Week 9 Lecture Note

Transcription

Week 9 Lecture Note
Protec)on*Mechanisms:*
Firewalls*!
(Part!2)!
Introduction (cont.)
• Categories
of Firewalls
processing mode
1.1)
1.2)
1.3)
1.4)
1.5)
MAC layer firewalls
packet filtering firewalls
application gateways
circuit gateways
hybrids
development era (generation)
2.1) – 2.5) 1st, 2nd, 3rd, 4th, 5th generation
structure
3.1)
3.2)
3.3)
3.4)
commercial grade firewall appliances
commercial grade firewall systems
small-office/home-office (SOHO) firewall appliances
residential-grade firewall software
architecture
4.1)
4.2)
4.3)
4.4)
packet filtering routers
dual-homed host firewalls
screened host firewalls
screened subnet firewalls
Firewalls by Structure
3.1) Commercial – stand-alone, self-contained
Grade
combination of hardware and
Firewall
software (~ $1 – $10,000 k)
Appliance
often a general-purpose computer
[Hardware]
with customized OS that can be
modified only using direct physical
connection & strong authentication
not vulnerable to ‘bugs’ and other
flaws of common OS + can handle
more data with faster throughput
generally more expensive than
software counterparts
examples:
Cisco’s hardware firewalls running on Cisco’s
own Internetwork Operating System (IOS)
The Cisco ASA 5510 Adaptive Security Appliance delivers a wealth of
advanced security and networking services for small-to-medium businesses and
enterprise remote/branch offices in an easy-to-deploy, cost-effective appliance.
These services can be easily managed and monitored by the integrated, Webbased management application, Cisco Adaptive Security Device Manager, thus
reducing the overall deployment and operations costs associated with providing
this high level of security. The Cisco ASA 5510 Adaptive Security Appliance
provides high performance firewall and VPN services, three integrated
10/100 Fast Ethernet interfaces, and optional high-performance intrusion
prevention and anti-x services via a Security Services Module making it an
excellent choice for businesses requiring a cost-effective, extensible, DMZ-enabled
security solution. As business needs grow, the Cisco ASA 5510 Adaptive Security
Appliance can also scale to higher interface density and integrate into switched
network environments through VLAN support by installing a Security Plus upgrade
license. Furthermore, this upgrade license maximizes business continuity by
enabling Active/Standby high availability services and expands VPN capacity by
supporting a greater number of concurrent VPN connections for mobile users,
remote sites, and business partners.
suggested retail price:$5,304.10
$3,978.07
Firewalls by Structure (cont.)
3.2) Commercial – consist of application firewall
Grade
software that runs on a general
purpose computer (~ $1 – $5 k)
Firewall
Systems
aka Enterprise Firewalls –
[Software]
designed for large complex networks
features:
ability to manage multiple firewalls centrally
sophisticated monitoring and reporting
load balancing and failover, …
examples:
Novell’s BorderManager
See: http://www.novell.com/documentation/nbm39/pdfdoc/installation/installation.pdf
Firewalls by Structure (cont.)
3.3) Small Office / – aimed to protect small business
Home Office
& residences with DSL or cable
modem (always on) connection
[SOHO] or
to the Internet (~ $100)
Residential
Grade
SOHO firewalls properties:
Firewall
stateful packet filtering
port filtering & simple intrusion detection
Appliance
screened subnetting, …
in recent years, SOHO firewall also
combine features of WAP & NAT
with NAT, internal computers ‘not visible’
to public network, hence less vulnerable
examples:
SMC Barricade residential broadband router
Sonicwall SOHO firewall
Firewalls by Structure (cont.)
Firewalls by Structure (cont.)
Firewalls by Structure (cont.)
3.4) Residential – software installed directly on
Grade
user’s system (free or ~ $100)
[SOHO]
aka Personal Firewalls – intended
Firewall
to protect a single computer
Software
features:
lightweight in terms of protection
most guard only against IP threats
some do not handle outbound blocking, …
examples:
ZoneAlarm Pro (freeware available)
Norton Personal Firewall
Sygate Personal Firewall Pro (freeware available)
Microsoft Windows Firewall – integral to
Windows XP, Vista, Windows 7 systems
http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm
Firewalls by Structure (cont.)
Firewalls by Structure (cont.)
Example: Firewall advantages and disadvantages
Firewalls by Architecture
Firewall Architectures – each of the four classes of
firewalls (MAC-layer, packet
filtering firewall, application
gateway, circuit gateway) can
be used and combined in a
number of ways
ultimate decision on which and
how many firewalls to deploy
depends on:
network uses
network objectives
available budget (for initial
purchase, maintenance, upgrades)
Firewalls by Architecture (cont.)
4.1) Packet Filtering – rejects packets that organi(Screening)
zation does not want to let ‘in’
Firewall/Router
simple way to lower risk from highvolume low-complexity attacks
drawbacks:
complex ACL can degrade (slow down)
network performance
single point of failure – if router fails,
there is no further protection
Firewalls by Architecture (cont.)
4.1) Packet Filtering (Screening) Router
appropriate uses:
the network being protected already
has a high level of host security
the number of protocols and their
rules/use is straightforward
you require maximum performance
Firewalls by Architecture (cont.)
4.2) Dual-Homed – a host-firewall (not router!) with
Firewall
2 NIC is placed between internal
and external network
(Application
Gateway)
all traffic must physically go through
host-firewall
host-firewall filters data based on
higher-layer data (not just IP!)
Firewalls by Architecture (cont.)
4.2) Dual-Homed Firewall (cont.)
drawbacks:
dual-homed hosts/firewalls are NOT
high-performance devices; have more
work to do per each connection
a dual-homed host is ‘regular’ computer
with all its vulnerabilities
a dual-homed host is the system’s
single-point of failure
Firewalls by Architecture (cont.)
4.2) Dual-Homed Firewall (cont.)
appropriate use:
traffic to the Internet is low-volume and
is not business-critical
no service is being provided to
Internet-based users
Firewalls by Architecture (cont.)
4.3) Screened – combines a packet filtering router
Host
& a separate application gateway
Firewall
router prescreens packets to minimize
network traffic
gateway - aka bastion-host - performs
proxy services for one or more applicat.
protocols (e.g. FTP, HTTP)
gateway is the only host in internal network that
hosts from the Internet can communicate to
Firewalls by Architecture (cont.)
4.3) Screen Host Firewall (cont.)
strengths:
to compromise internal network, attacker must compromise
both – the screening router and bastion host
overall, router + proxy protect data (network) more fully than
router or dual-homed host alone
appropriate uses:
few connections are coming from the
Internet
the network being protected has a
relatively high level of host security
Firewalls by Architecture (cont.)
4.4) Screened –
Subnet
Architecture
adds an extra layer of security
to screened host architecture
by adding a perimeter network
to better isolate bastion host
bastion host is ‘the most likely to be
attacked’ machine on a network
by setting up a perimeter network,
the ultimate impact of a break-in on
bastion host is significantly reduced
it is no longer an instant ‘jackpot’;
it gives an intruder some access,
but not all
to break into internal network an
attacker would have to get past
both routers
Firewalls by Architecture (cont.)
4.4) Screened Subnet Architecture (cont.)
If you have $$$$
it is OK to use multiple bastion hosts
e.g., one host handles services important to
your own users (SMTP, DNS), other host
handles services that you provide to the
Internet (HTTP, FTP) – this way the
performance of your own users will not be
dragged down by activities of outside users
Firewalls by Architecture (cont.)
4.4) Screened Subnet Architecture (cont.)
If you do not have $$$$
it is OK to merge bastion host and
exterior router
this configuration exposes bastion host more,
but it doesn’t open significant new vulnerabilities to the internal network
Firewalls by Architecture (cont.)
4.4) Screened Subnet Architecture (cont.)
If you do not have $$$$
it is dangerous to merge bastion host
and interior router
with this type of configuration, if the bastion
host is broken into, there is nothing left in
the way of security between the bastion host
and the internal network
one of the main purposes of
perimeter network is to
prevent bastion host from
being able to snoop on
internal traffic – with this
configuration all of your
internal traffic is visible to it
Firewalls by Architecture (cont.)
4.4) Screened Subnet Architecture (cont.)
In multi-LAN networks…
multiple interior routers should be
used with caution
in case of misconfiguration
on one of interior routers
(which happens frequently),
strictly internal traffic may
end up flowing across
perimeter network where it
can be snooped on if somebody has managed to break
into bastion host
possible solution: backbone
architecture
Firewalls by Architecture (cont.)
4.4) Screened Subnet Architecture (cont.)
In complex networks…
it is OK to use multiple exterior routers
may be needed if:
a) for redundancy purposes, you have multiple
connections to the Internet
b) you have connection to the Internet plus
other connections to other sites
compromise of an exterior
router in case of a) is not
critical – attacker still cannot
see internal traffic
case b) is possibly dangerous
if other connections are to
sites that require/assume
privacy of information
Firewalls by Architecture (cont.)
HTTP Server and HTTP Proxy separated by a firewall.
Is this architecture optimal with regard to QoS?
HTTP
Proxy
HTTP
Server
Firewalls by Architecture (cont.)
4.5) Screened Subnet – provides an extra layer of
Firewalls
security by creating a new
network segment (DMZ)
with DMZ
of ‘public servers’
DeMilitarized Zone (DMZ) is
isolated from rest of internal net.
Exterior and
interior filtering
routers.
Bastion host.
Firewalls by Architecture (cont.)
4.4) Screened Subnet Firewall with DMZ (cont.)
bastion host acts as proxy for DMZ’s servers and is
protected by interior and exterior filtering routers
interior router protects internal network from perimeter
network and the Internet
allow only specific DMZ hosts (DNS, SMTP, HTTP server) to
communicate with hosts on internal network
exterior router protects perimeter and internal network
from the Internet
block incoming and outgoing IP packets with forged IP addresses
if someone successfully breaks into bastion host, internal
network is still (reasonably) protected by internal router
attacker will be able to snoop only on DMZ’s local hosts and traffic
Firewalls by Architecture (cont.)
Example: Multiple DMZ/Firewall Configurations
server
farm 1
server
farm 2
Web Server 1: stores public data that
requires no (major) protection or is
not likely to be a ‘target’
Web Server 2: stores public data
that requires protection
server
farm 3
Web Server 3: stores private data
that requires high level of protection
Firewalls by Architecture (cont.)
How Many Firewalls
and Where?
simple home network might
be sufficiently protected with a
single stateful packet filter
small network with proprietary
information can use a proxy
server + packet filter to prevent
external user from ‘seeing’ internal
data and network
large companies with public
Web servers & proprietary data
may have to build a DMZ with
packet filters on either side
Firewall Rules
Firewall Rules (cont.)
Configuring Firewall – art as much as science
Rules
each rule must be carefully crafted,
debugged, tested and placed into
Access Control List (ACL) in
proper order
rules that can be evaluated quickly
& regulate broad access should be
performed first
when security rules conflict with
performance, security often needs
to be removed or redesigned
Most firewalls operate on the principle of
explicitly permitted rules:
“that which is not permitted is prohibited”.
Firewall Rules (cont.)
‘Best Practices’ for Firewall & Firewall Rules
Firewall devices should not be accessible from public, as well
internal network, for management and configuration purposes.
only authorized firewall administrators should be able to access
device, using encryption and strong authentication
SMTP data should be allowed through firewall, but routed to
a well-configured SMTP gateway to filter mail traffic securely.
All ICMP data should be denied.
Telnet access to all internal servers form the public network
should be blocked (especially to DNS server).
if internal users need to come into an organization’s network
form outside firewall, Virtual Private Network (VPN) is preferred
Firewall Rules (cont.)
‘Best Practices’ for Firewall & Firewall Rules (cont.)
When Web services are offered outside firewall, use of proxy
servers (in or outside DMZ) should be considered.
proxy server – application-level software, checks and forwards
packets to & from Web server, and caches Web pages to speed
up network performance
Firewall Rules (cont.)
Example: Firewall rules
Assume a network with one internal and one external
firewall.
NetIP: 10.10.10.0
Internal
Server
10.10.10.1 10.10.10.2
10.10.10.3 192.168.2.1
Firewall
Admin.
192.168.2.2 192.168.2.3
Switch
(external firewall)
(internal firewall)
NAT Addressing
INT Address
EXT Address
192.168.2.1
10.10.10.7
192.168.2.2
10.10.10.8
192.168.2.3
10.10.10.9
192.168.2.x
10.10.10.10
Firewall Rules (cont.)
I1
I1
I2
I1
I2
I2
I1
I1
I1
I1
both
I1
I1
I2
I1
I2
I2
I1
both
Firewall Rules (cont.)
Firewall Rules (cont.)
Example: Firewall rules (cont.)
Rule 1: Responses to internal requests are allowed.
External (Inbound) Firewall:
Client programs
run on registered ports.
Internal Firewall:
Use state tables to track connections and
prevent dangerous packets from entering
the upper port range.
Firewall Rules (cont.)
Example: Firewall rules (cont.)
Rule 2: Firewall device is never accessible directly from
public or internal network, and it should never
be allowed to access other devices directly.
External Firewall:
Internal Firewall:
Similar rules should be designed for internal
firewall as well.
Firewall Rules (cont.)
Example: Firewall rules (cont.)
Rule 3: All traffic from trusted network is allowed out.
External and Internal Firewall:
Rule 4: All traffic intended for SMTP server is allowed
into DMZ.
External and Internal Firewall:
Firewall Rules (cont.)
Example: Firewall rules (cont.)
Rule 5: All outside ICMP data (Ping, Traceroute) should
be denied, while inside ICMP should be allowed.
Internal Firewall:
External Firewall:
Rule 6: All outside Telnet access to all internal servers
should be blocked.
Internal Firewall:
External Firewall:
Firewall Rules (cont.)
Example: Firewall rules (cont.)
Rule 7: The proxy server & the Web server are in DMZ.
Internal hosts are allowed to access the Web
server directly.
External hosts are directed to proxy server.
Proxy server repackage any HTTP request into
a new packet and retransmits to the web server.
Internal Firewall:
External Firewall:
Firewall Rules (cont.)
Example: Firewall rules (cont.)
Rule 8: The Cleanup Rule!
If a request for a service is not explicitly allowed
by policy, that request should be denied!
External and Internal Firewall: