Types of Firewalls
Download
Report
Transcript Types of Firewalls
UNIT -5
Password Management
Firewall Design Principles.
NETWORK SECURITY By: Homera
Durani
2
PASSWORD PROTECTION
User ID and password:
User authorized to gain access to the system
Privileges accorded to the user
Discretionary access control
NETWORK SECURITY By: Homera
Durani
3
PASSWORD PROTECTION
Unix system (user ID, cipher text password, plain
text salt)
password 8 printable characters - 56-bit value (7-bit
ASCII)
encryption routine (crypt(3)) based on DES
modified DES algorithm with 12-bit salt value
(related to time of password assignment)
25 encryptions with 64-bit block of zeros input
64-bit - 11 character sequence
NETWORK SECURITY By: Homera
Durani
4
LOADING A NEW PASSWORD
NETWORK SECURITY By: Homera
Durani
5
PASSWORD PROTECTION
Purposes of salt:
Prevents duplicate passwords from being visible
Effectively increases password length without the
user needing to remember additional 2
characters (possible passwords increased by
4096)
Prevent use of hardware DES implementation for
a brute-force guessing attack
NETWORK SECURITY By: Homera
Durani
6
OBSERVED PASSWORD LENGTHS
IN A PURDUE STUDY
NETWORK SECURITY By: Homera
Durani
7
PASSWORDS CRACKED FROM A SAMPLE
SET
NETWORK SECURITY By: Homera
Durani
easy pickin’s
8
ACCESS CONTROL
NETWORK SECURITY By: Homera
Durani
One Method: Deny access to password file
Systems susceptible to unanticipated break-ins
An accident in protection may render the password file
readable compromising all accounts
Users have accounts in other protection domains using
the same passwords
9
ACCESS CONTROL
Goal:
Eliminate guessable passwords while allowing
the user to select a password that is
memorable
NETWORK SECURITY By: Homera
Durani
Answer:
Force users to select passwords that are
difficult to guess
10
PASSWORD SELECTION STRATEGIES
(BASIC TECHNIQUES)
User education
Users may ignore the guidelines
Computer-generated passwords
Poor acceptance by users
Difficult to remember passwords
NETWORK SECURITY By: Homera
Durani
11
PASSWORD SELECTION STRATEGIES
Reactive password checking
Proactive password checking
NETWORK SECURITY By: Homera
Durani
System runs its own password cracker
Resource intensive
Existing passwords remain vulnerable until reactive
checker finds them
Password selection is guided by the system
Strike a balance between user accessibility and
strength
May provide guidance to password crackers (what not
to try)
Dictionary of bad passwords (space and time problem)
12
PROACTIVE PASSWORD CHECKER
Markov Model – search for guessable
password
Bloom Filter – search in password
dictionary
NETWORK SECURITY By: Homera
Durani
There are two techniques currently in use:
13
MARKOV MODEL
Probability that b follows a
M = {states, alphabet, prob, order}
NETWORK SECURITY By: Homera
Durani
14
MARKOV MODEL
“Was this password generated by this Markov
model?”
Passwords that are likely to be generated by the
model are rejected
Good results for a second-order model
NETWORK SECURITY By: Homera
Durani
“Is this a bad password?”…same as…
15
BLOOM FILTER
NETWORK SECURITY By: Homera
Durani
A probabilistic algorithm to quickly test
membership in a large set using multiple hash
functions into a single array of bits
Developed in 1970 but not used for about 25
years
Used to find words in a dictionary also used for
web caching
Small probability of false positives which can be
reduced for different values of k, # hash funcs
16
BLOOM FILTER
A vector v of N bits
k independent hash
functions. Range 0 to N-1
For each element x,
compute hash functions
H1(x), H2(x)…Hk(x)
Set corresponding bits to 1
Note: A bit in the resulting
vector may be set to 1
multiple times
Bit Vector: v
Element: x
H1(x)=P1
H2(x)=P2
H3(x)=P3
H4(x)=P4
NETWORK SECURITY By: Homera
Durani
1
1
1
1
17
N bits
BLOOM FILTER
NETWORK SECURITY By: Homera
Durani
To query for existence of an entry x, compute
H1(x), H2(x)…Hk(x) and check if the bits at
the corresponding locations are 1
If not, x is definitely not a member
Otherwise there may be a false positive
(passwords not in the dictionary but that
produce a match in the hash table). The
probability of a false positive can be reduced
by choosing k and N
18
PERFORMANCE OF BLOOM FILTER
NETWORK SECURITY By: Homera
Durani
Dictionary of 1 million
words with 0.01 probability
of rejecting a password
We need a hash table of
9.6 X 106 bits
19
20
NETWORK SECURITY By: Homera Durani
FIREWALL
OUTLINE
Firewall Design Principles
NETWORK SECURITY By: Homera
Durani
Firewall Characteristics
Types of Firewalls
Firewall Configurations
21
FIREWALLS
NETWORK SECURITY By: Homera
Durani
Effective means of protection a local system or
network of systems from network-based
security threats while affording access to the
outside world via WAN`s or the Internet
22
FIREWALL DESIGN
PRINCIPLES
Information systems undergo a steady evolution
(from small LAN`s to Internet connectivity)
Strong security features for all workstations
and servers not established
NETWORK SECURITY By: Homera
Durani
23
FIREWALL DESIGN
PRINCIPLES
The firewall is inserted between the premises
network and the Internet
Aims:
NETWORK SECURITY By: Homera
Durani
Establish a controlled link
Protect the premises network from Internet-based
attacks
Provide a single choke point
24
FIREWALL CHARACTERISTICS
Design goals:
All traffic from inside to outside must pass through
the firewall (physically blocking all access to the
local network except via the firewall)
Only authorized traffic (defined by the local
security police) will be allowed to pass
NETWORK SECURITY By: Homera
Durani
25
FIREWALL CHARACTERISTICS
Design goals:
NETWORK SECURITY By: Homera
Durani
The firewall itself is immune to penetration (use of
trusted system with a secure operating system)
26
FIREWALL CHARACTERISTICS
Four general techniques:
Service control
Determines the types of Internet services that can
be accessed, inbound or outbound
Direction control
Determines the direction in which particular service
requests are allowed to flow
NETWORK SECURITY By: Homera
Durani
27
FIREWALL CHARACTERISTICS
User control
Behavior control
Controls how particular services are used (e.g. filter
e-mail)
NETWORK SECURITY By: Homera
Durani
Controls access to a service according to which user
is attempting to access it
28
TYPES
OF
FIREWALLS
Three common types of Firewalls:
Packet-filtering routers
Application-level gateways
Circuit-level gateways
(Bastion host)
NETWORK SECURITY By: Homera
Durani
29
TYPES
OF
FIREWALLS
Packet-filtering Router
NETWORK SECURITY By: Homera
Durani
30
TYPES
OF
FIREWALLS
Packet-filtering Router
NETWORK SECURITY By: Homera
Durani
Applies a set of rules to each incoming IP packet and
then forwards or discards the packet
Filter packets going in both directions
The packet filter is typically set up as a list of rules
based on matches to fields in the IP or TCP header
Two default policies (discard or forward)
31
TYPES
FIREWALLS
Advantages:
Simplicity
Transparency to users
High speed
Disadvantages:
Difficulty of setting up packet filter rules
Lack of Authentication
NETWORK SECURITY By: Homera
Durani
OF
32
TYPES
OF
FIREWALLS
Possible attacks and appropriate
countermeasures
NETWORK SECURITY By: Homera
Durani
IP address spoofing
Source routing attacks
Tiny fragment attacks
33
TYPES
OF
FIREWALLS
Application-level Gateway
NETWORK SECURITY By: Homera
Durani
34
TYPES
OF
FIREWALLS
Application-level Gateway
Also called proxy server
Acts as a relay of application-level traffic
NETWORK SECURITY By: Homera
Durani
35
TYPES
OF
FIREWALLS
Advantages:
Higher security than packet filters
Only need to scrutinize a few allowable applications
Easy to log and audit all incoming traffic
Disadvantages:
Additional processing overhead on each connection
(gateway as splice point)
NETWORK SECURITY By: Homera
Durani
36
TYPES
OF
FIREWALLS
Circuit-level Gateway
NETWORK SECURITY By: Homera
Durani
37
TYPES
OF
FIREWALLS
Circuit-level Gateway
Stand-alone system or
Specialized function performed by an Applicationlevel Gateway
Sets up two TCP connections
The gateway typically relays TCP segments from one
connection to the other without examining the
contents
NETWORK SECURITY By: Homera
Durani
38
TYPES
OF
FIREWALLS
Circuit-level Gateway
The security function consists of determining which
connections will be allowed
Typically use is a situation in which the system
administrator trusts the internal users
An example is the SOCKS package
NETWORK SECURITY By: Homera
Durani
39
TYPES
OF
FIREWALLS
Bastion Host
A system identified by the firewall administrator as
a critical strong point in the network´s security
The bastion host serves as a platform for an
application-level or circuit-level gateway
NETWORK SECURITY By: Homera
Durani
40
FIREWALL CONFIGURATIONS
In addition to the use of simple configuration of
a single system (single packet filtering router or
single gateway), more complex configurations are
possible
Three common configurations
NETWORK SECURITY By: Homera
Durani
41
FIREWALL CONFIGURATIONS
Screened host firewall system (single-homed
bastion host)
NETWORK SECURITY By: Homera
Durani
42
FIREWALL CONFIGURATIONS
Screened host firewall, single-homed bastion
configuration
Firewall consists of two systems:
NETWORK SECURITY By: Homera
Durani
A packet-filtering router
A bastion host
43
FIREWALL CONFIGURATIONS
Configuration for the packet-filtering router:
The bastion host performs authentication and
proxy functions
NETWORK SECURITY By: Homera
Durani
Only packets from and to the bastion host are
allowed to pass through the router
44
FIREWALL CONFIGURATIONS
Greater security than single configurations
because of two reasons:
NETWORK SECURITY By: Homera
Durani
This configuration implements both packet-level and
application-level filtering (allowing for flexibility in
defining security policy)
An intruder must generally penetrate two separate
systems
45
FIREWALL CONFIGURATIONS
NETWORK SECURITY By: Homera
Durani
This configuration also affords flexibility in
providing direct Internet access (public
information server, e.g. Web server)
46
FIREWALL CONFIGURATIONS
Screened host firewall system (dual-homed
bastion host)
NETWORK SECURITY By: Homera
Durani
47
FIREWALL CONFIGURATIONS
Screened host firewall, dual-homed bastion
configuration
NETWORK SECURITY By: Homera
Durani
The packet-filtering router is not completely
compromised
Traffic between the Internet and other hosts on the
private network has to flow through the bastion host
48
FIREWALL CONFIGURATIONS
Screened-subnet firewall system
NETWORK SECURITY By: Homera
Durani
49
FIREWALL CONFIGURATIONS
Screened subnet firewall configuration
Most secure configuration of the three
Two packet-filtering routers are used
Creation of an isolated sub-network
NETWORK SECURITY By: Homera
Durani
50
FIREWALL CONFIGURATIONS
Advantages:
Three levels of defense to thwart intruders
The outside router advertises only the existence of
the screened subnet to the Internet (internal
network is invisible to the Internet)
NETWORK SECURITY By: Homera
Durani
51
FIREWALL CONFIGURATIONS
Advantages:
NETWORK SECURITY By: Homera
Durani
The inside router advertises only the existence of
the screened subnet to the internal network (the
systems on the inside network cannot construct
direct routes to the Internet)
52