Firewalls for Open Networks - PowerPoint PPT Presentation

1 / 42
About This Presentation
Title:

Firewalls for Open Networks

Description:

Closed servers. Protected sessions ... Use VPNs from each workstation to servers ... You still need to reduce the number of vulnerable servers by applying patches ... – PowerPoint PPT presentation

Number of Views:69
Avg rating:3.0/5.0
Slides: 43
Provided by: xyz194
Category:

less

Transcript and Presenter's Notes

Title: Firewalls for Open Networks


1
Firewalls for Open Networks
  • Terry GrayDirector, Networks Distributed
    Computing
  • University of Washington
  • 08 May 2002

2
Conventional Security Wisdom
  • Popular Myth The network caused the problem,
    so the network should solve it
  • Border firewalls and border VPNs will save us!
  • Unpopular Reality In a large, diverse
    enterprise such as UW, security is not achieved
    by either one.

3
Grays Network Security Axioms
  • Network security is maximizedwhen we assume
    there is no such thing.
  • Firewalls are such a good ideaevery host should
    have one. Seriously.
  • Remote access is fraught with periljust like
    local access.

4
Perimeter Protection Paradox
  • Firewall value is proportional to number of
    systems protected.
  • Firewall effectiveness is inversely proportional
    to number of systems protected.
  • Probability of compromised systems existing
    inside
  • Lowest-common-denominator blocking policy

5
Credo
  • Open networks
  • Closed servers
  • Protected sessionsWith one exception DDOS
    attacks require network-level blocking

6
Inverted Networks
  • New trend in big companies (e.g. DuPont)
  • Ditch the border firewall
  • Assume LANs are dirty
  • Use VPNs from each workstation to servers
  • Hey, an open network, with closed servers and E2E
    encryption!
  • Why didnt we think of that? )

7
Heroic (but futile) Endeavors
  • Getting anyone to focus on policies first
  • Getting any consensus on border blocking
  • Patching old end-systems
  • Pretending that clients are only clients
  • Securing access to older network gear

8
Properties of ALL Firewalls
  • Inserted between UN-trusted (outside) and trusted
    (inside) nets
  • "All" traffic between inside and outside flows
    through them
  • The more restrictive the rules, the more
    protection offered
  • If rules are too restrictive, users may bypass
    them
  • Increase complexity, complicate debugging
  • No protection between hosts on trusted (inside)
    network
  • Little protection from attacks against permitted
    services
  • Your vulnerability is proportional to both the
    number of hostile hosts able to connect and the
    number of vulnerable servers to connect to.
  • Firewalls improve security primarily by reducing
    the number of hosts able to connect. You still
    need to reduce the number of vulnerable servers
    by applying patches

9
Where do firewalls make sense?
  • Pervasively (But of course we have a firewall)
  • For blocking spoofed source addresses
  • Small perimeter/edge
  • Cluster firewalls, e.g. server sanctuaries, labs
  • OS-based and Personal firewalls
  • Large perimeter/border
  • Maybe to block an immediate attack?
  • Maybe if there is widespread consensus to block
    certain ports? (Aye, and theres the rub)
  • And then again, maybe not...

10
Good Uses for a Firewall
  • Reducing exposure of vulnerable services on hosts
    you can't patch because they are
  • Certified by the FDA for only one particular
    revision of software
  • Old and no longer supported by the vendor
  • Devices with code in ROM, such as a printer or
    terminal server
  • Embedded in a device with a service contract
    where the service technician routinely wipes out
    any custom configuration
  • Protecting a new computer or service while you
    bring it up (even if you don't intend it to be
    firewalled in production).
  • Preventing the spread of worms and exploitation
    of back-doors.
  • As insurance against misconfigured hosts (defense
    in depth).
  • Explicitly blocking specific troublesome traffic.
  • Meeting due-diligence security requirements.
  • Limiting access to network-attached printers and
    devices.

11
Fundamental Firewall Truths...
  • Bad guys arent always "outside" the moat
  • One persons security perimeter is anothers
    broken network
  • Organization boundaries and filtering
    requirements constantly change
  • Perimeter defenses always have holes

12
The Dark Side of Border Firewalls Its not just
that they dont solve the problem very well
large-perimeter firewalls have serious
unintended consequences
  • Operational consequences
  • Force artificial mapping between biz and net
    perimeters
  • Catch 22 more port blocking -gt more port 80
    tunneling
  • Cost more than you think to manage MTTR goes up
  • May inhibit legitimate activities
  • May be a performance bottleneck
  • Organizational consequences
  • Give a false sense of security
  • Encourage backdoors
  • Separate policy configuration from best policy
    makers
  • Increase tensions between security, network, and
    sys admins

13
Mitnicks Perspective
  • "It's naive to assume that just installing a
    firewall is going to protect you from all
    potential security threats. That assumption
    creates a false sense of security, and having a
    false sense of security is worse than having no
    security at all."Kevin Mitnick
  • eWeek 28 Sep 00

14
Do You Feel Lucky?
  • QUESTION If a restrictive border firewall
    surrounds your --and 50,000 other-- computers,
    should you feel safe?
  • ANSWER Only if you regularly win the lottery!

15
Distributed Firewall Management
  • Given the credo of
  • Open networks
  • Closed servers
  • Protected sessions
  • What about all the desktops?
  • Organizations that can tolerate a restrictive
    border firewall usually centrally manage
    desktops
  • Thus, they can also centrally configure
    policy-based packet filters on each desktop and
    dont need to suffer the problems of border
    firewalls
  • Centrally managing desktop firewalls possible
    even if desktops generally unmanaged

16
UWs Logical Firewall
  • A response to pressure for deptl firewalls in
    our communication closets
  • Plugs into any network port
  • Departmentally managed
  • Opt-in deployment
  • Doesnt interfere with network management
  • Uses Network Address Translation (NAT)
  • Intended for servers can be used for clients
  • Web-based rules generator
  • Gibraltar Linux foundation

17
UW Logical Firewall - How it Works
  • Ethernet allows two completely separate subnets
    to share a single wire.
  • As per RFC 1918, our campus routers block all
    10.x.y.z traffic.
  • LFW clients are given 10.x.y.z unroutable network
    addresses.
  • By changing just the first octet to 10, address
    allocation becomes trivial.
  • Firewalled hosts can talk directly only to each
    other or their LFW.
  • LFW does Network Address Translation (NAT) for
    every packet in/out.
  • Note that the LFW is not physically between the
    outside network and protected hosts but all
    traffic between the outside network and protected
    hosts must go through it.

18
LFW Traffic Flow
19
LFW Advantages
  • No re-wiring necessary
  • Opt-in (easy to add/remove clients)
  • Firewalls (plural) can live anywhere on the
    subnet
  • Can have different administrators or policies,
    etc.
  • Does not interfere with managing network
    infrastructure
  • Software is available for free
  • Requires only a PC with floppy, NIC and CDROM (no
    hard drive, keyboard, mouse, monitor)
  • Use your favorite linux or use "Gibraltar" (boots
    runs from CDROM)
  • Web-based firewall rule-generator supports
    hand-crafting rules too
  • Stateful firewall rules (more expressive and
    simpler to write)
  • Remotely and securely manageable (via SSH login)
  • Supports IPSEC tunneling between subnets

20
LFW Disadvantages
  • Potentially more vulnerable from hacked
    un-firewalled box on subnet
  • A hacked box might be able to sniff traffic from
    the 10.x.y.z net
  • A skillful intruder might be able to configure a
    10.x.y.z virtual interface
  • But this added threat is only from hosts on your
    own subnet
  • You're always more vulnerable to arp-spoofing, IP
    spoofing and hijacking attacks from your subnet
    anyway.
  • Traffic through firewall (off subnet) travels
    your switch twice --unless you use a second NIC
    and rewire (which _is_ supported)
  • With a full-duplex switched network connection,
    this may not reduce throughput significantly
  • Clients must be re-configured with a new IP
    address
  • A few protocols don't NAT well (or at all)
  • Public and private IP addrs on one wire makes
    DHCP difficult

21
LFW - Setup Overview
  • Download the "Gibraltar" CDROM image and burn it
    onto a CDROM
  • Boot the Gibraltar CDROM
  • Copy "uw-setup" script to a floppy, run it on
    Gibraltar, answer questions
  • Visit LFW "Rule Generator" webpage to specify
    firewall rules and clients
  • SSH into Gibraltar, copy/paste output of "Rule
    Generator" into Gibraltar
  • Save configuration to floppy
  • Once you have the CDROM, the remaining steps take
    under 5 minutes
  • More detail at the LFW homepage
    http//staff.washington.edu/corey/fw/

22
LFW Results
  • Largest installation Appled Physics Lab
  • 5 LFWs on 5 subnets
  • 219 protected clients
  • IPSEC tunnels between them
  • Publication Svcs LFW protects hi-end printers
  • FTP performance 7.1MB/s vs. 8.6MB/s without
  • Local policy-making a big win minimizes admin
    distance between policy definition and policy
    enforcement.

23
Is it enough?
  • Hard to find anyone who believes all end-systems
    can be properly managed/secured
  • Server sanctuaries, centrally-managed personal
    firewalls, logical-firewalls are they enough?
  • Do we need a dual-policy network?
  • What about DDOS attacks?

24
Resources
  • http//staff.washington.edu/gray/papers/credo.html
  • http//staff.washington.edu/corey/fw/
  • http//staff.washington.edu/dittrich
  • http//www.sans.org/ Thanks to Corey Satten for
    several of the LFW slides used in this
    presentation.

25
Best Security Practicesfor eclectic enterprises
  • Terry GrayDirector, Networks Distributed
    Computing
  • University of Washington
  • 08 May 2002

26
UW Environment
  • 1.5 B/yr enterpise (75 research/clinical)
  • 55,000 machines
  • Infinite variety and vintage of computers
  • Incredibly complex/diverse org structure
  • Relatively little centralized desktop mgt
  • Every depts middle name is Autonomous
  • CC provides core I.T. infrastructure
  • Depts responsible for end-system support

27
Unconventional Security Wisdom
  • If you think technology can solve your security
    problems, then you don't understand the problems
    and you don't understand the technology. Bruce
    Schneier
  • Secrets and Lies

28
Security Elements
  • Architectural
  • Authentication Authorization
  • Encryption
  • Packet filtering
  • Operational
  • Prevention
  • Detection
  • Recovery
  • Policy
  • Risk Management
  • Liability Management

29
Bad Ideas
  • Departmental firewalls within the core.
  • VPNs only between institution borders.
  • Over-reliance on large-perimeter defenses...e.g.
    believing firewalls can substitute for good
    host/application administration...

30
Good Ideas
  • Two-factor authentication
  • End-to-End encryption IPSEC, SSH/SSL/K5
  • Proactive vulnerability probing
  • Centrally managed desktop computers
  • Centrally managed personal firewalls
  • Logical firewalls
  • Bulk email virus scanning
  • Server sanctuaries

31
Jury Still Out
  • Intrusion Detection Systems
  • DDoS trackers
  • Thin Clients

32
Server Sanctuaries
  • Cluster sensitive/critical servers together
  • But dont forget geographic-diversity needs
  • Then provide additional logical and physical
    security

33
Technical Priorities
  • Application security (e.g. SSH, SSL, K5)
  • Host security (patches, minimum svcs)
  • Strong authentication (e.g. SecureID)
  • Net security (VPNs, firewalling)

34
Start with a Security PolicyNow theres an
idea...
  • Define who can/cannot do what to whom...
  • Identify and prioritize threats
  • Identify assumptions, e.g.
  • Security perimeters
  • Trusted systems and infrastructure
  • Hardware/software constraints
  • Block threats or permit good apps?
  • Minimize organizational distance between policy
    definition, configuration, and enforcement points

35
Policy Procedure
  • Policy definition enforcement structure
  • Education/awareness its everyones job
  • Standards and documentation
  • Adequate resources for system administration
  • High-level support for policies
  • Pro-active probing
  • Security consulting services
  • IDS and forensic services
  • Virus scanning measures
  • Acquiring/distributing tools, e.g. SSH

36
When do VPNs make sense?
  • E2E
  • Whenever config cost is acceptably small
  • Non-E2E
  • When legacy apps cannot be accessed via secure
    protocols, e.g. SSH, SSL, K5.and
  • When the tunnel end-points are very near the
    end-systems.

37
Network Risk Profile(notwithstanding recent SNMP
exploits)
38
Risk Liability Issues
  • Liability over network misuse?
  • Policies define acceptable use
  • Post-audit strategy for enforcement
  • Wireless perimeter control?
  • Are networks an attractive nuisance?
  • Risk of server compromise?
  • Strong preventive stance
  • Pre-audit via proactive probing
  • Greater sensitivity -gt greater security

39
Reality Check
  • John Gilmore The Internet deals with censorship
    as if it were a malfunction and routes around it
  • Isnt this also true of other forms of
    policy-based restrictions, including Kazaa
    clamping and border port blocking?

40
Worrisome Trends
  • Increasing sophistication of attacks
  • Increasing number of attacks
  • Tunneling everything thru port 80
  • Partially connected Internets
  • Increasing complexity anddiagnostic difficulty

41
Encouraging Trends
  • Enterprise decision makers are engaged
  • Vendors are paying more attention
  • Software is slowly getting better
  • ?

42
Conclusions
  • Central network services think of as an ISP
  • Conventional wisdom wont work in our world
  • Border firewalls can actually be harmful
  • We cant afford to settle for fake security
  • There are no silver bullets
  • The hardest problems are non-technical
  • Its still going to be a long, up-hill battle
  • Dont forget disaster preparedness and recovery
    (e.g. High-Availability system design)
Write a Comment
User Comments (0)
About PowerShow.com