Firewalls 1 / 43. Firewalls



Similar documents
Network Security - ISA 656 Firewalls & NATs

Network Security - ISA 656 Intro to Firewalls

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

FIREWALL AND NAT Lecture 7a

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Application Firewalls

INTRODUCTION TO FIREWALL SECURITY

CSCE 465 Computer & Network Security

Firewalls. Chapter 3

CSCI Firewalls and Packet Filtering

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Firewalls, IDS and IPS

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Cryptography and network security

Internet Ideal: Simple Network Model

Network Security. Internet Firewalls. Chapter 13. Network Security (WS 2002): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

Chapter 15. Firewalls, IDS and IPS

Firewall Design Principles

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Firewall Defaults and Some Basic Rules

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

CMPT 471 Networking II

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

How Your Computer Accesses the Internet through your Wi-Fi for Boats Router

Chapter 3 Security and Firewall Protection

About Firewall Protection

Firewalls and System Protection

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Network Security - ISA 656 Application Firewalls

Firewalls. Ahmad Almulhem March 10, 2012

Source-Connect Network Configuration Last updated May 2009

Firewalls. Pehr Söderman KTH-CSC

A S B

Firewall Firewall August, 2003

Firewalls. Steven M. Bellovin Matsuzaki maz Yoshinobu

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

8. Firewall Design & Implementation

Chapter 8 Security Pt 2

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Security Technology: Firewalls and VPNs

Chapter 8 Network Security

allow all such packets? While outgoing communications request information from a

Application Note - Using Tenor behind a Firewall/NAT

Lecture 23: Firewalls

Cisco Configuring Commonly Used IP ACLs

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Firewalls P+S Linux Router & Firewall 2013

Internet Security Firewalls

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewalls. Network Security. Firewalls Defined. Firewalls

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Chapter 11 Cloud Application Development

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

BorderWare Firewall Server 7.1. Release Notes

Access control policy: Role-based access

FIREWALLS & CBAC. philip.heimer@hh.se

Application Note. Stateful Firewall, IPS or IDS Load- Balancing

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Firewall implementation and testing

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Network Security CS 192

Network Security. Chapter 13. Internet Firewalls. Network Security (WS 07/08): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010

Chapter 4 Firewall Protection and Content Filtering

Overview - Using ADAMS With a Firewall

Firewalls CSCI 454/554

Content Distribution Networks (CDN)

Firewall Design Principles Firewall Characteristics Types of Firewalls

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

What would you like to protect?

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Overview - Using ADAMS With a Firewall

Middleboxes. Firewalls. Internet Ideal: Simple Network Model. Internet Reality. Middleboxes. Firewalls. Globally unique idenpfiers

Proxy Server, Network Address Translator, Firewall. Proxy Server

Configuration Example

Chapter 4 Firewall Protection and Content Filtering

CS Computer and Network Security: Firewalls

Next Generation Network Firewall

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Introduction to Firewalls Open Source Security Tools for Information Technology Professionals

+ iptables. packet filtering && firewall

Overview. Firewall Security. Perimeter Security Devices. Routers

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Implementing Network Address Translation and Port Redirection in epipe

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

- Introduction to Firewalls -

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Firewalls (IPTABLES)

Packet filtering and other firewall functions

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

CSE543 - Computer and Network Security Module: Firewalls

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

Transcription:

What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains? Splitting a Location Firewall Philosophies Blocking Outbound Traffic? Packet 1 / 43

What s a Firewall What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains? Splitting a Location Firewall Philosophies Blocking Outbound Traffic? Barrier between us and them. Limits communication to the outside world. The outside world can be another part of the same organization. Only a very few machines exposed to attack. Packet 2 / 43

Why Use? What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains? Splitting a Location Firewall Philosophies Blocking Outbound Traffic? Packet Most hosts have security holes. Proof: Most software is buggy. Therefore, most security software has security bugs. run much less code, and hence have few bugs (and holes). can be professionally (and hence better) administered. run less software, with more logging and monitoring. They enforce the partition of a network into separate security domains. Without such a partition, a network acts as a giant virtual machine, with an unknown set of privileged and ordinary users. 3 / 43

Tradttional by Analogy What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains? Splitting a Location Firewall Philosophies Blocking Outbound Traffic? Passports are (generally) checked at the border. My office doesn t have a door direct to the outside. My bedroom doesn t have a real lock. But a bank still has a vault... Packet 4 / 43

What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains? Splitting a Location Firewall Philosophies Blocking Outbound Traffic? Packet Should We Fix the Network Protocols Instead? Network security is not the problem. are not a solution to network problems. They are a network response to a host security problem. More precisely, they are a response to the dismal state of software engineering; taken as a whole, the profession does not know how to produce software that is secure, correct, and easy to administer. Consequently, better network protocols will not obviate the need for firewalls. The best cryptography in the world will not guard against buggy code. 5 / 43

Firewall Advantages What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains? Splitting a Location Firewall Philosophies Blocking Outbound Traffic? Packet If you don t need it, get rid of it. No ordinary users, and hence no passowrds for them Run as few servers as possible Install conservative software, don t get the latest fancy servers, etc.) Log everything, and monitor the log files. Keep copious backups, including a Day 0 backup. Ordinary machines cannot be run that way. 6 / 43

Schematic of a Firewall What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains? Splitting a Location Firewall Philosophies Blocking Outbound Traffic? Inside Filter Gateway(s) DMZ Filter Outside Packet 7 / 43

Conceptual Pieces What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains? Splitting a Location Firewall Philosophies Blocking Outbound Traffic? An inside everyone on the inside is presumed to be a good guy An outside bad guys live there A DMZ (Demilitarized Zone) put necessary but potentially dangerous servers there Packet 8 / 43

The DMZ What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains? Splitting a Location Firewall Philosophies Blocking Outbound Traffic? Good spot for things like mail and web servers Outsiders can send email, retrieve web pages Insiders can retrieve email, update web pages Must monitor such machines very carefully! Packet 9 / 43

Positioning What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains? Splitting a Location Firewall Philosophies Blocking Outbound Traffic? protect administrative divisions. Packet 10 / 43

Why Administrative Domains? What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains? Splitting a Location Firewall Philosophies Blocking Outbound Traffic? enforce policy Policy follows administrative boundaries, not physical ones Example: separate protection domains for Legal, HR, Research, etc. Packet 11 / 43

Splitting a Location What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains? Splitting a Location Firewall Philosophies Blocking Outbound Traffic? Packet 12 / 43

Firewall Philosophies What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains? Splitting a Location Firewall Philosophies Blocking Outbound Traffic? 1. Block all dangerous destinations. 2. Block everything; unblock things known to be both safe and necessary. Option 1 gets you into an arms race with the attackers; you have to know everything that is dangerous, in all parts of your network. Option 2 is much safer. Packet 13 / 43

Blocking Outbound Traffic? What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains? Splitting a Location Firewall Philosophies Blocking Outbound Traffic? Many sites permit arbitrary outbound traffic, but... Internal bad guys? Extrusion detection? Regulatory requirements? Other corporate policy? Packet 14 / 43

Packet Types of Packet Packet and Point Rules Packet 15 / 43

Types of Packet Types of Packet Packet and Point Rules Packet Dynamic Packet Application Gateways Circuit Relays Personal and/or Distributed Many firewalls are combinations of these types. 16 / 43

Packet Packet Types of Packet Packet and Point Rules Router-based (and hence cheap). Individual packets are accepted or rejected; no context is used. Filter rules are hard to set up; the primitives are often inadequate, and different rules can interact. Packet filters a poor fit for ftp and X11. Hard to manage access to -based services. 17 / 43

Packet Types of Packet Packet and Point Rules We want to permit outbound connections We have to permit reply packets For TCP, this can be done without state The very first packet of a TCP connection has just the SYN bit set All others have the ACK bit set Solution: allow in all packets with ACK turned on 18 / 43

Packet Types of Packet Packet and Point Rules We want to block a spamme, but allow anyone else to send email to our gateway. block: theirhost = spammer allow: theirhost = any and theirport = any and ourhost = our-gw and ourport = 25. 19 / 43

Packet Types of Packet Packet and Point Rules We want to allow all conversations with remote mail gateways. allow: theirhost = any and theirport = 25 and ourhost = any and ourport = any. We don t control port number selection on the remote host. Any remote process on port 25 can call in. 20 / 43

Packet Types of Packet Packet and Point Rules allow: Permit outgoing calls. theirhost = any and theirport = 25 and ourhost = any and ourport = any and bitset(ack) 21 / 43

Packet Types of Packet Packet and Point Rules Generally have per-interface rules Rules are further divided to apply to inbound or outbound packets on an interface Better to filter inbound packets less loss of information 22 / 43

Packet Types of Packet Packet and Point Rules Outside Firewall Inside DMZ If you filter outbound packets to the DMZ link, you can t tell where they came from. 23 / 43

Packet and Packet Types of Packet Packet and Point Rules has no notion of a connection. It is therefore impossible to distinguish a reply to a query which should be permitted from an intrusive packet. Address-spoofing is easy no connections At best, one can try to block known-dangerous ports. But that s a risky game. The safe solution is to permit packets through to known-safe servers only. 24 / 43

Packet Types of Packet Packet and Point Rules Accepts queries on port 53 Block if handling internal queries only; allow if permitting external queries What about recursive queries? Bind local response socket to some other port; allow inbound packets to it Or put the DNS machine in the DMZ, and run no other services (Deeper issues with DNS semantics; stay tuned) 25 / 43

Packet Types of Packet Packet and Point Rules Often see ICMP packets in response to TCP or packets Important example: Path MTU response Must be allowed in or connectivity can break Simple packet filters can t match things up 26 / 43

Packet Types of Packet Packet and Point Rules services bind to random port numbers There s no way to know in advance which to block and which to permit Similar considerations apply to clients Systems using cannot be protected by simple packet filters 27 / 43

Packet Types of Packet Packet and Point Rules One will sometimes read just block low-numbered ports. $ rpcinfo -p cluster.cs.columbia.edu 100004 2 udp 1023 ypserv 100004 1 udp 1023 ypserv 100005 1 udp 32882 mountd 100005 2 udp 32882 mountd 100005 3 udp 32882 mountd The precise patterns are implementation-specific 28 / 43

Packet Types of Packet Packet and Point Rules FTP clients (and some other services) use secondary channels Again, these live on random port numbers Simple packet filters cannot handle this 29 / 43

Packet Types of Packet Packet and Point Rules By default, FTP clients send a PORT command to specify the address for an inbound connection If the PASV command is used instead, the data channel uses a separate outbound connection If local policy permits arbitrary outbound connections, this works well 30 / 43

Packet Types of Packet Packet and Point Rules Packet filters are not very useful as general-purpose firewalls That said, they have their place Several special situations where they re perfect 31 / 43

Packet Types of Packet Packet and Point Rules Packet filters are very simple, and can protect some simple environments Virtually all routers have the facility built in 32 / 43

Point Packet Types of Packet Packet and Point Rules Internet Web Server Allow in ports 80 and 443. Block everything else. This is a Web server appliance it shouldn t do anything else! But it may have necessary internal services for site administration. 33 / 43

Packet Types of Packet Packet and Point Rules At the border, block internal addresses from coming in from the outside Similarly, prevent fake addresses from going out 34 / 43

Packet Types of Packet Packet and Point Rules Outside Firewall Inside: 10.0.0.0/16 DMZ: 192.168.42.0/24 Mail DNS 35 / 43

Rules Packet Types of Packet Packet and Point Rules Interface Action Addr Port Flags Outside Block src=10.0.0.0/16 Outside Block src=192.168.42.0/24 Outside Allow dst=mail 25 Outside Block dst=dns 53 Outside Allow dst=dns Outside Allow Any ACK Outside Block Any DMZ Block src 192.168.42.0/24 DMZ Allow dst=10.0.0.0/16 ACK DMZ Block dst=10.0.0.0/16 DMZ Allow Any Inside Block src 10.0.0.0/16 Inside Allow dst=mail 993 Inside Allow dst=dns 53 Inside Block dst=192.168.42.0/24 Insde Allow Any 36 / 43

Packet Keeping Problems Solved Remaining Problems Network Address Translators Comparison 37 / 43

Packet Keeping Problems Solved Remaining Problems Network Address Translators Comparison Most common type of packet filter Solves many but not all of the problems with simple packet filters Requires per-connection state in the firewall 38 / 43

Keeping Packet Keeping Problems Solved Remaining Problems Network Address Translators Comparison When a packet is sent out, record that Associate inbound packet with state created by outbound packet 39 / 43

Problems Solved Packet Keeping Problems Solved Remaining Problems Network Address Translators Comparison Can handle query/response Can associate ICMP packets with connection Solves some of the inbound/outbound filtering issues but state tables still need to be associated with inbound packets Still need to block against address-spoofing 40 / 43

Remaining Problems Packet Keeping Problems Solved Remaining Problems Network Address Translators Comparison Still have problems with secondary ports Still have problems with Still have problems with complex semantics (i.e., DNS) 41 / 43

Network Address Translators Packet Keeping Problems Solved Remaining Problems Network Address Translators Comparison Translates source address (and sometimes port numbers) Primary purpose: coping with limited number of global IP addresses Sometimes marketed as a very strong firewall is it? It s not really stronger than a stateful packet filter 42 / 43

Comparison Packet Keeping Problems Solved Remaining Problems Network Address Translators Comparison Filter Outbound Create state table entry. Inbound Look up state table entry; drop if not present. NAT Outbound Create state table entry. Translate address. Inbound Look up state table entry; drop if not present. Translate address. The lookup phase and the decision to pass or drop the packet are identical; all that changes is whether or not addresses are translated. 43 / 43