(c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

45
(c) University of Technology, Sydney 200 0 - 2004 1 Firewall Architectures

Transcript of (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

Page 1: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

1

Firewall Architectures

Page 2: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

2

Earliest firewalls

?

Page 3: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

3

What are we dealing with?

Data Stream on a wire – ‘data in flight’ Sequence of bits Relayed from machine to machine

Will assume using Ethernet

Page 4: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

4

Firewall Architectures Packet Filter Application Gateway/Proxy Stateful Inspection

Firewall Deployment Methods Choke Router Bastion Host DMZ

Platform Selection Proprietary, Open Source UNIX vs Windows General Purpose Platform vs Appliance

Faculty of Information Technology

Topics

Page 5: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

5

Types of Firewall

Packet Filter Proxy Server Stateful Inspection

Internet

F irewall

Internal Desktop

Internal Server Internal Desktop

In te rna lN etwork

D M ZW eb Server FTP Server

Page 6: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

6

Packet Filter

Applications

Presentations

Sessions

Transport

DataLink

Physical

DataLink

Physical

Applications

Presentations

Sessions

Transport

DataLink

Physical

Network Network

Go / No - Go

Page 7: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

7

Packet Filters

PRO Cheap (you have to

buy a router anyway). Already sits in the ideal

position for a firewall.

CON Routers are made to be

cheap and fast, so they don’t have memory or time for state information.

Certain things don’t work without state information.

Hard to configure.

Page 8: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

8

Packet Filters and FTP

The FTP protocol uses a control connection and a data connection.

The port number for the data connection is passed on the control connection.

Without state tables, packet filters have no way to keep track of the data connection’s port, so they can’t filter it specifically.

Client ServerRouter

FTP Control ConnectionPort

x Port21

USER joePASS blow

220 Who do you think you are?

230 Welcome, sorry I ever doubted

you.

PORT ipc1,ipc2,ipc3,ipc4,y,z"I want to open a data connection tothat port"

FTP Data ConnectionPort20Port

256y+z

Page 9: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

9

Packet Filters and FTP

Solution? Another solution?

Client ServerRouter

FTP Control ConnectionPort

x Port21

USER joePASS blow

220 Who do you think you are?

230 Welcome, sorry I ever doubted

you.

PORT ipc1,ipc2,ipc3,ipc4,y,z"I want to open a data connection tothat port"

FTP Data ConnectionPort20Port

256y+zAllow

connections toany possible

256y+z (all valuesabove 1023)?

Yes

A security risk -somebody

could connectto a vulnerableinternal service(such as X11)from port 20

NoFTP

doesn'twork

Page 10: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

10

Packet Filters and FTP

Another solution? Passive FTP (pasv)

client inside firewall initiates control connection as usual on port x outgoing => port 21 on server

client issues pasv command server replies with port p command (p > 1023) client initiates data connection from port (x + 1)

outgoing => port p on server Both connections start from inside the firewall, so

stateful firewall allows them.

Page 11: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

11

Stateful Inspection

Works by sitting in the Kernel, where the packets go naturally.

Uses (in most cases) a general purpose computer, so it’s flexible.

Sits before the TCP/IP protocol stack, so it can be protected.

Internet

User Mode

KernelMode

NIC

NIC

TCP/IP

InternalN

etwork

F irewall-1KernelModule

Firewall-1KernelModule

Page 12: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

12

Stateful Packet Filter

Applications

Presentations

Sessions

Transport

DataLink

Physical

DataLink

Physical

Applications

Presentations

Sessions

Transport

DataLink

Physical

Network Network

Network

Presentations

Sessions

Transport

ApplicationsApplications

Tracks the conversation flow

Allows packets based on

Can be fooled by “fiddling” the packet flags

Page 13: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

13

Proxy Server/Application Gateway Works by forcing everything

to go through a process on the firewall box (a proxy).

From the client’s perspective, the proxy is the server. From the server’s perspective, it’s the client. Internet

User Mode

KernelMode

NIC

NIC

TCP/IP

InternalN

etwork

Norm alPacket F low

Proxy

ProxyPacket F low

Page 14: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

14

Application Gateway / Proxy

Applications

Presentations

Sessions

Transport

DataLink

Physical

DataLink

Physical

Applications

Presentations

Sessions

Transport

DataLink

Physical

Network NetworkNetwork

Presentations

Sessions

Transport

ApplicationsApplications

TelnetTelnetTelnetTelnet HTTPHTTPHTTPHTTPFTPFTPFTPFTP

Screens limited number of applications

Connectivity & Transparency are broken

Performance is poor due to many data copies & context switches

Flexibility & Open-ness lost, dependent on vendor

Page 15: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

15

Application Gateway

PRO Easy to program. Can be made as

flexible as you’d like.

CON Performance hit. Usually application

specific. Require changes in

user behavior. Doesn’t protect the

TCP/IP protocol stack itself.

Page 16: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

16

Additional Pieces

TCP-Wrapper Provides control at a TCP packet level proxy daemon for inetd, i.e. UNIX only

and others to find out … Socks Circuit Gateways Transparent Proxies

Page 17: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

17

State of the Art

Today most firewalls are a combination of technologies

No perfect answer Still only part of the security puzzle

Page 18: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

18

Firewall Deployment Methods

Page 19: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

19

Philosophies

Hotly debated area Schemes have evolved with the technology Important elements

Availability Maintainability Practicality

Page 20: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

20

The Gateway

Only entry point Go / No Go decisions Easy to check

payload

Page 21: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

21

Start Point

Page 22: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

22

Start Point

Bastion Host

Page 23: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

23

Defence in Layers

DMZ

Page 24: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

24

Segregate

Bastion HostChoke Router

DMZ

Page 25: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

25

Segregate

Dual Homed Bastion Host

Page 26: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

26

Segregate

Firewall

Page 27: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

27

Segregate

Firewall

DMZ

Page 28: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

28

Simple Network

Internet

F irewall

IBM Com patible

IBM Com patible

IBM Com patible

W orkstation

In ternal N etwork(legal IP addresses)

Page 29: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

29

Simple Network with NAT

Internet

F irewall

IBM Com patible

IBM Com patible

IBM Com patible

W orkstation

In terna l N etwork(192.168.1.0)

H ide 192.168.1.2 -192.168.1.254 behind

0.0.0.0

.1

Page 30: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

30

Network Address Translation

Security by Obscurity

Conscious design? Fortunate result of problem solving

Using limited address spaces Allowing more convoluted designs

Page 31: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

31

More Architectural Choices

Design for availability redundant firewalls redundant routes redundant ISPs

Throughput number of hops in path NIC capabilities

Page 32: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

32

Platform Selection

Page 33: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

33

Completely Secure?

NO!

YES!

Anything else

Page 34: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

34

Operating System Choices

Unix Was written to be as flexible as possible. Originated in environments where security

was not an issue.

Page 35: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

35

Operating System Choices

Windows Developed for a business environment,

where security is important. Supposed to be as user friendly as possible.

Security isn’t user friendly.

Page 36: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

36

Operating System Choices

Appliances Hide the details Limited Functionality in

the operating system Full functionality for the

task

Page 37: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

37

Open Source

Totally visible to ALL

Support In-house skills Reproducible

Version control

Page 38: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

38

Real World

What can or cannot be done

Page 39: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

39

Firewalls Cannot

Protect traffic that does NOT flow thru them Protect networks inside the firewall Stop all application based attacks

Page 40: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

40

Page 41: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

41

Page 42: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

42

Firewalls CAN

Control raw traffic flows Provide a point to log and “examine” events Be a Billboard to advertise your security

policy

Page 43: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

43

End

Page 44: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

44

Circuit Gateway/SOCKS/Proxy

SOCKS - a protocol that includes a set of client libraries for proxy interfaces with clients. “SOCKS, the most popular circuit gateway” (RFC 1928 versions 4 and 5) tcp sessions; client s/w for proxy server, e.g. AnalogX

Circuit (Level) Gateway allows sessions, doesn’t analyze packets. Permission

granted based on port number. More transparent, not as secure, as application gateway (proxy server)

supports sessions based on port no (doesn’t analyze packets) sets up end-to-end session between client and remote server needs SOCKS running on client

Basically, a Circuit Gateway is like a ‘null’ Proxy server

Page 45: (c) University of Technology, Sydney 2000 - 20041 Firewall Architectures.

(c) University of Technology, Sydney 2000 - 2004

45

Additional Pieces

contrast Circuit Gateway with Application Gateway = Proxy Server

client connects to proxy server no change required to client (except need to point

client at proxy) Transparent proxy (don’t even need to do that)

Transparent Proxies built as part of network architecture, so all o/g port

80 traffic goes through it and the user does not have to configure browser. Includes cache too (caching proxy).