Internet Security - DISIcs.unibo.it/babaoglu/courses/security/lucidi/pdf/firewall.pdf · Internet...

8
ALMA MATER STUDIORUM – UNIVERSITA’ DI BOLOGNA Internet Security Firewalls Ozalp Babaoglu © Babaoglu 2001-2017 Sicurezza Overview Cryptographic technologies Secure Sockets Layer IPSec Exo-structures Firewalls Virtual Private Networks 2 © Babaoglu 2001-2017 Sicurezza Firewall “Firewall” of a car that separates the passenger compartment from the engine More like a moat around a medieval castle restricts entry to carefully controlled points prevents attackers from getting close to defenses restricts exits to carefully controlled points 3 © Babaoglu 2001-2017 Sicurezza Firewall Combination of hardware and software to regulate trac between an internal network and an external network (Internet) Benefits of being “connected” while minimizing the risks of threats 4

Transcript of Internet Security - DISIcs.unibo.it/babaoglu/courses/security/lucidi/pdf/firewall.pdf · Internet...

ALMA MATER STUDIORUM – UNIVERSITA’ DI BOLOGNA  

Internet Security FirewallsOzalp Babaoglu

© Babaoglu 2001-2017 Sicurezza

Overview

■ Cryptographic technologies ■ Secure Sockets Layer ■ IPSec

■ Exo-structures ■ Firewalls ■ Virtual Private Networks

2

© Babaoglu 2001-2017 Sicurezza

Firewall

■ “Firewall” of a car that separates the passenger compartment from the engine

■ More like a moat around a medieval castle ● restricts entry to carefully controlled points ● prevents attackers from getting close to defenses ● restricts exits to carefully controlled points

3 © Babaoglu 2001-2017 Sicurezza

Firewall

■ Combination of hardware and software to regulate traffic between an internal network and an external network (Internet)

■ Benefits of being “connected” while minimizing the risks of threats

4

© Babaoglu 2001-2017 Sicurezza

Firewall

■ What a firewall can do? ● Focus security decisions ● Enforce security policies ● Log Internet activity

■ What a firewall can’t do? ● Protect against malicious insiders ● Protect against connections that bypass it ● Protect against completely new threats ● Protect against viruses and worms ● Set itself up correctly

5 © Babaoglu 2001-2017 Sicurezza

Firewall

■ Problems with firewalls ● Interfere with the Internet end-to-end communication model ● Create false sense of perfect security ● Increase inconvenience for users

6

© Babaoglu 2001-2017 Sicurezza

Firewall Technologies

■ Packet filtering ■ Proxy servers ■ Network address translation ■ Virtual Private Networks

7 © Babaoglu 2001-2017 Sicurezza

Packet Filtering

8

© Babaoglu 2001-2017 Sicurezza

Packet Filtering

■ Implemented through a screening router (packet filter) ● Router: can the packet be routed to its destination? ● Screening router: should the packet be routed to its destination?

■ Applies a set of rules to each inbound/outbound packet and then forwards or discards it

9 © Babaoglu 2001-2017 Sicurezza

Packet Filtering

■ Decision based on information in the IP packet header ● IP source address ● IP destination address ● Protocol (TCP, UDP, ICMP) ● Source port number ● Destination port number ● Packet size

■ Additional information ● Interface the packet arrives on ● Interface the packet will go out on

10

© Babaoglu 2001-2017 Sicurezza

Stateful Packet Filtering

■ State information ● Is the packet a response to an earlier packet? ● Number of recent packets seen from the same host ● Is the packet identical to a recently seen packet? ● Is the packet a fragment?

11 © Babaoglu 2001-2017 Sicurezza

Packet Filtering

■ Advantages ● One screening router can protect the entire network ● Extremely efficient ● Widely available

■ Disadvantages ● Hard to configure ● Reduces router performance ● Limited in the range of policies that can be implemented

12

© Babaoglu 2001-2017 Sicurezza

Proxy Servers

■ Specialized application programs for Internet services (HTTP, FTP, telnet, etc.) ● Proxy server ● Proxy client

■ Need a mechanism to restrict direct communication between the internal and external networks

■ Typically combined with caching for performance ■ Effective only when used in conjunction with mechanisms that

restrict direct communications between the internal and external hosts

13 © Babaoglu 2001-2017 Sicurezza

Dual-Homed Host Proxy Servers

14

© Babaoglu 2001-2017 Sicurezza

Proxy Servers

■ Advantages ● Can perform user-level authentication ● Can do intelligent (application specific) filtering ● Can be combined with caching ● Can do good logging

■ Disadvantages ● Require different servers for each service ● Require modifications to clients

15 © Babaoglu 2001-2017 Sicurezza

Network Address Translation

■ Allows a network to use a set of addresses internally and a different set of addresses externally

■ Invented not for security but for conserving IP addresses ■ Typically implemented within a router

16

© Babaoglu 2001-2017 Sicurezza

Network Address Translation

17 © Babaoglu 2001-2017 Sicurezza

Network Address Translation

■ Advantages ● Enforces firewall control over outbound traffic ● Restricts incoming traffic (no spontaneous connections) ● Hides structure and details of internal network

■ Disadvantages ● Interferes with some encryption-based techniques ● Dynamic allocation of addresses interferes with logging ● Internal network cannot host externally-visible services (requires port

mapping)

18

© Babaoglu 2001-2017 Sicurezza

Network Address Translation with Port Forwarding

19 © Babaoglu 2001-2017 Sicurezza

Firewall Architectures

■ Host-based and “personal” ■ Screening Router ■ Dual-Homed Host ■ Screened Host ■ Screened Subnet

20

© Babaoglu 2001-2017 Sicurezza

Host-based Firewalls

■ Secures an individual host ■ Available in many operating systems ■ Commonly used to protect servers

■ Advantages ■ Highly customizable ■ Topology independent — all (internal and external) attacks must go

through the firewall ■ Extensible — new servers can be added to the network, with their

own firewall, without the need of altering the network configuration

21 © Babaoglu 2001-2017 Sicurezza

Personal Firewalls (Incoming connections)

■ Controls the traffic between a personal computer or workstation and a network (or Internet)

22

© Babaoglu 2001-2017 Sicurezza

Personal Firewalls (Outgoing connections)

23 © Babaoglu 2001-2017 Sicurezza

Screening Router

24

© Babaoglu 2001-2017 Sicurezza

Dual-Homed Host

25 © Babaoglu 2001-2017 Sicurezza

Screened Host

26

© Babaoglu 2001-2017 Sicurezza

Bastion Host

■ A computer on a network specifically designed and configured to resist attacks

■ Great exposure to attacks ■ All traffic crosses the bastion host, that can control and block/

forward it ■ Generally runs only a few applications, mainly proxies

27 © Babaoglu 2001-2017 Sicurezza

Bastion Host

■ Basic rules to set up a bastion host: ■ No other hosts can be reached from outside ■ Trusted operating system ■ No unnecessary software (no compilers) ■ Read-only file system (apart from strictly required write operations) ■ Only strictly required services ■ No user accounts ■ Additional authentication mechanisms ■ Extensive logging

28

© Babaoglu 2001-2017 Sicurezza

Screened Subnet

29

“DMZ”

“DMZ”

© Babaoglu 2001-2017 Sicurezza

Screened Subnet

■ Exterior router (access router) ■ protects DMZ (De-Militarized Zone) and internal network from Internet ■ allows incoming traffic only for bastion hosts/services.

■ Interior router (or choke router) ■ protects internal network from Internet and DMZ ■ does most of packet filtering for firewall ■ allows selected outbound services from internal network ■ limits services between bastion host and internal network

30