Types of Firewalls

advertisement
UNIT -5
Password Management
Firewall Design Principles.
NETWORK SECURITY By: Homera
Durani
2
PASSWORD PROTECTION
User ID and password:
User authorized to gain access to the system

Privileges accorded to the user

Discretionary access control
NETWORK SECURITY By: Homera
Durani

3
PASSWORD PROTECTION

Unix system (user ID, cipher text password, plain
text salt)




password 8 printable characters - 56-bit value (7-bit
ASCII)
encryption routine (crypt(3)) based on DES
modified DES algorithm with 12-bit salt value
(related to time of password assignment)
25 encryptions with 64-bit block of zeros input
64-bit - 11 character sequence
NETWORK SECURITY By: Homera
Durani

4
LOADING A NEW PASSWORD
NETWORK SECURITY By: Homera
Durani
5
PASSWORD PROTECTION
Purposes of salt:
Prevents duplicate passwords from being visible
Effectively increases password length without the
user needing to remember additional 2
characters (possible passwords increased by
4096)
Prevent use of hardware DES implementation for
a brute-force guessing attack


NETWORK SECURITY By: Homera
Durani

6
OBSERVED PASSWORD LENGTHS
IN A PURDUE STUDY
NETWORK SECURITY By: Homera
Durani
7
PASSWORDS CRACKED FROM A SAMPLE
SET
NETWORK SECURITY By: Homera
Durani
easy pickin’s
8
ACCESS CONTROL
NETWORK SECURITY By: Homera
Durani
One Method: Deny access to password file
 Systems susceptible to unanticipated break-ins
 An accident in protection may render the password file
readable compromising all accounts
 Users have accounts in other protection domains using
the same passwords
9
ACCESS CONTROL

Goal:
Eliminate guessable passwords while allowing
the user to select a password that is
memorable
NETWORK SECURITY By: Homera
Durani

Answer:
Force users to select passwords that are
difficult to guess
10
PASSWORD SELECTION STRATEGIES
(BASIC TECHNIQUES)
User education


Users may ignore the guidelines
Computer-generated passwords

Poor acceptance by users

Difficult to remember passwords
NETWORK SECURITY By: Homera
Durani

11
PASSWORD SELECTION STRATEGIES

Reactive password checking



Proactive password checking
NETWORK SECURITY By: Homera
Durani

System runs its own password cracker
Resource intensive
Existing passwords remain vulnerable until reactive
checker finds them
Password selection is guided by the system
 Strike a balance between user accessibility and
strength
 May provide guidance to password crackers (what not
to try)
 Dictionary of bad passwords (space and time problem)
12

PROACTIVE PASSWORD CHECKER


Markov Model – search for guessable
password
Bloom Filter – search in password
dictionary
NETWORK SECURITY By: Homera
Durani
There are two techniques currently in use:
13
MARKOV MODEL
Probability that b follows a
M = {states, alphabet, prob, order}
NETWORK SECURITY By: Homera
Durani
14
MARKOV MODEL



“Was this password generated by this Markov
model?”
Passwords that are likely to be generated by the
model are rejected
Good results for a second-order model
NETWORK SECURITY By: Homera
Durani

“Is this a bad password?”…same as…
15
BLOOM FILTER
NETWORK SECURITY By: Homera
Durani
A probabilistic algorithm to quickly test
membership in a large set using multiple hash
functions into a single array of bits
Developed in 1970 but not used for about 25
years
Used to find words in a dictionary also used for
web caching
Small probability of false positives which can be
reduced for different values of k, # hash funcs
16
BLOOM FILTER





A vector v of N bits
k independent hash
functions. Range 0 to N-1
For each element x,
compute hash functions
H1(x), H2(x)…Hk(x)
Set corresponding bits to 1
Note: A bit in the resulting
vector may be set to 1
multiple times
Bit Vector: v
Element: x
H1(x)=P1
H2(x)=P2
H3(x)=P3
H4(x)=P4
NETWORK SECURITY By: Homera
Durani
1
1
1
1
17
N bits
BLOOM FILTER


NETWORK SECURITY By: Homera
Durani

To query for existence of an entry x, compute
H1(x), H2(x)…Hk(x) and check if the bits at
the corresponding locations are 1
If not, x is definitely not a member
Otherwise there may be a false positive
(passwords not in the dictionary but that
produce a match in the hash table). The
probability of a false positive can be reduced
by choosing k and N
18
PERFORMANCE OF BLOOM FILTER
NETWORK SECURITY By: Homera
Durani
Dictionary of 1 million
words with 0.01 probability
of rejecting a password
We need a hash table of
9.6 X 106 bits
19
20
NETWORK SECURITY By: Homera Durani
FIREWALL
OUTLINE

Firewall Design Principles


NETWORK SECURITY By: Homera
Durani

Firewall Characteristics
Types of Firewalls
Firewall Configurations
21
FIREWALLS

NETWORK SECURITY By: Homera
Durani
Effective means of protection a local system or
network of systems from network-based
security threats while affording access to the
outside world via WAN`s or the Internet
22
FIREWALL DESIGN
PRINCIPLES
Information systems undergo a steady evolution
(from small LAN`s to Internet connectivity)
 Strong security features for all workstations
and servers not established

NETWORK SECURITY By: Homera
Durani
23
FIREWALL DESIGN
PRINCIPLES
The firewall is inserted between the premises
network and the Internet
 Aims:

NETWORK SECURITY By: Homera
Durani
Establish a controlled link
 Protect the premises network from Internet-based
attacks
 Provide a single choke point

24
FIREWALL CHARACTERISTICS

Design goals:
All traffic from inside to outside must pass through
the firewall (physically blocking all access to the
local network except via the firewall)
 Only authorized traffic (defined by the local
security police) will be allowed to pass

NETWORK SECURITY By: Homera
Durani
25
FIREWALL CHARACTERISTICS

Design goals:

NETWORK SECURITY By: Homera
Durani
The firewall itself is immune to penetration (use of
trusted system with a secure operating system)
26
FIREWALL CHARACTERISTICS
Four general techniques:
 Service control


Determines the types of Internet services that can
be accessed, inbound or outbound
Direction control

Determines the direction in which particular service
requests are allowed to flow
NETWORK SECURITY By: Homera
Durani

27
FIREWALL CHARACTERISTICS

User control

Behavior control

Controls how particular services are used (e.g. filter
e-mail)
NETWORK SECURITY By: Homera
Durani

Controls access to a service according to which user
is attempting to access it
28
TYPES

OF
FIREWALLS
Three common types of Firewalls:
Packet-filtering routers
 Application-level gateways
 Circuit-level gateways
 (Bastion host)

NETWORK SECURITY By: Homera
Durani
29
TYPES

OF
FIREWALLS
Packet-filtering Router
NETWORK SECURITY By: Homera
Durani
30
TYPES

OF
FIREWALLS
Packet-filtering Router



NETWORK SECURITY By: Homera
Durani

Applies a set of rules to each incoming IP packet and
then forwards or discards the packet
Filter packets going in both directions
The packet filter is typically set up as a list of rules
based on matches to fields in the IP or TCP header
Two default policies (discard or forward)
31
TYPES

FIREWALLS
Advantages:


Simplicity
Transparency to users
High speed
Disadvantages:


Difficulty of setting up packet filter rules
Lack of Authentication
NETWORK SECURITY By: Homera
Durani


OF
32
TYPES

OF
FIREWALLS
Possible attacks and appropriate
countermeasures
NETWORK SECURITY By: Homera
Durani
IP address spoofing
 Source routing attacks
 Tiny fragment attacks

33
TYPES

OF
FIREWALLS
Application-level Gateway
NETWORK SECURITY By: Homera
Durani
34
TYPES

OF
FIREWALLS
Application-level Gateway
Also called proxy server
 Acts as a relay of application-level traffic

NETWORK SECURITY By: Homera
Durani
35
TYPES

OF
FIREWALLS
Advantages:
Higher security than packet filters
 Only need to scrutinize a few allowable applications
 Easy to log and audit all incoming traffic

Disadvantages:

Additional processing overhead on each connection
(gateway as splice point)
NETWORK SECURITY By: Homera
Durani

36
TYPES

OF
FIREWALLS
Circuit-level Gateway
NETWORK SECURITY By: Homera
Durani
37
TYPES

OF
FIREWALLS
Circuit-level Gateway
Stand-alone system or
 Specialized function performed by an Applicationlevel Gateway
 Sets up two TCP connections
 The gateway typically relays TCP segments from one
connection to the other without examining the
contents

NETWORK SECURITY By: Homera
Durani
38
TYPES

OF
FIREWALLS
Circuit-level Gateway
The security function consists of determining which
connections will be allowed
 Typically use is a situation in which the system
administrator trusts the internal users
 An example is the SOCKS package

NETWORK SECURITY By: Homera
Durani
39
TYPES

OF
FIREWALLS
Bastion Host
A system identified by the firewall administrator as
a critical strong point in the network´s security
 The bastion host serves as a platform for an
application-level or circuit-level gateway

NETWORK SECURITY By: Homera
Durani
40
FIREWALL CONFIGURATIONS
In addition to the use of simple configuration of
a single system (single packet filtering router or
single gateway), more complex configurations are
possible
 Three common configurations

NETWORK SECURITY By: Homera
Durani
41
FIREWALL CONFIGURATIONS

Screened host firewall system (single-homed
bastion host)
NETWORK SECURITY By: Homera
Durani
42
FIREWALL CONFIGURATIONS
Screened host firewall, single-homed bastion
configuration
 Firewall consists of two systems:

NETWORK SECURITY By: Homera
Durani
A packet-filtering router
 A bastion host

43
FIREWALL CONFIGURATIONS

Configuration for the packet-filtering router:

The bastion host performs authentication and
proxy functions
NETWORK SECURITY By: Homera
Durani

Only packets from and to the bastion host are
allowed to pass through the router
44
FIREWALL CONFIGURATIONS

Greater security than single configurations
because of two reasons:
NETWORK SECURITY By: Homera
Durani
This configuration implements both packet-level and
application-level filtering (allowing for flexibility in
defining security policy)
 An intruder must generally penetrate two separate
systems

45
FIREWALL CONFIGURATIONS

NETWORK SECURITY By: Homera
Durani
This configuration also affords flexibility in
providing direct Internet access (public
information server, e.g. Web server)
46
FIREWALL CONFIGURATIONS

Screened host firewall system (dual-homed
bastion host)
NETWORK SECURITY By: Homera
Durani
47
FIREWALL CONFIGURATIONS

Screened host firewall, dual-homed bastion
configuration
NETWORK SECURITY By: Homera
Durani
The packet-filtering router is not completely
compromised
 Traffic between the Internet and other hosts on the
private network has to flow through the bastion host

48
FIREWALL CONFIGURATIONS

Screened-subnet firewall system
NETWORK SECURITY By: Homera
Durani
49
FIREWALL CONFIGURATIONS

Screened subnet firewall configuration
Most secure configuration of the three
 Two packet-filtering routers are used
 Creation of an isolated sub-network

NETWORK SECURITY By: Homera
Durani
50
FIREWALL CONFIGURATIONS

Advantages:
Three levels of defense to thwart intruders
 The outside router advertises only the existence of
the screened subnet to the Internet (internal
network is invisible to the Internet)

NETWORK SECURITY By: Homera
Durani
51
FIREWALL CONFIGURATIONS

Advantages:

NETWORK SECURITY By: Homera
Durani
The inside router advertises only the existence of
the screened subnet to the internal network (the
systems on the inside network cannot construct
direct routes to the Internet)
52
Download