RE: Firewalls [7:25757]

2001-11-12 Thread Kent Hundley

John,

The question is not as simple as it seems.  Over the past 3-4 years the
terms proxy and stateful filtering have been considerably vendorized
so that what one vendor or person refers to as a proxy may not be exactly
the same as what another vendor or person refers to.  Ditto for stateful
filtering.

The easy one first. Packet filtering, sometimes called non-stateful
filtering, works up through layer 4.  You can filter on IP address, TCP or
UDP port numbers and some limited TCP flags. (such as the SYN or ACK bit)
If a filter can do more than this, its probably a stateful filter.

The idea behind a proxy server is that a proxy server acts as a server to a
trusted client and as a client to an untrusted server.  In transparent mode,
both the trusted client and the untrusted server believe they are talking to
each other and are unaware that there is a 3rd party, the proxy, involved.
In non-transparent mode, at least the client is aware of the proxy although
the server may not be. Some applications can be proxied transparently, other
can be but require additional software, some are very difficult to proxy
transparently.

Since proxies must support the actual application used, it works through all
7 layers.  The basic idea is that since the proxy actually terminates the
connection on both the client side and the server side, it can inspect and
reject any portion of the application that does not conform to certain rules
defined by the site implementing the proxy.

While this works well in theory, in reality a true proxy can be problematic
and may not be any more secure than other methods such as SPF. (more on this
in a minute)

Stateful filtering generally implies inspecting a packet at least up through
layer 4, but not necessarily beyond that.  Strictly speaking, a SPF must be
aware of the way an app uses ports, but its arguable whether this is layer 7
awareness.  For example, an SPF must understand that FTP opens a
back-channel connection.  Some SPF's examine the FTP PORT command to see
which port the reverse connection should originate from.  This could be
called layer 7 since you must look at the actual FTP commands.  In general,
the layer at which the SPF operates depends on the application used and the
vendors implementation.  For common apps, an SPF implementation may have
limited functionality at layer 7, but for uncommon apps it is probably
functioning more at layer 4 and just maintaining state. (IP src/dst, TCP
src/dst, etc)

It is generally believed that a true proxy is more secure than SPF.  The
idea being that a proxy is forced to look at all 7 layers.  This is not
exactly true.  A proxy must terminate an application, but if an app is not
well known, it is typical for the proxy to use a plug gateway and simply
take the data from the server and give it to the client and vice versa.
Even for well-known apps, it is difficult to determine what may or may not
be dangerous content and typically a proxy will just block application
commands that are erroneous or malformed although more options may be
available for well-known apps.  Additionally, there is no technical reason
why a SPF cannot look at the data portion of a packet, in fact most SPF
implementations look at the data portion of some well-known apps and allow
limited filtering. (i.e blocking FTP get or put requests)

On top of all this, some SPF implementations have limited true proxy abilty
(i.e. Checkpoint) and some proxy implementations have some SPF ability (i.e.
Gauntlet).

That's a bit of a long-winded answer, but the skinny of all this would be:

packet filter - layer 4
SPF - layer 4-7 depending on app
proxy - layer 7 (but may not _examine_ layer 7 info depending on app, so may
really be only looking at layer 4 info)

HTH,
Kent

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
John Tafasi
Sent: Saturday, November 10, 2001 8:50 PM
To: [EMAIL PROTECTED]
Subject: CID: Firewalls [7:25757]


Hi Group,

I a little confused about osi layers at different types of firewalls work
(proxy, packet filters and stateful firewalls). Can any body help with that.

Thanks




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=25999t=25757
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Firewalls [7:25757]

2001-11-12 Thread John Tafasi

Thank you Kent for the elaborate answer. I realy appreciate it.

John
Kent Hundley  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
 John,

 The question is not as simple as it seems.  Over the past 3-4 years the
 terms proxy and stateful filtering have been considerably vendorized
 so that what one vendor or person refers to as a proxy may not be
exactly
 the same as what another vendor or person refers to.  Ditto for stateful
 filtering.

 The easy one first. Packet filtering, sometimes called non-stateful
 filtering, works up through layer 4.  You can filter on IP address, TCP or
 UDP port numbers and some limited TCP flags. (such as the SYN or ACK bit)
 If a filter can do more than this, its probably a stateful filter.

 The idea behind a proxy server is that a proxy server acts as a server to
a
 trusted client and as a client to an untrusted server.  In transparent
mode,
 both the trusted client and the untrusted server believe they are talking
to
 each other and are unaware that there is a 3rd party, the proxy, involved.
 In non-transparent mode, at least the client is aware of the proxy
although
 the server may not be. Some applications can be proxied transparently,
other
 can be but require additional software, some are very difficult to proxy
 transparently.

 Since proxies must support the actual application used, it works through
all
 7 layers.  The basic idea is that since the proxy actually terminates the
 connection on both the client side and the server side, it can inspect and
 reject any portion of the application that does not conform to certain
rules
 defined by the site implementing the proxy.

 While this works well in theory, in reality a true proxy can be
problematic
 and may not be any more secure than other methods such as SPF. (more on
this
 in a minute)

 Stateful filtering generally implies inspecting a packet at least up
through
 layer 4, but not necessarily beyond that.  Strictly speaking, a SPF must
be
 aware of the way an app uses ports, but its arguable whether this is layer
7
 awareness.  For example, an SPF must understand that FTP opens a
 back-channel connection.  Some SPF's examine the FTP PORT command to see
 which port the reverse connection should originate from.  This could be
 called layer 7 since you must look at the actual FTP commands.  In
general,
 the layer at which the SPF operates depends on the application used and
the
 vendors implementation.  For common apps, an SPF implementation may have
 limited functionality at layer 7, but for uncommon apps it is probably
 functioning more at layer 4 and just maintaining state. (IP src/dst, TCP
 src/dst, etc)

 It is generally believed that a true proxy is more secure than SPF.  The
 idea being that a proxy is forced to look at all 7 layers.  This is not
 exactly true.  A proxy must terminate an application, but if an app is not
 well known, it is typical for the proxy to use a plug gateway and simply
 take the data from the server and give it to the client and vice versa.
 Even for well-known apps, it is difficult to determine what may or may not
 be dangerous content and typically a proxy will just block application
 commands that are erroneous or malformed although more options may be
 available for well-known apps.  Additionally, there is no technical reason
 why a SPF cannot look at the data portion of a packet, in fact most SPF
 implementations look at the data portion of some well-known apps and allow
 limited filtering. (i.e blocking FTP get or put requests)

 On top of all this, some SPF implementations have limited true proxy
abilty
 (i.e. Checkpoint) and some proxy implementations have some SPF ability
(i.e.
 Gauntlet).

 That's a bit of a long-winded answer, but the skinny of all this would be:

 packet filter - layer 4
 SPF - layer 4-7 depending on app
 proxy - layer 7 (but may not _examine_ layer 7 info depending on app, so
may
 really be only looking at layer 4 info)

 HTH,
 Kent

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
 John Tafasi
 Sent: Saturday, November 10, 2001 8:50 PM
 To: [EMAIL PROTECTED]
 Subject: CID: Firewalls [7:25757]


 Hi Group,

 I a little confused about osi layers at different types of firewalls work
 (proxy, packet filters and stateful firewalls). Can any body help with
that.

 Thanks




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=26018t=25757
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



CID: Firewalls [7:25757]

2001-11-10 Thread John Tafasi

Hi Group,

I a little confused about osi layers at different types of firewalls work
(proxy, packet filters and stateful firewalls). Can any body help with that.

Thanks




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=25757t=25757
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]