Evaluating Your Firewall
Source: informit.com - Posted by Vincenzo Ciaglia   
Firewalls Are you an administrator or security analyst who watches over a firewall with a hundred or more rules? Or perhaps a hired gun who must review a firewall with years of crusty buildup? Are you creating a test lab that involves a wide variety of networks, servers, and risks? If you're interested in enterprise-level firewalls, this article will help you make sense of common failures in processes and tools. We'll focus on enterprise-grade business and networking issues that affect firewalls. (Penetration studies and piercing firewalls from the outside will be covered in a later article.)

The Value of Firewalls

Once upon a time, many major institutions felt that they could run without firewalls, concentrating instead on server security. It wasn't long before intruders used all kinds of low-level, network-type attacks against such institutions:

* Intruders might start a TCP connection but never complete the dialogue. Soon the server's TCP connection table would fill with empty connections that must wait for connection timeout values to be exhausted. (Imagine someone phoning you and never saying a word; you would just have to wait until the caller hung up.)

* The attacker might fake a message from one machine to another. The packet/message would tell the character generation (CHARGEN) service to send a return message to the impersonated machine's ECHO service. Much like the Abbott and Costello "Who's on first?" comedy routine, ECHO would echo back, CHARGEN would generate a character back to machine 1, whose ECHO routine would echo back, and so on. Soon, both machines would be locked in this two-way dialogue, like arguing politicians.

* Within ICMP, a message can be sent to a server, directing the server to use the attacker's device as the default gateway. Intruders would send this message to a server to force the server to route through an attack machine that would sniff (review and record) packets. Plain-text protocols such as FTP and Telnet could be hacked even in a switched network. The ICMP redirect is one message that few people remember when securing networks.

Read this full article at informit.com

Only registered users can write comments.
Please login or register.

Powered by AkoComment!