implementing firewalls & proxy servers - robert gezelter software

27
Robert Gezelter Software Consultant +1 718 463 1079 35 – 20 167th Street, Suite 215, Flushing, New York 11358 – 1731 USA Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights Reserved Slide 1 Implementing Firewalls & Proxy Servers Robert Gezelter Software Consultant 35 – 20 167th Street, Suite 215 Flushing, New York 11358 – 1731 United States of America +1 718 463 1079 [email protected] Session ES132 Tuesday, November 9, 1998 1:30 pm – 2:50 am Room 11B Fall 1999 US DECUS Symposium San Diego Convention Center San Diego, California

Upload: others

Post on 03-Feb-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

Robert GezelterSoftware Consultant

+1 718 463 107935 – 20 167th Street, Suite 215, Flushing, New York 11358 – 1731 USA

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 1

Implementing Firewalls & Proxy Servers

Robert Gezelter Software Consultant35 – 20 167th Street, Suite 215

Flushing, New York 11358 – 1731United States of America

+1 718 463 [email protected]

SessionES132

Tuesday, November 9, 19981:30 pm – 2:50 am

Room 11B

Fall 1999 US DECUS SymposiumSan Diego Convention Center

San Diego, California

Page 2: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

2

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 2

Regardless of whether you are running a single Pentium with Microsoft RRAS and Proxy Server; or a major corporation with hundreds of routers, firewalls and servers, the Goal is the same — survival.

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 3

Software Installation Notes — General

• Keep Notes • Make Backups • Use a Test Environment • Use Blackboards

Page 3: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

3

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 4

Software Installation Notes — WNT Specific

• GUI Managed — Keep Notes • Read ALL WWW pages FIRST • Make Backups • Make NEW Recovery Diskette OFTEN! • Significantly more fragile than OpenVMS • Registry Hazards

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 5

Common Corporate Model

Firewall

HostComputer

A

HostComputer

B

HostComputer

C

Page 4: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

4

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 6

Common Corporate Reality

Acme Financial Corporation

Merchant Bank

Mergers &Acquisitions

Trust Department

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 7

Common Corporate Model

CorporateFirewall

DepartmentA2

Firewall

DepartmentA1

Firewall

HostC

HostD

HostC

HostD

Encrypted Tunnel

Page 5: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

5

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 8

Introduction Issues and Definitions Terminology Us/Them Services Topologies

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 9

Goals

• What are Firewalls and Proxy Servers? • How to use a single IP address to serve the entire organization • Why caching is central to performance • Establish Channels and Controls

Page 6: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

6

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 10

Terminology

• IP Address • Domain Name System DNS • Bridges • Routers • Firewalls • Proxy

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 11

ISOOpen

SystemsInterconnect

Model

Application

Presentation

Session

Transport

Network

Data Link

Physical

Page 7: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

7

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 12

IP Address

• 32-bits (IPv4) • Written as ddd.ddd.ddd.ddd • Assigned by ISP/InterNIC • Address Classes: A, B, C • CIDR (Classless Inter Domain Routing) • Shortened OSI Implementation

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 13

Domain Name System

• Translates Name into IP Addresses • Distributed, cached database • Hierarchical Name Space • Security issues • Root Level Domains • Who controls your entries

Page 8: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

8

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 14

Bridges

• Data Link level • LAN/LAN • Sometimes filtering

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 15

Routers

• Network Level • Can Screen Packets by address/protocol • No application knowledge • Stateless • Ownership • Access

Page 9: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

9

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 16

Firewall

• Not Generally Defined Term • Intended as choke point • Point of control • Point of access • Access Control • Validation/Authentication

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 17

Proxy

• Not well defined • Can be Routing, or Application • May or may not include checking • Acts on behalf of • Can be simple or complex

Page 10: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

10

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 18

The Gestalt of it All

• on the Internet; the nobody has "evolutionary dominance" • Hubris • Social Engineering II — Information Warfare • Like to Know/Need to Know

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 19

Us vs. Them

• Who NEEDS to know? • Who NEEDS to do what? • What is permissible? • What is safe? • Not black/white • VERY Gray!

Page 11: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

11

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 20

Services

• FTP • Telnet • HTTP • Gopher • DNS • PING • FINGER, ...

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 21

Facilities

• Virtual Private Networks • Dial-up • Authentication • Credentials

Page 12: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

12

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 22

Trust

Trust is the fundamental problem in the online connected world. Today’s environment requires a flexible trust model; including: • colleagues • collaborators • competitors

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 23

Policies and Politics

• Company policies • Disclosure • Defamation/Harrassment • Access Control • Regulations • Auditing • Accountability • Monopoly on Force

Page 13: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

13

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 24

Security Eco-system

A Firewall (or Firewalls) do not exist in a vacuum, they are part and parcel of the entire security plan.

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 25

Security Eco-system

Before you can sit down to plan your configuration, you need to well understand your environment.

Page 14: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

14

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 26

Common Corporate Model

Firewall

HostComputer

A

HostComputer

B

HostComputer

C

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 27

Common Corporate Reality

Acme Financial Corporation

Merchant Bank

Mergers &Acquisitions

Trust Department

Page 15: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

15

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 28

Complementary Technologies/Strategies

• Hidden Subnets (RFC 1597) • Virtual Private Networks • Multi-level DNS • DHCP restrictions

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 29

Hidden Subnetworks Ñ RFC 1597

Page 16: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

16

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 30

"Overall, he judged it to be better to be invisible than agile ..." – Red Storm Rising

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 31

Routers filter packets based upon source and destination addresses and protocol type. Their efficacy is limited.

Page 17: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

17

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 32

Firewalls (bastion hosts) should be the exclusive "ports of entry" into your internal network. Many assets are now addressable via IP, from printers to PBXes. It is highly undesireable that most of these resources be accessable from outside the security perimeter.

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 33

These concerns also apply to nested security environments.

Page 18: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

18

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 34

Enter RFC 1597 – Address Allocation for Private Internets

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 35

RFC 1597 is a scheme which reserves a portion of the IPv4 address space for guaranteed internal use in non-publicly addressible networks.

Page 19: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

19

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 36

What is reserved by RFC 1597?

Guaranteed non-public allocation of: • 1 Class A Address Block (10.0.0.0 – 10.255.255.255) • 16 Class B Address Blocks (172.16.0.0 – 172.131.255.255) • 255 Class C Address Blocks (192.168.0.0 – 192.168.255.255)

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 37

RFC 1597 Intent

Permit the connection of large numbers of local devices to LANs via IP without requiring every LAN to hold a Class A address space. It is worth noting that even a private residence could easily overflow a Class C address space.

Page 20: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

20

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 38

Implications of RFC 1597

• Repeatedly sub-divideable • internal nodes (workstations, servers, PCs) cannot connect to outside servers EXCEPT through an approved application proxy on an outside addressable host. • inbound connections must go through approved proxies on the (externally visible) gateways • internal nodes need not be renumbered due to changes in externally visible address ranges caused by CIDR adjustments and/or access provider changes.

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 39

Router Configuration

• Access Providers should filter the RFC 1597 Address Blocks • Nested internal routers should filter addresses • Your router outside your firewall should filter RFC 1597 addresses

Page 21: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

21

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 40

Router Implications

• Internal hosts (possibly nested) are invisible to systems outside the firewall • Even if your router fails, the from address is ambiguous • The previous note is not as safe as might be perceived, an attack on your link might be feasible.

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 41

RFC 1597 and Domain Name Services

• Internal DNS serving • External DNS serving • Implications

CorporateFirewall

DepartmentA2

Firewall

DepartmentA1

Firewall

HostC

HostD

HostC

HostD

Page 22: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

22

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 42

Internal DNS

• Final authority on nodes inside the firewall • Uses firewall to resolve external DNS

CorporateFirewall

DepartmentA2

Firewall

DepartmentA1

Firewall

HostC

HostD

HostC

HostD

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 43

External DNS

• all internal mail targets are represented by MX records • Internal nodes which are not to be addressed may be totally absent from the External DNS

CorporateFirewall

DepartmentA2

Firewall

DepartmentA1

Firewall

HostC

HostD

HostC

HostD

Page 23: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

23

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 44

DNS Implications

• SMTP mail is forced to the route through the gateway • FTP, TELNET, HTTP cannot even resolve the address of interior systems.

CorporateFirewall

DepartmentA2

Firewall

DepartmentA1

Firewall

HostC

HostD

HostC

HostD

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 45

Relationship Connectivity

• RFC 1597 address can be used together with careful management to protect IP links with business and strategic partners • Mutual distrust • "No Man’s" land

CorporateFirewall

DepartmentA2

Firewall

DepartmentA1

Firewall

HostC

HostD

HostC

HostD

Page 24: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

24

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 46

Summary

RFC 1597 provides and excellent framework for implementing an environment which enhances the safety support provided by your firewall(s)

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 47

Corporate Strategy

• Keep things outside • Minimize Trust • Minimize Exposure • Minimize Firewall use • Public/Semipublic Outside • Nest Security/Access Domains • Parents AND Sibling Domains

Page 25: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

25

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 48

General Corporate Implementation

Bastion

HostComputer

A

HostComputer

B

HostComputer

C

WWWServer

FTPServer

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 49

Virtual Private Networks

• Use Encryption • Caution: Derived Trust • Efficient Solution • Ease of Use • Make it easy to be good

Page 26: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

26

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 50

Multi-level DNS

• Keep inside invisible • Mail headers • Fake Authorities • Ambiguities

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 51

DHCP restrictions

• Within domain • Within physical department • DO NOT Proxy • Point of attack • Availability issues

Page 27: Implementing Firewalls & Proxy Servers - Robert Gezelter Software

NOTES

27

Robert GezelterSoftware Consultant

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 52

Bibliography

Hutt, Bosworth, Hoytt "The Computer Security Handbook, 3rd Edition/Updated", John Wiley & Son Internet RFCs Littman "The Fugitive Game" Little Brown Stoll, Clifford "The Cuckoo’s Egg"

Robert GezelterSoftware Consultant

+1 718 463 107935 – 20 167th Street, Suite 215, Flushing, New York 11358 – 1731 USA

Implementing Firewalls & Proxy Servers 1998, Robert Gezelter, All Rights ReservedSlide 53

Questions?

Robert Gezelter Software Consultant35 – 20 167th Street, Suite 215

Flushing, New York 11358 – 1731United States of America

+1 718 463 [email protected]