Dear All:

I have been getting a number of off-list replies to my query and have been 
responding to them likewise.  I therefore thought that I should post a 
summary of information discussed to the list.

Kyle Haugsness provided references of a number of switch vulnerabilities.

Richard Taylor gave this published reference:
Building Internet Firewalls, 2nd Edition,  Elizabeth D. Zwicky, Simon
Cooper, & D. Brent Chapman, O'Reilly & Associates, Page 101
"You should not rely on VLANs to provide strong, secure separation between
networks"
"they provide a small measure of increased security over a plain switched"

Michael Hamelin also provided references to switch vulnerabilities.  He 
also wrote, "I have serious reservations about trusting a VLAN outside the 
Firewall."

In replying to these individuals, I stated my views:
"In most of the diagrams that I have seen, the physical connectivity is 
usually stylized and never actually show details down to the actual 
switches, hubs, or cables (10base-T, baseband, broadband, etc.) that 
compose the logical LAN segments.  In addition, the switch vendors (e.g.; 
Cisco, 3Com, ...) will all tell you that it is "safe" to use a single 
intelligent switch configured with logically isolated VLANs to build such 
an architecture.  Since I started in information security at a defense 
contractor, I tend to adhere to the belief that individual physical 
segments is the best way to ensure that the two security domains will 
remain safely isolated in the event of an equipment failure in the device 
providing the interconnection."
"My concern ... stems from the rare situation when the switch fails in such 
a way as to loose its configuration.  Almost every network device (e.g.; 
switch, router, ...) that I have seen will default to all ports open (i.e.; 
a bridged configuration) in such situations.  Only purpose built firewalls 
are normally designed to forbid all traffic if they were to fail the same way."

In summation, at this time it appears that the consensus is: Connecting 
both the external and internal ports of a firewall to a single switch is an 
architectural approach that does not represent "best practice."

I can only hope that:
(1) The switch vendors work to rectify the vulnerability to the 
satisfaction of an independent, third party review acceptable to the industry.
(2) That the authors of firewall books, such as those by Cheswick & 
Bellovin, Goncalves & Brown, and Zwicky, Cooper, & Chapman, add a 
discussion on this matter the next time their books are revised.  (If any 
of these authors are monitoring this list, I'd love to hear your comments 
about this.)

Respectfully;

Marc Mandel
[EMAIL PROTECTED]

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to