Network Security - ISA 656 Application Firewalls



Similar documents
Application Firewalls

Network Security - ISA 656 Firewalls & NATs

CSCI Firewalls and Packet Filtering

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

12. Firewalls Content

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Security Technology: Firewalls and VPNs

Advanced Higher Computing. Computer Networks. Homework Sheets

Internet Security Firewalls

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Chapter 9 Firewalls and Intrusion Prevention Systems

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

CSCE 465 Computer & Network Security

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Internet Security Firewalls

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewalls 1 / 43. Firewalls

Stateful Inspection Technology

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY

IPv6 Firewalls. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok. Last updated 17 th May 2016

allow all such packets? While outgoing communications request information from a

Proxies. Chapter 4. Network & Security Gildas Avoine

Proxy Server, Network Address Translator, Firewall. Proxy Server

Firewalls and System Protection

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewalls (IPTABLES)

Types of Firewalls E. Eugene Schultz Payoff

Cryptography and network security

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Firewalls. Chapter 3

CMPT 471 Networking II

Cisco PIX vs. Checkpoint Firewall

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

Fig : Packet Filtering

VPN. Date: 4/15/2004 By: Heena Patel

Introduction to Computer Security Benoit Donnet Academic Year

Computer Security: Principles and Practice

Firewalls. Pehr Söderman KTH-CSC

Overview. Firewall Security. Perimeter Security Devices. Routers

Building A Secure Microsoft Exchange Continuity Appliance

Intranet, Extranet, Firewall

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Computer Security DD2395

Firewall Design Principles Firewall Characteristics Types of Firewalls

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Basics of Internet Security

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Implementing Secure Converged Wide Area Networks (ISCW)

Security threats and network. Software firewall. Hardware firewall. Firewalls

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Network Security. Chapter 13. Internet Firewalls. Network Security (WS 07/08): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

Deploying Layered Security. What is Layered Security?

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Overview. Packet filter

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

1 Introduction: Network Applications

Networking Basics and Network Security

FIREWALLS & CBAC. philip.heimer@hh.se

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Gateway Security at Stateful Inspection/Application Proxy

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Guideline on Firewall

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...

Small Business Server Part 2

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Chapter 20. Firewalls

Securing Networks with PIX and ASA

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Enterprise Security Critical Standards Summary

Security Type of attacks Firewalls Protocols Packet filter

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

CS5008: Internet Computing

How to set up a multifunction device or application to send using Office 365

Gateways Using MDaemon 6.0 With Dynaworx

CIT 480: Securing Computer Systems. Firewalls

Topics NS HS12 2 CINS/F1-01

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Transcription:

Network Security - ISA 656 Application Angelos Stavrou August 20, 2008

Moving Up the Stack Application Moving Up the Stack Filtering levels Advantages Disadvantages Example: Protecting Email Email Threats In-bound Email Different Protection Layers Combining Firewall Types Firewalling Email Policy Enforcement Distributed Why move up the stack? Apart from the limitations of packet filters discussed last time, firewalls are inherently incapable of protecting against attacks on a higher layer IP packet filters (plus port numbers... ) can t protect against bogus TCP data A TCP-layer firewall can t protect against bugs in SMTP SMTP proxies can t protect against problems in the email itself, etc. Angelos Stavrou (astavrou@gmu.edu) 2 / 36

Filtering levels Application Moving Up the Stack Filtering levels Advantages Disadvantages Example: Protecting Email Email Threats In-bound Email Different Protection Layers Combining Firewall Types Firewalling Email Policy Enforcement Application/proxy level firewalls FTP HTTP TELNET NFS TCP Network/packet filtering firewalls IP UDP ICMP Distributed Link layer firewalls Ethernet FDDI PPP Angelos Stavrou (astavrou@gmu.edu) 3 / 36

Advantages Application Moving Up the Stack Filtering levels Advantages Disadvantages Example: Protecting Email Email Threats In-bound Email Different Protection Layers Combining Firewall Types Firewalling Email Policy Enforcement Distributed Protection can be tuned to the individual application More context can be available You only pay the performance price for that application, not others Angelos Stavrou (astavrou@gmu.edu) 4 / 36

Disadvantages Application Moving Up the Stack Filtering levels Advantages Disadvantages Example: Protecting Email Email Threats In-bound Email Different Protection Layers Combining Firewall Types Firewalling Email Policy Enforcement Distributed Application-layer firewalls don t protect against attacks at lower layers! They require a separate program per application These programs can be quite complex They may be very intrusive for user applications, user behavior, etc. Angelos Stavrou (astavrou@gmu.edu) 5 / 36

Example: Protecting Email Application Moving Up the Stack Filtering levels Advantages Disadvantages Example: Protecting Email Email Threats In-bound Email Different Protection Layers Combining Firewall Types Firewalling Email Policy Enforcement Distributed Do we protect in-bound or out-bound email? Some of the code is common; some is quite different Do we work at the SMTP level (RFC 2821) or the mail content level (RFC 2822)? What about MIME? (What about S/MIME- or PGP-protected mail?) What are the threats? Angelos Stavrou (astavrou@gmu.edu) 6 / 36

Email Threats Application Moving Up the Stack Filtering levels Advantages Disadvantages Example: Protecting Email Email Threats In-bound Email Different Protection Layers Combining Firewall Types Firewalling Email Policy Enforcement Distributed The usual: defend against protocol implementation bugs Virus-scanning Anti-spam? Javascript? Web bugs in HTML email? Violations of organizational email policy? Signature-checking? Angelos Stavrou (astavrou@gmu.edu) 7 / 36

In-bound Email Application Moving Up the Stack Filtering levels Advantages Disadvantages Example: Protecting Email Email Threats In-bound Email Different Protection Layers Combining Firewall Types Firewalling Email Policy Enforcement Distributed Email is easy to intercept: MX records in the DNS route in-bound email to a machine Possible to use * to refer and handle the entire domain Example: DNS records exist for gmu.edu and *.gmu.edu Net result: all email for that domain is sent to a front end machine Angelos Stavrou (astavrou@gmu.edu) 8 / 36

Different Protection Layers Application Moving Up the Stack Filtering levels Advantages Disadvantages Example: Protecting Email Email Threats In-bound Email Different Protection Layers Combining Firewall Types Firewalling Email Policy Enforcement Distributed There are are multiple layers of protection possible here The receiving machine can filter IP Addresses from spammers, providing protection at the network layer The receiving machine can run a hardened SMTP, providing protection at the application layer Once the email is received, it can be scanned at the content layer for any threats The firewall function can consist of either or both Angelos Stavrou (astavrou@gmu.edu) 9 / 36

Application Moving Up the Stack Filtering levels Advantages Disadvantages Example: Protecting Email Email Threats In-bound Email Different Protection Layers Combining Firewall Types Firewalling Email Policy Enforcement No help from the protocol definition here But most mailers have the ability to forward some or all email to a relay host Create a policy that all mail has to pass through the relay in order to be delivered Enforce this with a packet filter... Distributed Angelos Stavrou (astavrou@gmu.edu) 10 / 36

Combining Firewall Types Application Moving Up the Stack Filtering levels Advantages Disadvantages Example: Protecting Email Email Threats In-bound Email Different Protection Layers Combining Firewall Types Firewalling Email Policy Enforcement Distributed Use an application firewall to handle in-bound and out-bound email Use a packet filter to enforce the rules Angelos Stavrou (astavrou@gmu.edu) 11 / 36

Firewalling Email Application Moving Up the Stack Filtering levels Advantages Disadvantages Example: Protecting Email Email Threats In-bound Email Different Protection Layers Combining Firewall Types Firewalling Email Policy Enforcement Distributed Outside Packet Filter Inside SMTP Receiver DMZ Anti Spam Anti Virus Angelos Stavrou (astavrou@gmu.edu) 12 / 36

Policy Enforcement Application Moving Up the Stack Filtering levels Advantages Disadvantages Example: Protecting Email Email Threats In-bound Email Different Protection Layers Combining Firewall Types Firewalling Email Policy Enforcement Distributed Email can t flow any other way The only SMTP server the outside can talk to is the SMTP receiver It forwards the email to the anti-virus/anti-spam filter, via some arbitrary protocol That machine speaks SMTP to some inside mail gateway Note the other benefit: if the SMTP receiver is compromised, it can t speak directly to the inside Angelos Stavrou (astavrou@gmu.edu) 13 / 36

Application Moving Up the Stack Filtering levels Advantages Disadvantages Example: Protecting Email Email Threats In-bound Email Different Protection Layers Combining Firewall Types Firewalling Email Policy Enforcement Distributed Again, we use a packet filter to block direct out-bound connections to port 25 The only machine that can speak to external SMTP receivers is the dedicated out-bound email gateway That gateway can either live on the inside or on the DMZ Angelos Stavrou (astavrou@gmu.edu) 14 / 36

DNS Issues Application DNS Issues UDP Issues Internal Versus External View Cache Contamination Attacks DNS Filtering Distributed UDP (discussed previously) Internal versus external view DNS cache corruption Optimizing DNSSEC checks Angelos Stavrou (astavrou@gmu.edu) 15 / 36

UDP Issues Application DNS Issues UDP Issues Internal Versus External View Cache Contamination Attacks DNS Filtering Distributed Remember the DNS server location discussed last time In fact, what we did there was use an application-level relay to work around packet filter restrictions We re lucky since the DNS protocol includes provision for recursion, it requires no application changes for this to work Angelos Stavrou (astavrou@gmu.edu) 16 / 36

Application DNS Issues UDP Issues Internal Versus External View Cache Contamination Attacks DNS Filtering Distributed Internal Versus External View Should outsiders be able to see the names of all internal machines? What about secretproject.foobar.com? Solution: use two DNS servers, one for internal requests and one for external request Put one on each side of the firewall Issue: which machine does the NS record for foobar.com point to, the inside or the outside server? Can be trickier than it seems must make sure that internal machines don t see NS records that will make them try to go outside directly Angelos Stavrou (astavrou@gmu.edu) 17 / 36

Cache Contamination Attacks Application DNS Issues UDP Issues Internal Versus External View Cache Contamination Attacks DNS Filtering Distributed DNS servers cache results from queries Responses can contain additional information data that may be helpful but isn t part of the answer Send bogus DNS records as additional information; confuse a later querier Angelos Stavrou (astavrou@gmu.edu) 18 / 36

Application DNS Issues UDP Issues Internal Versus External View Cache Contamination Attacks DNS Filtering Distributed DNS Filtering All internal DNS queries go to a DNS switch If it s an internal query, forward the query to the internal server or pass back internal NS record If it s an external query, forward the query to outside, but: Scrub the result to remove any references to inside machines Scrub the result to remove any references to any NS records; this prevents attempts to go outside directly Use a packet filter to block direct DNS communication Angelos Stavrou (astavrou@gmu.edu) 19 / 36

Small Application Gateways Application Small Application Gateways FTP Proxy Attacks Via FTP Proxy Web Proxies Distributed Some protocols don t need full-fledged handling at the application level That said, a packet filter isn t adequate Solution: examine some of the traffic via an application-specific proxy; react accordingly Angelos Stavrou (astavrou@gmu.edu) 20 / 36

FTP Proxy Application Small Application Gateways FTP Proxy Attacks Via FTP Proxy Web Proxies Distributed Remember the problem with the PORT command? Scan the FTP control channel If a PORT command is spotted, tell the firewall to open that port temporarily for an incoming connection (Can do similar things with RPC define filters based on RPC applications, rather than port numbers) Angelos Stavrou (astavrou@gmu.edu) 21 / 36

Attacks Via FTP Proxy Application Small Application Gateways FTP Proxy Attacks Via FTP Proxy Web Proxies Distributed Downloaded Java applets can call back to the originating host A malicious applet can open an FTP channel, and sea PORT command listing a vulnerable port on a nominally-protected host The firewall will let that connection through Solution: make the firewall smarter about what host and port numbers can appear in PORT commands... Angelos Stavrou (astavrou@gmu.edu) 22 / 36

Web Proxies Application Small Application Gateways FTP Proxy Attacks Via FTP Proxy Web Proxies Distributed Again, built-in protocol support Provide performance advantage: caching Can enforce site-specific filtering rules Angelos Stavrou (astavrou@gmu.edu) 23 / 36

Application Application Modifications Adding Authentication Distributed Circuit gateways operate at (more or less) the TCP layer No application-specific semantics Avoid complexities of packet filters Allow controlled in-bound connections, i.e., for FTP Handle UDP Most common one: SOCKS. Supported by many common applications, such as Firefox and GAIM. Angelos Stavrou (astavrou@gmu.edu) 24 / 36

Application Modifications Application Application Modifications Adding Authentication Distributed Application must be changed to speak the circuit gateway protocol instead of TCP or UDP Easy for open source Socket-compatible circuit gateway libraries have been written for SOCKS use those instead of standard C library to convert application Angelos Stavrou (astavrou@gmu.edu) 25 / 36

Adding Authentication Application Application Modifications Adding Authentication Distributed Because of the circuit (rather than packet) orientation, it s feasible to add authentication Purpose: extrusion control Angelos Stavrou (astavrou@gmu.edu) 26 / 36

Rationale Application Distributed Rationale Personal Saying No, Saying Yes Application-Linked Distributed Conventional firewalls rely on topological assumptions these are questionable today Instead, install protection on the end system Let it protect itself Angelos Stavrou (astavrou@gmu.edu) 27 / 36

Personal Application Distributed Rationale Personal Saying No, Saying Yes Application-Linked Distributed Add-on to the main protocol stack The inside is the host itself; everything else is the outside Most act like packet filters Rule set can be set by individual or by administrator Angelos Stavrou (astavrou@gmu.edu) 28 / 36

Saying No, Saying Yes Application Distributed Rationale Personal Saying No, Saying Yes Application-Linked Distributed It s easy to reject protocols you don t like with a personal firewall The hard part is saying yes safely There s no topology all that you have is the sender s IP address Spoofing IP addresses isn t that hard, especially for UDP Angelos Stavrou (astavrou@gmu.edu) 29 / 36

Application-Linked Application Distributed Rationale Personal Saying No, Saying Yes Application-Linked Distributed Most personal firewalls act on port numbers At least one such firewall is tied to applications individual programs are or are not allowed to talk, locally or globally Pros: don t worry about cryptic port numbers; handle auxiliary ports just fine Cons: application names can be just as cryptic; service applications operate on behalf of some other application Angelos Stavrou (astavrou@gmu.edu) 30 / 36

Distributed Application Distributed Rationale Personal Saying No, Saying Yes Application-Linked Distributed In some sense similar to personal firewalls, though with central policy control Use IPsec to distinguish inside from outside Insiders have inside-issued certificates; outsiders don t Only trust other machines with the proper certificate No reliance on topology; insider laptops are protected when traveling; outsider laptops aren t a threat when they visit Angelos Stavrou (astavrou@gmu.edu) 31 / 36

Problems with Application Distributed Problems with Malicious Insiders Mobile Devices Dynamic Connectivity Evasion Malicious Insiders Mobile Devices Dynamic Connectivity Evasion Angelos Stavrou (astavrou@gmu.edu) 32 / 36

Malicious Insiders Application Distributed Problems with Malicious Insiders Mobile Devices Dynamic Connectivity Evasion assume that everyone on the inside is good Obviously, that s not true... Insiders can cause much more damage since there is no control For example, open proxies over encrypted tunnels Angelos Stavrou (astavrou@gmu.edu) 33 / 36

Mobile Devices Application Distributed Problems with Malicious Insiders Mobile Devices Dynamic Connectivity Evasion Laptops and smart phones, more or less by definition, are mobile When they re outside the firewall, what protects them? Similar problems with all networked devices (over powerlines, blue-tooth) Is there a solution for mobile devices? (Personal firewalls, secure/close all unnecessary services) Angelos Stavrou (astavrou@gmu.edu) 34 / 36

Dynamic Connectivity Application Distributed Problems with Malicious Insiders Mobile Devices Dynamic Connectivity Evasion rely on topology and on static services If there are too many connections, some will bypass the firewall Sometimes, that s even necessary; it isn t possible to effectively firewall all external partners A large company may have hundreds or even thousands of external links, most of which are unknown to the official networking people Angelos Stavrou (astavrou@gmu.edu) 35 / 36

Evasion Application Distributed Problems with Malicious Insiders Mobile Devices Dynamic Connectivity Evasion and firewall administrators got too good Some applications weren t able to run Vendors started building things that ran over known ports (i.e HTTP) HTTP usually gets through firewalls and even web proxies... Angelos Stavrou (astavrou@gmu.edu) 36 / 36