firewalls by m. singhal (original notes by henric johnson):

50
Henric Johnson 1 Chapter 10 Chapter 10 Firewalls Firewalls //Modified by Prof. M. Singhal// Blekinge Institute of Technology, Sweden http://www.its.bth.se/staff/hjo/ +46-708-250375

Upload: sandra4211

Post on 08-Jun-2015

757 views

Category:

Documents


13 download

TRANSCRIPT

Page 1: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 1

Chapter 10Chapter 10

FirewallsFirewalls

//Modified by Prof. M. Singhal//

Blekinge Institute of Technology, Sweden

http://www.its.bth.se/staff/hjo/

+46-708-250375

Page 2: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 2

OutlineOutline

• Firewall Design Principles– Firewall Characteristics– Types of Firewalls– Firewall Configurations

• Trusted Systems– Data Access Control– The Concept of Trusted systems– Trojan Horse Defense

Page 3: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 3

FirewallsFirewalls

• Effective means of protecting a local system or network of systems from network-based security threats while affording access to the outside world via a WAN or the Internet.

Threat:>While Internet provides benefits to

organizations, it exposes the organizations’ systems to the outside world.

Page 4: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 4

Firewall DesignFirewall DesignPrinciplesPrinciples

• Information systems undergo a steady evolution (from small LAN`s to Internet connectivity)

• Strong security features (like intrusion protection) for all workstations and servers is not a practical approach.

• Firewall is a popular approach to protect the assets.

Page 5: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 5

Firewall DesignFirewall DesignPrinciplesPrinciples

• The firewall is inserted between the premises network and the Internet.

• Aims:– Establish a controlled link– Protect the premises network from

Internet-based attacks– Provide a single choke point. (to keep

the unauthorized users out of the protected network.)

Page 6: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 6

Firewall CharacteristicsFirewall Characteristics• Design goals:

– All traffic from inside to outside and outside to inside must pass through the firewall (physically blocking all access to the local network except via the firewall)

– Only authorized traffic (defined by the local security policy) will be allowed to pass

– The firewall itself is immune to penetration

Page 7: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 7

Firewall CharacteristicsFirewall CharacteristicsFour general techniques to control access:• Service control

– Determines the types of Internet services that can be accessed, inbound or outbound

• Direction control– Determines the direction in which particular

service requests are allowed to flow

Page 8: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 8

Firewall CharacteristicsFirewall Characteristics

• User control– Controls access to a service according

to which user is attempting to access it

• Behavior control– Controls how particular services are

used (e.g., it may enable external access to only a portion of local information).

Page 9: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 9

Types of FirewallsTypes of Firewalls

• Four common types of Firewalls:– Packet-filtering routers– Application-level gateways– Circuit-level gateways– Bastion hosts.

Page 10: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 10

Types of FirewallsTypes of Firewalls

• Packet-filtering Router

Page 11: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 11

Types of FirewallsTypes of Firewalls

• Packet-filtering Router– Applies a set of rules to each incoming IP

packet and then forwards or discards the packet.

– Filters packets going in both directions.– The packet filter is typically set up as a list

of rules based on matches to fields in the IP or TCP header.

– Two default policies (discard or forward).

Page 12: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 12

Types of FirewallsTypes of Firewalls

• Advantages:– Simplicity– Transparency to users– High speed

• Disadvantages:– Difficulty of setting up packet filter rules– Lack of Authentication (IP spoofing

attacks possible).

Page 13: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 13

Types of FirewallsTypes of Firewalls• Possible attacks and appropriate

countermeasures1. IP address spoofing

//discard outside packets that contain an inside source address.//

2. Source routing attacks>Source specifies a route that a packet

should take.>May bypass security measures.>Discard all packets with this option.

Page 14: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 14

Types of FirewallsTypes of Firewalls• Possible attacks and appropriate

countermeasures.3. Tiny Fragment attacks:

>Intruder uses IP fragmentation option to create extremely small fragments.

>Forces TCP header information into a separate packet fragment.

>Only the first fragment will be examined by the filtering router.

>> Discard all such packets.

Page 15: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 15

Types of FirewallsTypes of Firewalls

• Application-level Gateway

Page 16: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 16

Types of FirewallsTypes of Firewalls

• Application-level Gateway– Also called proxy server– Acts as a relay of application-level

traffic

Page 17: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 17

Types of FirewallsTypes of Firewalls

• Advantages:– Higher security than packet filters– Only need to scrutinize a few allowable

applications– Easy to log and audit all incoming traffic

• Disadvantages:– Additional processing overhead on each

connection (gateway as splice point)

Page 18: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 18

Types of FirewallsTypes of Firewalls

• Circuit-level Gateway

Page 19: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 19

Types of FirewallsTypes of Firewalls

• Circuit-level Gateway– Does not permit an end-to-end TCP

connection.– Sets up two TCP connections >One between itself and inner TCP

user. >Second between itself and outside

TCP host.– The gateway typically relays TCP

segments from one connection to the other without examining the contents

Page 20: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 20

Types of FirewallsTypes of Firewalls

• Circuit-level Gateway– The security function consists of

determining which connections will be allowed

– Typically use is a situation in which the system administrator trusts the internal users.

//low processing overheads.//

Page 21: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 21

Types of FirewallsTypes of Firewalls

• Bastion Host– A system identified by the firewall

administrator as a critical strong point in the network´s security

– The bastion host serves as a platform for an application-level or circuit-level gateway

Page 22: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 22

Firewall ConfigurationsFirewall Configurations

• In addition to the use of simple configuration of a single system (single packet filtering router or single gateway), more complex configurations are possible.

• Three common configurations.

Page 23: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 23

Firewall ConfigurationsFirewall Configurations

• Screened host firewall system (single-homed bastion host)

Page 24: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 24

Firewall ConfigurationsFirewall ConfigurationsFirewall consists of two systems:

– A packet-filtering router– A bastion host>Only packets from and to the bastion host

are allowed to pass through the router.-From Internet, only IP packets destined for

the bastion host are allowed.-From internal network, only IP packets

from bastion host are allowed out.

Page 25: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 25

Firewall ConfigurationsFirewall Configurations

• Greater security than single configurations because of two reasons:– This configuration implements both

packet-level and application-level filtering (allowing for flexibility in defining security policy).

– An intruder must generally penetrate two separate systems.

Page 26: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 26

Firewall Configurations

• Provides flexibility in having direct access from Internet.

• Internal network may include an information server for which tighter security is not required (like a Web server).

• The router can allow direct traffic between the Internet and the information server.

Page 27: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 27

Firewall ConfigurationsFirewall Configurations

• Screened host firewall system (dual-homed bastion host)

Page 28: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 28

Firewall ConfigurationsFirewall Configurations

– Traffic between the Internet and other hosts on the private network has to flow through the bastion host.

– If the packet-filtering router is completely compromised, traffic will not flow freely between Internet and protected network.

Page 29: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 29

Firewall ConfigurationsFirewall Configurations

• Screened-subnet firewall system

Page 30: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 30

Firewall ConfigurationsFirewall Configurations

>Most secure configuration of the three.

>Two packet-filtering routers are used.

>Creation of an isolated sub-network.

Page 31: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 31

Firewall ConfigurationsFirewall Configurations

• Advantages:– Three levels of defense to thwart intruders.– The outside router advertises only the

existence of the screened subnet to the Internet (internal network is invisible to the Internet)

– Inside router advertises only the existence of the screened subnet to the internal network.

(an inside host can not construct direct route to the Internet.)

Page 32: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 32

Trusted SystemsTrusted Systems

• One way to enhance the ability of a system to defend against intruders and malicious programs is to “implement trusted system technology”.

Page 33: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 33

Data Access ControlData Access Control

• Through the user access control procedure (log on), a user can be identified to the system.

• Associated with each user, there can be a profile that specifies permissible operations and file accesses.

• The operating system can enforce rules based on the user profile.

Page 34: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 34

Data Access ControlData Access Control

• General models of access control:– Access matrix– Access control list– Capability list

Page 35: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 35

Data Access ControlData Access Control

• Access Matrix

Page 36: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 36

Data Access ControlData Access Control

• Access Matrix: Basic elements of the model– Subject: An entity capable of accessing

objects. The concept of subject equates with that of process.

– Object: Anything to which access is controlled (e.g. files, programs).

– Access right: The way in which an object is accessed by a subject (e.g. read, write, execute).

Page 37: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 37

Data Access ControlData Access Control

• Access Control List: Decomposition of the matrix by columns

Page 38: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 38

Data Access ControlData Access Control

• Access Control List– An access control list lists users and

their permitted access right.– The list may contain a default or

public entry.

Page 39: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 39

Data Access ControlData Access Control

• Capability list: Decomposition of the matrix by rows

Page 40: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 40

Data Access ControlData Access Control

• Capability list– A capability ticket specifies

authorized objects and operations for a user.

– Each user have a number of tickets.– Capabilities are not forgeable.

Page 41: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 41

The Concept ofThe Concept ofTrusted SystemsTrusted Systems

• Levels of Security– Protection of data and resources on

the basis of levels of security (e.g., military,

unclassified, confidential, secret, top secret.)

– Users can be granted clearances to access certain categories of data.

Page 42: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 42

The Concept ofThe Concept ofTrusted SystemsTrusted Systems

• Multilevel security– Definition of multiple categories or levels of

data

• A multilevel secure system must enforce:– No read up: A subject can only read an

object of less or equal security level (Simple Security Property)

– No write down: A subject can only write into an object of greater or equal security level (*-Property)

Page 43: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 43

The Concept ofThe Concept ofTrusted SystemsTrusted Systems

• Reference Monitor Concept: Multilevel security for a data processing system

Page 44: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 44

The Concept ofThe Concept ofTrusted SystemsTrusted Systems

Page 45: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 45

The Concept ofThe Concept ofTrusted SystemsTrusted Systems

• Reference Monitor– Controlling element in the hardware

and operating system of a computer that regulates the access of subjects to objects on basis of security parameters

– The monitor has access to a file (security kernel database)

– The monitor enforces the security rules (no read up, no write down)

Page 46: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 46

The Concept ofThe Concept ofTrusted SystemsTrusted Systems

• Properties of the Reference Monitor– Complete mediation: Security rules are

enforced on every access.– Isolation: The reference monitor and

database are protected from unauthorized modification.

– Verifiability: The reference monitor’s correctness must be provable (mathematically).

Page 47: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 47

Trojan Horse DefenseTrojan Horse Defense

• Secure, trusted operating systems are one way to secure against Trojan Horse attacks

Page 48: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 48

Trojan Horse DefenseTrojan Horse Defense

Page 49: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 49

Trojan Horse DefenseTrojan Horse Defense

Page 50: Firewalls by M. Singhal (Original notes by Henric Johnson):

Henric Johnson 50

Recommended ReadingRecommended Reading

• Chapman, D., and Zwicky, E. Building Internet Firewalls. O’Reilly, 1995

• Cheswick, W., and Bellovin, S. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley, 2000

• Gasser, M. Building a Secure Computer System. Reinhold, 1988

• Pfleeger, C. Security in Computing. Prentice Hall, 1997