Chapter_6 Flashcards
Firewall
A combination of hardware and software that isolates internal net from larger Internet,
allowing some packets to pass, blocking others.
Firewall Locations in the Network
Between internal LAN and external network
At the gateways of sensitive subnetworks
within the organizational LAN
On end-user machines
Firewalls: Why?
Prevent denial of service attacks: E.g., SYN flooding:
Prevent illegal access of internal data
Allow only authorized access to inside network
Firewalls: Philosophies
1. Block all dangerous destinations
or
2. Block everything; unblock things known to
be both safe and necessary
Option 1: gets you into an arms race with the
attackers; you have to know everything that is
dangerous, in all parts of your network
Option 2: is much safer
TRUE
Firewalls: Types
Filtering firewalls
Proxy firewalls
Stateless Packet Filtering: Examples
slide 15
Packet Filtering
Packet filtering operates by sequentially
checking filtering rules against the datagram being inspected; the first rule matching the datagram determines the action taken
Packet Filtering Advantages:
Simplicity
Transparency to users
High speed
Packet Filtering Disadvantages:
Difficulty of setting up packet filter rules
Lack of authentication
Possible attacks and appropriate
countermeasures
IP address spoofing: Intruder attempts to gain access by altering a packet’s IP address
Countermeasure: discard packets with an inside source address if the packet arrives on an external interface
Source routing attacks: source station specifies the route that a packet should take as it crosses the Internet, to bypass security
measures
Countermeasure: discard all packets that use this option
Tiny fragment attacks: intruder uses the IP fragmentation option
force the TCP header information into a separate packet fragment.
This attack is designed to circumvent filtering rules that depend on
TCP header information.
Countermeasure: discard all packets where the protocol type is TCP
and IP Fragment Flag is equal to 1
Session (Stateful) Packet Filteri
Track status of every TCP connection
Track connection setup (SYN), teardown (FIN): can
determine whether incoming, outgoing packets “makes sense”
Timeout inactive connections at firewall: no longer admit
packets
Proxy Firewalls
Packet-level filtering allows an org to perform coarse-grain filtering on IP/TCP/UDP headers, including IP addr, port #, and acknowledgment bits
Proxy Firewalls Application level
Filters packets on application data as well as on IP/TCP/UDP fields Example: allow select internal users to telnet outside host-to-gateway telnet session gateway-to-remote host telnet session application gateway router and filter 1. Require all telnet users to telnet through gateway 2. For authorized users, gateway sets up telnet connection to destination host. Gateway relays data between two connections 3. Router filter (blocks) all telnet connections not originating from gateway
Proxy Firewalls Application level
Advantages:
Higher security than packet filters
Only need to scrutinize a few allowable applications
Easy to log and audit all incoming traffic
Disadvantages:
Additional processing overhead on each connection (2
spliced connections b/w the end users, gateway as splice
point)
Circuit-level Gateway
Typical use is a situation in which the system
administrator trusts the internal users
An example is the SOCKS package