application firewallssmb/classes/s09/l20.pdf · inbound email different sublayers outbound email...

41
Application Firewalls Application Firewalls Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application Proxies Circuit Gateways Personal and Distributed Firewalls The Problems with Firewalls 1 / 41

Upload: others

Post on 10-Oct-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Application Firewalls

Application Firewalls

Moving Up theStack

Advantages

Disadvantages

Example: ProtectingEmail

Email Threats

Inbound Email

Different Sublayers

Outbound EmailCombining FirewallTypes

Firewalling Email

Enforcement

Outbound Email

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

1 / 41

Page 2: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Moving Up the Stack

Application Firewalls

Moving Up theStack

Advantages

Disadvantages

Example: ProtectingEmail

Email Threats

Inbound Email

Different Sublayers

Outbound EmailCombining FirewallTypes

Firewalling Email

Enforcement

Outbound Email

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

2 / 41

■ Why move up the stack?■ Apart from the limitations of packet filters

discussed last time, firewalls are inherently

incapable of protecting against attacks on a

higher layer

■ IP packet filters (plus port numbers. . . ) can’tprotect against bogus TCP data

■ A TCP-layer firewall can’t protect against bugsin SMTP

■ SMTP proxies can’t protect against problemsin the email itself, etc.

Page 3: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Advantages

Application Firewalls

Moving Up theStack

Advantages

Disadvantages

Example: ProtectingEmail

Email Threats

Inbound Email

Different Sublayers

Outbound EmailCombining FirewallTypes

Firewalling Email

Enforcement

Outbound Email

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

3 / 41

■ Protection can be tuned to the individualapplication

■ More context can be available■ You only pay the performance price for that

application, not others

Page 4: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Disadvantages

Application Firewalls

Moving Up theStack

Advantages

Disadvantages

Example: ProtectingEmail

Email Threats

Inbound Email

Different Sublayers

Outbound EmailCombining FirewallTypes

Firewalling Email

Enforcement

Outbound Email

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

4 / 41

■ Application-layer firewalls don’t protect againstattacks at lower layers!

■ They require a separate program perapplication

■ These programs can be quite complex■ They may be very intrusive for user

applications, user behavior, etc.

Page 5: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Example: Protecting Email

Application Firewalls

Moving Up theStack

Advantages

Disadvantages

Example: ProtectingEmail

Email Threats

Inbound Email

Different Sublayers

Outbound EmailCombining FirewallTypes

Firewalling Email

Enforcement

Outbound Email

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

5 / 41

■ Do we protect inbound or outbound email?Some of the code is common; some is quitedifferent

■ Do we work at the SMTP level (RFC 2821) orthe mail content level (RFC 2822)?

■ What about MIME?■ (What about S/MIME- or PGP-protected

mail?)■ What are the threats?

Page 6: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Email Threats

Application Firewalls

Moving Up theStack

Advantages

Disadvantages

Example: ProtectingEmail

Email Threats

Inbound Email

Different Sublayers

Outbound EmailCombining FirewallTypes

Firewalling Email

Enforcement

Outbound Email

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

6 / 41

■ The usual: defend against protocolimplementation bugs

■ Virus-scanning■ Anti-spam?■ Javascript? Web bugs in HTML email?■ Violations of organizational email policy?■ Signature-checking?

Page 7: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Inbound Email

Application Firewalls

Moving Up theStack

Advantages

Disadvantages

Example: ProtectingEmail

Email Threats

Inbound Email

Different Sublayers

Outbound EmailCombining FirewallTypes

Firewalling Email

Enforcement

Outbound Email

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

7 / 41

■ Email is easy to intercept: MX records in theDNS route inbound email to an arbitrarymachine

■ Possible to use “*” to handle entire domain■ Example: DNS records exist for att.com and

*.att.com

■ Net result: all email for that domain is sent toa front end machine

Page 8: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Different Sublayers

Application Firewalls

Moving Up theStack

Advantages

Disadvantages

Example: ProtectingEmail

Email Threats

Inbound Email

Different Sublayers

Outbound EmailCombining FirewallTypes

Firewalling Email

Enforcement

Outbound Email

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

8 / 41

■ Note that are are multiple layers of protectionpossible here

■ The receiving machine can run a hardenedSMTP, providing protection at that layer

■ Once the email is received, it can be scannedat the content layer for any threats

■ The firewall function can consist of either orboth

Page 9: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Outbound Email

Application Firewalls

Moving Up theStack

Advantages

Disadvantages

Example: ProtectingEmail

Email Threats

Inbound Email

Different Sublayers

Outbound EmailCombining FirewallTypes

Firewalling Email

Enforcement

Outbound Email

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

9 / 41

■ No help from the protocol definition here■ But — most MTAs have the ability to forward

some or all email to a relay host■ Declare by administrative fiat that this must

be done■ (Remember: in a large organization, some

groups will run their own MTA.)■ Enforce this with a packet filter. . .

Page 10: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Combining Firewall Types

Application Firewalls

Moving Up theStack

Advantages

Disadvantages

Example: ProtectingEmail

Email Threats

Inbound Email

Different Sublayers

Outbound EmailCombining FirewallTypes

Firewalling Email

Enforcement

Outbound Email

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

10 / 41

■ Use an application firewall to handle inboundand outbound email

■ Use a packet filter to enforce the rules

Page 11: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Firewalling Email

Application Firewalls

Moving Up theStack

Advantages

Disadvantages

Example: ProtectingEmail

Email Threats

Inbound Email

Different Sublayers

Outbound EmailCombining FirewallTypes

Firewalling Email

Enforcement

Outbound Email

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

11 / 41

Filter

Outside

DMZ

Inside

SMTPReceiver

Anti−SpamAnti−Virus

Packet

Page 12: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Enforcement

Application Firewalls

Moving Up theStack

Advantages

Disadvantages

Example: ProtectingEmail

Email Threats

Inbound Email

Different Sublayers

Outbound EmailCombining FirewallTypes

Firewalling Email

Enforcement

Outbound Email

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

12 / 41

■ Email can’t flow any other way■ The only SMTP server the outside can talk to

is the SMTP receiver■ It forwards the email to the

anti-virus/anti-spam filter, via some arbitraryprotocol

■ That machine speaks SMTP to some insidemail gateway

■ Note the other benefit: if the SMTP receiver iscompromised, it can’t speak directly to theinside

Page 13: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Outbound Email

Application Firewalls

Moving Up theStack

Advantages

Disadvantages

Example: ProtectingEmail

Email Threats

Inbound Email

Different Sublayers

Outbound EmailCombining FirewallTypes

Firewalling Email

Enforcement

Outbound Email

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

13 / 41

■ Again, we use a packet filter to block directoutbound connections to port 25

■ The only machine that can speak to externalSMTP receivers is the dedicated outboundemail gateway

■ That gateway can either live on the inside oron the DMZ

Page 14: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

The DNS

Application Firewalls

The DNS

DNS Issues

UDP IssuesInternal VersusExternal ViewCacheContaminationAttacks

DNS Filtering

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

14 / 41

Page 15: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

DNS Issues

Application Firewalls

The DNS

DNS Issues

UDP IssuesInternal VersusExternal ViewCacheContaminationAttacks

DNS Filtering

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

15 / 41

■ UDP (discussed previously)■ Internal versus external view■ DNS cache corruption■ Optimizing DNSSEC checks

Page 16: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

UDP Issues

Application Firewalls

The DNS

DNS Issues

UDP IssuesInternal VersusExternal ViewCacheContaminationAttacks

DNS Filtering

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

16 / 41

■ Remember the DNS server location discsussedlast time

■ In fact, what we did there was use anapplication-level relay to work around packetfilter restrictions

■ We’re lucky — since the DNS protocolincludes provision for recursion, it requires noapplication changes for this to work

Page 17: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Internal Versus External View

Application Firewalls

The DNS

DNS Issues

UDP IssuesInternal VersusExternal ViewCacheContaminationAttacks

DNS Filtering

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

17 / 41

■ Should outsiders be able to see the names ofall internal machines?

■ What about secretproject.foobar.com?■ Solution: use two DNS servers, one for internal

requests and one for external request■ Put one on each side of the firewall■ Issue: which machine does the NS record for

foobar.com point to, the inside or the outsideserver?

■ Can be trickier than it seems — must makesure that internal machines don’t see NSrecords that will make them try to go outsidedirectly

Page 18: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Cache Contamination Attacks

Application Firewalls

The DNS

DNS Issues

UDP IssuesInternal VersusExternal ViewCacheContaminationAttacks

DNS Filtering

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

18 / 41

■ DNS servers cache results from queries■ Responses can contain “additional

information” — data that may be helpful butisn’t part of the answer

■ Send bogus DNS records as additionalinformation; confuse a later querier

Page 19: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

DNS Filtering

Application Firewalls

The DNS

DNS Issues

UDP IssuesInternal VersusExternal ViewCacheContaminationAttacks

DNS Filtering

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

19 / 41

■ All internal DNS queries go to a DNS switch

■ If it’s an internal query, forward the query tothe internal server or pass back internal NSrecord

■ If it’s an external query, forward the query tooutside, but:

◆ Scrub the result to remove any referencesto inside machines

◆ Scrub the result to remove any referencesto any NS records; this prevents attemptsto go outside directly

■ Use a packet filter to block direct DNScommunication

Page 20: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Application Proxies

Application Firewalls

The DNS

Application Proxies

Small ApplicationGateways

FTP Proxy

Attacks Via FTPProxy

Web Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

20 / 41

Page 21: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Small Application Gateways

Application Firewalls

The DNS

Application Proxies

Small ApplicationGateways

FTP Proxy

Attacks Via FTPProxy

Web Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

21 / 41

■ Some protocols don’t need full-fledgedhandling at the application level

■ That said, a packet filter isn’t adequate■ Solution: examine some of the traffic via an

application-specific proxy; react accordingly

Page 22: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

FTP Proxy

Application Firewalls

The DNS

Application Proxies

Small ApplicationGateways

FTP Proxy

Attacks Via FTPProxy

Web Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

22 / 41

■ Remember the problem with the PORTcommand?

■ Scan the FTP control channel■ If a PORT command is spotted, tell the

firewall to open that port temporarily for anincoming connection

■ (Can do similar things with RPC — definefilters based on RPC applications, rather thanport numbers)

Page 23: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Attacks Via FTP Proxy

Application Firewalls

The DNS

Application Proxies

Small ApplicationGateways

FTP Proxy

Attacks Via FTPProxy

Web Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

23 / 41

■ Downloaded Java applets can call back to theoriginating host

■ A malicious applet can open an FTP channel,and send a PORT command listing avulnerable port on a nominally-protected host

■ The firewall will let that connection through■ Solution: make the firewall smarter about

what host and port numbers can appear inPORT commands. . .

Page 24: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Web Proxies

Application Firewalls

The DNS

Application Proxies

Small ApplicationGateways

FTP Proxy

Attacks Via FTPProxy

Web Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

24 / 41

■ Again, built-in protocol support■ Provide performance advantage: caching■ Can enforce site-specific filtering rules

Page 25: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Circuit Gateways

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Circuit Gateways

ApplicationModificationsAddingAuthentication

Personal andDistributed Firewalls

The Problems withFirewalls

25 / 41

Page 26: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Circuit Gateways

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Circuit Gateways

ApplicationModificationsAddingAuthentication

Personal andDistributed Firewalls

The Problems withFirewalls

26 / 41

■ Circuit gateways operate at (more or less) theTCP layer

■ No application-specific semantics■ Avoid complexities of packet filters■ Allow controlled inband connections, i.e., for

FTP■ Handle UDP■ Most common one: SOCKS. Supported by

many common applications, such as Firefoxand Pidgin.

Page 27: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Application Modifications

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Circuit Gateways

ApplicationModificationsAddingAuthentication

Personal andDistributed Firewalls

The Problems withFirewalls

27 / 41

■ Application must be changed to speak thecircuit gateway protocol instead of TCP orUDP

■ Easy for open source■ Socket-compatible circuit gateway libraries

have been written for SOCKS — use thoseinstead of standard C library to convertapplication

Page 28: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Adding Authentication

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Circuit Gateways

ApplicationModificationsAddingAuthentication

Personal andDistributed Firewalls

The Problems withFirewalls

28 / 41

■ Because of the circuit (rather than packet)orientation, it’s feasible to add authentication

■ Purpose: extrusion control

Page 29: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Personal and Distributed

Firewalls

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

Rationale

Personal FirewallsSaying “No”, Saying“Yes”Application-LinkedFirewalls

Distributed Firewalls

The Problems withFirewalls

29 / 41

Page 30: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Rationale

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

Rationale

Personal FirewallsSaying “No”, Saying“Yes”Application-LinkedFirewalls

Distributed Firewalls

The Problems withFirewalls

30 / 41

■ Conventional firewalls rely on topologicalassumptions — these are questionable today

■ Instead, install protection on the end system■ Let it protect itself

Page 31: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Personal Firewalls

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

Rationale

Personal FirewallsSaying “No”, Saying“Yes”Application-LinkedFirewalls

Distributed Firewalls

The Problems withFirewalls

31 / 41

■ Add-on to the main protocol stack■ The “inside” is the host itself; everything else

is the “outside”■ Most act like packet filters■ Rules can be set by individual or by

administrator

Page 32: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Saying “No”, Saying “Yes”

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

Rationale

Personal FirewallsSaying “No”, Saying“Yes”Application-LinkedFirewalls

Distributed Firewalls

The Problems withFirewalls

32 / 41

■ It’s easy to reject protocols you don’t like witha personal firewall

■ The hard part is saying “yes” safely■ There’s no topology — all that you have is the

sender’s IP address■ Spoofing IP addresses isn’t that hard,

especially for UDP

Page 33: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Application-Linked Firewalls

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

Rationale

Personal FirewallsSaying “No”, Saying“Yes”Application-LinkedFirewalls

Distributed Firewalls

The Problems withFirewalls

33 / 41

■ Most personal firewalls act on port numbers■ At least one such firewall is tied to applications

— individual programs are or are not allowedto talk, locally or globally

■ Pros: don’t worry about cryptic port numbers;handle auxiliary ports just fine

■ Cons: application names can be just ascryptic; service applications operate on behalfof some other application

Page 34: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Distributed Firewalls

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

Rationale

Personal FirewallsSaying “No”, Saying“Yes”Application-LinkedFirewalls

Distributed Firewalls

The Problems withFirewalls

34 / 41

■ In some sense similar to personal firewalls,though with central policy control

■ Use IPsec to distinguish “inside” from“outside”

■ Insiders have inside-issued certificates;outsiders don’t

■ Only trust other machines with the propercertificate

■ No reliance on topology; insider laptops areprotected when traveling; outsider laptopsaren’t a threat when they visit

Page 35: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

The Problems with Firewalls

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

ProblemsIPsec versusFirewalls

Corrupt Insiders

Connectivity

Laptops

Evasion

35 / 41

Page 36: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Problems

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

ProblemsIPsec versusFirewalls

Corrupt Insiders

Connectivity

Laptops

Evasion

36 / 41

■ Corrupt insiders■ IPsec versus Firewalls■ Connectivity■ Laptops■ Evasion

Page 37: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

IPsec versus Firewalls

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

ProblemsIPsec versusFirewalls

Corrupt Insiders

Connectivity

Laptops

Evasion

37 / 41

■ Suppose hosts routinely use IPsec to talk tothe outside world.

■ An inbound, ESP-protected packet arrives atthe firewall.

■ Should it be allowed in? Does it conform tosecurity policies?

■ The destination port number is encrypted.The ACK flag is encrypted. It might even be atunnel mode packet.

■ There is no way to for the firewall to make adecision!

Page 38: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Corrupt Insiders

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

ProblemsIPsec versusFirewalls

Corrupt Insiders

Connectivity

Laptops

Evasion

38 / 41

■ Firewalls assume that everyone on the inside isgood

■ Obviously, that’s not true■ Beyond that, active content and subverted

machines mean there are bad actors on theinside

Page 39: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Connectivity

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

ProblemsIPsec versusFirewalls

Corrupt Insiders

Connectivity

Laptops

Evasion

39 / 41

■ Firewalls rely on topology■ If there are too many conections, some will

bypass the firewall■ Sometimes, that’s even necessary; it isn’t

possible to effectively firewall all externalpartners

■ A large company may have hundreds or eventhousands of external links, most of which areunknown to the official networking people

Page 40: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Laptops

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

ProblemsIPsec versusFirewalls

Corrupt Insiders

Connectivity

Laptops

Evasion

40 / 41

■ Laptops, more or less by definition, travel■ When they’re outside the firewall, what

protects them?■ At one conference, I spotted at least a dozen

other attendee machines that were infectedwith the Code Red virus

■ (Code Red only infected web servers. Whywere laptops running web servers?)

Page 41: Application Firewallssmb/classes/s09/l20.pdf · Inbound Email Different Sublayers Outbound Email Combining Firewall Types Firewalling Email Enforcement Outbound Email The DNS Application

Evasion

Application Firewalls

The DNS

Application Proxies

Circuit Gateways

Personal andDistributed Firewalls

The Problems withFirewalls

ProblemsIPsec versusFirewalls

Corrupt Insiders

Connectivity

Laptops

Evasion

41 / 41

■ Firewalls and firewall administrators got toogood

■ Some applications weren’t able to run■ Vendors started building things that ran over

HTTP■ HTTP usually gets through firewalls and even

web proxies. . .