The Advantages of a Firewall Over an Interafer



Similar documents
TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005

idata Improving Defences Against Targeted Attack

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS

Intro to Firewalls. Summary

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

SPEAR PHISHING UNDERSTANDING THE THREAT

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

BYOD Guidance: Architectural Approaches

Networking for Caribbean Development

CMPT 471 Networking II

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Cisco PIX vs. Checkpoint Firewall

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewall and UTM Solutions Guide

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

Firewalls, Tunnels, and Network Intrusion Detection

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Security Technology: Firewalls and VPNs

Firewalls (IPTABLES)

Protection profile of an industrial firewall

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

From Network Security To Content Filtering

Secure Software Programming and Vulnerability Analysis

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Host/Platform Security. Module 11

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

TECHNICAL NOTE 08/04 IINTRODUCTION TO VULNERABILITY ASSESSMENT TOOLS

Protecting Your Organisation from Targeted Cyber Intrusion

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Complete Protection against Evolving DDoS Threats

Seminar Computer Security

Internet Security Firewalls

Configuring Allied Telesyn Equipment to Counter Nimda Attacks

co Characterizing and Tracing Packet Floods Using Cisco R

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, IDS and IPS

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Introducing IBM s Advanced Threat Protection Platform

Chapter 9 Firewalls and Intrusion Prevention Systems

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

Securing EtherNet/IP Using DPI Firewall Technology

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Proxies. Chapter 4. Network & Security Gildas Avoine

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Database Security in Virtualization and Cloud Computing Environments

Database Security, Virtualization and Cloud Computing

Lecture 23: Firewalls

How Cisco IT Protects Against Distributed Denial of Service Attacks

WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA

Cisco Advanced Services for Network Security

Overview. Firewall Security. Perimeter Security Devices. Routers

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

GoToMyPC Corporate Advanced Firewall Support Features

Nuclear Plant Information Security A Management Overview

Proxy Services: Good Practice Guidelines

Firewalls CSCI 454/554

8. Firewall Design & Implementation

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Firewalls Overview and Best Practices. White Paper

How To Protect A Web Application From Attack From A Trusted Environment

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Proxy Server, Network Address Translator, Firewall. Proxy Server

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

FAQs about PAS , A Specification for securityminded building information modelling, digital built environments and smart asset management

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Meeting the Challenges of Virtualization Security

ACHILLES CERTIFICATION. SIS Module SLS 1508

Guideline on Firewall

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Introduction to Computer Security Benoit Donnet Academic Year

Firewalls. Network Security. Firewalls Defined. Firewalls

Network Segmentation

Transcription:

FIREWALLS VIEWPOINT 02/2006 31 MARCH 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre for the Protection of National Infrastructure (CPNI). Hyperlinks in this document may refer to resources that no longer exist. Please see CPNI s website (www.cpni.gov.uk) for up-to-date information. Disclaimer Reference to any specific commercial product, process or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favouring by CPNI. The views and opinions of authors expressed within this document shall not be used for advertising or product endorsement purposes. To the fullest extent permitted by law, CPNI accepts no liability for any loss or damage (whether direct, indirect or consequential and including, but not limited to, loss of profits or anticipated profits, loss of data, business or goodwill) incurred by any person and howsoever caused arising from or connected with any error or omission in this document or from any person acting, omitting to act or refraining from acting upon, or otherwise using, the information contained in this document or its references. You should make your own judgement as regards use of this document and seek independent professional advice on your particular circumstances.

Firewalls 1. If asked to name a device used for computer security, the most popular answer would undoubtedly be a firewall. But what can we expect from a firewall? What can a firewall do, and just as important what can t it do? What types of firewall are available, and what makes some of them expensive? This NISCC Viewpoint briefly covers all of these questions. The most important message it contains is a firewall is only as good as its configuration. 2. Network traffic can be described at the lowest level by the IP addresses of the two endpoints, the ports of the two endpoints, and the packet type (e.g. UDP, TCP). Higher level protocols are layered on top of these basics; for example DNS is built on top of UDP, while HTTP is TCP based. In some cases there are several layers in the protocol stack; for example the Simple Object Access Protocol (SOAP) is usually implemented using HTTP as the transport. 3. Encrypted protocols are particularly difficult to control adequately, as the firewall is not able to check the content of the data stream. It is sometimes possible to enforce tight controls on the identities of the parties in encrypted transactions by using authentication, but these controls must be enforced at the endpoints, and the firewall is little help. 4. Any firewall is potentially vulnerable to denial of service attacks caused by simple volume of traffic; this may result in the effective isolation of the two networks. In some cases the impact of this can be reduced by implementing additional filtering rules upstream, so as to reduce the hostile traffic at the earliest possible points. More sophisticated denial of service attacks exploit features of the protocols (or defects in implementation) to disrupt service using modest amounts of bandwidth. 5. Most firewalls can generate logs of traffic in greater or lesser amounts of detail. Everybody would agree in principle that these should be routinely inspected, but this rarely happens. Sadly, the commonest practical use of firewall logs is as part of a forensic investigation after an incident has occurred. 6. There are two broad classes of firewall hardware and software. Hardware firewalls 7. A hardware firewall is an appliance that connects to two (or sometimes more) network segments, and restricts traffic flow between the networks. The simplest type is called a packet filter, and allows rules that specify which packets can travel between specific endpoints, based on the packet type and the source and destination addresses and ports. This sort of rule can be implemented by any modern router, but it has the limitation that each packet is considered in isolation, and there is no concept of a protocol with state (ie the possible continuations to a 2

sequence of packets are not modelled). Despite this limitation, packet filtering at routing devices is still valuable, as it can reduce the volume of traffic that more sophisticated devices need to handle. 8. More sophisticated firewalls have a deeper understanding of the protocols, so that they can apply stricter tests on the incoming and outgoing data. Even if the data is well formed, it may be unwanted; perhaps because it carries a virus or other malware, or is spam e-mail. Some firewalls integrate additional protocol specific payload checking, such as virus or spam checking. Many of these tests depend, to a greater or lesser extent, on the use of signatures to detect known types of threat. These signatures need to be kept up to date, and cannot offer protection against newly discovered threats until an appropriate signature can be created and circulated. 9. An alternative architecture moves some of the protocol specific checking to servers inside the firewall; for example virus and spam-filtering may be performed on the mail server. It is important to understand what a given firewall can check, and add supplemental filtering elsewhere in the system when needed. 10. In general, there is a three way trade-off between the strength of the filtering, the speed of the device and its cost. Devices which have been certified to a high level in the Common Criteria 1 scheme tend to command a price premium. Software firewalls 11. Software firewalls are installed on the computer to be protected, and limit the connections that are allowed between applications running on the computer, and the network (or networks) the computer is connected to. It is possible for a software firewall to identify which application wishes to make a connection, to send data or to receive data. This means that rules can be formulated that specifically permit certain applications to connect to particular ports, while excluding all unregistered ones. For example, access to the local mail server could be restricted to an approved e-mail client. 12. A major drawback of software firewalls is that they run on the same hardware as the applications they seek to control and protect. This means that even a denial of service attack that is entirely blocked by the firewall consumes resources on the same platform as the applications to be protected, and may render them unacceptably slow. 13. Software firewalls are highly privileged components, and often form part of the operating system kernel, where there are no effective access controls. This means that exploitable defects in the firewall itself will generally lead to complete system compromise. 1 See www.commoncriteriaportal.org 3

14. The use of software firewalls by themselves on important machines is not usually recommended but they are very useful as a supplement to hardware firewalls, as they can implement additional controls at the level of individual applications, and provide an additional level of protection to give defence in depth. Software firewalls can be configured to restrict which other computers within a network can be accessed, which would otherwise require an impractical number of a hardware firewalls. Limitations of all Firewalls 15. Firewalls are not perfect. Bugs inevitably exist in anything as complex as a firewall, and some of these bugs will be exploitable vulnerabilities. If defects are discovered, you will need to upgrade your firewall. With firewall devices, this often means upgrading the firmware. 16. A firewall is only as good as its configuration. The rules should allow those protocols through that are needed, and no more. One common problem is that special rules to allow additional access get added temporarily as a work-around or for a short term project, and are then never removed. When services or machines are no longer needed, the configuration is not always tightened to remove the now redundant access. The defect is not apparent, as permitted services still continue. This is the basic difficulty in firewall maintenance when things fail open, nobody notices. Good processes for configuration control can help reduce these problems. 17. Strict configuration control should be enforced on firewalls because they are one of the key defences of a system. When significant changes are made to the configuration, the new settings should be tested. Ideally, this testing should take the form of penetration testing by an independent team, who will be able to see if they can reach systems or services that are not intended to be accessible. The configuration data should be stored and protected like any other business continuity data, as it may be necessary to recreate the same configuration after hardware failure or some bigger incident. 18. Even if a firewall has been configured correctly, and works as intended, it cannot offer complete protection. All it can hope to do is restrict the nature of the threat to those protocols that are actually needed. Threats that are carried by well formed traffic in the permitted protocols will pass through the firewall. A common example is e-mail; a firewall may indeed restrict connections so that only legitimate e-mail traffic enters the network, but will not be able to stop a harmful payload being carried by an attachment unless it examines attachments and can distinguish good and bad. 19. A common mistake in configuring firewalls is to concentrate exclusively on the threat from outside, and to assume that traffic originating inside the firewall is automatically legitimate. This is not a safe assumption anymore, as viruses, trojans, key-loggers and other malware may attempt to send valuable data out through the firewall, often by using mainstream protocols. Common examples include e-mail 4

viruses that send well-formed mail messages, and various remote control payloads that use Internet Relay Chat (IRC) to establish a control link with a remote machine, making the compromised machine into a zombie. Firewall rules should certainly constrain outgoing protocols to those that are actually needed from specific machines. 20. Protocols that allow Remote Procedure Calls (RPC) need to be very tightly controlled if they are allowed at all. Examples of such protocols include DCE RPC, Java RMI, DCOM, CORBA and SOAP. SOAP is particularly worrying, as it uses HTTP as a transport, and many firewalls need to allow HTTP traffic through for legitimate business reasons. Simple HTTP filtering rules, such as those used by a packet filter which allows connections on port 80, will allow SOAP through as well. More sophisticated firewalls can detect SOAP traffic (there are some SOAP specific headers, and it has a distinct Mime-Type), and apply specific rules to it, or even block it entirely if it is not needed. There are also now a variety of SOAP specific firewall products which make it possible to enforce fine grained application level rules. There are a much smaller number of firewall products for the other RPC protocols, and system architects should think long and hard about the wisdom of exposing such protocols outside the protected part of the system. 21. Firewall administrators, like any security administrators, have to be trusted absolutely. Their technical competence must be trusted, and their loyalty to the organisation must be beyond question. For highly critical systems, it may be worthwhile to set up procedural controls, where two administrators routinely check one another s work. 22. A correctly configured firewall forms part, but only one part, of the defences of a system. The best that can be hoped for is to reduce the avenues of attack to the minimum consistent with delivering necessary services. Firewalls can never be a panacea, and their presence can induce complacency that leads to neglect of other vital measures, or toleration of risky behaviours by system users. System administrators, users and policy makers all need to understand the residual risks in a system with even the best maintained and configured firewall and behave responsibly in the face of those risks. 5

This paper was produced for NISCC by QinetiQ About NISCC The role of NISCC is to minimise the risk to the Critical National Infrastructure from electronic attack. NISCC was set up in 1999 and is an interdepartmental centre drawing on contributions from across government. Defence, Central Government Policy, Trade, the Intelligence Agencies and Law Enforcement all contribute expertise and effort. Further information can be found at www.niscc.gov.uk National Infrastructure Security Co-ordination Centre PO Box 832 London, SW1P 1BG Tel: 0870 487 0748 Fax: 0870 487 0749 Email: enquiries@niscc.gov.uk Web: www.niscc.gov.uk About QinetiQ QinetiQ is one of the world's leading defence technology and security companies. For further information please call us on 08700 100 942 or refer to our website: www.qinetiq.com 6