Firewalls SMU CSE 5349/7349 Firewalls • Most widely sold solution for Internet security – Solution in a box appeal • Not a substitute for proper configuration management • Firewall needs to be configured properly for intended protection SMU CSE 5349/7349 Types of Firewalls • IP packet level – Packet filtering • TCP session level – Circuit gateways • Application level – Application relays/gateway • Dynamic packet filtering – Combination of packet filtering and circuit-level gateways, often with application level semantics • NATs, IDSs, Logging • Ingress vs. Egress filtering SMU CSE 5349/7349 Firewalls and OSI Layers OSI Model Layer Firewall Functionality 7 - Application Application Level Proxies, forward and reverse proxies 6 - Presentation 5 - Session Stateful Firewall 4 – Transport – TCP/UDP Port filtering, circuit level proxy 3 – Network - IP Packet filtering, Address filtering, packet filtering firewall 2 – Data Link 1- Physical SMU CSE 5349/7349 Packet Filters • Read the header and filter by whether fields match specific rules – Administrator makes a list of acceptable/unacceptable field values – Ingress/Egress filtering • Come in standard, specialized, and stateful models • Weaknesses – Easy to botch rules – Logging difficult – Lack of authentication between end points SMU CSE 5349/7349 Network Topology and Address Spoofing • Consider a three network (N1, N2, and N3) system with one router firewall – N1 the DMZ net connecting the GW – Very limited connection between GW and outside – Very limited connection (different set) between GW and N2/N3 (Why?) – Anything can pass between N2 and N3 – Outgoing connections only from N2 or N3 • How to set the packet filter rules – External nodes can spoof internal addresses – block all the source addresses same as internal addresses SMU CSE 5349/7349 Routing Filters • Perfect security if the node is completely unreachable – Routers do not advertise internal routes • Output route filtering – Input route filtering ? • To prevent subversion by route confusion – Route leaks SMU CSE 5349/7349 Stateful Packet Filters (SPFs) – Track last few minutes of network activity. – If a packet doesn’t fit in, drop it – Stronger inspection engines search for information inside the packet’s data – Have to collect and assemble packets in order to have enough data – Examples: • Firewall One, SeattleLabs, ipfilter SMU CSE 5349/7349 Packet Filtering Performance • May affect the router optimization in handling packets • Still the serial link from the router to the Internet may be the bottleneck • Keep the rules simple and uniform • Ordering the rules to get the most common type traffic through, first SMU CSE 5349/7349 Proxy Firewalls • Pass data between two separate connections, one on each side of the firewall. • Types: – Circuit level proxy – Application proxy – Store and forward proxy • Higher latency and lower throughput SMU CSE 5349/7349 Circuit Level Proxy • Client asks connects to the relay host and request a connection to the server • FW connects to server – Server usually do not get details such as IP address of the client – All IP tricks are stopped at the relay host • Fragments • Fire walking probes SMU CSE 5349/7349 Application Proxy • FW transfers only acceptable information between the two connections • The proxy can understand the protocol and filter the data within – Example mail proxies • Usually sore-and-forward SMU CSE 5349/7349 Caching Proxies • Client asks firewall for document; the firewall downloads the document, saves it to disk, and provides the document to the client. The firewall may cache the document • Can do data filtering. • More administration time, hardware, and cost SMU CSE 5349/7349 Network Address Translation (NAT) • Changes ip addresses in a packet – Address of the client inside never shows up outside – Many IPs inside to many static IPs outside – Many IPs inside to many random IPs outside – Many IPs inside to one IP address outside • Examples: Cisco PIX, Linux Masquerading, Firewall One, ipfilter SMU CSE 5349/7349 Logging • Cheap solution to most behavioral problems – program logging – syslog /NT event log – sniffers • TCPdump, SSLdump Argus, Network General, HP Openview • Down side – Overhead intensive – Does not prevent damage (more reactive than proactive) SMU CSE 5349/7349 Firewall Pitfalls • Single point of failure • Useful ones are difficult to configure and integrate • Performance requirements tend to create back doors • False sense of security – May be 40% protection against the top attacks SMU CSE 5349/7349 Where to Put FW SMU CSE 5349/7349 Where (cont’d) SMU CSE 5349/7349 SMU CSE 5349/7349 DMZ • Neither internal nor external • Placed between the external router and the bastion host • Idea is to minimize the services and hence potential attacks • Example: For a web server stop everything but http • Multiple zones for increased availability/security SMU CSE 5349/7349 Distributed Firewalls (DFWs) • • • • To avoid S-P-O-F To distribute risks Better scalability Trend to use sophisticated protocols – IPSec – Instead of IP headers use authentication codes SMU CSE 5349/7349 Switched Firewalls (Air-gap Technology) SMU CSE 5349/7349