65
1 Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 Firewalls

Firewalls

  • Upload
    danyl

  • View
    27

  • Download
    0

Embed Size (px)

DESCRIPTION

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Outline. Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations Trusted Systems Data Access Control - PowerPoint PPT Presentation

Citation preview

Page 1: Firewalls

1

Ola FlygtVäxjö University, Sweden

http://w3.msi.vxu.se/users/ofl/[email protected]

+46 470 70 86 49

Firewalls

Page 2: Firewalls

2

OutlineOutlineFirewall Design Principles

Firewall CharacteristicsTypes of FirewallsFirewall Configurations

Trusted SystemsData Access ControlThe Concept of Trusted systemsTrojan Horse Defence

Page 3: Firewalls

3

FirewallsFirewallsEffective means of protection a

local system or network of systems from network-based security threats while affording access to the outside world via WAN’s or the Internet

Page 4: Firewalls

4

Firewall DesignFirewall DesignPrinciplesPrinciples

Information systems undergo a steady evolution (from small LAN’s to Internet connectivity)

Strong security features for all workstations and servers not established

Page 5: Firewalls

5

Firewall DesignFirewall DesignPrinciplesPrinciples

The firewall is inserted between the premises network and the Internet

Aims:Establish a controlled linkProtect the premises network from

Internet-based attacksProvide a single choke point

Page 6: Firewalls

6

Firewall CharacteristicsFirewall CharacteristicsDesign goals:

All traffic from inside to outside must pass through the firewall (physically blocking all access to the local network except via the firewall)

Only authorized traffic (defined by the local security police) will be allowed to pass

Page 7: Firewalls

7

Firewall CharacteristicsFirewall CharacteristicsDesign goals:

The firewall itself is immune to penetration (use of trusted system with a secure operating system)

Page 8: Firewalls

8

Firewall CharacteristicsFirewall CharacteristicsFour general techniques:

Service controlDetermines the types of Internet services

that can be accessed, inbound or outbound

Direction controlDetermines the direction in which

particular service requests are allowed to flow

Page 9: Firewalls

9

Firewall CharacteristicsFirewall CharacteristicsUser control

Controls access to a service according to which user is attempting to access it

Behaviour controlControls how particular services are used

(e.g. filter e-mail)

Page 10: Firewalls

10

Firewall TypesFirewall TypesDifferent scopes

Personal - a single host is protectedTypically implemented in software run as an

application under a host OSSite - the firewall protects an entire site

Typically a dedicated hardware device with hardened software

We will assume the latter type in the rest of this presentation

Page 11: Firewalls

11

Types of FirewallsTypes of FirewallsThree common types of Firewalls:

Packet-filtering routersApplication-level gatewaysCircuit-level gateways

(Bastion host)

Page 12: Firewalls

12

Types of FirewallsTypes of FirewallsPacket-filtering Router

Page 13: Firewalls

13

Types of FirewallsTypes of FirewallsPacket-filtering Router

Applies a set of rules to each incoming IP packet and then forwards or discards the packet

Filter packets going in both directionsThe packet filter is typically set up as a

list of rules based on matches to fields in the IP or TCP header

Two default policies (discard or forward)

Page 14: Firewalls

14

Filtering rule examplesFiltering rule examplesPolicy Firewall Setting

No outside Web access. Drop all outgoing packets to any IP address, port 80

Outside connections to public Web server only.

Drop all incoming TCP SYN packets to any IP except 130.207.244.203, port 80

Prevent Web-radios from eating up the available bandwidth.

Drop all incoming UDP packets - except DNS and router broadcasts.

Prevent your network from being used for a Smurf DoS attack.

Drop all ICMP packets going to a “broadcast” address (eg 130.207.255.255).

Prevent your network from being tracerouted

Drop all outgoing ICMP

Page 15: Firewalls

15

Filtering rule examplesFiltering rule examplesaction source

addressdest

address protocol sourceport

destport

flagbit

allow 222.22/16

outside of222.22/16 TCP > 1023 80 any

allowoutside

of222.22/1

6

222.22/16 TCP 80 > 1023 ACK

allow 222.22/16

outside of222.22/16 UDP > 1023 53 ---

allowoutside

of222.22/1

6

222.22/16 UDP 53 > 1023 ----

deny all all all all all all

Page 16: Firewalls

16

Types of FirewallsTypes of FirewallsAdvantages:

SimplicityTransparency to usersHigh speed

Disadvantages:Difficulty of setting up packet filter

rulesLack of Authentication

Page 17: Firewalls

17

Types of FirewallsTypes of FirewallsPossible attacks and appropriate

countermeasuresIP address spoofingSource routing attacksTiny fragment attacks

Page 18: Firewalls

18

Stateful vs. Stateless Stateful vs. Stateless FirewallsFirewalls

A stateless packet filtering FW is investigating each packet on its on merits.

A stateful firewall is an advanced packet filter that keeps track of the state of the network connections going through it.

Whenever a packet arrives to the stateful firewall, it checks whether it matches an ongoing connection. If a match is found the packet can pass through.

Page 19: Firewalls

19

Stateful FirewallsStateful Firewalls A stateful inspecting firewall is not limited to the

network TCP/IP protocols. For known applications it looks at the application

protocol as well. This enables the firewall to detect when a

communication link does something out of the ordinary

It also enables the firewall to filter out certain parts of the data transmitted.

For the HTTP protocol it may filter out javascripts For the SMTP protocol it may filter out certain

types of attachments.

Page 20: Firewalls

20

Stateful Filtering rule Stateful Filtering rule exampleexample

• Log each TCP connection initiated through firewall: SYN segment

• Timeout entries which see no activity for, say, 60 seconds

If rule table indicates that stateful table must be checked:check to see if there is already a connection in stateful tableStateful filters can also remember outgoing UDP segments

sourceaddress

destaddress

sourceport

destport

222.22.1.7 37.96.87.123 12699 80

222.22.93.2 199.1.205.23 37654 80222.22.65.14

3 203.77.240.43 48712 80

Page 21: Firewalls

21

Stateful Filtering rule Stateful Filtering rule exampleexample

1. Packet arrives from outside: SA=37.96.87.123, SP=80,DA=222.22.1.7, DP=12699, SYN=0, ACK=1

2. Check filter table ➜ check stateful table

3. Connection is listed in connection table ➜ let packet through

action sourceaddress

destaddress proto source

portdestport

flagbit

check conn.

allow 222.22/16 outside of222.22/16 TCP > 1023 80 any

allow outside of222.22/16 222.22/16 TCP 80 > 1023 ACK x

allow 222.22/16 outside of222.22/16 UDP > 1023 53 ---

allow outside of222.22/16

222.22/16 UDP 53 > 1023 ---- x

deny all all all all all all

Page 22: Firewalls

22

Types of FirewallsTypes of FirewallsApplication-level Gateway

Page 23: Firewalls

23

Types of FirewallsTypes of FirewallsApplication-level Gateway

Also called proxy serverActs as a relay of application-level

traffic

Page 24: Firewalls

24

Types of FirewallsTypes of FirewallsAdvantages:

Higher security than packet filtersOnly need to scrutinize a few allowable

applicationsEasy to log and audit all incoming traffic

Disadvantages:Additional processing overhead on each

connection (gateway as splice point)

Page 25: Firewalls

25

Types of FirewallsTypes of FirewallsCircuit-level Gateway

Page 26: Firewalls

26

Types of FirewallsTypes of FirewallsCircuit-level Gateway

Stand-alone system orSpecialized function performed by an

Application-level GatewaySets up two TCP connectionsThe gateway typically relays TCP

segments from one connection to the other without examining the contents

Page 27: Firewalls

27

Types of FirewallsTypes of FirewallsCircuit-level Gateway

The security function consists of determining which connections will be allowed

Typically use is a situation in which the system administrator trusts the internal users

An example is the SOCKS package

Page 28: Firewalls

28

Types of FirewallsTypes of FirewallsBastion Host

A system identified by the firewall administrator as a critical strong point in the network’s security

The bastion host serves as a platform for an application-level or circuit-level gateway

Page 29: Firewalls

29

Firewall ConfigurationsFirewall ConfigurationsIn addition to the use of simple

configuration of a single system (single packet filtering router or single gateway), more complex configurations are possible

Three common configurations

Page 30: Firewalls

30

Firewall ConfigurationsFirewall ConfigurationsScreened host firewall system

(single-homed bastion host)

Page 31: Firewalls

31

Firewall ConfigurationsFirewall ConfigurationsScreened host firewall, single-

homed bastion configurationFirewall consists of two systems:

A packet-filtering routerA bastion host

Page 32: Firewalls

32

Firewall ConfigurationsFirewall ConfigurationsConfiguration for the packet-

filtering router:Only packets from and to the bastion

host are allowed to pass through the router

The bastion host performs authentication and proxy functions

Page 33: Firewalls

33

Firewall ConfigurationsFirewall ConfigurationsGreater security than single

configurations because of two reasons:This configuration implements both

packet-level and application-level filtering (allowing for flexibility in defining security policy)

An intruder must generally penetrate two separate systems

Page 34: Firewalls

34

Firewall ConfigurationsFirewall ConfigurationsThis configuration also affords

flexibility in providing direct Internet access (public information server, e.g. Web server)

Page 35: Firewalls

35

Firewall ConfigurationsFirewall ConfigurationsScreened host firewall system

(dual-homed bastion host)

Page 36: Firewalls

36

Firewall ConfigurationsFirewall ConfigurationsScreened host firewall, dual-homed

bastion configurationThe packet-filtering router is not

completely compromisedTraffic between the Internet and

other hosts on the private network has to flow through the bastion host

Page 37: Firewalls

37

Firewall ConfigurationsFirewall ConfigurationsScreened-subnet firewall system

Page 38: Firewalls

38

Firewall ConfigurationsFirewall ConfigurationsScreened subnet firewall

configurationMost secure configuration of the

threeTwo packet-filtering routers are usedCreation of an isolated sub-network

Page 39: Firewalls

39

Firewall ConfigurationsFirewall ConfigurationsAdvantages:

Three levels of defence to thwart intruders

The outside router advertises only the existence of the screened subnet to the Internet (internal network is invisible to the Internet)

Page 40: Firewalls

40

Firewall ConfigurationsFirewall ConfigurationsAdvantages:

The inside router advertises only the existence of the screened subnet to the internal network (the systems on the inside network cannot construct direct routes to the Internet)

Page 41: Firewalls

41

Combining Firewalls Combining Firewalls with other functionswith other functions

An firewall may be co-implemented with other functionality such as:VPNIDSNATRouterAuthentication Server

Page 42: Firewalls

42

Firewall TestingFirewall TestingAfter having designed,

implemented, and configured your firewall, it is extremely important to test your firewall thoroughly before putting it in use. Eg:Your firewall should not allow any

packet from outside the network to go into your internal network if the source address is the same as any host in your internal network.

Page 43: Firewalls

43

Firewall TestingFirewall Testing If you have a proxy firewall, running Squid e.g, make

sure that only the needed ports are open. Daemons such as Telnetd, FTPd, HTTPd and others should

be shut down when they are not needed. You may sometimes require the ability to remotely

administer your firewall. However, you should consider disabling all remote logins to your internal system.

It is best to allow only interactive logins at your firewall hosts.

If you must log in the firewall host from other machines, use only a relatively secure login application, such as SSH with one time passwords.

Page 44: Firewalls

44

Firewall TestingFirewall Testing Regularly testing your firewall system and verifying that

it operates properly. In general, a firewall professional has at least to test the following: Host hardware (processor, disk, memory, network

interfaces, etc.). Operating system software (booting, console access

programs, start-up scripts, etc.). Network interconnection equipment (cables, switches,

hubs, routers, APs, etc.). Firewalls.

To check all possible flaws in the software is difficult and this requires expert knowledge, but you still can use software such as a packet injector and listening sniffer (together with other tools: port canners, system vulnerability checking tools and some hacking tools) to test your firewalls.

Check if configuration files, log files, audit files are modified by unauthorised people or processes.

Page 45: Firewalls

45

Firewall TestingFirewall TestingExhaustive tests of all the

possibilities are expensive and practically not possible.

However we can use boundary tests. Eg.identify boundaries in your packet

filtering firewall rules.then test the regions immediately

adjacent to each boundary.

Page 46: Firewalls

46

Firewall TestingFirewall TestingTests also should be conducted thoroughly:

Test the routing configuration, packet filtering rules (including service-specific testing), and logging and alert options separately and together.

Test the firewall system as a whole (such as hardware/software failure recovery, sufficient log file space, proper archival procedure of logs, performance monitoring).

Exercise both normal conditions and abnormal conditions.

Page 47: Firewalls

47

Firewall Testing ToolsFirewall Testing ToolsThere is no way that you can manually test

a firewall as complete as possible, you need to employ firewall testing tools:Network traffic generators (Eg: SPAK (Send

PAcKets), ipsend, etc.).Network monitors (Eg: tcpdump and Network

Monitor) Port scanners (Eg: strobe, nmap, etc) Vulnerability detection tools (Eg: COPS, Tiger,

ISS, Nessus, SAINT, MacAnalysis, etc.) Intrusion detection systems Snort, Cisco IDS, etc.

Page 48: Firewalls

48

Trusted SystemsTrusted SystemsOne way to enhance the ability of

a system to defend against intruders and malicious programs is to implement trusted system technology

Page 49: Firewalls

49

Data Access ControlData Access ControlThrough the user access control

procedure (log on), a user can be identified to the system

Associated with each user, there can be a profile that specifies permissible operations and file accesses

The operation system can enforce rules based on the user profile

Page 50: Firewalls

50

Data Access ControlData Access ControlGeneral models of access control:

Access matrixAccess control listCapability list

Page 51: Firewalls

51

Data Access ControlData Access ControlAccess Matrix

Page 52: Firewalls

52

Data Access ControlData Access ControlAccess Matrix: Basic elements of the

modelSubject: An entity capable of accessing

objects, the concept of subject equates with that of process

Object: Anything to which access is controlled (e.g. files, programs)

Access right: The way in which an object is accessed by a subject (e.g. read, write, execute)

Page 53: Firewalls

53

Data Access ControlData Access ControlAccess Control List: Decomposition

of the matrix by columns

Page 54: Firewalls

54

Data Access ControlData Access ControlAccess Control List

An access control list, lists users and their permitted access right

The list may contain a default or public entry

Page 55: Firewalls

55

Data Access ControlData Access ControlCapability list: Decomposition of

the matrix by rows

Page 56: Firewalls

56

Data Access ControlData Access ControlCapability list

A capability ticket specifies authorized objects and operations for a user

Each user have a number of tickets

Page 57: Firewalls

57

The Concept ofThe Concept ofTrusted SystemsTrusted Systems

Trusted SystemsProtection of data and resources on

the basis of levels of security (e.g. military)

Users can be granted clearances to access certain categories of data

Page 58: Firewalls

58

The Concept ofThe Concept ofTrusted SystemsTrusted Systems

Multilevel securityDefinition of multiple categories or levels of

dataA multilevel secure system must enforce:

No read up: A subject can only read an object of less or equal security level (Simple Security Property)

No write down: A subject can only write into an object of greater or equal security level (*-Property)

Page 59: Firewalls

59

The Concept ofThe Concept ofTrusted SystemsTrusted Systems

Reference Monitor Concept: Multilevel security for a data processing system

Page 60: Firewalls

60

The Concept ofThe Concept ofTrusted SystemsTrusted Systems

Reference MonitorControlling element in the hardware

and operating system of a computer that regulates the access of subjects to objects on basis of security parameters

The monitor has access to a file (security kernel database)

The monitor enforces the security rules (no read up, no write down)

Page 61: Firewalls

61

The Concept ofThe Concept ofTrusted SystemsTrusted Systems

Properties of the Reference MonitorComplete mediation: Security rules are

enforced on every accessIsolation: The reference monitor and

database are protected from unauthorized modification

Verifiability: The reference monitor’s correctness must be provable (mathematically)

Page 62: Firewalls

62

The Concept ofThe Concept ofTrusted SystemsTrusted Systems

A system that can provide such verifications (properties) is referred to as a trusted system

Page 63: Firewalls

63

Trojan Horse DefenceTrojan Horse DefenceSecure, trusted operating systems

are one way to secure against Trojan Horse attacks

Page 64: Firewalls

64

Trojan Horse DefenceTrojan Horse Defence

Page 65: Firewalls

65

Trojan Horse DefenceTrojan Horse Defence