• Aucun résultat trouvé

"There's nothing like a firewall"

N/A
N/A
Protected

Academic year: 2021

Partager ""There's nothing like a firewall""

Copied!
20
0
0

Texte intégral

(1)

There’s nothing like a Firewall

Olivier Paul, GET/INT

(2)

How does this relate to risk ?



From wikipedia

• Risk = (probability of incident) * (Cost of incident)



From risk evaluation techniques

• Mehari, Octave, …

• probability of incident depends on:

– Existing Vulnerabilities.

– Mitigation Measures Effectiveness.

– Attackers Ability/Will.



How to evaluate Mitigation Measures

Effectiveness ?

(3)

Alternatives



Use marketing information.



Use the documentation.

(4)

Threat Example



Traffic injection

• Known for decades

– Morris, R.T. 1985. A Weakness in the 4.2BSD UNIX TCP/IP

Software. Computing Science Technical Report No. 117, AT&T Bell

Laboratories.

– Bellovin,S. 1989. Security problems in the TCP/IP protocol suite.

ACM Computer Communications Review. volume 19:2.

– CERT® Vulnerability Note VU#498440 (TCP).

– CERT® Vulnerability Note VU#222750 (ICMP)



Cannot be fully mitigated without using crypto.



Can be partially mitigated using stateful filters.

• Restricting which packets can enter a network depending

on exiting communications parameters.

(5)

Marketing says:



Cisco IOS 12.3(T)

• “When you configure the Cisco IOS Firewall on your

Cisco router, you turn your router into an effective, robust

firewall.”



Linksys WRT54g

• “The Router protects your PC from most known Internet

attacks with a powerful Stateful Packet Inspection

firewall.”



IPFilter, IPFW, PF, Netfilter.

(6)

Comparison Scenario

1.

Setting filtering policy on

stateful filter.

2.

Generating traffic from

Initiator to Receiver.



TCP



ICMP

3.

Trying to insert traffic from

Inserter.



Varying amount of

information matching

original communication.

Initiator Ins e rte r R e c e iv e r S tate f u l F il te r

Disclaimer: Studied parameters are not comprehensive.

Other stateful filtering operations might help mitigate

traffic injection.

(7)

Comparing stateful filtering



TCP

X

X

X

X

X

X

X

Ports

X

X

X

X

X

Seq.

Num.

X

X

X

Netfilter (v 1.3.4) Conntrack (v 0.81)

X

X

IPFW (FreeBSD 6.1)

X

X

X

PF (FreeBSD 6.1)

X

X

Lynksys WRT54g (v 4.21.1)

X

X

X

IPFilter (v 4.1.8)

X

X

X

Cisco Context Based Access Control

(v 12.3(14)T2)

X

X

Cisco Reflexive Access Lists (v

12.3(14)T2)

Flags

Addr.

Proto.

Name

(8)

Comparing stateful filtering



ICMP

X

X

X

X

X

Seq.

Num.

X

X

Data

X

X

X

Netfilter (v 1.3.4) Conntrack (v 0.81)

X

X

X

IPFW (FreeBSD 6.1)

X

X

X

PF (FreeBSD 6.1)

X

X

X

Lynksys WRT54g (v 4.21.1)

X

X

X

IPFilter (v 4.1.8)

X

X

X

Cisco Context Based Access Control

(v 12.3(14)T2)

X

X

X

Cisco Reflexive Access Lists (v

12.3(14)T2)

Code

Addr.

Proto.

Name

(9)

How do you evaluate mitigation

effectiveness ?



Match marketing buzzwords to real operations

• What is “stateful” ?



Match operations with threats/vulnerabilities

• What kind of vulnerabilities does “stateful” mitigate ?



Determine level of mitigation

(10)

What about the documentation ?



From “man ipfw”:

“ N o t e t h a t n o a d d i t i o n a l a t t r i b u t e s o t h e r t h a n p r o t o c o l a n d I P a d d r e s s e s a n d p o r t s a r e c h e c k e d o n d y n a m i c r u l e s . ”

• Not as expected.



From IOS 12.3(T) Security Command Reference

• Not as expected.

“ W i t h T C P a n d U D P i n s p e c t i o n , p a c k e t s e n t e r i n g t h e n e t w o r k m u s t e x a c t l y m a t c h a n e x i s t i n g s e s s i o n : t h e e n t e r i n g p a c k e t s m u s t h a v e t h e s a m e s o u r c e o r d e s t i n a t i o n a d d r e s s e s a n d s o u r c e o r d e s t i n a t i o n p o r t n u m b e r s a s t h e e x i t i n g p a c k e t ( b u t r e v e r s e d ) . ”

(11)

What about certification using

Common Criteria PPs ?



U.S. Government Traffic-Filter Firewall Protection Profile

For Medium Robustness Environments v 1.1, January

2006.



FDP_IFF.1-NIAP-0417(1-2) Simple security attributes

• Stateful packet attributes:

– Connection-oriented protocols:

– sequence number;

– acknowledgement number; – Flags: SYN; ACK; RST; FIN;

– Connectionless protocols:

– source and destination network identifiers; – source and destination service identifiers;

(12)

What about certification using

Common Criteria PPs ?



Mapping Requirement to Security Objectives

• FDP_IFF.1-NIAP-0417(1-2)

– O.MEDIATE: The TOE must mediate the flow of information

between sets of TOE network interfaces or between a network

interface and the TOE itself in accordance with its security policy.



Mapping Security Objectives to Threats

• O.MEDIATE

– T.ADDRESS_MASQUERADE: A user on one interface may

masquerade as a user on another interface to circumvent the TOE

policy.

– T.UNAUTHORIZED_ACCESS: A user may gain access to services

(by sending data through the TOE) for which they are not authorized

according to the TOE security policy.

(13)

Conclusion



Not all mitigation devices are alike.

• 1 marketing term = many levels of mitigation.



That’s ok as long as you only care about VU#222750.

• But what about 20k other vulnerabilities ?

• And filtering software changes every other month.



Testing

• Costly (buy devices & software).

• Time consuming

– Setting up testbed, Learning filtering language, Running the test … 

Alternatives ?

(14)

Conclusion



Documentation

• Often out of sync with true features.

• Does not tell you which threats/vulnerabilities are mitigated.



Common Criteria Protection Profiles

• Lack of certified products (5/83 with PPs, 1 for 06 version).

• Time gap between Products, PPs and Certification.

• Loose mapping between threats mitigated and actual

vulnerabilities.

(15)

What I’d like



A clear description of mitigated vulnerabilities.



An estimate for the level of mitigation.

X

498440

X

Medium

222750

Strong

Weak

None

VUL#

(16)

Couldn’t I find such a thing with a

Nessus like tester ?



Most vulnerability testers require open ports.



From “Using Nessus to scan hosts behind a firewall,

Ron Gula, August 2006”:

• “The firewall policy will dictate which ports you can scan and

which you can't. Unfortunately, this requires that you know the

policy of the firewall across all hosts to judge the impact to

your scan.”



For stateful filtering evaluation you need cooperation

between victim and testing device.

(17)

Comparing stateful filtering



Cisco Reflexive Access Lists

• Since IOS 11.3.



TCP



ICMP

IP alice-em0.2222 > 192.168.4.2.62455: P 1157681637:1157681685(48) ack 2375139339 win 33304 IP 192.168.4.2.62455 > alice-em0.2222: . ack 1157681685 win 33280

IP alice-em0.2222 > 192.168.4.2.62455: . 427933754:427933774(20) ack 359869675 win 512 IP alice-em0.2222 > 192.168.4.2.62455: . 148820808:148820828(20) ack 1560354948 win 512

IP alice-em0 > 192.168.4.2: ICMP echo reply, id 58114, seq 16, length 64 IP 192.168.4.2 > alice-em0: ICMP echo request, id 58114, seq 17, length 64 IP alice-em0 > 192.168.4.2: ICMP echo reply, id 58114, seq 17, length 64 IP 192.168.4.2 > alice-em0: ICMP echo reply, id 60162, seq 0, length 8 IP 192.168.4.2 > alice-em0: ICMP echo reply, id 60162, seq 256, length 8

(18)

Comparing stateful filtering



Cisco Context Base Access Control

• Since IOS 11.2(P).

IP 192.168.4.2 > alice-em0: ICMP echo request, id 27305, seq 19, length 64 IP alice-em0 > 192.168.4.2: ICMP echo reply, id 27305, seq 19, length 64 IP alice-em0 > 192.168.4.2: ICMP echo reply, id 28841, seq 6144, length 8



TCP



ICMP

IP alice-em0.2222 > 192.168.4.2.62791: P 1813240040:1813240088(48) ack 3434482765 win 33304 IP 192.168.4.2.62791 > alice-em0.2222: . ack 1813240088 win 33280

IP alice-em0.2222 > 192.168.4.2.62791: F 1813180000:1813180020(20) ack 3434497000 win 512 IP alice-em0.2222 > 192.168.4.2.62791: F 1813180000:1813180020(20) ack 3434497000 win 512

(19)

Comparing stateful filtering



Linksys WRT54G

• Version 4.21.1

IP alice-em0.2222 > 192.168.4.2.52523: P 1229162795:1229162843(48) ack 2554302288 win 33304 IP 192.168.4.2.52523 > alice-em0.2222: . ack 1229162843 win 33280

IP alice-em0.2222 > 192.168.4.2.52523: . 1708963294:1708963314(20) ack 2099787280 win 512 IP alice-em0.2222 > 192.168.4.2.52523: . 821101742:821101762(20) ack 527062172 win 512 IP alice-em0.2222 > 192.168.4.2.52523: S 1709484311:1709484331(20) win 512

IP alice-em0.2222 > 192.168.4.2.52523: S 1289584082:1289584102(20) win 512

(20)

Comparing stateful filtering



IPFW

• (here with FreeBSD 6.1)



TCP

IP alice-em0.2222 > 192.168.4.2.53085: P 3395001447:3395001495(48) ack 2376553661 win 33304 IP 192.168.4.2.53085 > alice-em0.2222: . ack 3395001495 win 33256

IP alice-em0.2222 > 192.168.4.2.53085: S 3395001496:3395001516(20) ack 2376553661 win 512 IP alice-em0.2222 > 192.168.4.2.53085: E 3395001496:3395001516(20) win 512

Références

Documents relatifs

Le projet Brusselsspeaks fait l’objet d’une installation artistique audiovisuelle visible au 119 rue de Laeken, à 1000 Bruxelles, dans le cadre de l’exposition BXL UNIVERSEL II

Quelle que soit la case où A pose le deuxième 1, il suffit alors à B de poser un deuxième 0 au milieu d’un des cotés judicieusement choisi.. A doit alors éviter que B puisse

• Out of more than 1300 procedures of adjuvant epinephrine in digital nerve block of the toes reviewed for this study, no cases were complicated with postoperative digital ischemia

2.  A  5  mm  incision  is  made  proximally  from  the  base  of  the  nail,  about  3  mm  from  the  edge  (leaving  the  nail  bed  intact).  The 

C’est nouveau, ça vient de sortir. *Tu as lu son livre neuf ?) Ao contrário, Neuf expressa um estado inicial sob um ponto de vista Qualitativo, no sentido em que o caráter

As we are not interested in determining a winner when counting the game tree size, the number of squares in the board does not need to be a perfect square and we define s to be

There are no definite data on the prevalence of idiopathic toe-walking, but some studies record this type of behavior in 20% of subjects with Autism Spectrum Disorder [5].. Although

However, by our encoding, existing QBF solvers could not solve the open problem on HTTT, whether the first player has a winning strat- egy to achieve a Snaky on the 9 × 9 board,