On Fri, 28 May 1999, Mark Wallace wrote:

> I believe that the firewall provides significant additional security
> by providing a tool which assists the network (security) administrator
> to do her job.

That used to be true.  Now it's not so true, and becomming increasingly 
less so.  First of all- you make a *major* assumption that you have a 
"network (security) administrator."  Large companies have them, most 
companies don't.  If small companies have them, they don't generally have 
sufficient clue to do an in-depth protocol risk analysis.  That means 
they turn on some of the silliest things.  At that point, perhaps you can 
explain what you mean by "do her job."  That's an important distinction, 
because if the job is to provide _network_security_, then it's not 
happening in most cases.  If it's to provide a single point of failure 
chokepoint so that all the simple attacks can go though the same set of 
NICs, then yeah - hands down.  Note there's a substantial difference 
between "go through" and "are stopped at."

> Wallace's first law of firewalls "The value of the firewall is not
> in the hardware or the software, but in the genius and professionalism
> of the firewall administrator."

Wallace obviously lives in a dream world where firewall administrators 
can actually *do* something about firewalls.  I've had times when I've 
needed to pass protocols between internal segments which were firewalled 
and I've had to go in and do source code modification on things to make 
it work.  Look at what's being sold in the market today and who it's 
being sold to.  You can't get there from here.

> I can't imagine recommending to any client that they deploy the 
> level of resources appropriate to firewall administration to every node
> in the network.  The laughter which drove me from the room would cause
> permanent damage to my ears.  In the real world, my clients can only
> afford limited resources for security.

There's a *major* difference between spending limited resources on 
security and spending them on a placebo.

> The firewall creates a checkpoint where security is emphasized over
> functionality. In that sense, it is a fortified platform from which the

No longer.  We've given ground to enough braindead protocols that 
functionality is now built into application layer transport protocols 
such as HTTP.  Look at the HTTP spec and then look me in the eye and say 
it's a good protocol.

> security administrator can control traffic into and out of the network.

Can and does are completely different issues.  Look if you will at the 
Melissa virus problem and tell me what good firewalls did.  Now 
extrapolate that out to trojans over HTTP, stacks that don't need SYN 
with no ACK to have a TCP conversation, entire ranges of UDP ports open 
to hosts to allow RPC for "business critical" services...  I'm *often* 
asked to open RPC to NT machines by vendors who are shocked at my 
flat-out denial.  

> Marcus's arguments, apart from being idealistic, omit the administrator
> from the firewall. He is an integral portion of the firewall system.
> The firewall is a line in the sand.  If the network is to be attacked,
> it should be attacked here.  And I deploy my best network administrator

"Should be attacked here?"  Sorry, but I think you're missing a great deal
if you're putting all your eggs in the "attacker does what they're 
supposed to" basket.  Apart from that, the entire base argument is about 
what gets *passed through the firewall these days*.  

> at that point, to carefully monitor the behavior and security of the
> firewall.  If I believe that I'm under attack, I can quickly shift to
> a higher security posture, shutting down some services, negotiating
> some compromises with operations for the duration of the crisis.

In the next 5 years when those services *are* the business you're going 
to mandate shutting down the business during an attack?  The phrase 
"infrastructure for electronic commerce" *should* scare the hell out of 
all of us.  *If* it's the type of attack that you can figure out and shut 
down, (a) you're probably lucky and (b) the proverbial screening router 
could serve the same function at a lower cost (since you most probably 
already have one in place.)  Now, care to enumerate the value of a 
traditional bastion host again?  Fred's hit it on the head IMO - 
authentication and audit trails for the internal users.  Security is 
increasingly less of a service provided by a firewall.  

> [Aside: I'm aware that I'm giving inappropriate short shrift to 
> both insider attacks, and to modem policy/compliance defects.  Those
> are, IMHO, intrinsically attacks which are not solved by a firewall.]

Nor are an increasing rang of attacks that are allowed to pass through 
the firewall.  Meet the issue - we're passing enough crap through bad 
enough protocols that there are an increasing number of attacks which are 
"intrinsically attacks which are not solved by a firewall."  Discounting 
attacks not solved by a firewall is ... um... well... let's just say not the 
best predicate when discussing network security.

> Moreover, network administration must involve not only security control,
> but configuration control, user management, fault management, 
> performance management, etc.  I don't believe you're doing security
> management if you neglect these things. The firewall, and the associated

But you do believe you're doing it if you omit serious levels of host 
security?

> logs give me insight into the behavior of my network.  

Funnily enough, the firewall logs are the last things I'd look at for 
insight into the behaviour of my network.  Behaviour of my users, but not 
the network.

> The negotiations over which protocols should be allowed provide two 
> invaluable benefits. First, they give me insight into the real business 
> needs of my customers.  Second, they tell me how senior management
> views me.  If they don't value the service I'm providing, it is time
> to drop back to a lower security posture. 

If "lower security posture" means opening the business to significant 
potential compromise, I think that's a complete disservice to everyone in 
99.9999% of the cases it happens in.  In fact, I can think of a lot 
better words than "lower security posture."  If you don't have the real 
business needs of an entity mapped out prior to talking about passing 
protocols you're way behind.

> Summary - if you consider that the firewall is a system, including
> hardware, software, policy, and professional administration, then 
> I'd argue that firewalls are very much part of the solution. Indeed
> I argue that they're a necessary part, early in the solution.

Let's look at the state of the world.  Attack vectors that bypass, 
compromise, or tunnel through firewalls are becoming increasingly popular 
in the segment of the attacker community that isn't interested in 
breaking into Web and mail servers or trojaning dial-ups.  The ammount of 
data being passed through the typical firewall these days is so huge that 
analysis is pretty much moot.  

I think you'd be insanely surprised at what most firewall administrators are 
told to pass through their firewalls.  "Told to pass" because they *aren't* 
security officers, they're the computer resource in a small business who gets 
stuck with any information system.  In a lot of cases, those businesses 
are being led to insecurity by vendors with proprietary protocols that 
don't work well in a hostile environment.  Those vendors' margins are 
huge if they dump leased lines and force their customers to open up 
gaping holes in their firewalls.  For a small business where that service 
is a lifeblood service, the answer is almost always that they're forced 
to accept the new risk to survive.  In those cases, and they're becomming 
increasingly common, the firewall isn't providing any value that a 
screening router couldn't provide.  

If the router vendors get to authentication and logging, firewalls are 
mostly useless unless we see a culture change in protocols, applications and 
services.

Paul
-----------------------------------------------------------------------------
Paul D. Robertson      "My statements in this message are personal opinions
[EMAIL PROTECTED]      which may have no basis whatsoever in fact."
                                                                     PSB#9280

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to