University of WashingtonComputing & Communications Firewalls for Open Networks Terry Gray Director, Networks & Distributed Computing University of Washington.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
VLANs Virtual LANs CIS 278.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Firewalls & VPNs Terry Gray UW Computing & Communications 13 September 2000.
Firewalling Techniques Prabhaker Mateti. ACK Not linux specific Not linux specific Some figures are from 3com Some figures are from 3com.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Firewall Configuration Strategies
Network Insecurity: challenging conventional wisdom Terry Gray UW Computing & Communications 10 October 2000.
University of WashingtonComputing & Communications Open Network Security or “closed network” insecurity? Terry Gray Director, Networks & Distributed Computing.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
University of WashingtonComputing & Communications Firewalls for Open Networks Terry Gray Director, Networks & Distributed Computing University of Washington.
University of WashingtonComputing & Communications Network Insecurity: challenging conventional wisdom Terry Gray Director, Networks & Distributed Computing.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Internet Protocol Security (IPSec)
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Firewalls and the Campus Grid: an Overview Bruce Beckles University of Cambridge Computing Service.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Address Translation (NAT)
Computer Networking Part 1 CS 1 Rick Graziani Cabrillo College Fall 2005.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
October 15, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint SOEN321-Information-Systems Security Revision.
Honeypot and Intrusion Detection System
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Internet and Intranet Fundamentals Class 9 Session A.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Thoughts on Firewalls: Topologies, Application Impact, Network Management, Tech Support and more Deke Kassabian, April 2007.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
CPT 123 Internet Skills Class Notes Internet Security Session A.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
COEN 350 Network Defense in Depth Firewalls. Terms of the Trade Border Router First / last router under control of system administration. DMZ Demilitarized.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Critical Security Controls
ETHANE: TAKING CONTROL OF THE ENTERPRISE
Network Security Marshall Leitem 11/30/04
Firewalls Routers, Switches, Hubs VPNs
6. Application Software Security
Network Security in Academia: an Oxymoron?
Presentation transcript:

University of WashingtonComputing & Communications Firewalls for Open Networks Terry Gray Director, Networks & Distributed Computing University of Washington 08 May 2002

University of WashingtonComputing & Communications Conventional Security Wisdom Popular Myth: “The network” caused the problem, so “the network” should solve it: –Border firewalls and border VPNs will save us! Unpopular Reality: In a large, diverse enterprise such as UW, security is not achieved by either one.

University of WashingtonComputing & Communications Gray’s Network Security Axioms Network security is maximized… when we assume there is no such thing. Firewalls are such a good idea… every host should have one. Seriously. Remote access is fraught with peril… just like local access.

University of WashingtonComputing & Communications Perimeter Protection Paradox Firewall value is proportional to number of systems protected. Firewall effectiveness is inversely proportional to number of systems protected. –Probability of compromised systems existing inside –Lowest-common-denominator blocking policy

University of WashingtonComputing & Communications Credo Open networks* Closed servers Protected sessions *With one exception: DDOS attacks require network-level blocking

University of WashingtonComputing & Communications “Inverted Networks” New trend in big companies (e.g. DuPont) Ditch the border firewall Assume LANs are “dirty” Use VPNs from each workstation to servers Hey, an open network, with closed servers and E2E encryption! Why didn’t we think of that? :)

University of WashingtonComputing & Communications Heroic (but futile) Endeavors Getting anyone to focus on policies first Getting any consensus on border blocking Patching old end-systems Pretending that clients are only clients Securing access to older network gear

University of WashingtonComputing & Communications Properties of ALL Firewalls  Inserted between UN-trusted (outside) and trusted (inside) nets  "All" traffic between inside and outside flows through them  The more restrictive the rules, the more protection offered  If rules are too restrictive, users may bypass them  Increase complexity, complicate debugging  No protection between hosts on trusted (inside) network  Little protection from attacks against permitted services  Your vulnerability is proportional to both the number of hostile hosts able to connect and the number of vulnerable servers to connect to.  Firewalls improve security primarily by reducing the number of hosts able to connect. You still need to reduce the number of vulnerable servers by applying patches

University of WashingtonComputing & Communications Where do firewalls make sense? Pervasively: (But of course we have a firewall…:) –For blocking spoofed source addresses Small perimeter/edge: –Cluster firewalls, e.g. server sanctuaries, labs –OS-based and Personal firewalls Large perimeter/border: –Maybe to block an immediate attack? –Maybe if there is widespread consensus to block certain ports? (Aye, and there’s the rub…) –And then again, maybe not...

University of WashingtonComputing & Communications Good Uses for a Firewall  Reducing exposure of vulnerable services on hosts you can't patch because they are:  Certified by the FDA for only one particular revision of software;  Old and no longer supported by the vendor;  Devices with code in ROM, such as a printer or terminal server;  Embedded in a device with a service contract where the service technician routinely wipes out any custom configuration  Protecting a new computer or service while you bring it up (even if you don't intend it to be firewalled in production).  Preventing the spread of worms and exploitation of back-doors.  As insurance against misconfigured hosts (defense in depth).  Explicitly blocking specific troublesome traffic.  Meeting due-diligence security requirements.  Limiting access to network-attached printers and devices.

University of WashingtonComputing & Communications Fundamental Firewall Truths... Bad guys aren’t always "outside" the moat One person’s security perimeter is another’s broken network Organization boundaries and filtering requirements constantly change Perimeter defenses always have holes

University of WashingtonComputing & Communications The Dark Side of Border Firewalls It’s not just that they don’t solve the problem very well; large-perimeter firewalls have serious unintended consequences Operational consequences –Force artificial mapping between biz and net perimeters –Catch 22: more port blocking -> more port 80 tunneling –Cost more than you think to manage; MTTR goes up –May inhibit legitimate activities –May be a performance bottleneck Organizational consequences –Give a false sense of security –Encourage backdoors –Separate policy configuration from best policy makers –Increase tensions between security, network, and sys admins

University of WashingtonComputing & Communications Mitnick’s Perspective "It's naive to assume that just installing a firewall is going to protect you from all potential security threats. That assumption creates a false sense of security, and having a false sense of security is worse than having no security at all." Kevin Mitnick eWeek 28 Sep 00

University of WashingtonComputing & Communications Do You Feel Lucky? QUESTION: If a restrictive border firewall surrounds your --and 50,000 other-- computers, should you feel safe? ANSWER: Only if you regularly win the lottery!

University of WashingtonComputing & Communications Distributed Firewall Management Given the credo of: –Open networks –Closed servers –Protected sessions What about all the desktops? –Organizations that can tolerate a restrictive border firewall usually centrally manage desktops –Thus, they can also centrally configure policy- based packet filters on each desktop and don’t need to suffer the problems of border firewalls –Centrally managing desktop firewalls possible even if desktops generally unmanaged

University of WashingtonComputing & Communications UW’s Logical Firewall A response to pressure for dept’l firewalls in our communication closets Plugs into any network port Departmentally managed Opt-in deployment Doesn’t interfere with network management Uses Network Address Translation (NAT) Intended for servers; can be used for clients Web-based rules generator Gibraltar Linux foundation

University of WashingtonComputing & Communications UW Logical Firewall - How it Works  Ethernet allows two completely separate subnets to share a single wire.  As per RFC 1918, our campus routers block all 10.x.y.z traffic.  LFW clients are given 10.x.y.z unroutable network addresses.  By changing just the first octet to 10, address allocation becomes trivial.  Firewalled hosts can talk directly only to each other or their LFW.  LFW does Network Address Translation (NAT) for every packet in/out. Note that the LFW is not physically between the outside network and protected hosts but all traffic between the outside network and protected hosts must go through it.

University of WashingtonComputing & Communications LFW Traffic Flow

University of WashingtonComputing & Communications LFW Advantages No re-wiring necessary Opt-in (easy to add/remove clients) Firewalls (plural) can live anywhere on the subnet Can have different administrators or policies, etc. Does not interfere with managing network infrastructure Software is available for free Requires only a PC with floppy, NIC and CDROM (no hard drive, keyboard, mouse, monitor) Use your favorite linux or use "Gibraltar" (boots & runs from CDROM) Web-based firewall rule-generator supports hand-crafting rules too Stateful firewall rules (more expressive and simpler to write) Remotely and securely manageable (via SSH login) Supports IPSEC tunneling between subnets

University of WashingtonComputing & Communications LFW Disadvantages Potentially more vulnerable from hacked un-firewalled box on subnet A hacked box might be able to sniff traffic from the 10.x.y.z net A skillful intruder might be able to configure a 10.x.y.z virtual interface But this added threat is only from hosts on your own subnet You're always more vulnerable to arp-spoofing, IP spoofing and hijacking attacks from your subnet anyway. Traffic through firewall (off subnet) travels your switch twice --unless you use a second NIC and rewire (which _is_ supported) With a full-duplex switched network connection, this may not reduce throughput significantly Clients must be re-configured with a new IP address A few protocols don't NAT well (or at all) Public and private IP addrs on one wire makes DHCP difficult

University of WashingtonComputing & Communications LFW - Setup Overview Download the "Gibraltar" CDROM image and burn it onto a CDROM Boot the Gibraltar CDROM Copy "uw-setup" script to a floppy, run it on Gibraltar, answer questions Visit LFW "Rule Generator" webpage to specify firewall rules and clients SSH into Gibraltar, copy/paste output of "Rule Generator" into Gibraltar Save configuration to floppy Once you have the CDROM, the remaining steps take under 5 minutes More detail at the LFW homepage:

University of WashingtonComputing & Communications LFW Results Largest installation: Appled Physics Lab –5 LFWs on 5 subnets –219 protected clients –IPSEC tunnels between them Publication Svcs: LFW protects hi-end printers FTP performance: 7.1MB/s vs. 8.6MB/s without Local policy-making a big win: minimizes admin distance between policy definition and policy enforcement.

University of WashingtonComputing & Communications Is it enough? Hard to find anyone who believes all end- systems can be properly managed/secured Server sanctuaries, centrally-managed personal firewalls, logical-firewalls… are they enough? Do we need a dual-policy network? What about DDOS attacks?

University of WashingtonComputing & Communications Resources Thanks to Corey Satten for several of the LFW slides used in this presentation.