The DNS. Application Proxies. Circuit Gateways. Personal and Distributed Firewalls The Problems with Firewalls

Similar documents
Application Firewalls

ISA 674 Understanding Firewalls & NATs

Firewalls. Types of Firewalls. Schematic of a Firewall. Conceptual Pieces Packet Filters Stateless Packet Filtering. UDP Filtering.

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Network Security - ISA 656 Intro to Firewalls

Why Firewalls? Firewall Characteristics

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

CSC Network Security

Internet Security: Firewall

CE Advanced Network Security

Computer Security and Privacy

SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels

Some of the slides borrowed from the book Computer Security: A Hands on Approach by Wenliang Du. Firewalls. Chester Rebeiro IIT Madras

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways

10 Defense Mechanisms

CSE 565 Computer Security Fall 2018

W is a Firewall. Internet Security: Firewall. W a Firewall can Do. firewall = wall to protect against fire propagation

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.

Internet Security Firewalls

CyberP3i Course Module Series

Indicate whether the statement is true or false.

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Unit 4: Firewalls (I)

CTS2134 Introduction to Networking. Module 08: Network Security

Security Architect Northeast US Enterprise CISSP, GCIA, GCFA Cisco Systems. BRKSEC-2052_c Cisco Systems, Inc. All rights reserved.

Spring 2010 CS419. Computer Security. Vinod Ganapathy Lecture 14. Chapters 6 and 9 Intrusion Detection and Prevention

20-CS Cyber Defense Overview Fall, Network Basics

Intranets 4/4/17. IP numbers and Hosts. Dynamic Host Configuration Protocol. Dynamic Host Configuration Protocol. CSC362, Information Security

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking

Secure VPNs for Enterprise Networks

Firewalls and NAT. Firewalls. firewall isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others.

Chapter 8 roadmap. Network Security

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

4.1.3 Filtering. NAT: basic principle. Dynamic NAT Network Address Translation (NAT) Public IP addresses are rare

Chapter 9. Firewalls

CSC 474/574 Information Systems Security

Network Security. Thierry Sans

COMPUTER NETWORK SECURITY

CHAPTER 8 FIREWALLS. Firewall Design Principles

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Network Security. Kitisak Jirawannakool Electronics Government Agency (public organisation)

Complete B-2: Comparing firewall-based secure topologies, complete questions 1 through 3 on

SE 4C03 Winter 2005 Network Firewalls

UMSSIA LECTURE II: NETWORKS?

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

Network Control, Con t

Distributed Systems. Lecture 14: Security. Distributed Systems 1

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

Distributed Systems. Lecture 14: Security. 5 March,

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

Security and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California

EE 122: Network Security

Easy To Install. Easy To Manage. Always Up-To-Date.

Computer Security Exam 3 Review. Paul Krzyzanowski. Rutgers University. Spring 2017

Objectives CINS/F1-01

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Training UNIFIED SECURITY. Signature based packet analysis

CSE 461 Midterm Winter 2018

Protection of Communication Infrastructures

Agenda of today s lecture. Firewalls in General Hardware Firewalls Software Firewalls Building a Firewall

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Advanced Security and Mobile Networks

Network Security: Firewalls. Tuomas Aura T Network security Aalto University, Nov-Dec 2013

Cisco Cisco Certified Network Associate (CCNA)

Firewall and IDS/IPS. What is a firewall?

Network Security Fundamentals

Lotus Protector Interop Guide. Mail Encryption Mail Security Version 1.4

CSC 4900 Computer Networks: Security Protocols (2)

AccessEnforcer Version 4.0 Features List

Checkpoint Exam Check Point NG with Application Intelligence - Management I Version: 3.2 [ Total Questions: 241 ]

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Threat Pragmatics. Target 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:

4. The transport layer

SOLUTION MANAGEMENT GROUP

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Network Services, Cloud Computing and Virtualization

AMP-Based Flow Collection. Greg Virgin - RedJack

Locking down a Hitachi ID Suite server

Managing SonicWall Gateway Anti Virus Service

Network Defenses 21 JANUARY KAMI VANIEA 1

Context Based Access Control (CBAC): Introduction and Configuration

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Cisco IOS Firewall Authentication Proxy

COSC 301 Network Management

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017

Operating Systems Design Exam 3 Review: Spring 2011

Fundamentals of Network Security v1.1 Scope and Sequence

Implementing Firewall Technologies

Definition of firewall

What is a firewall? Firewall and IDS/IPS. Firewall design. Ingress vs. Egress firewall. The security index

CS 356 Internet Security Protocols. Fall 2013

Simple and Powerful Security for PCI DSS

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Transcription:

Network Security - ISA 656 Application Angelos Stavrou August 20, 2008 Application Distributed Why move up the stack? Apart from the limitations of packet filters discussed last time, firewalls are inherently incapable of protecting against attacks on a higher layer IP packet filters (plus port numbers... ) can t protect against bogus TCP data A TCP-layer firewall can t protect against bugs in SMTP SMTP proxies can t protect against problems in the email itself, etc. Angelos Stavrou (astavrou@gmu.edu) 2 / 36 Application Application/proxy level firewalls FTP HTTP TELNET NFS TCP Network/packet filtering firewalls IP UDP ICMP Application Protection can be tuned to the individual application More context can be available You only pay the performance price for that application, not others Distributed Link layer firewalls Ethernet FDDI PPP Distributed Angelos Stavrou (astavrou@gmu.edu) 3 / 36 Angelos Stavrou (astavrou@gmu.edu) 4 / 36

Application Application-layer firewalls don t protect against attacks at lower layers! They require a separate program per application These programs can be quite complex They may be very intrusive for user applications, user behavior, etc. Application Do we protect in-bound or out-bound email? Some of the code is common; some is quite different Do we work at the SMTP level (RFC 2821) or the mail content level (RFC 2822)? What about MIME? (What about S/MIME- or PGP-protected mail?) What are the threats? Distributed Distributed Angelos Stavrou (astavrou@gmu.edu) 5 / 36 Angelos Stavrou (astavrou@gmu.edu) 6 / 36 Application The usual: defend against protocol implementation bugs Virus-scanning Anti-spam? Javascript? Web bugs in HTML email? Violations of organizational email policy? Signature-checking? Application is easy to intercept: MX records in the DNS route in-bound email to a machine Possible to use * to refer and handle the entire domain Example: DNS records exist for gmu.edu and *.gmu.edu Net result: all email for that domain is sent to a front end machine Distributed Distributed Angelos Stavrou (astavrou@gmu.edu) 7 / 36 Angelos Stavrou (astavrou@gmu.edu) 8 / 36

Application Distributed There are are multiple layers of protection possible here The receiving machine can filter IP Addresses from spammers, providing protection at the network layer The receiving machine can run a hardened SMTP, providing protection at the application layer Once the email is received, it can be scanned at the content layer for any threats The firewall function can consist of either or both Application Distributed No help from the protocol definition here But most mailers have the ability to forward some or all email to a relay host Create a policy that all mail has to pass through the relay in order to be delivered Enforce this with a packet filter... Angelos Stavrou (astavrou@gmu.edu) 9 / 36 Angelos Stavrou (astavrou@gmu.edu) 10 / 36 Application Use an application firewall to handle in-bound and out-bound email Use a packet filter to enforce the rules Application Outside Packet Filter SMTP Receiver DMZ Anti Spam Anti Virus Distributed Distributed Inside Angelos Stavrou (astavrou@gmu.edu) 11 / 36 Angelos Stavrou (astavrou@gmu.edu) 12 / 36

Application Distributed can t flow any other way The only SMTP server the outside can talk to is the SMTP receiver It forwards the email to the anti-virus/anti-spam filter, via some arbitrary protocol That machine speaks SMTP to some inside mail gateway Note the other benefit: if the SMTP receiver is compromised, it can t speak directly to the inside Application Distributed Again, we use a packet filter to block direct out-bound connections to port 25 The only machine that can speak to external SMTP receivers is the dedicated out-bound email gateway That gateway can either live on the inside or on the DMZ Angelos Stavrou (astavrou@gmu.edu) 13 / 36 Angelos Stavrou (astavrou@gmu.edu) 14 / 36 Application Distributed UDP (discussed previously) Internal versus external view DNS cache corruption Optimizing DNSSEC checks Application Distributed Remember the DNS server location discussed last time In fact, what we did there was use an application-level relay to work around packet filter restrictions We re lucky since the DNS protocol includes provision for recursion, it requires no application changes for this to work Angelos Stavrou (astavrou@gmu.edu) 15 / 36 Angelos Stavrou (astavrou@gmu.edu) 16 / 36

Application Distributed Should outsiders be able to see the names of all internal machines? What about secretproject.foobar.com? Solution: use two DNS servers, one for internal requests and one for external request Put one on each side of the firewall Issue: which machine does the NS record for foobar.com point to, the inside or the outside server? Can be trickier than it seems must make sure that internal machines don t see NS records that will make them try to go outside directly Angelos Stavrou (astavrou@gmu.edu) 17 / 36 Application Distributed DNS servers cache results from queries Responses can contain additional information data that may be helpful but isn t part of the answer Send bogus DNS records as additional information; confuse a later querier Angelos Stavrou (astavrou@gmu.edu) 18 / 36 Application Distributed All internal DNS queries go to a DNS switch If it s an internal query, forward the query to the internal server or pass back internal NS record If it s an external query, forward the query to outside, but: Scrub the result to remove any references to inside machines Scrub the result to remove any references to any NS records; this prevents attempts to go outside directly Use a packet filter to block direct DNS communication Angelos Stavrou (astavrou@gmu.edu) 19 / 36 Application Small Application Gateways FTP Proxy Via FTP Proxy Distributed Small Application Gateways Some protocols don t need full-fledged handling at the application level That said, a packet filter isn t adequate Solution: examine some of the traffic via an application-specific proxy; react accordingly Angelos Stavrou (astavrou@gmu.edu) 20 / 36

FTP Proxy Via FTP Proxy Application Small Application Gateways FTP Proxy Via FTP Proxy Distributed Remember the problem with the PORT command? Scan the FTP control channel If a PORT command is spotted, tell the firewall to open that port temporarily for an incoming connection (Can do similar things with RPC define filters based on RPC applications, rather than port numbers) Application Small Application Gateways FTP Proxy Via FTP Proxy Distributed Downloaded Java applets can call back to the originating host A malicious applet can open an FTP channel, and sea PORT command listing a vulnerable port on a nominally-protected host The firewall will let that connection through Solution: make the firewall smarter about what host and port numbers can appear in PORT commands... Angelos Stavrou (astavrou@gmu.edu) 21 / 36 Angelos Stavrou (astavrou@gmu.edu) 22 / 36 Application Small Application Gateways FTP Proxy Via FTP Proxy Distributed Again, built-in protocol support Provide performance advantage: caching Can enforce site-specific filtering rules Application Application Modifications Adding Authentication Distributed Circuit gateways operate at (more or less) the TCP layer No application-specific semantics Avoid complexities of packet filters Allow controlled in-bound connections, i.e., for FTP Handle UDP Most common one: SOCKS. Supported by many common applications, such as Firefox and GAIM. Angelos Stavrou (astavrou@gmu.edu) 23 / 36 Angelos Stavrou (astavrou@gmu.edu) 24 / 36

Application Modifications Adding Authentication Application Application Modifications Adding Authentication Distributed Application must be changed to speak the circuit gateway protocol instead of TCP or UDP Easy for open source Socket-compatible circuit gateway libraries have been written for SOCKS use those instead of standard C library to convert application Application Application Modifications Adding Authentication Distributed Because of the circuit (rather than packet) orientation, it s feasible to add authentication Purpose: extrusion control Angelos Stavrou (astavrou@gmu.edu) 25 / 36 Angelos Stavrou (astavrou@gmu.edu) 26 / 36 Personal Application Distributed Personal Distributed Conventional firewalls rely on topological assumptions these are questionable today Instead, install protection on the end system Let it protect itself Application Distributed Personal Distributed Add-on to the main protocol stack The inside is the host itself; everything else is the outside Most act like packet filters Rule set can be set by individual or by administrator Angelos Stavrou (astavrou@gmu.edu) 27 / 36 Angelos Stavrou (astavrou@gmu.edu) 28 / 36

Application Distributed Personal Distributed It s easy to reject protocols you don t like with a personal firewall The hard part is saying yes safely There s no topology all that you have is the sender s IP address Spoofing IP addresses isn t that hard, especially for UDP Application Distributed Personal Distributed Most personal firewalls act on port numbers At least one such firewall is tied to applications individual programs are or are not allowed to talk, locally or globally Pros: don t worry about cryptic port numbers; handle auxiliary ports just fine Cons: application names can be just as cryptic; service applications operate on behalf of some other application Angelos Stavrou (astavrou@gmu.edu) 29 / 36 Angelos Stavrou (astavrou@gmu.edu) 30 / 36 Distributed Application Distributed Personal Distributed In some sense similar to personal firewalls, though with central policy control Use IPsec to distinguish inside from outside Insiders have inside-issued certificates; outsiders don t Only trust other machines with the proper certificate Application Distributed No reliance on topology; insider laptops are protected when traveling; outsider laptops aren t a threat when they visit Angelos Stavrou (astavrou@gmu.edu) 31 / 36 Angelos Stavrou (astavrou@gmu.edu) 32 / 36

Application assume that everyone on the inside is good Application Laptops and smart phones, more or less by definition, are mobile Distributed Obviously, that s not true... Insiders can cause much more damage since there is no control For example, open proxies over encrypted tunnels Distributed When they re outside the firewall, what protects them? Similar problems with all networked devices (over powerlines, blue-tooth) Is there a solution for mobile devices? (Personal firewalls, secure/close all unnecessary services) Angelos Stavrou (astavrou@gmu.edu) 33 / 36 Angelos Stavrou (astavrou@gmu.edu) 34 / 36 Application rely on topology and on static services Application and firewall administrators got too good Distributed If there are too many connections, some will bypass the firewall Sometimes, that s even necessary; it isn t possible to effectively firewall all external partners A large company may have hundreds or even thousands of external links, most of which are unknown to the official networking people Distributed Some applications weren t able to run Vendors started building things that ran over known ports (i.e HTTP) HTTP usually gets through firewalls and even web proxies... Angelos Stavrou (astavrou@gmu.edu) 35 / 36 Angelos Stavrou (astavrou@gmu.edu) 36 / 36