Worried about potential security gaps? Follow these seven steps to make sure your installation won’t melt under fire.
Set Up a Flame-Proof Firewall
Worried about potential security gaps? Follow these seven steps to make sure your installation won’t melt under fire.
- By Roberta Bragg
- December 01, 1999
I can still remember when most people thought a firewall
was a special wall placed in a building to prevent the
spread of fire. Now it’s just what the doctor ordered
to protect your company from those heinous hacker homies,
and sooner or later it’s going to be your job to put one
into operation. Are you up to the job? Do you know how
to install a flame-proof firewall? Here are seven sure-fire
tips on how to set up a firewall right the first time.
1. Know Why You’re Installing the Firewall
Was this your choice? Been fighting for a firewall? Has
it just become company policy? The consultants who brought
in the Web site insisted on a firewall? Your boss handed
you a box and said, “Here, go install this?” If you know
what a firewall is and why you’re installing it, this
can help dictate which features to choose during installation
and configuration, and even where you place the firewall
in your network. So that we’re on the same page, I define
a firewall as a service that limits access between the
Internet and a private network, between pairs or groups
of private networks, or between sensitive and less-sensitive
parts of private networks.
More than any other system you’ll configure, a firewall
has only one purpose in life, and its purpose may seem
to be opposite that availability/usability/ease-of-use
credo you’ve had hammered into your head all this time.
After all, by definition, a firewall blocks information
flow. So ask the question, why are we installing this
firewall? You don’t want to make it harder for people
to get information, do you?
Time to wake up. Information flow has to be controlled
like everything else. The peace, free love, and freedom
of information banner just doesn’t fly well in corporate
America. Just as we don’t want our precious laptops and
automobiles to be “borrowed” by someone else, information
in your company is critical to its survival. As rapidly
as we expand the boundaries of information access to include
our suppliers and customers, we must protect our private
information (and theirs).
The
Proxy Server Connection |
Proxy services are applications
that run on a firewall. User requests
for Internet services such as FTP, telnet,
and http are received and forwarded, according
to security policy. Proxy servers, therefore,
act as gateways and replace connections.
The client doesn’t “talk” directly to
the service. In fact, use of a proxy service
is usually transparent to the user. Proxy
services are implemented via software
and thus should be used with a mechanism
that physically prevents or restricts
direct communication between internal
and external systems. Examples of such
mechanisms are a dual-homed host (a host
with two network interfaces) and/or packet
filtering. Proxy servers require proxy
clients. Web browsers can be configured
to act as proxy clients. |
|
|
But again, why are you installing a firewall now? Are
you setting up a perimeter defense for your corporate
network? Creating a DMZ (demilitarized zone) where Web
servers and other systems that need to be accessed by
your business partners or customers can reside? Putting
up a wall around sensitive areas of your company to assure
only the select, authorized, vetted few can get in? Firewalls
are often used for all these purposes. Knowing who’s supposed
to get in, and who’s not, will help you properly configure
the firewall, as well as monitor how well it’s performing.
Understanding the type of systems that sit on either
side of the firewall helps you determine which ports to
open or close. After all, not all access is determined
by user ID. Understanding the way services and applications
communicate machine-to-machine can help us control access.
Most communication relies on connection to a standard
port number (see “Consider These Weaknesses”). Block the
wrong port and authorized work can’t continue; leave the
wrong ones open and your firewall’s got holes large enough
for dragons to fly through.
Take the time to ask:
- What are you trying to protect against? Denial of
service? Information theft? Intrusion?
- Who’s likely to be attacking your systems? Vandals?
Joyriders? Braggarts? Information spies? Inexperienced
users doing stuff they shouldn’t?” (Stupidity is hardly
an attack, but the results are the same.)
2. Read the Docs—Know All about Your
Firewall
You know the old adage… if all else fails, read the documentation.
But you can’t wait for all else to fail here. Fail to
fasten your seat belt and hit a brick wall head on—it’s
a little to late to read the instructions. Fail to configure
your firewall correctly, and you may be open to an attack
that can precipitate corporate meltdown. So grab those
docs and a good cup of latte and head for a quiet place.
All firewalls are not created equal. They don’t even work
the same way. Knowing what your firewall is supposed to
do, and how to make it do so, can give you the edge you
need to set it up right the first time. Firewalls are
complex and chances are you don’t set them up every day.
Would you try to pilot a jet with your knowledge of driving
an automobile?
I wish I had a quarter for every time someone has said
to me he found the answer to the problem he spent hours
trying to figure out in the documentation. The first firewall
I installed had a printout of a sample configuration for
very close to my exact needs. Although the documentation
was a little unclear, the screenshots showed me how to
enter appropriate information and made it easier to add
additional features. If the documentation is unintelligible,
get some help. Often the manufacturer has updated docs,
FAQs, newer versions of utilities, forums, and direct
support links on its site.
By the way, this isn’t the time to question anyone’s
judgment in choosing this particular firewall. While this
intense study of its features (or lack of them), ease
of use, and the ability of its publisher to produce usable
documentation may make you aware of its shortcomings and
make you wish you or the powers that be had chosen another
firewall, chances are you’re not going to get anywhere
by grumbling. Put the system together, do the best with
what you have, and document the need for other things
to occur to make your system safe.
A good practice is to make a list of the things the firewall
can do, such as blocking services, blocking systems, controlling
who can transfer files across the firewall, and recording
information about accesses and attempted access. This
helps you with the next step.
3. Match Features of the Product to Your
Company Security Policy
Your company security policy will tell you which features
of the firewall you’ll need to implement—and let you know
the things that the firewall can’t do. See No. 6. Don’t
know what your corporate security policy is? Find out.
Implementing a flame-proof firewall isn’t so hot if what
the company really wants to do is to toast marshmallows.
Typical implementations require you to:
- Set up filters to block services.
Does your company allow Internet Relay Chat (IRC)? Probably
not. IRC servers can be used to access IRC client machine
files, processes, and programs. Don’t let IRC users
apply these features against the unsuspecting. Do you
want ping, telnet, FTP , traceroute, or http services
to enter your network? How about providing internal
users use of these services across the Internet? Fortunately,
firewalls are usually set up on the “least privilege”
security principle and the “that which isn’t expressly
permitted is prohibited” proverb—all ports are blocked.
You don’t have to close down those with possible malicious
use; you have to open those that you want to allow.
Your security policy will tell you which ones to choose.
- Insist that your company establish
a security policy. Somebody got a great big dose
of security awareness somewhere, or the money wouldn’t
have been spent. Tell the powers-that-be that a policy
is required for proper setup. If no one will write one,
do it yourself. Having a written policy—title it, “This
is how I’m going to configure the firewall”—starts the
conversation. And, oh, get it approved. Can’t get it
approved? Well, they did tell you to set up the firewall,
didn’t they? You were going to have to make the choices
anyway. Now you’re documenting what you did and allowing
management to pass on it.
- Monitor log activity. Once
you know which logs are activated or able to be activated
and what’s being logged, you can decide how much of
this information is necessary to fulfill policy requirements.
However, don’t forget another good use of logs: maintenance.
You may want to start out logging more information than
you think you need and reducing it if you don’t feel
it adds anything to the picture. Once again, this may
be part of your security policy.
4. Get the Advice of Peers; Take a Class;
Hire an Expert
If you haven’t already joined security lists, now’s the
time to do it. A good one is ntbugtraq (www.ntbugtraq.com).
These lists provide you with an endless stream of inane
chatter about risks and perceived risks of OSs and other
products, including firewalls. You’re going to have to
filter the information, but it does provide a ready source,
and a place for you to ask specific information about
your firewall and its perceived features, benefits, and
holes.
Visit your vendor’s Web site for the latest information
and for responses to security-list tirades and public
media reviews. In our “new world,” vendors take a proactive
approach and alert users to possible holes and fixes for
their products. Visit other Web sites as well and see
what holes, fixes, and features they offer. Remember,
don’t bemoan your boss’ lack of sophistication for picking
this product; instead find out how best to implement and
use it to protect your network. A frying pan can knock
out an intruder as efficiently as a can of mace; you just
have to get a little closer.
Talk to your co-workers, talk to your friends. Attend
a seminar, meeting, conference, or class. Talk to your
fellow attendees; you may find that one of them has experience
with this product too. Get the advice of peers, but be
sure to follow the advice of experts.
At this point you’re in a great position to judge whether
or not a class will help you. If a vendor or third-party
instruction is available on your product, check it out.
Since you’ve done your homework, you stand a better chance
of finding one that fits. Ask for a curriculum outline
and match it against your requirements. Don’t be afraid
of extra topics. You’re the learner here, right? You’ll
also be better prepared for class. You know the features
you need to implement—if they aren’t covered, ask why.
Many instructors can give additional help that’s not part
of the official curriculum, but some may not. The time
to ask is before you plunk down your money.
Should you hire an expert to install the system for you?
It depends. You now should be in a better position to
judge if this is necessary and/or advisable. After all,
you need to manage the firewall when it’s up. Don’t isolate
yourself from the initial installation and configuration
process. If you feel you want to hire an expert, or if
you’ve been told to do so, now you’ll be able to judge
better the type of expert to get. Make sure that transfer
of knowledge is required. You don’t want to have to call
the expert back for every change you make. You also want
to be able to monitor the system. Although it should be
obvious by now that security policies may vary with the
company and an external expert should ask you for this
type of advice, some may not. Find out your so-called
experts’ willingness to follow your rules before they’re
hired.
Packet-Filtering
Firewall vs. Screening Router |
A packet-filtering system
selectively routes packets between hosts
in a way that implements a network’s security
policy. A packet encapsulates data sent
across a network. Each packet contains
a set of headers with information necessary
for its passage. Header information includes:
- IP source address
- IP destination address
- Protocol (TCP, UDP, ICMP)
- TCP or UDP source
- Destination port
- ICMP message type
Routers also know the interface the
packet arrived on and which interface
the packet will go out on. A regular
router looks at the destination address
of each packet and picks the best way
to get that packet to its destination.
Either the router knows how to send
the packet and thus sends it on or it
doesn’t and returns it with a “destination
unreachable” message.
A screening router examines the packet
more thoroughly. It asks the question,
“Should I send this packet on its way?”
Since Internet services (http, telnet,
ping, and so on) reside at standard
port numbers, the router can be configured
to block or allow Internet connections
by specifying the port number. A screening
router may be configured, for example,
to block all connections from the Internet
except SMTP. (You do want to receive
email, don’t you?) Or you could configure
it to block all connections from certain
systems, or allow email and FTP, but
block TFTP, RPC, IRC, and the like.
A screening router can’t be configured
to let some operations of a service
pass but block others. It’s an all-or-nothing
approach.
|
|
|
5. Isolate, Install, Test
Ready to go for it? Don’t immediately set the firewall
in its chosen place on the network. Even an attack dog
needs to be tested for his response to your commands.
Place the system in a test lab. Don’t have one? Make a
temporary lab with minimum configuration, say, one client,
the firewall, and the Internet access line. Keep the rest
of the network out of the picture for now. Armed with
your policy, notes, and extensive knowledge, install and
configure the system.
Now test it. If it’s supposed to block external users
from telnet access to internal hosts, come at it from
outside and use the telnet command. If you can get to
the internal host, you probably configured the system
wrong. Find out why and correct it.
Do all users have unlimited access to the Internet? Create
some typical user accounts, one with each type of access
you’ve designed. Then log on as those users and test.
Not sure what services applications cutting across barriers
need to use? Run them and test as well. You’ve got the
idea now. You must intimately document each feature once
again and develop test scenarios, then apply them. As
you tweak your firewall configuration, retest using each
test scenario once again. Check the firewall logs for
information gathered and lessons learned.
When your system passes your rigorous testing, it’s time
to move it to the real world. You may want to allow access
a little at a time to make sure all applications, users,
and services have access, but only the access they should
have.
6. Monitor the Firewall and Network Access
Once you’re up and running, the rule is to monitor constantly.
Don’t just monitor the firewall, monitor network access
as well. Remember, a firewall is really just a perimeter
defense. It can’t protect against all types of attack,
and it’s not the only soldier in your arsenal. A firewall
can’t protect your network from access that doesn’t go
through its system. Many current attack exploits were
carried out with social engineering and the use of viruses
or Trojans—things that firewalls usually can’t examine
packets to detect.
Firewall
Architectures |
- Dual-homed host.
A computer with at least two network
interfaces. To use this architecture
in a firewall implementation, routing
between these interfaces is disabled.
Therefore, packets from the Internet
interface can’t be routed directly
to the internal, private network.
Systems on either network can communicate
with the dual-homed host, but not
with each other. When accessing either
the external from the internal or
vice-versa is necessary, proxy services
are used.
- Screened host
or bastion host. This host
sits on the internal network. Packet
filtering at the screening router
is set up to allow external hosts
(Internet) to access the bastion host
and no other systems on the internal
network. The typical use of this system
might be an email server. The bastion
host is also allowed to make certain
types of connections to the external
world. Internal systems can connect
directly to the bastion host.
- Screened subnet
or perimeter network. This
architecture implements a perimeter
network to isolate the internal network
from the Internet. The bastion host
can easily come under attack since
it’s accessible from the Internet.
Conquering the bastion host can mean
wide-open access to your internal
network. Thus, a screened subnet can
provide further protection. A minimum
of two screening routers are used
to implement this solution—one router
between the internal network and the
perimeter network, the other between
the perimeter network and the Internet.
|
|
|
7. Lather, Rinse, Repeat!
You’ve heard the joke about the programmer who was found
dead in the shower? He had a bottle of shampoo with him
and it said, “Lather, rinse, repeat.” As you should know
by now, network defense never ends.
Consider These Weaknesses
Internet
Service |
Description |
Port |
Exploit |
SMTP |
Electronic mail |
25 |
Mail spoofing, penetrating
your network with mail exploits |
FTP |
File transfer |
20/21 |
Access to internal information,
no strong authentication |
NNTP |
Usenet news |
119 |
Denial of service |
telnet |
Remote terminal access |
23 |
No authentication |
http |
World Wide Web access |
80 |
Access to improperly protected
files |
DNS |
Host name address lookup |
53 |
Information about your internal
network |
Gopher |
Text-based, menu-oriented
tools help users find information |
70 |
Information |
WAIS |
Wide area information service,
allows multiple queries such as for documents
that contain a phrase; www.ai.mit.edu/the-net/wais.html
is a site that provides a WAIS gateway |
210 |
Information |
Archie |
Indexes of anonymous FTP
servers for file and directory names,
service via telnet and email, and Archie
clients pp or Web browsers at http-Archie
gateways; www.archie.emnet.co.uk/ |
1525 |
Allowing access to Archie
might allow access directly to NFS and
mis/yp servers |
Finger |
Looks up info about a user
who has an account on the machine being
queried: real name, login phone number,
office location, when and where most recently
logged in |
79 |
Information |
POP, POP2, POP3 |
Internet mail |
109,110 |
Password in clear issues |
whois |
Information about hosts,
networks, domains, and administrators |
43 |
Information |
talk |
Two people to hold conversation |
517 |
No authentication, so easy
way to do social engineering |
IRC |
IRC Internet relay chat;
IRC user uses IRC client or telnet; IRC
services many people at the same time |
6667 |
Many servers means access
to client files, processes, programs |
MBONE |
Multicast backbone; expanding
real-time conference services for audio,
video, and electronic whiteboard; uses:
Internet Engineering Task Force meetings,
space shuttle flight operations |
Protocol number a, filter
by this |
Can the tunnel be used as
a backdoor? |
Name services |
Used over TCP/IP to establish
identity, locate a systems, and notify
network that NetBIOS system has shut down |
137,138 |
Find easily accessed hosts
on system, learn what services are used
on hosts |
ICMP |
Internet control message |
Filter by message code |
Information source, denial
of service attack |
Ping |
Check if can reach host;
uses ICMP |
|
Verify there is such a host |
Traceroute or tracert |
Sees route packet takes
on way to destination; uses ICMP; find
location, names of routers, SNMP; manages
routers, bridges, concentrators, hubs,
hosts |
|
Find location, names of
routers. |
SNMP |
Manages routers, bridges,
concentrators, hubs, hosts |
161,162 |
Control these devices |
Network Time Protocol |
NTP—important in synchronizing
time, preventing playback attack; Kerberos
depends on time synchronization |
37 |
Lack of use of or spoofing
the NTP could result in denial of service
attacks |
NFS |
Network file system |
2049 |
Clients can read and change
files stored on server without having
to log in to the server or enter a password;
also does log transactions |
lpr and lp |
Print to printer |
|
No reason to do this across
the Internet; allows removal of information
by printing it remotely from your servers |
|
|
Once you install the firewall, you can’t
rest. In fact, it’s not a bad idea to pull out this list
periodically and make sure you’re still following these
steps to a flame-proof firewall.