screened host firewall (single-homed bastion host ... · web viewthe first type of firewall is a...

26
T.Z.A.S.P.MANDAL’S PRAGATI COLLEGE OF ARTS, COMMERCE AND SCIENCE F.Y/S.Y/T.Y.B.SC. (IT) This is to certify that miss. Shrutika Ratnakar Kesarkar. Has completed the prescribe Case Study during the year 2011-2012 Grade-A/B/C/D/E/F Date- Seal- CERTIFICA

Upload: phamduong

Post on 03-May-2018

298 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

T.Z.A.S.P.MANDAL’S

PRAGATI COLLEGE OF

ARTS, COMMERCE AND SCIENCE

F.Y/S.Y/T.Y.B.SC. (IT)

This is to certify that miss. Shrutika Ratnakar Kesarkar.

Has completed the prescribe Case Study

during the year 2011-2012

Grade-A/B/C/D/E/F

Date-

Seal-

Co-ordinator professor in-charge

(B.SC IT) (B.SC IT)

CERTIFICATE

Page 2: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

NO. TITLE PAGE NO.

1 INTRODUCTION 1

2 TYPES OF FIREWALL 43 FIREWALL CONFIGURATION 84 TYPES OF CONFIGURATION 95 PROXY SERVER 116 TYPES OF PROXY SERVER 12

7 IMPLEMENTATION METHOD 15

INDEX

Page 3: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

INTRODUCTIONA system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

Firewalls are computer security systems that protect your office/home PCs or your network from intruders, hackers & malicious code. Firewalls protect you from offensive software that may come to reside on your systems or from prying hackers. In a day and age when online security concerns are the top priority of the computer users, Firewalls provide you with the necessary safety and protection.

WHAT EXACTLY ARE FIREWALLS?Firewalls are software programs or hardware devices that filter the traffic that flows into you PC or your network through a internet connection. They sift through the data flow & block that which they deem (based on how & for what you have tuned the firewall) harmful to your network or computer system.

When connected to the internet, even a standalone PC or a network of interconnected computers make easy targets for malicious software & unscrupulous hackers. A firewall can offer the security that makes you less vulnerable and also protect your data from being compromised or your computers being taken hostage.

Page 4: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

HOW DO THEY WORK?Firewalls are setup at every connection to the Internet, therefore subjecting all data flow to careful monitoring. Firewalls can also be tuned to follow "rules". These Rules are simply security rules that can be set up by yourself or by the network administrators to allow traffic to their web servers, FTP servers, Telnet servers, thereby giving the computer owners/administrators immense control over the traffic that flows in & out of their systems or networks.

Rules will decide who can connect to the internet, what kind of connections can be made, which or what kind of files can be transmitted in out. Basically all traffic in & out can be watched and controlled thus giving the firewall installer a high level of security & protection.

FIREWALL LOGICFirewalls use 3 types of filtering mechanisms:

Packet filtering or packet purity Data flow consists of packets of information and firewalls analyze these packets to sniff out offensive or unwanted packets depending on what you have defined as unwanted packets. 

Proxy Firewalls in this case assume the role of a recipient & in turn sends it to the node that has requested the information & vice versa. 

Inspection In this case Firewalls instead of sifting through all of the information in the packets, mark key features in all outgoing requests & check for the same matching characteristics in the inflow to decide if it relevant information that is coming through.

 

FIREWALL RULESFirewalls rules can be customized as per your needs, requirements & security threat levels. You can create or disable firewall filter rules based on such conditions as:

Page 5: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

IP Addresses Blocking off a certain IP address or a range of IP addresses, which you think are predatory. 

Domain names You can only allow certain specific domain names to access your systems/servers or allow access to only some specified types of domain names or domain name extension like .edu or .mil. 

Protocols A firewall can decide which of the systems can allow or have access to common protocols like IP, SMTP, FTP, UDP, ICMP,Telnet or SNMP. 

TYPES OF FIREWALL Software firewalls

 New generation Operating systems come with built in firewalls or you can buy a firewall software for the computer that accesses the internet or acts as the gateway to your home network. 

Hardware firewalls Hardware firewalls are usually routers with a built in Ethernet card and hub. Your computer or computers on your network connect to this router & access the web.

Page 6: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

THERE ARE SEVERAL TYPES OF FIREWALL TECHNIQUES:

1.PACKET FILTER FIREWALL

All Internet traffic travels in the form of packets. A packet is a quantity of data of limited size, kept small for easy handling. When larger amounts of continuous data must be sent, it is broken up into numbered packets for transmission and reassembled at the receiving end. All your file downloads, Web page retrievals, emails -- all these Internet communications always occur in packets.

A packet is a series of digital numbers basically, which conveys these things:

The data, acknowledgment, request or command from the originating system The source IP address and port The destination IP address and port Information about the protocol (set of rules) by which the packet is to be handled Error checking information Usually, some sort of information about the type and status of the data being sent Often, a few other things too - which don't matter for our purposes here.

In packet filtering, only the protocol and the address information of each packet is examined. Its contents and context (its relation to other packets and to the intended application) are ignored. The firewall pays no attention to applications on the host or local network and it "knows" nothing about the sources of incoming data.

Filtering consists of examining incoming or outgoing packets and allowing or disallowing their transmission or acceptance on the basis of a set of configurable rules, called policies.

Packet filtering policies may be based upon any of the following:

Allowing or disallowing packets on the basis of the source IP address Allowing or disallowing packets on the basis of their destination port Allowing or disallowing packets according to protocol.

This is the original and most basic type of firewall.

Packet filtering alone is very effective as far as it goes but it is not foolproof security. It can potentially block all traffic, which in a sense is absolute security. But for any useful networking to occur, it must of course allow some packets to pass. Its weaknesses are:

Address information in a packet can potentially be falsified or "spoofed" by the sender

Page 7: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

The data or requests contained in allowed packets may ultimately cause unwanted things to happen, as where a hacker may exploit a known bug in a targeted Web server program to make it do his bidding, or use an ill-gotten password to gain control or access.

An ADVANTAGE of packet filtering is its relative simplicity and ease of implementation.

2.CIRCUIT LEVEL GATEWAY

Also called a "Circuit Level Gateway," this is a firewall approach that validates connections before allowing data to be exchanged.

What this means is that the firewall doesn't simply allow or disallow packets but also determines whether the connection between both ends is valid according to configurable rules, then opens a session and permits traffic only from the allowed source and possibly only for a limited period of time. Whether a connection is valid may for examples be based upon:

destination IP address and/or port source IP address and/or port time of day protocol user password

Every session of data exchange is validated and monitored and all traffic is disallowed unless a session is open.

Circuit Level Filtering takes control a step further than a Packet Filter.

Among the ADVANTAGES of a circuit relay is that it can make up for the shortcomings of the ultra-simple and exploitable UDP protocol, wherein the source address is never validated as a function of the protocol. IP spoofing can be rendered much more difficult.

A DISADVANTAGE is that Circuit Level Filtering operates at the Transport Layer and may require substantial modification of the programming which normally provides transport functions (e.g. Winsock).

3.APPLICATION GATEWAY

In this approach, the firewall goes still further in its regulation of traffic.

The Application Level Gateway acts as a proxy for applications, performing all data exchanges with the remote system in their behalf. This can render a computer behind the firewall all but invisible to the remote system.

Page 8: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

It can allow or disallow traffic according to very specific rules, for instance permitting some commands to a server but not others, limiting file access to certain types, varying rules according to authenticated users and so forth. This type of firewall may also perform very detailed logging of traffic and monitoring of events on the host system, and can often be instructed to sound alarms or notify an operator under defined conditions.

Application-level gateways are generally regarded as the most secure type of firewall. They certainly have the most sophisticated capabilities.

A DISADVANTAGE is that setup may be very complex, requiring detailed attention to the individual applications that use the gateway.

An application gateway is normally implemented on a separate computer on the network whose primary function is to provide proxy service.

4.DYNAMIC PACKET FILTERING FIREWALL

Dynamic packet filtering is a firewall and routing capability that provides network packet filtering based not only on packet information in the current packet, but also on previous packets that have been sent. For example without dynamic packet filtering, a connection response may be allowed to go from the internet to the secure part of the network. Dynamic packet filtering would consider whether a connection was started from inside the secure part of the network and only allow a connection response from the internet if the packet appeared to be a response to the request.

Dynamic packet filtering filters packets based on:

1. Administrator defined rules governing allowed ports and IP addresses at the network and transport layers of the OSI network model.

2. Connection state which considers prior packets that have gone through the firewall.

3. Packet contents including the application layer contents

Static packet filtering only filters packets based on administrator defined rules governing allowed ports and IP addresses at the network and transport layers of the OSI network model as mentioned in item 1 above. Therefore dynamic packet filtering also called stateful inspection provides additional capabilities including inspection of packet contents up to the application layer and consideration of the state of any connections.

Dynamic packet filtering provides a better level of security than static packet filtering since it takes a closer look at the contents of the packet and also

Page 9: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

considers previous connection states.

5.DISTRIBUTED FIREWALLS

Distributed firewalls are host-resident security software applications that protect the enterprise network's servers and end-user machines against unwanted intrusion. They offer the advantage of filtering traffic from both the Internet and the internal network. This enables them to prevent hacking attacks that originate from both the Internet and the internal network. This is important because the most costly and destructive attacks still originate from within the organization. They are like personal firewalls except they offer several important advantages like central management, logging, and in some cases, access-control granularity. These features are necessary to implement corporate security policies in larger enterprises. Policies can be defined and pushed out on an enterprise-wide basis.

A feature of distributed firewalls is centralized management. The ability to populate servers and end-users machines, to configure and "push out" consistent security policies helps to maximize limited resources. The ability to gather reports and maintain updates centrally makes distributed security practical. Distributed firewalls help in two ways. Remote end-user machines can be secured. Secondly, they secure critical servers on the network preventing intrusion by malicious code and "jailing" other such code by not letting the protected server be used as a launch pad for expanded attacks.

Distributed firewalls are often kernel-mode applications that sit at the bottom of the OSI stack in the operating system. They filter all traffic regardless of its origin—the Internet or the internal network. They treat both the Internet and the internal network as "unfriendly". They guard the individual machine in the same way that the perimeter firewall guards the overall network. Distributed firewalls rest on three notions:

A policy language that states what sort of connections are permitted or prohibited, Any of a number of system management tools, such as Microsoft's SMS or ASD, and IPSEC, the network-level encryption mechanism for TCP/IP.

The basic idea is simple. A compiler translates the policy language into some internal format. The system management software distributes this policy file to all hosts that are protected by the firewall. And incoming packets are accepted or rejected by each "inside" host, according to both the policy and the cryptographically-verified identity of each sender.

Page 10: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

Components of a distributed firewall

A central management system for designing the policies. A transmission system to transmit these polices. Implementation of the designed policies in the client end.

Firewall configurationThere are three types of firewall configuration

Screened Host Firewall (Single-Homed Bastion Host) configuration

Screened Host Firewall (Homed Bastion Host) configuration

Screened subnet firewall

SCREENED HOST FIREWALL (SINGLE-HOMED BASTION HOST)

The first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router, Single-homed bastion hosts can be configured as either circuit-level or application-level gateways. When using either of these two gateways, each of which is called a proxy server, the bastion host can hide the configuration of the internal network. NAT is essentially needed for developing an address scheme internally. It is a critical component of any firewall strategy. It translates the internal IP addresses to IAN Aregistered addresses to access the Internet. Hence, using NAT allows network

Page 11: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

administrators to use any internal IP address scheme. The screened host firewall is designed such that all incoming and outgoing information is passed through the bastion host. The external screening router is configured to route all incoming traffic directly to the bastion host. The screening router is also configured to route outgoing traffic only if it originates from the bastion host. This kind of configuration prevents internal clients from bypassing the bastion host. Thus, the bastion host is configured to restrict unacceptable traffic and proxy acceptable traffic. A single-homed implementation may allow a hacker to modify the router not to forward packets to the bastion host. This action would bypass the bastion host and allow the hacker directly into the network. But such a bypass usually does not happen because a network using a single-homed bastion host is normally configured to send packets only to the bastion host, and not directly to the internet.

SCREENED HOST FIREWALL, DUAL-HOMED BASTION

In firewall technology, dual-homed is one of the firewall architectures for implementing preventive security. It provides the first-line defense and protection technology for keeping untrusted bodies from compromising information security by violating trusted network space.

A dual-homed host (or dual-homed gateway) is a system fitted with two network interfaces (NICs) that sits between an untrusted network (like the internet) and trusted network (such as a corporate network) to provide secure access. Dual-homed is a general term for proxies, gateways, firewalls, or any server that provides secured applications or services directly to an untrusted network.

Page 12: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

Dual-homed hosts can be seen as a special case of bastion hosts and multi-homed hosts. They fall into the category of application-based firewalls.

SCREENED SUBNET FIREWALL

The third implementation of a firewall is the screened subnet, which is also known as a DMZ. This firewall is the most secure one among the three implementations, simply because it uses a bastion host to support both circuit- and application-level gateways. This DMZ then functions as a small isolated network positioned between the Internet and the internal network. The screened subnet firewall contains external and internal screening routers. Each is configured such that its traffic flows only to or from the bastion host. This arrangement prevents any traffic from directly traversing the DMZ subnetwork. The external screening router uses standard filtering to restrict external access to the bastion host, and rejects any traffic that does not come from the bastion host. This router also uses filters to prevent attacks such as IP spoofing and source routing. The internal screening router also uses rules to prevent spoofing and source routing. Like its external counterpart, this internal router rejects incoming packets that do not originate from the bastion host, and sends only outgoing packets to the bastion host. The benefits of the screened subnet firewall are based on the following facts. First, a hacker must subvert three separate tri-homed interfaces when he or she wants to access the internal network. But it is almost infeasible. Second, the internal network is effectively invisible to the Internet because all inbound/outbound packets go directly through the DMZ. This arrangement makes it impossible for a hacker to gain information about the internal systems because only the DMZ is advertised in the routing tables and

Page 13: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

other Internet information. Third, internal users cannot access the Internet without going through the bastion host.

PROXY SERVER

In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.

The proxy concept was invented in the early days of distributed systems as a way to simplify and control their complexity. Today, most proxies are a web proxy, allowing access to content on the World Wide Web.

TYPES OF PROXY

Forward proxies

A forward proxy taking requests from an internal network and forwarding them to the Internet.

Forward proxies are proxies where the client server names the target server to connect to. Forward proxies are able to retrieve from a wide range of sources (in most cases anywhere on the Internet).

Page 14: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

The terms "forward proxy" and "forwarding proxy" are a general description of behavior (forwarding traffic) and thus ambiguous. Except for Reverse proxy, the types of proxies described on this article are more specialized sub-types of the general forward proxy concept.

Open proxies

An open proxy forwarding requests from and to anywhere on the Internet.

An open proxy is a forwarding proxy server that is accessible by any Internet user. Gordon Lyon estimates there are "hundreds of thousands" of open proxies on the Internet.[6] An anonymous open proxy allows users to conceal their IP address while browsing the Web or using other Internet services.

Reverse proxies

A reverse proxy taking requests from the Internet and forwarding them to servers in an internal network. Those making requests connect to the proxy and may not be aware of the internal network.

A reverse proxy is a proxy server that appears to clients to be an ordinary server. Requests are forwarded to one or more origin servers which handle the request. The response is returned as if it came directly from the proxy server.[5]

Reverse proxies are installed in the neighborhood of one or more web servers. All traffic coming from the Internet and with a destination of one of the web servers goes through the proxy server. The use of "reverse" originates in its counterpart "forward proxy" since the reverse proxy sits closer to the web server and serves only a restricted set of websites.

There are several reasons for installing reverse proxy servers:

Page 15: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

Encryption / SSL acceleration: when secure web sites are created, the SSL encryption is often not done by the web server itself, but by a reverse proxy that is equipped with SSL acceleration hardware. See Secure Sockets Layer. Furthermore, a host can provide a single "SSL proxy" to provide SSL encryption for an arbitrary number of hosts; removing the need for a separate SSL Server Certificate for each host, with the downside that all hosts behind the SSL proxy have to share a common DNS name or IP address for SSL connections. This problem can partly be overcome by using the SubjectAltName feature of X.509 certificates.

Load balancing: the reverse proxy can distribute the load to several web servers, each web server serving its own application area. In such a case, the reverse proxy may need to rewrite the URLs in each web page (translation from externally known URLs to the internal locations).

Serve/cache static content: A reverse proxy can offload the web servers by caching static content like pictures and other static graphical content.

Compression: the proxy server can optimize and compress the content to speed up the load time.

Spoon feeding: reduces resource usage caused by slow clients on the web servers by caching the content the web server sent and slowly "spoon feeding" it to the client. This especially benefits dynamically generated pages.

Security: the proxy server is an additional layer of defense and can protect against some OS and WebServer specific attacks. However, it does not provide any protection to attacks against the web application or service itself, which is generally considered the larger threat.

Extranet Publishing: a reverse proxy server facing the Internet can be used to communicate to a firewalled server internal to an organization, providing extranet access to some functions while keeping the servers behind the firewalls. If used in this way, security measures should be considered to protect the rest of your infrastructure in case this server is compromised, as its web application is exposed to attack from the Internet.

USES OF PROXY SERVERS

Filtering

A content-filtering web proxy server provides administrative control over the content that may be relayed through the proxy. It is commonly used in both commercial and non-commercial organizations (especially schools) to ensure that Internet usage conforms to acceptable use policy. In some cases users can circumvent the proxy, since there are services designed to proxy information from a filtered website through a non filtered site to allow it through the user's proxy.

A content filtering proxy will often support user authentication, to control web access. It also usually produces logs, either to give detailed information about the URLs accessed by specific users, or to monitor bandwidth usage statistics. It may also communicate to

Page 16: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

daemon-based and/or ICAP-based antivirus software to provide security against virus and other malware by scanning incoming content in real time before it enters the network.

Many work places, schools, and colleges restrict the web sites and online services that are made available in their buildings. This is done either with a specialized proxy, called a content filter (both commercial and free products are available), or by using a cache-extension protocol such as ICAP, that allows plug-in extensions to an open caching architecture.

Some common methods used for content filtering include: URL or DNS blacklists, URL regex filtering, MIME filtering, or content keyword filtering. Some products have been known to employ content analysis techniques to look for traits commonly used by certain types of content providers.

Requests made to the open internet must first pass through an outbound proxy filter. The web-filtering company provides a database of URL patterns (regular expressions) with associated content attributes. This database is updated weekly by site-wide subscription, much like a virus filter subscription. The administrator instructs the web filter to ban broad classes of content (such as sports, pornography, online shopping, gambling, or social networking). Requests that match a banned URL pattern are rejected immediately.

Assuming the requested URL is acceptable, the content is then fetched by the proxy. At this point a dynamic filter may be applied on the return path. For example, JPEG files could be blocked based on flesh tone matches, or language filters could dynamically detect unwanted language. If the content is rejected then an HTTP fetch error is returned and nothing is cached.

Extranet Publishing: a reverse proxy server facing the Internet can be used to communicate to a firewalled server internal to an organization, providing extranet access to some functions while keeping the servers behind the firewalls. If used in this way, security measures should be considered to protect the rest of your infrastructure in case this server is compromised, as its web application is exposed to attack from the Internet

Most web filtering companies use an internet-wide crawling robot that assesses the likelihood that a content is a certain type. The resultant database is then corrected by manual labor based on complaints or known flaws in the content-matching algorithms.

As mentioned above, the SSL/TLS chain-of-trust does rely on trusted root certificate authorities; in a workplace setting where the client is managed by the organization, trust might be granted to a root certificate whose private key is known to the proxy. Concretely, a root certificate generated by the proxy is installed into the browser CA list by IT staff. In such scenarios, proxy analysis of the contents of a SSL/TLS transaction

Page 17: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

becomes possible. The proxy is effectively operating a man-in-the-middle attack, allowed by the client's trust of a root certificate the proxy owns.

IMPLEMENTATIONS OF PROXIES Web proxy

A proxy that focuses on World Wide Web traffic is called a "web proxy". The most common use of a web proxy is to serve as a web cache. Most proxy programs provide a means to deny access to URLs specified in a blacklist, thus providing content filtering. This is often used in a corporate, educational, or library environment, and anywhere else where content filtering is desired. Some web proxies reformat web pages for a specific purpose or audience, such as for cell phones and PDAs.

Suffix proxies

A suffix proxy server allows a user to access web content by appending the name of the proxy server to the URL of the requested content (e.g. "en.wikipedia.org.example.com"). Suffix proxy servers are easier to use than regular proxy servers.

Transparent proxies

An intercepting proxy, also known as a forced proxy or transparent proxy, is a proxy which intercepts normal communication, without clients needing any special configuration to use the proxy. Clients do not need to even be aware of the existence of the proxy. Intercepting proxies are normally located between the client and the Internet, with the proxy performing some of the functions a gateway or router.

RFC 2616 (Hypertext Transfer Protocol—HTTP/1.1) offers standard definitions:

"A 'transparent proxy' is a proxy that does not modify the request or response beyond what is required for proxy authentication and identification".

"A 'non-transparent proxy' is a proxy that modifies the request or response in order to provide some added service to the user agent, such as group annotation services, media type transformation, protocol reduction, or anonymity filtering".

A security flaw in the way that transparent proxies operate was published by Robert Auger in 2009 and advisory by the Computer Emergency Response

Page 18: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

Team was issued listing dozens of affected transparent, and intercepting proxy servers

IMPLEMENTATION METHODS

Interception can be performed using Cisco's WCCP (Web Cache Control Protocol). This proprietary protocol resides on the router and is configured from the cache, allowing the cache to determine what ports and traffic is sent to it via transparent redirection from the router. This redirection can occur in one of two ways: GRE Tunneling (OSI Layer 3) or MAC rewrites (OSI Layer 2).

Once traffic reaches the proxy machine itself interception is commonly performed with NAT (Network Address Translation). Such setups are invisible to the client browser, but leave the proxy visible to the web server and other devices on the internet side of the proxy. Recent Linux and some BSD releases provide TPROXY (transparent proxy) which performs IP-level (OSI Layer 3) transparent interception and spoofing of outbound traffic, hiding the proxy IP address from other network devices.

DETECTION

There are several methods that can often be used to detect the presence of an intercepting proxy server:

By comparing the client's external IP address to the address seen by an external web server, or sometimes by examining the HTTP headers received by a server. A number of sites have been created to address this issue, by reporting the user's IP address as seen by the site back to the user in a web page.

By comparing the sequence of network hops reported by a tool such as traceroute for a proxied protocol such as http (port 80) with that for a non proxied protocol such as SMTP (port 25).

By attempting to make a connection to an IP address at which there is known to be no server. The proxy will accept the connection and then attempt to proxy it on. When the proxy finds no server to accept the connection it may return an error message or simply close the connection to the client. This difference in behaviour is simple to detect. For example most web browsers will generate a browser created error page in the case where they cannot connect to an HTTP server but will return a different error in the case where the connection is accepted and then closed .

Page 19: Screened Host Firewall (Single-Homed Bastion Host ... · Web viewThe first type of firewall is a screened host which uses a single-homed bastion host plus a packet-filtering router,

FIREWALL CONFIGURATION AND PROXY SERVER