Title: Internet Security: Building a Fortress around your Data
1Internet SecurityBuilding a Fortress around
your Data
Kevin BoldingElectrical EngineeringSeattle
Pacific University
2Security
- Who is inside?
- People
- Computers
- Other networked resources
- Who needs to be kept out?
- People
- Wanderers
- Hackers
- Probe programs
3A Firewall/Gateway
- Our Trusted LAN users would like a connection to
the Internet...
- The Firewall is the area where no connections are
allowed to be made to the outside world
- A Gateway is the point where data can be
transferred between the LAN and the outside world
4Security in the whole
Internet
- Any data transfer across the firewall outside of
the gateway violates its integrity
Gateway
Firewall
- Other Internet connections
- Your security policy mustaddress all of
theseissues first
5Gateway Security (Firewalls)
- Firewall components have three basic elements
- Packet filtering
- Drops incoming packets from non-authorized hosts
- Circuit-level gateway
- Matches incoming packets to internally-generated
requests
- Proxy servers (application gateway)
- Analyzes incoming messages for content
- Firewall implementations may use any combination
of the three main elements
6Packet Filtering
Reject fromAccept from...
- Router bridges the firewall
- Checks all packets crossing it
Internet
- Works at the network level with IP, so can scan
- IP source/destination addresses
- Protocol (TCP, UDP, etc.)
- Source/destination ports
- Telnet port 23, Http port 80, etc.
Firewall
- Can filter on any of the above properties
- Ex Disallow all incoming telnet connections to
all hosts except 128.95.1.4 - Ex Disallow all incoming packets from host
24.1.2.3 - Ex Disallow all incoming packets except on port
80 (Http)
Normally the first rule in a packet filter is
always Deny All
7Pros/Cons of Packet Filtering
- Pros
- You need a router anyway
- Most routers support packet filtering
- Provides good security when set up properly
- Cons
- The IP header is the only basis for filtering
- Often filters too much
- Have to trade security for convenience
- Very difficult to set up the right filters
- Need to change filtering as network needs change
8Circuit Level Firewalls
- Packet filtering is often too rigid
- Allows or denies access for broad classes for all
time
- Circuit Level Filtering
- Takes advantage of TCP connections
- Insider (trusted) sets up TCP connection with
outside host - Filter allows incoming packets from that outside
host as long as they belong to the original TCP
connection
Circuit Level Filtering works at the Transport
Layer, while Packet Filtering works at the
Network Layer
9Application Level Firewalls
- Circuit- and Packet-Level Firewalls deal only
with information in the TCP and IP headers
- What about Content?
- Application Level Firewalls examine the content
of incoming messages - Pass on only those that meet strict requirements
- At the application level, everything is
possible... - Passwords/Account names are visible
- Content screening can be done
- Application level host must be a Bastion Host
- Hardened version of OS
10Application Level - Proxy Servers
- Force all communication across a gateway through
proxies - Proxy web servers, email servers, telnet clients,
etc.
Internet
Proxy Client
- Proxy Server portion of gateway communicates with
insiders
Analysis
Proxy Server
- Proxy Client portion of gateway communicates with
outsiders
Firewall
- Any communication between client and server must
undergo analysis
11Advanced Firewall Techniques
- Dynamic Packet Filtering
- Packet filtering that relies on TCP port numbers
wont work with UDP packets. - Either allow all UDP accesses or disable all of
them
- Dynamic Packet Filtering keeps state for UDP
packets - Matches requests from inside with outside
responses
- Network Address Translation
- A router may translate all internal addresses
into different external addresses - Avoids exposing internal architecture to the
Internet
12A Full System Using a DMZ