Lecture Notes
Download
Report
Transcript Lecture Notes
CSCE 201
Network Security
Firewalls
Fall 2015
Traffic Control – Firewall
Brick wall placed between apartments to
prevent the spread of fire from one
apartment to the next
Single, narrow checkpoint placed between
two or more networks where security and
audit can be imposed on traffic which
passes through it
CSCE 201 - Farkas
2
Firewall
Private Network
Firewall
security wall between
private (protected)
network and outside word
External Network
CSCE 201 - Farkas
3
Firewall Objectives
Private Network
Keep intruders,
malicious code and
unwanted
traffic or
information out
Proprietary data
Keep proprietary
and sensitive
information in
External attacks
External Network
CSCE 201 - Farkas
4
Without firewalls, nodes:
– Are exposed to insecure services
– Are exposed to probes and attacks from outside
– Can be defenseless against new attacks
– Network security totally relies on host security
and all hosts must communicate to achieve high
level of security – almost impossible
CSCE 201 - Farkas
5
Network Address Translation (NAT)
Organization uses private IP addresses on its network
increase address space
Send packet to Internet: convert private IP address to
globally assigned IP address
Receive packer from Internet: globally assigned IP
addresses converted to private IP addresses
Firewalls may
Establish connections on behalf of the client
Support NAT
CSCE 201 - Farkas
6
Common firewall features
Routing information about the private network
can't be observed from outside
traceroute and ping -o can't `see' internal hosts
Users wishing to log on to an internal host must
first log onto a firewall machine (or else start
`behind' the firewall).
CSCE 201 - Farkas
7
Trade-Off between accessibility
and Security
Service Access Policy
Accessibility
CSCE 201 - Farkas
Security
8
Firewall Advantages
Protection for vulnerable services
Controlled access to site systems
Concentrated security
Enhanced Privacy
Logging and statistics on network use,
misuse
Policy enforcement
CSCE 201 - Farkas
9
Controlled Access
A site could prevent outside access to its
hosts except for special cases (e.g., mail
server).
Do not give access to a host that does not
require access.
Some hosts can be reached from outside,
some can not.
Some hosts can reach outside, some can not.
CSCE 201 - Farkas
10
Concentrated Security
Firewall less expensive than securing all
hosts
– All or most modified software and additional
security software on firewall only (no need to
distribute on many hosts)
Other network security (e.g., Kerberos)
involves modification at each host system.
CSCE 201 - Farkas
11
Enhanced Privacy
Even innocuous information may contain
clues that can be used by attackers
– E.g., finger:
information about the last login time, when e-mail
was read, etc.
Infer: how often the system is used, active users,
whether system can be attacked without drawing
attention
CSCE 201 - Farkas
12
Logging and Statistics on
Network Use, Misuse
If all access to and from the Internet passes
through the firewall, the firewall can
theoretically log accesses and provide
statistics about system usage
Alarm can be added to indicate suspicious
activity, probes and attacks – double duty as
IDS on smaller networks
CSCE 201 - Farkas
13
Policy enforcement
Means for implementing and enforcing a
network access policy
Access control for users and services
Can’t replace a good education/awareness
program, however:
– Knowledgeable users could tunnel traffic to
bypass policy enforcement on a firewall
CSCE 201 - Farkas
14
Firewall Disadvantages
Restricted access to desirable services
Large potential for back doors
No protection from insider attacks
No protection against data-driven attacks
Cannot protect against newly discovered
attacks – policy/situation dependent
Large learning curve
CSCE 201 - Farkas
15
Firewall Components
Firewall Administrator
Firewall policy
Packet filters
– transparent
– does not change traffic, only passes it
Proxies
– Active
– Intercepts traffic and acts as an intermediary
CSCE 201 - Farkas
16
Firewall Administrator
Knowledge of underpinnings of network
protocols (ex. TCP/IP, ICMP)
Knowledge of workings of applications that
run over the lower level protocols
Knowledge of interaction between firewall
implementation and traffic
Vendor specific knowledge
CSCE 201 - Farkas
17
Firewall Policy
High-level policy: service access policy
Low-level policy: firewall design policy
Firewall policy should be flexible!
CSCE 201 - Farkas
18
Service Access Policy
Part of the Network Security Policy
Defines:
– TCP/IP protocols
– Services that are allowed or denied
– Service usage
– Exception handling
CSCE 201 - Farkas
19
Service Access Policy
Goal: Keep outsiders out
Must be realistic and reflect required
security level
Full security v.s. full accessibility
CSCE 201 - Farkas
20
Firewall Design Policy
Refinement of service access policy for specific
firewall configuration
Defines:
– How the firewall achieves the service access
policy
– Unique to a firewall configuration
– Difficult!
CSCE 201 - Farkas
21
Firewall Design Policy
Approaches:
Open system: Permit any service unless
explicitly denied (maximal accessibility)
Closed system: Deny any service unless
explicitly permitted (maximal security)
CSCE 201 - Farkas
22
Simple Packet Filters
Applies a set of rules to each incoming IP packet
to decide whether it should be forwarded or
discarded.
Header information is used for filtering ( e.g,
Protocol number, source and destination IP, source
and destination port numbers, etc.)
Stateless: each IP packet is examined isolated
from what has happened in the past.
Often implemented by a router (screening router).
CSCE 201 - Farkas
23
Simple Packet Filter
Private Network
Placing a simple router (or
similar hardware) between
internal network and
“outside”
Allow/prohibit packets from
certain services
Packet
Filter
Packet-level
rules
Outside
CSCE 201 - Farkas
24
Simple Packet Filters
Advantages:
– Does not change the traffic flow or
characteristics –passes it through or doesn’t
– Simple
– Cheap
– Flexible: filtering is based on current rules
CSCE 201 - Farkas
25
Simple Packet Filters
Disadvantages:
– Direct communication between multiple hosts and internal
network
–Unsophisticated (protects against simple attacks)
– Calibrating rule set may be tricky
– Limited auditing
– Single point of failure
CSCE 201 - Farkas
26
Stateful Packet Filters
Called Stateful Inspection or Dynamic
Packet Filtering
Checkpoint patented this technology in
1997
Maintains a history of previously seen
packets to make better decisions about
current and future packets
CSCE 201 - Farkas
27
Proxy Firewalls
View
Private Network
Reality
Private Network
Bastion
Host
Proxy Server
Outside
CSCE 201 - Farkas
Outside
28
Proxy Firewalls
Application Gateways
– Works at the application layer must
understand and implement application protocol
– Called Application-level gateway or proxy
server
Circuit-Level Gateway
– Works at the transport layer
– E.g., SOCKS
CSCE 201 - Farkas
29
Application Gateways
Interconnects one network to another for a specific
application
Understands and implements application protocol
Good for higher-level restrictions
Client
CSCE 201 - Farkas
Application Gateway
Server
30
Application Gateways
Advantages: by permitting application traffic directly to
internal hosts
– Information hiding: names of internal systems are not known to
–
–
–
–
–
outside systems
Can limit capabilities within an application
Robust authentication and logging: application traffic can be preauthenticated before reaching host and can be logged
Cost effective: third-party software and hardware for authentication
and logging only on gateway
Less-complex filtering rules for packet filtering routers: need to
check only destination
Most secure
CSCE 201 - Farkas
31
Application Gateways
Disadvantages:
– Keeping up with new applications
– Need to know all aspects of protocols
– May need to modify application
client/protocols
CSCE 201 - Farkas
32
Firewall Evaluation
Level of protection on the private network ?
– Prevented attacks
– Missed attacks
– Amount of damage to the network
How well the firewall is protected?
– Possibility of compromise
– Detection of the compromise
– Effect of compromise on the protected network
Ease of use
Efficiency, scalability, redundancy
Expense
CSCE 201 - Farkas
33