23
Perimeter Defenses: Filters and Firewalls Lesson 17

Perimeter Defenses: Filters and Firewalls Lesson 17

Embed Size (px)

Citation preview

Page 1: Perimeter Defenses: Filters and Firewalls Lesson 17

Perimeter Defenses:Filters and Firewalls

Lesson 17

Page 2: Perimeter Defenses: Filters and Firewalls Lesson 17

Filters and Firewalls

• Filter -- a software program or device that monitors incoming and outgoing packets on a computer network to determine whether the packets should be allowed to enter or leave a computer system.

• Firewall -- a network monitor or collection of monitors placed between an organization’s internal network and the Internet or between two local area networks.

Page 3: Perimeter Defenses: Filters and Firewalls Lesson 17

Junk E-Mail Filters

• Some ISP’s attempt to filter junk email• extra load it places on servers

• annoyance factor

• Attempts to eliminate junk e-mail• Check “From” field or IP address for known spammers

• Check to see if it originated from mail delivery agent frequently used by spammers

• All approaches potentially eliminate valid (non-spam) email

Page 4: Perimeter Defenses: Filters and Firewalls Lesson 17

Junk e-mail filters

• Bright Light Technologies developed SW that• Seeds Internet with 1000’s of email addresses• Addresses picked up by spammer bots• Messages sent to these addresses sent to Bright Light

which then develops filter for it.

• ISPs that allow spammers to use their site can find all mail originating from it (valid or spam) blocked in response.• UUNet and Compuserve both had this happen to them.

Page 5: Perimeter Defenses: Filters and Firewalls Lesson 17

Issues with spam filtering• Add to the issue the error rate:

• A study showed that• Brightmail, a for-profit blacklisting and filtering service blocks 94% of

spam with 1% false positives.• MAPS was found to block 24% of spam with 34% false positives.

• Also consider the following from Julian Haight, founder of SpamCop• “We list you immediately, and then we can talk about it.”• They receive 50,000 complaints/day.

• What is the implications in terms of a potential for a DoS attack?

Page 6: Perimeter Defenses: Filters and Firewalls Lesson 17

Web Filtering

• Used to “prevent certain materials from entering into a system while users are browsing the Web.”

• Often offered as an alternative to legislative actions such as the Communications Decency Act.• Filtering at the receiving end does not inhibit free speech

• The problem is that the filters are not completely accurate• numerous reports of “inappropriate” material not being

filtered or valid info being blocked

Page 7: Perimeter Defenses: Filters and Firewalls Lesson 17

Web Filtering• Net Shepherd Family Search filter returned only 1% of sites

returned by non-filtered search using Alta Vista -- even though search was on items such as “American Red Cross”, “Thomas Edison”, and “National Aquarium”.

• One university’s filtering blocked the Edupage newsletter because of the sentence:• “The new bill is more narrowly focused than the CDA, and is targeted

strictly at impeding the flow of commercial pornography on the World Wide Web.”

• Cybersitter blocked sites for National Organization for Women, Godiva chocolates, and the teen website Peacefire.

• Cyber Patrol allowed 6 of the first 16 sites listed on Yahoo’s category “Sex: Virtual Clubs”

Page 8: Perimeter Defenses: Filters and Firewalls Lesson 17

Web Filtering

• World Wide Web Consortium approach to filtering based on assigned labels and ratings and is called the Platform for Internet Content Selection (PICS)• does not dictate labels, instead allows groups to establish their

own.

• European Commission proposed a similar rating scheme. Governments could develop site-rating systems and SW provided that would allow teachers and parents to filter unwanted info.

• Another proposal is an adult only domain

Page 9: Perimeter Defenses: Filters and Firewalls Lesson 17

Firewalls

• Purpose of a firewall is to provide a shell around the network to protect it from “outside” threats.

• Types of threats a firewall addresses:• Filter inherently insecure network services

• Unauthorized access to network resources

• Denial of service

• Masquerading

Page 10: Perimeter Defenses: Filters and Firewalls Lesson 17

Firewalls

• Three Basic Techniques• Packet Filtering -- decide to allow or reject specific packets as they enter your network

• Stateful Packet filtering – keep track of sessions and connections– Stateful Inspection – looks at contents of packet not just header

• Circuit Level Gateway -- simply relays bytes from a port on one system to another on an external network.

• Connection appears to originate from firewall and not internal system– Prevents direct connection between internal and external systems, but…– Packets are not filtered/checked

• Application Level Gateway -- also known as proxy gateways, used to forward service-specific traffic (e.g. email).

• Proxies act as a middleman preventing direct connection, the proxy will take the request and, if allowed by the policy, will forward it.

• Proxy ‘understands’ the service and can make better filtering decisions (thus theoretically more secure) but this process is less flexible and more time consuming

Page 11: Perimeter Defenses: Filters and Firewalls Lesson 17

Packet FilteringOperation source port destination port typediscard bad.host * * * *allow our.host 25 * * *discard 128.236.*.* >1023 our.host >1023 tcp

Operation source port destination port typeallow bad.host 25 our.host 25 *discard bad.host * * * *allow our.host 25 * * *discard 128.236.*.* >1023 our.host >1023 tcpallow * * * * *

Page 12: Perimeter Defenses: Filters and Firewalls Lesson 17

Firewall Architectures

Internet

Screening Router

Page 13: Perimeter Defenses: Filters and Firewalls Lesson 17

Firewall Architectures

Internet

Dual-homed host Architecture

Dual-homed host

Page 14: Perimeter Defenses: Filters and Firewalls Lesson 17

Firewall Architectures

Internet

X

Screened host Architecture

Bastion Host

Screening Router

Page 15: Perimeter Defenses: Filters and Firewalls Lesson 17

Bastion Hosts

• A specially ‘armored’ and protected host.• May run special ‘secure’ or ‘stripped down’

version of OS

• Only essential services are run on it.

• User accounts generally not permitted (admin only)

• Machines inside of the firewall should not trust the Bastion Host.

Page 16: Perimeter Defenses: Filters and Firewalls Lesson 17

Firewall Architectures

Internet

Screened subnet Architecture

Internal Network

Perimeter Network

Exterior Router

Interior Router

Bastion host

Page 17: Perimeter Defenses: Filters and Firewalls Lesson 17

So, what’s the difference between them?Screening router

very primitive, just a souped up routerDual-homed host (firewall)

Routing function turned off, external systems can’t communicate directly with internal systems!

Provides services through proxiesScreened Host

router provides routing and packet filtering functionsBastion provides single system to heavily secure.

Screened subnetno defenses between bastion and other systems in screened host firewall,

thus if bastion compromised, the internal network is vulnerable.Screened subnet adds another router to add another layer of protection.

This router can be configured to only allow certain services.

Page 18: Perimeter Defenses: Filters and Firewalls Lesson 17

Firewall Architectures

Internet

Bastion host

Multiple Exterior Routers

Interior Router

Internal Network

Perimeter Network

Exterior Router

Supplier Network

Exterior Router

Lab Network

Page 19: Perimeter Defenses: Filters and Firewalls Lesson 17

Checkpoint Firewall Sample Rule Set

Page 20: Perimeter Defenses: Filters and Firewalls Lesson 17

Cisco System PIX Firewall

Page 21: Perimeter Defenses: Filters and Firewalls Lesson 17

Choosing a Firewall• Determine the trust relationships and communication

paths in your organization.• What capacity do you need – can the firewall handle

the throughput?• Does the firewall have the features you desire.• What is the interface like – you have to live with using

it…• Price• Reputation of the company, especially in terms of their

responsiveness to product vulnerabilities.

Page 22: Perimeter Defenses: Filters and Firewalls Lesson 17

Network Address Translation (NAT)

• Firewalls can also provide NAT services

• Allows a LAN to use one set of addresses for internal purposes and a second set for external traffic• Not all systems need a globally unique IP address

• Saves on IP addresses which is a concern for IPv4

• Shields internal addresses from public view

Page 23: Perimeter Defenses: Filters and Firewalls Lesson 17

Network Address Translation (NAT)

• There are a limited number of IP addresses available and not every system needs one.

• NAT was developed to provide a means to translate private IP addresses into public IP addresses.– A device (typically a router or firewall) will accomplish this translation

process.

Source: 10.1.1.123Destination: 207.25.71.23

Source: 63.69.110.110Destination: 207.25.71.23

Source: 207.25.71.23 Destination: 10.1.1.123

Source: 207.25.71.23 Destination: 63.69.110.110

Firewall performs NAT