Domain and Type Enforcement Firewalls Karen Oostendorp, Lee Badger, Christopher Vance, Wayne Morrison, Michael Petkac, David Sherman, Daniel Sterne Trusted.

Slides:



Advertisements
Similar presentations
DMZ (De-Militarized Zone)
Advertisements

5-Network Defenses Dr. John P. Abraham Professor UTPA.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Kittiphan Techakittiroj (21/05/58 10:00 น. 21/05/58 10:00 น. 21/05/58 10:00 น.) Firewall Kittiphan Techakittiroj
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Security Firewall Firewall design principle. Firewall Characteristics.
Chapter 11 Firewalls.
Firewall Configuration Strategies
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Firewalls and Intrusion Detection Systems
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Circuit & Application Level Gateways CS-431 Dick Steflik.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 20 Firewalls.
Intranet, Extranet, Firewall. Intranet and Extranet.
FIREWALL Mạng máy tính nâng cao-V1.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
SOCKS Group: Challenger Member: Lichun Zhan. Agenda Introduction SOCKS v4 SOCKS v5 Summary Conclusion References Questions.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 6: Packet Filtering
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
October 15, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint SOEN321-Information-Systems Security Revision.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Proxy Servers.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
5 Firewalls in VoIP Selected Topics in Information Security – Bazara Barry.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Security fundamentals Topic 10 Securing the network perimeter.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
Module 10: Windows Firewall and Caching Fundamentals.
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
1 Chapter 8: DHCP in IP Configuration Designs Designs That Include DHCP Essential DHCP Design Concepts Configuration Protection in DHCP Designs DHCP Design.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Security fundamentals
NAT、DHCP、Firewall、FTP、Proxy
Firewalls Jiang Long Spring 2002.
دیواره ی آتش.
AbbottLink™ - IP Address Overview
Introduction to Network Security
Firewall Installation
Presentation transcript:

Domain and Type Enforcement Firewalls Karen Oostendorp, Lee Badger, Christopher Vance, Wayne Morrison, Michael Petkac, David Sherman, Daniel Sterne Trusted Information Systems Inc. The Annual Computer Security Applications Conference (ACSAC) December, 1997 Presented by Chris Dion

Outline For Tonight Introduction Domain and Type Enforcement review DTE Firewall design and mechanisms Evaluation of DTE firewall security Related work/Future Directions Conclusions

Internet Firewalls Conventional firewalls use simplistic inside vs. outside model Incompatible with business practices that require trust outside the firewall No protection from inside attacks and do not protect sensitive data We need a better way to protect inside networks!

What are DTE’s? An enhanced form of type enforcement (a table- oriented mandatory access control mechanism) Split logically into two categories: –Passive entities: files or network packets Associated with a type –Active entities: processes Associated with a domain, protected user identifier (UID) Access control decisions are made by consulting database to determine access

What are DTE’s? To extend protection across networks, DTE uses 3 attributes (carried in IP option) –The DTE Type of the information –Domain of the source process –DTE-protected User ID of the source process For non-DTE system compatibility, packets are assigned based upon source IP address

DTE Firewall Concept

As with a ‘normal’ firewall, DTE firewall intercepts network traffic between internal/external hosts If end host is DTE: –Passing along communication attributes For non DTE hosts: –Performs access control on behalf of the non- DTE hosts

Controlling Exported Services Non-DTE Attributes assigned by Firewall Determines if Comm. Is allowed Specific to the protocol

Proxy Algorithm 1.Extract Client Attributes Attributes are available in each IP message 2.Optionally Authenticate If non-DTE, uses configured method If DTE, may trust UID 3.Connect to Server 4.Pass Data and DTE attributes bidirectional May choose to block data based upon attributes

Controlling Imported Services Relays DTE attributes 1.) Prevents attack on client 2.) labels data with trust identifier

Network Services Evaluation Evaluation of several network services running through a DTE firewall: –rlogin –TELNET –Mail –FTP –NFS –HTTP Evaluation criteria considered: –Security –Preservation of functionality –Compatibility with non-DTE hosts –Performance

Security Evaluation Effectiveness of attacks is reduced if programs execute with the minimum access rights required Three primary areas where program auth. are reduced by DTE: –Confined proxies in a separate domain for each –Protected servers on the firewall Services can run on DTE firewall safely because of access rights –Defense in depth Prevent clients from tricking interior services into access

Functionality Evaluation For Importing services, functionality is rarely affected –User authentication can be supplied by the client DTE system For Exported services functionality increases –No longer have to run server outside firewall –Can run behind firewall with the additional security of running a server in a domain restricted according to trust level

Compatibility Evaluation Can operate either with DTE or non-DTE systems Few changes to applications to function with DTE firewalls, with the exception of the NFS server (kernel-resident in UNIX) Some services required administrative configuration –NFS clients must explicitly name the firewall host as the server whose file systems behind firewall

Performance Evaluation Testbed setup: –3 Pentium 166Mhz machines on isolated net –Running BSD/OS 2.0 with DTE prototype –Configuration is a triple (client, firewall, server) (n,y,n) indicates firewall running DTE, client and server are non-DTE

Performance Evaluation For rlogin, TELNET, and FTP, use Expect script to authenticate a pass traffic (20 iterations) –Performance was at worst 13% degradation –Actually better when client running DTE, which passes UID instead of authentication (except for FTP, which has its own) For HTTP, used ZeusBench which connects, retrieves web page, and disconnects –Approx. 50% slower in worst case due to a low- performance implementation of DTE

Raw Performance in Seconds

NFS Performance Used two widely known benchmark packages (Iozone and NFSstones) Performance of writes moderately affected Reads dominate NFS performance, with a slowdown of 38% max. Largely due to dual domain combination and manipulation of additional file handles

NFS Test Results Larger numbers indicate better performance

Related Work 3 types of firewalls –Packet-filtering –Circuit gateway (force TCP connections to go through intermediary) –Application gateway (per-protocol basis) DTE can be added to all three, but incorporated into application gateways because of the protocol interaction Type enforcement is implemented on a number of systems, such as DTOS, XENIX, and Secure Ada Target

Future Directions This paper address first-phase: manually- administered DTE firewall Second phase is to allow dynamic updates to DTE modules and support interactions between non-identical policies Third phase will allow for a central administration of security policies

Conclusions Firewall perimeter security is relatively weak DTE supports role-based policies that relate resource access to individual responsibilities Showed functionality stayed the same (and increased for NFS), with performance hits that can be eliminated through optimization techniques Administrative costs are still an open issue