12.2

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

CIT 480: Securing Computer Systems. Firewalls

Transcription:

Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Application Distributed 1 / 44

Moving Up the Stack Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Distributed Why move up the stack? Apart from the limitations of packet filters discussed last time, firewalls are inherently incapable of protecting against attacks on a higher layer IP packet filters (plus port numbers... ) can t protect against bogus TCP data A TCP-layer firewall can t protect against bugs in SMTP SMTP proxies can t protect against problems in the email itself, etc. 2 / 44

Advantages Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Protection can be tuned to the individual application More context can be available You only pay the performance price for that application, not others Distributed 3 / 44

Disadvantages Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Application-layer firewalls don t protect against attacks at lower layers! They require a separate program per application These programs can be quite complex They may be very intrusive for user applications, user behavior, etc. Distributed 4 / 44

Example: Protecting Email Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Do we protect inbound or outbound email? Some of the code is common; some is quite different Do we work at the SMTP level (RFC 2821) or the mail content level (RFC 2822)? What about MIME? (What about S/MIME- or PGP-protected mail?) What are the threats? Distributed 5 / 44

Email Threats Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement The usual: defend against protocol implementation bugs Virus-scanning Anti-spam? Javascript? Web bugs in HTML email? Violations of organizational email policy? Signature-checking? Distributed 6 / 44

Inbound Email Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Email is easy to intercept: MX records in the DNS route inbound email to an arbitrary machine Possible to use * to handle entire domain Example: DNS records exist for att.com and *.att.com Net result: all email for that domain is sent to a front end machine Distributed 7 / 44

Different Sublayers Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Note that are are multiple layers of protection possible here The receiving machine can run a hardened SMTP, providing protection at that layer Once the email is received, it can be scanned at the content layer for any threats The firewall function can consist of either or both Distributed 8 / 44

Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement No help from the protocol definition here But most mailers have the ability to forward some or all email to a relay host Declare by administrative fiat that this must be done Enforce this with a packet filter... Distributed 9 / 44

Combining Firewall Types Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Use an application firewall to handle inbound and outbound email Use a packet filter to enforce the rules Distributed 10 / 44

Firewalling Email Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Distributed Outside Packet Filter Inside SMTP Receiver DMZ Anti Spam Anti Virus 11 / 44

Enforcement Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Distributed Email can t flow any other way The only SMTP server the outside can talk to is the SMTP receiver It forwards the email to the anti-virus/anti-spam filter, via some arbitrary protocol That machine speaks SMTP to some inside mail gateway Note the other benefit: if the SMTP receiver is compromised, it can t speak directly to the inside 12 / 44

Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Again, we use a packet filter to block direct outbound connections to port 25 The only machine that can speak to external SMTP receivers is the dedicated outbound email gateway That gateway can either live on the inside or on the DMZ Distributed 13 / 44

Application DNS Issues UDP Issues Internal Versus External View Cache Contamination Attacks DNS Filtering Distributed 14 / 44

DNS Issues Application DNS Issues UDP Issues Internal Versus External View Cache Contamination Attacks DNS Filtering UDP (discussed previously) Internal versus external view DNS cache corruption Optimizing DNSSEC checks Distributed 15 / 44

UDP Issues Application DNS Issues UDP Issues Internal Versus External View Cache Contamination Attacks DNS Filtering Distributed Remember the DNS server location discsussed last time In fact, what we did there was use an application-level relay to work around packet filter restrictions We re lucky since the DNS protocol includes provision for recursion, it requires no application changes for this to work 16 / 44

Internal Versus External View Application DNS Issues UDP Issues Internal Versus External View Cache Contamination Attacks DNS Filtering Distributed Should outsiders be able to see the names of all internal machines? What about secretproject.foobar.com? Solution: use two DNS servers, one for internal requests and one for external request Put one on each side of the firewall Issue: which machine does the NS record for foobar.com point to, the inside or the outside server? Can be trickier than it seems must make sure that internal machines don t see NS records that will make them try to go outside directly 17 / 44

Cache Contamination Attacks Application DNS Issues UDP Issues Internal Versus External View Cache Contamination Attacks DNS Filtering DNS servers cache results from queries Responses can contain additional information data that may be helpful but isn t part of the answer Send bogus DNS records as additional information; confuse a later querier Distributed 18 / 44

DNS Filtering Application DNS Issues UDP Issues Internal Versus External View Cache Contamination Attacks DNS Filtering Distributed All internal DNS queries go to a DNS switch If it s an internal query, forward the query to the internal server or pass back internal NS record If it s an external query, forward the query to outside, but: Scrub the result to remove any references to inside machines Scrub the result to remove any references to any NS records; this prevents attempts to go outside directly Use a packet filter to block direct DNS communication 19 / 44

Application Small Application Gateways FTP Proxy Attacks Via FTP Proxy Web Proxies Distributed 20 / 44

Small Application Gateways Application Small Application Gateways FTP Proxy Attacks Via FTP Proxy Web Proxies Some protocols don t need full-fledged handling at the application level That said, a packet filter isn t adequate Solution: examine some of the traffic via an application-specific proxy; react accordingly Distributed 21 / 44

FTP Proxy Application Small Application Gateways FTP Proxy Attacks Via FTP Proxy Web Proxies Distributed Remember the problem with the PORT command? Scan the FTP control channel If a PORT command is spotted, tell the firewall to open that port temporarily for an incoming connection (Can do similar things with RPC define filters based on RPC applications, rather than port numbers) 22 / 44

Attacks Via FTP Proxy Application Small Application Gateways FTP Proxy Attacks Via FTP Proxy Web Proxies Distributed Downloaded Java applets can call back to the originating host A malicious applet can open an FTP channel, and send a PORT command listing a vulnerable port on a nominally-protected host The firewall will let that connection through Solution: make the firewall smarter about what host and port numbers can appear in PORT commands... 23 / 44

Web Proxies Application Small Application Gateways FTP Proxy Attacks Via FTP Proxy Web Proxies Again, built-in protocol support Provide performance advantage: caching Can enforce site-specific filtering rules Distributed 24 / 44

Application Application Modifications Adding Authentication Distributed 25 / 44

Application Application Modifications Adding Authentication Distributed Circuit gateways operate at (more or less) the TCP layer No application-specific semantics Avoid complexities of packet filters Allow controlled inband connections, i.e., for FTP Handle UDP Most common one: SOCKS. Supported by many common applications, such as Firefox and GAIM. 26 / 44

Application Modifications Application Application Modifications Adding Authentication Distributed Application must be changed to speak the circuit gateway protocol instead of TCP or UDP Easy for open source Socket-compatible circuit gateway libraries have been written for SOCKS use those instead of standard C library to convert application 27 / 44

Adding Authentication Application Application Modifications Adding Authentication Distributed Because of the circuit (rather than packet) orientation, it s feasible to add authentication Purpose: extrusion control 28 / 44

Application Distributed Rationale Personal Saying No, Saying Yes Application-Linked Distributed Distributed 29 / 44

Rationale Application Distributed Rationale Personal Saying No, Saying Yes Application-Linked Distributed Conventional firewalls rely on topological assumptions these are questionable today Instead, install protection on the end system Let it protect itself 30 / 44

Personal Application Distributed Rationale Personal Saying No, Saying Yes Application-Linked Distributed Add-on to the main protocol stack The inside is the host itself; everything else is the outside Most act like packet filters Rule set can be set by individual or by administrator 31 / 44

Saying No, Saying Yes Application Distributed Rationale Personal Saying No, Saying Yes Application-Linked Distributed It s easy to reject protocols you don t like with a personal firewall The hard part is saying yes safely There s no topology all that you have is the sender s IP address Spoofing IP addresses isn t that hard, especially for UDP 32 / 44

Application-Linked Application Distributed Rationale Personal Saying No, Saying Yes Application-Linked Distributed Most personal firewalls act on port numbers At least one such firewall is tied to applications individual programs are or are not allowed to talk, locally or globally Pros: don t worry about cryptic port numbers; handle auxiliary ports just fine Cons: application names can be just as cryptic; service applications operate on behalf of some other application 33 / 44

Distributed Application Distributed Rationale Personal Saying No, Saying Yes Application-Linked Distributed In some sense similar to personal firewalls, though with central policy control Use IPsec to distinguish inside from outside Insiders have inside-issued certificates; outsiders don t Only trust other machines with the proper certificate No reliance on topology; insider laptops are protected when traveling; outsider laptops aren t a threat when they visit 34 / 44

Application Distributed Problems Corrupt Insiders Connectivity Laptops Evasion 35 / 44

Problems Application Distributed Problems Corrupt Insiders Connectivity Laptops Evasion Corrupt insiders Connectivity Laptops Evasion 36 / 44

Corrupt Insiders Application Distributed Problems Corrupt Insiders Connectivity Laptops Evasion assume that everyone on the inside is good Obviously, that s not true Beyond that, active content and subverted machines mean there are bad actors on the inside 37 / 44

Connectivity Application Distributed Problems Corrupt Insiders Connectivity Laptops Evasion rely on topology If there are too many conections, some will bypass the firewall Sometimes, that s even necessary; it isn t possible to effectively firewall all external partners A large company may have hundreds or even thousands of external links, most of which are unknown to the official networking people 38 / 44

Laptops Application Distributed Problems Corrupt Insiders Connectivity Laptops Evasion Laptops, more or less by definition, travel When they re outside the firewall, what protects them? At one conference, I spotted at least a dozen other attendee machines that were infected with the Code Red virus (Code Red only infected web servers. Why were laptops running web servers?) 39 / 44

Evasion Application Distributed Problems Corrupt Insiders Connectivity Laptops Evasion and firewall administrators got too good Some applications weren t able to run Vendors started building things that ran over HTTP HTTP usually gets through firewalls and even web proxies... 40 / 44

Application Distributed Conditions Format Material 41 / 44

Conditions Application Distributed Open book, open notes No computers or calculators 75 minutes Conditions Format Material 42 / 44

Format Application Distributed Conditions Format Material Approximately 8 questions I m not asking you to write programs Three types of questions Explanations of certain concepts, above the pure memorization level Carrying out tasks based on things discussed in class Design questions (i.e., ones intended to make you think) 43 / 44

Material Application Distributed Conditions Format Material Everything through today s lecture If it s in my slides or I said it in class, you re responsible for it There will be some material based more on the readings You re responsible for the assigned readings at about the level of class coverage. 44 / 44