Mar, 8th 2005 Arguments creating a FIG WG within GGF 1 Arguments creating a Firewalls Issues Group within GGF Ralph Niederberger.

Slides:



Advertisements
Similar presentations
SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
Advertisements

Oct, 26 th, 2010 OGF 29, FVGA-WG: Firewall Virtualization for Grid Applications Firewall Virtualization for Grid Applications - Status update
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Chapter 1 Read (again) chapter 1.
Internet Protocol Security (IPSec)
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Abstraction and Control of Transport Networks (ACTN) BoF
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Course 201 – Administration, Content Inspection and SSL VPN
Additional SugarCRM details for complete, functional, and portable deployment.
Data Communications and Networks
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Intranet, Extranet, Firewall. Intranet and Extranet.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Chapter 6: Packet Filtering
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Common Devices Used In Computer Networks
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network Firewall Technologies By: David W Chadwick Implementing a Distributed Firewall By: Sotiris Ioannidis Angelos D. Keromytis Steve M. Bellovin Jonathan.
Defense Techniques Sepehr Sadra Tehran Co. Ltd. Ali Shayan November 2008.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
COEN 350 Network Defense in Depth Firewalls. Terms of the Trade Border Router First / last router under control of system administration. DMZ Demilitarized.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
1 Revision to DOE proposal Resource Optimization in Hybrid Core Networks with 100G Links Original submission: April 30, 2009 Date: May 4, 2009 PI: Malathi.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
GGF 17 - May, 11th 2006 FI-RG: Firewall Issues Overview Document update and discussion The “Firewall Issues Overview” document.
S ECURITY APPLIANCES Module 2 Unit 2. S ECURE NETWORK TOPOLOGIES A topology is a description of how a computer network is physically or logically organized.
Multi-layer software defined networking in GÉANT
Grid Optical Burst Switched Networks
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Implementing TMG Server Publishing
Chapter 5: Inter-VLAN Routing
NET323 D: Network Protocols
* Essential Network Security Book Slides.
I. Basic Network Concepts
Firewalls Purpose of a Firewall Characteristic of a firewall
IS4680 Security Auditing for Compliance
NET323 D: Network Protocols
Firewalls Routers, Switches, Hubs VPNs
دیواره ی آتش.
Introduction to Network Security
Delivery, Forwarding, and Routing of IP Packets
Cengage Learning: Computer Networking from LANs to WANs
Presentation transcript:

Mar, 8th 2005 Arguments creating a FIG WG within GGF 1 Arguments creating a Firewalls Issues Group within GGF Ralph Niederberger Research Center Jülich Jülich, Germany Mar, 8th 2005 Arguments creating a FIG WG within GGF Presentation for GGF13, Seoul, Korea, March, 13th 2005

Mar, 8th 2005 Arguments creating a FIG WG within GGF 2 Grid projects and its implications Grid-Projects with external partners often lead to communication relationships between external and internal computer systems requiring special configurations at firewall systems This implies –Allowing access for communication sessions (ports) –Allowing access to single systems or sub networks in general –Allowing access via physical or logical links as fiber, wavelength, sub wavelength This results in –administrative overhead –wildcard access rights (port not known, so give access to whole system) –softening of security policies (weaker policies, no security policies anymore) –general decreasing security level to that of the partner installation –security vulnerability because of open ports for long time periods

Mar, 8th 2005 Arguments creating a FIG WG within GGF 3 Todays firewalls –are limited to 1 Gb/s throughput often, some already allow 10 Gb/s –Often load balancing of multiple firewalls is done based on IP or MAC-address balancing, i.e one stream will be executed by one firewall giving real balancing only with multiple communication streams. Grid applications with huge bandwidth demands do not have any advantage of these firewalls. –Some firewall clusters allow round robbin mechanisms, but are limited to lower speeds because of the extreme overhead needed for status information updates between the different firewall components –Only a small amount of firewall systems is able to handle applications with dynamically assigned ports –Some implementations are known for applications like ftp, h.323, sip –But no general solution is available

Mar, 8th 2005 Arguments creating a FIG WG within GGF 4 Projects today –Every installation has its own firewall –Project networks are placed in a demilitarized zone mostly –Every computer system used in the project has to be secured –Bad or wrong configured systems lead to security vulnerabilities –Supercomputers or special systems are connected via dedicated networks –Assuming “Net of Trust”, i.e. users at these systems will be trusted leading to insider security problem –Compromise of these systems leads to increased security problems –Access lists for ports, systems, networks have to be configured manually which implies additional overhead

Mar, 8th 2005 Arguments creating a FIG WG within GGF 5 Projects at Research Center Jülich and firewall implications Research Center Jülich involved in many national & international projects DEISA - deploying and operate a persistent, production quality, distributed supercomputing environment,  currently using dedicated network (only router ACLs) VIOLA - set up an optical test bed with fibers connecting the project partners in Germany, used to test advanced network equipment and architectures, to develop software for user-driven dynamical provisioning of bandwidth and Quality of Service, and to develop and enhance advanced Grid- and distributed visualisation applications and Grid-middleware.  currently using “net of trust model” (cluster machines in DMZ separated from local installation networks) Other grid projects at Research Center Jülich UNICORE, UNICORE Plus, EUROGRID, GRIP, OpenMolDRID, PAB, GRIDSTART, GRIDWELTEN, UniGrids, NextGrid, CoreGRID, GRANDE, GARDEN  see

Mar, 8th 2005 Arguments creating a FIG WG within GGF 6 Some new FW activities launched –D-Grid (German project to be funded by BMBF) work package: AP 7 - Design and deployment of firewall concepts within grid environments (Performance and dynamic configuration) –EGEE (European Project funded by EU) Service Activity 1, –MIDCOM (IETF): & –OPSEC (CheckPoint): –ACDC-Grid Firewall „Advanced Computational Data Center Dynamic Firewall (ACDC Dyna- Fire) Development“ –Many other activities are on the way

Mar, 8th 2005 Arguments creating a FIG WG within GGF 7 Firewall definition and short history Definition of the term Firewall A firewall is the implementation of a security policy of an institution concerning traffic exchange between different security domains. It is no black box or single hardware It can be much more. It is all the rules you specify, to become safe. It is the way you check the compliance with these rules. It is the whole bunch of software and hardware you use to implement this.

Mar, 8th 2005 Arguments creating a FIG WG within GGF 8 Short history of firewalls –TIS (Trusted Information Systems) firewall toolkit released in 1995 (application firewall) –later on firewalls as packet screens, looking into each packet –firewall als statefull inspection engine –knowing about TCP sessions (streams) –defining UDP Streams as „sessions“ (Timeout managed) –extension to „application aware protocols“ -> http, ftp,..., –allowing to accept streams with unknown ports (dynamic access) –allowing to check, if stream really a http-stream or e.g. a tunneled music download –tendencies are going back to application level firewalls

Mar, 8th 2005 Arguments creating a FIG WG within GGF 9 Always growing bandwidth of networks requires a reconsidering of techniques Checking every single packet not possible anymore Firewalls cannot be faster as normal network interfaces, so new ideas have to be found Instead of single packets streams could be checked Many connections will be allowed without checking the content of the connection. The connection will be allowed because of the fact that an instance, the destination system, checked the authorization. Examples are: ssh traffic into local networks, IPSec connections between local and remote machines There are no high performance firewalls to secure fiber links with 32, 64, 128 wavelength with 10 Gb/s throughput each? New firewall demands

Mar, 8th 2005 Arguments creating a FIG WG within GGF 10 New ideas Why should we not allow the switching of paths, virtual paths, real paths, fiberlinks, wavelengths, … We do not know for why an IPsec connection has been initiated. –It could be a host-to-host link –It could be a net-to-host link –It could be a net-to-net link –It could be an unwanted tunneled connection violating the security policy Authorization checking will be performed by the application: –Trusting the IPsec connection –Trust in UID/Password mapping / checking –Trust in checking of certificates

Mar, 8th 2005 Arguments creating a FIG WG within GGF 11 What do we need We need a authorization protocol that checks authorization of inquiries and instructs an entity –to allow or deny traffic, –to switch (switch off) light paths and We need the implementation of this authorization protocol –into a firewall concept (policies, software and hardware) To allow network elements to switch paths after being instructed by an authorized instance

Mar, 8th 2005 Arguments creating a FIG WG within GGF 12 To become precise An authorization protocol has to be defined and standardized, which checks the authorization of a client (e.g. the grid application, the user, …) if it has the right permission to request the use or creation of a communication path. If the authorization has been granted the router, cross connect, … has to be informed / instructed to create the requested connection entity

Mar, 8th 2005 Arguments creating a FIG WG within GGF 13 The firewall issue A firewall can be divided into –Authorization check instance and –Routing / switching instance The authorization check instance corresponds to the access rules, statically authourized and configured by the firewall administrator The forwarding instance is the executing part of the firewall, the router part, which routes the packets to the destination after checks have been done, or it is the cross connect which switches paths and switches them off after transaction

Mar, 8th 2005 Arguments creating a FIG WG within GGF 14 Abstraction The authorization check instance is a server which checks authorization –may the application use the port –may the system A communicate with system B –may the protocol (e.g. ssh to inside) be used without checking the contents of the connection –May the wavelength be switched from site A to side B The forwarding instance will be the executing instrument, the networking hardware –It’s the firewall in the classical view having checked the access lists authorized (and configured) by the administrator and now forwarding or denying the packet –It’s the router, changing routing tables –It’s the cross connect switching virtual or real optical paths

Mar, 8th 2005 Arguments creating a FIG WG within GGF 15 Tasks to be done by FIG –Checking which protocols, procedures, mechanisms are available already –Evaluating, which of these can be used to reach the defined goals –Definition of the new protocols, datastructures and security mechanisms –(Implementing a prototype) Strategic objectives will be to define a standardized authorization mechanism accepted and implemented by firewall vendors into their systems so that grid enabled firewalls will become reality.