Вы находитесь на странице: 1из 7

Security:Overview

Understanding
Firewalls
Link your LAN to the Internet and you open it up not just to your legitimate users but to the
whole world. A firewall can help to ensure that your corporate information is only available to
those entitled to see it.

By David Morton

H igh on the list of things which


the administrators of net-
works are being asked to do is
the connection of the isolated LAN to
the outset, a direct connection from
your company’s network to the In-
ternet is the equivalent of knocking a
substantial hole through the wall of
be from within your company.
Such a barrier is known as a fire-
wall, after the type of installation used
in the construction industry to stop the
the global Internet. your stock room to the street outside. spread of a fire from one part of a
In many cases the initial require- Just as that hole would make it easier building to another (despite the curi-
ment will only specify email: few com- for your mail-room staff to carry your ous illustrations used in some maga-
panies perceive an immediate benefit product out to your customers’ vehi- zines, it’s nothing to do with a wall of
in allowing their staff to surf the net in cles, it lets others walk in and remove fire).
their desktop machines. valuable items. The only difference is In this sense it’s something of a mis-
However, as most of us have dis- that while you can see light-fingered nomer: a real firewall usually only de-
covered over the years, initial require- individuals making off with your lays the fire’s spread for long enough
ments have a habit of growing with stock, you may never know that some- for the occupants to leave and the fire
time. What was seen initially as a sim- one’s made off with your list of suppli- fighters to arrive. It also doesn’t as-
ple SMTP and POP3 requirement, to ers, customers, or the plans for next sume that there’s always a fire on one
collect incoming mail and deliver it to year’s world-beating product. side of it, and something expensive
the right desktop, can soon grow, as and flammable on the other. By com-
the benefits of Web access for market The Firewall parison an Internet firewall has to as-
research, and the potential of corporate sume that there are all the fires of hell
Web sites for the dissemination of in- Between your network and the out- on the outside and that the contents of
formation to customers, become ap- side world, you must have a barrier your network are slightly more com-
parent to the management. which restricts access only to those bustible than a stick of dynamite
But before you connect your com- whom you wish to enter, and which soaked in petrol.
pany’s network to the Internet, there only allows those individuals to com- It’s important to realise that, no
are a number of things which you must municate in a manner which you de- matter how cleverly you design and
consider. Most of us are familiar with fine: you can let them read the Web implement your Internet firewall, and
the benefits of leased lines against pages on your HTTP server, but they however finely its configuration is
ISDN, or the advantages of large glob- must not be able to read the company honed, it is of value only in conjunction
ally-recognised ISPs over their smaller accounts or send mail using your with a correctly-specified security pol-
competitors. But at least as important SMTP server and hence pretending to icy. Just because you have a firewall
as the technological and managerial
considerations is the concept of secu-
rity. While your site is an island, dis-
connected from the rest of the Net, it is
secure against attack from outside.
“A direct connection from your
Once connected, it’s potentially as easy
for your vital data to leak out as it is for
company’s network to the Internet is
your users to read a newsgroup or look
at a Web page.
the equivalent of knocking a substantial
hole through the wall of your stock
Risks
room to the street outside.”
If you don’t plan and implement
appropriate security precautions from

Issue 86 (August 1997) Page 11


PC Network Advisor File: S0499.1
Security:Overview

product installed and configured, even if it never goes near any top-secret spare hard disk capacity to store pi-
doesn’t mean that you can dispense files. The files which the intruder has rated software, pornography etc. If the
with such network niceties as secret accessed may not have contained any computer press finds out about this,
passwords or sensible access controls great secrets, but will it be inconven- your public relations and marketing
from user accounts, any more than ient if the information in them has been staff are going to have a hard time
locking the street door lets you dis- changed very slightly? How important explaining that you really do take se-
pense with the safe in the cash office. is it to you that you can rely on the curity seriously within your organisa-
information you store on your system? tion. Your customers won’t be too
The Risk Of Connection And if the information isn’t important impressed either.
enough for you to want to protect, why
Remember that any connection to are you wasting disk space storing it? Denial Of Service
the Internet is a potential security hole
and that an attacker doesn’t necessar- Resources In addition to simple intrusion and
ily need a permanent connection like a actual data theft, there is a third type of
leased line to gain access. A leased line While the intruder is wandering attack to consider: this is known as
gives the attacker a more reliable target round your system looking up your denial of service, often abbreviated to
to aim at, but a dial-up connection us- canteen’s casserole recipe, they’re con- DoS. This may take the form of mail-
ing a modem or ISDN can be just as suming resources. Not a great many, if bombing, where vast quantities of
vulnerable. they’re just listing files, but they’re email are sent to the victim’s site until
In the case of ISDN, many ISPs op- your resources, you paid for them, and the mail system is overwhelmed. An
erate a “dial back” system. When you don’t really want to hand them out even more violent intrusion may in-
someone tries to access your site (be to everyone who strolls by. volve sending large numbers of net-
they welcome visitor or unwelcome as- work requests into the system under
sailant) the ISP’s ISDN system dials Reputation attack. Each request needs to be dealt
your site and then drops the line, indi- with and resources assigned to handle
cating to your connection that it should Finally, and perhaps most impor- the traffic. If enough network requests
dial back and establish communication tantly, you need to protect your repu- can be fired into the system from out-
(it’s done this way so that you pay the tation. If your system has an Internet side, then the valid requests generated
call costs, rather than the ISP). With connection, then it’s highly likely that internally will be swamped, and the
this arrangement an ISDN connection you send mail using the SMTP proto- entire network brought to its knees.
can be available to the attacker virtu- col, so one of your machines will be Such attacks don’t just come from
ally on demand. Unlike a modem con- running an SMTP server. If you’re con- personal enemies or commercial rivals.
nection there’s no requirement for nected to the net with no security bar- It’s easy to imagine that, since you have
someone, or some automated process rier then it’s quite possible for someone no antagonists and your competitors
within the company, to have made the to connect to that SMTP server and are all gentlemen, that there’s no like-
connection to the outside world before send a mail message which appears - lihood of such attacks being mounted.
the attacker can strike. However even as far as the recipient can tell - to have Sadly there are those who - rather like
a modem connection can be held up by come from your site. Such a message youths who steal cars for kicks - like to
an attacker: the assailant sends a large could be obscene, illegal or any combi- mount such attacks purely as a form of
email message, knowing that the next nation of the two, and you may be “sport”, and who enjoy keeping a score
automatic mail connection will be up completely unable to prove that the of the networks they’ve visited, the
for a considerable period, during message wasn’t sent by an employee. embarrassing mail messages they’ve
which time an attack can be mounted. The damage done to a company’s forged, and the servers they’ve
reputation in this way could be incal- crashed (or run the latest interactive
Possessions culable. game server on, without permission).
Also, it’s possible for intruders to Don’t assume for a moment that
Having decided you need protec- break into your system and use your anyone needs detailed technical exper-
tion, it’s worth considering what you
need to protect. Most of us imagine
that an attack will be restricted to an
attempt to access secret data, and we “It’s quite possible for someone to connect
may consider that all the important
data is adequately protected already. to that SMTP server and send a mail mes-
Perhaps accounts and personnel data
is kept on a separate network, one sage which appears - as far as the recipient
which will not be connected to the out-
side world, or perhaps we believe that can tell - to have come from your site.”
encrypting such files will be sufficient.
But an attack can cost time and money

File: S0499.2
PC Network Advisor Issue 86 (August 1997) Page 12
Security:Overview

Firewalls

tise in order to crash your system. Once who only do such things for economic for a user to turn a Windows machine
a method is discovered, it rarely takes gain. Sad to say this isn’t true, as some into a server “just to share the data for
more than a couple of days before an of the most significant threats come an urgent report with Fred down the
“exploit script” is posted to the hack- from those individuals who’re doing it corridor” without realising that - in
ing-related Internet newsgroups. The for the thrill of the chase, or who derive some configurations - he’s just shared
most infamous exploit utility is WIN- pleasure from sheer vandalism, mak- that directory with the entire wired
NUKE - run it on your PC while dialled ing their day by deleting (if you’re world. Indeed in some cases creating
up to the Internet, type in the address lucky) or minutely altering (if you’re such an insecure share can expose not
of a Web server, and WINNUKE at- not) someone else’s quarterly results. just that subdirectory, but the entire
tempts to crash it. If that server is run- The kind of attacker who will break drive.
ning under Windows NT, WINNUKE into a system and wreak havoc simply
will probably succeed, too, because it to add another victim to their score, Network Model
exploits a recently-discovered bug in won’t care that the victim is a company When you’re connecting your inter-
the way that NT handles certain in- no one’s ever heard of, it’s simply one nal network to the Internet, what is
coming packets. more on the score sheet. Indeed some required is known as a Network secu-
such individuals are thought to target rity model. In implementing a Net-
The Best Policy new arrivals on the Internet (by watch- work security model and controlling
ing publicly available sources of regis- network access to all your hosts and
Having decided that attacks can tration information), which makes it services, rather than securing them in-
and most probably will happen, the doubly important to establish your se- dividually with a host security ap-
next stage is to decide your security curity policy and secure the system proach, a single network firewall can
policy, which is an essential precursor before you establish your connection: protect hundreds or even thousands of
to the design and implementation of don’t connect and assume you can tidy machines.
your firewall. Security policies can be up the details later, because the dam- With a correctly-configured fire-
divided into four categories. age may already have been done. wall, even the most suicidal user can
only breach the security of their ma-
Do Nothing Host Model chine within the confines of the net-
You can choose to have no security The third type of security model is work within the firewall, and not
policy at all. This is an approach which the one which most network managers expose the system to outside interfer-
is only appropriate to those with noth- and administrators are familiar with: ence no matter how hard he tries.
ing whatsoever to protect. the host security model. In this case, That’s not to say that a firewall
each host is secured separately and should be used as an excuse to aban-
Obscurity every effort is made to eliminate secu- don the basics of good host security.
A second approach is known as se- rity holes on a host-by-host basis. The Just because you’ve bought the best
curity through obscurity: the assump- problem with this is that it tends to firewall product available for your net-
tion that because you’re a small assume that all those who are in a po- work configuration, and paid a con-
company or even a single-user ma- sition to change the configuration of a sultant vast amounts of money to set it
chine and not a household name, no- host machine are sufficiently knowl- up, does not give your users carte
one will ever find you or if they do find edgeable about the hazards and blanche to abandon the basics of per-
you, they won’t be interested in your threats to that machine. While this is sonal passwords which are kept secure
data. the case when there are defined roles (and not on a note stuck to the screen).
This approach makes a fundamen- for servers and workstations (as in the A firewall should always be an adjunct
tally flawed assumption: it assumes days when we all had DOS clients and to good host security, not as a substi-
that attacks on your data, resources or NetWare servers) those boundaries are tute.
reputation come from rational people now much less defined. It’s quite easy
Firewall Functions
Logically a network firewall is less
“With a correctly-configured firewall, of the impenetrable barrier suggested
by the “firewall” metaphor and more
even the most suicidal user can only closely akin to the moat around a me-
dieval castle - complete with draw-
breach the security of their machine bridge - or perhaps an international
border, with barbed wire and mine-
within the confines of the network fields perforated by controlled cross-
ing points. It restricts all accesses from
within the firewall.” outside the network to a carefully con-
trolled point, it prevents the attackers
from even testing your other defences

Issue 86 (August 1997) Page 13


PC Network Advisor File: S0499.3
Security:Overview

(such as an individual host’s security) system to your site simply to imple- lightly. Even hardened firewall ex-
and it restricts traffic leaving the net- ment this one function. An NT firewall perts have been known to spend many
work for the outside world to the same may be less developed, but if your net- expensive days getting things right.
point. work administrators know and under- Whole weighty text books exist on the
Having made sure that all traffic stand NT, you’re much more likely to subject, some of which are only com-
entering or leaving your company’s get a solid and secure configuration prehensible to those with a degree in
network passes through this one point from that, than if the same team are obscure languages and advanced ob-
- the firewall - the firewall software can fumbling about on a Unix machine fuscatory techniques.
then ensure that all traffic passing they don’t fully understand.
through it conforms to the security pol- However there are other crucial An Example
icy. This security definition depends considerations when considering the
on your system requirements, and is a choice of platform for your firewall, To take the simplest possible case as
matter for careful consideration when not least of these is cost. If you choose an example of a firewall in action, we
configuring the firewall software itself. Linux (the free Unix clone) as the oper- might choose what is known as a “dual
However the firewall configuration is ating system for the machine which homed host” architecture. In this im-
only a small part of the whole problem will run your firewall software, then all plementation we have a host computer
of defining how your site security of the software you need is available which has two network interfaces. One
should work: it’s no good having the free and much of it comes with the of these is connected to our internal
most rigorous firewall implementa- more comprehensive Linux distribu- network and is probably physically
tion in the world if your users are al- tion sets. On the other hand if the idea represented by an Ethernet card. The
lowed to have modems in their of getting security software for nothing other is connected to the outside
workstations and dial up their own bothers you, and you’re unsure about world, or “hot” side of the firewall.
Internet accounts from the desktop to using something as strange as Linux, This might be another Ethernet card
collect their personal mail. then you may wish to consider a com- connected to an ISDN or leased line
mercial alternative. Be prepared to dig router, an ISDN Terminal Adapter, or
Platform Choice deep, however, as some of these com- even a humble modem.
mercial firewall packages come expen- Normally such a dual-homed ma-
Physically the firewall is unlikely to sive. Shiva’s Raptor product for NT, chine would route network packets
be one identifiable lump of hardware for example, costs US$6,500 for 50 us- from one network interface to the
with a large “firewall” label on it. It is ers rising to US$15,000 for the unlim- other. All data that needs to get from
much more likely to be a combination ited version. [An article on setting up a one network to the other would simply
of hardware components - such as a Linux firewall is currently being prepared go in through one end of the firewall
router and one or more host machines for future publication - Ed.] machine and pass straight out the
- which may be dedicated to the task of The detailed implementation of a other side.
running the firewall, or which may un- firewall can be a hugely complex field, But to serve as a firewall machine,
dertake other tasks in addition to this with variations on numbers of routers, this facility is disabled. IP packets from
role. There’s no security reason why the presence of one or more so-called the Internet can reach this host, but can
the host machine running the firewall “bastion hosts”, ie, machines to which go no further, and in the same way
software should run the same operat- incoming attacks are deflected by the packets from the internal network can
ing system as the rest of your network firewall. reach it, but cannot leak out onto the
- you don’t necessarily need an NT Even when one of these many archi- Internet outside.
firewall for an NT network or a Net- tectures has been chosen because of its Of course such a configuration
Ware version for a Novell site. The suitability to the network you wish to would have little utility. You could
firewall is simply a black box, and protect, the configuration of the soft- achieve the same level of service (ie
what goes on inside it is of no relevance ware is not something to be taken none at all) by simply not connecting
to the way you manage it.
Indeed in many installations the
only machine in the building running
a flavour of Unix may be the one im-
plementing the firewall and the In-
“Physically the firewall is unlikely to be
ternet connection. This is because the
history of Unix and the Internet is such
one identifiable lump of hardware with
that Unix firewalls have been under
development for much longer, and are
a large “firewall” label on it. It is much
much better understood by systems
administrators than their younger sib-
more likely to be a combination of
lings. Of course, there may be good
management reasons for not introduc-
hardware components.”
ing an entire new network operating

File: S0499.4
PC Network Advisor Issue 86 (August 1997) Page 14
Security:Overview

Firewalls

to the Internet at all. What our firewall The next level of complexity might as detecting failed login attempts on a
machine now has to do is act as a filter be to allow email packets to flow, but host security system: a few dropped
of the data passing through it: to per- to block all packets to and from hosts packets may not be significant, but a
mit some kinds of connection and data, which you know to be dangerous: a consistent pattern should be examined
and to forbid others. colleague has suggested that the local in greater detail: perhaps with a view
schools and educational estab- to implementing more draconian fil-
Packet Filtering lishments might come into this cate- tering on packets from the host in ques-
gory, although that might appear a tion.
This filter has to look at the data rather harsh judgement to some. You The problem with packet filtering
packets arriving at each side, and de- can make the packet filtering ever on its own is that it is something of an
cide if it is appropriate to pass them more complex: allow ftp, for example, all-or-nothing operation. If you choose
through. An IP packet has a header but block telnet, rlogin or similarly to allow a service, then you allow all
which contains information on the hazardous operations. elements of that service. If you wish to
source address, the destination ad- permit some operations within a serv-
dress, the source and destination ports, Rules ice but deny others, then a packet fil-
what protocol the packet represents, tering system like a screening router
and so on. When a conventional router It’s important that the software you may not be sufficient. Certainly a sim-
handles an IP packet, it only makes one use to implement packet filtering has ple packet filtering scheme on a hard-
important decision: if it knows how to an understandable way of applying ware router should not be regarded as
send the packet on its way to the cor- the filtering rules, and that it applies sufficient protection on its own, in any
rect destination address it does so; if it the rules in the order you specify them. but the simplest - and most severely
can’t do this, it returns the packet to the Some packet filtering systems have filtered - implementations. While a
sender with a message saying that the been known to attempt to re-order the screening router can provide a reason-
destination is unreachable. rules to make the filtering software able degree of protection from unso-
But the router within our firewall is more efficient and to improve its per- phisticated attacks, it can sometimes be
more cunning than this. It’s what is formance. The problem with this kind overcome, and should be used in con-
known as a screening router. This of improvement is that it can lead to junction with other techniques.
looks not just at the source and desti- unexpected results, and be difficult - if
nation addresses, but at the type of not impossible - to debug when you The Proxy Server
protocol and the port which the packet find that packets you would wish to
represents. The screening router have transmitted unimpaired are be- One way of giving greater control to
doesn’t only consider if it can pass the ing dropped on the machine room the system administrator, and greater
packet on to the destination address, floor by the screening router. flexibility to the firewall, is to use
but also if it would be a breach of the Equally important is that the router proxy servers. These reside on the
security policy if it were to do so. should log those packets which it re- dual-homed host already mentioned
In an email-only installation you jects. This is essential, not only in the and effectively impersonate the In-
might configure the screening router to setup and debugging phase, but in the ternet, to the user within your net-
block all incoming packets other than day to day operation of a screening work. This is - as far as the user is
SMTP, and this is a common configu- router. If you don’t log the dropped concerned - a rather good example of
ration when sites have only a hard- packets (and check the logs regularly), smoke and mirrors: the users think
ware router to implement a simple the screening router will leave you they’re directly connected to the In-
firewall. In this case it’s likely that the blissfully unaware of an attack in pro- ternet and that their commands are
outgoing packets will not be filtered at gress until the attacker finds a chink in directly controlling the real server,
all: everyone within the firewall has your armour and wreaks havoc with however in reality their instructions -
access to everything outside. your system. This is just as important and packets - go no further than the
machine running the proxy - all at-
tempts to make a direct connection are
filtered by the screening router.
“It’s important that the software you If we consider the example of a
proxy ftp server, this would run on the
use to implement packet filtering has an firewall machine, and the user’s ftp
client would communicate with it. The
understandable way of applying the proxy server in turn would communi-
cate with the real ftp server out on the
filtering rules, and that it applies the Internet. Requests for file transfers
from the client machine are not passed
rules in the order you specify them.” directly to the unknown server but are
first screened by the proxy, which can
implement rules according to the site’s

Issue 86 (August 1997) Page 15


PC Network Advisor File: S0499.5
Security:Overview

security policy. For example, one Unix host in the building, this tempta- If it seems like too complex a prob-
might choose to block access to files tion should be firmly resisted. It’s a lem to tackle, treat it as an opportunity
from certain sites, or more realistically good idea to ensure that - from the to really understand how your valu-
one might forbid outgoing file traffic point of view of the outside attacker - able data is secured, what policies
from all but a chosen few machines the firewall machine looks an unattrac- you’re implementing, and how you’re
and to a chosen few trusted recipients. tive and boring target. It should have controlling them. Examine your mana-
Such proxy servers are available for no user accounts, nor anything resem- gerial approach to data security, see
most of the common Internet proto- bling interesting data. Ideally it ap- what policies are defined, and which
cols: Telnet, ftp, http etc and if the fire- pears as just one IP address with no ones you have allowed to define them-
wall machine is running Linux, they’re further hosts visible beyond it, and for selves, or just grow and change at ran-
available free. From the user’s point of all the attacker knows it might be a dom. But above all do consider all this
view the client software may need to solitary home user’s machine with no before you make that fateful connec-
be told that it’s communicating via a useful data on it worth stealing. tion, otherwise you may find you’ve
proxy, but this is usually a minor con- closed the firewall only after your
figuration option. On Microsoft’s In- Conclusion building’s ablaze.
ternet Explorer, for example, it is only
necessary to tell the software that a It’s important to realise just what a
proxy server is being used, and the firewall - any firewall, no matter how
address of the machine on which the complex the implementation - can do
server resides. Once the client software for you, and what it can not. It can
has been set up, so far as the user’s concentrate your security efforts to one
concerned he has a conventional con- single point, and enforce a well-de-
nection to the Internet, until they at- fined security policy. It can limit your
tempt to do something that the security exposure to outside threats but only
policy doesn’t permit. those you have anticipated. If a new
It’s important to realise that a proxy threat arises which wasn’t taken into
server is not - on its own - any form of consideration when the design and
effective firewall. In addition to pro- configuration of the firewall (and its
viding a proxy, you have to implement associated security policy) was being
a packet filtering screening router to planned, then it won’t protect you.
completely block any direct access to Equally it won’t protect against vi-
the Internet from the users’ machines. ruses (it has no way of knowing that a
All too often one sees proxy servers network packet is part of a virus) or
described as security mechanisms, against incompetent or malicious staff. PCNA
when on their own they are no more If there are ways around the firewall
than an Internet cache: something (like other access ports to the Internet
which can be quite useful, but which from workstations) then it’s as useless
should not be confused with a secure as a real firewall with a large hole in it.
system. However if things do start to go wrong,
and you’ve controlled your access to
Monitoring and from the Internet with a well-con-
figured firewall, it represents the best
An additional benefit of a proxy way to log and monitor what new
server and packet filtering system,is threat has appeared or what unantici-
that it makes monitoring of Internet pated problem has come to light, so
use quite straightforward. While most that steps can be taken to combat the
users might not be delighted to dis- new hazard.
cover that the jpeg files they’ve been But the most complicated firewall
viewing at lunch-time are listed - and implementation imaginable won’t
possibly cached - in the proxy server, protect your valuable data, if it’s im-
from a system administrator’s point of plemented as part of an ill thought out
view letting this fact “leak out” to the and implemented security policy or if The Author
users can have a dramatic - and highly you treat it as an afterthought to be
beneficial - effect on the cost of a dial- bolted on to your Internet connection David Morton (dmorton@cix.-
up connection. when you’ve got the bugs out and it’s co.uk) is a networking consultant
While it’s tempting to add a few all working nicely. It must be planned and freelance writer, who pre-
more useful services to the firewall ma- carefully, before you expose your com- viously worked in an R&D capac-
chine - after all it’s probably not doing pany data to the hazards of the In- ity at the BBC.
very much, and it might be the only ternet.

File: S0499.6
PC Network Advisor Issue 86 (August 1997) Page 16
New Reviews from Tech Support Alert

Anti-Trojan Software Reviews


A detailed review of six of the best anti trojan software programs. Two products
were impressive with a clear gap between these and other contenders in their
ability to detect and remove dangerous modern trojans.

Inkjet Printer Cartridge Suppliers


Everyone gets inundated by hundreds of ads for inkjet printer cartridges, all
claiming to be the cheapest or best. But which vendor do you believe? Our
editors decided to put them to the test by anonymously buying printer cartridges
and testing them in our office inkjet printers. Many suppliers disappointed but we
came up with several web sites that offer good quality cheap inkjet cartridges
with impressive customer service.

Windows Backup Software


In this review we looked at 18 different backup software products for home or
SOHO use. In the end we could only recommend six though only two were good
enough to get our “Editor’s Choice” award

The 46 Best Freeware Programs


There are many free utilities that perform as well or better than expensive
commercial products. Our Editor Ian Richards picks out his selection of the very
best freeware programs and he comes up with some real gems.

Tech Support Alert


http://www.techsupportalert.com

Вам также может понравиться