PSU CSE 543 - A Quantitative Study of Firewall Configuration Errors

Unformatted text preview:

A QuantitativeStudy of FirewallConfiguration ErrorsAvishai Wool, Tel Aviv UnivPresented bySaurabh JainIntroduction The protection thatfirewalls provide is onlyas good as the policythey are configured toimplement. Corporate firewalls areoften enforcing rule setsthat violate wellestablished securityguidelines.Methodology Data collection – 37 Check point FireWall-1Rule sets. (out of hundreds of thousands) Could be biased towards badly configured.Rule-set Complexity RC = Rules + Objects + Interfaces(Interfaces – 1)/2 Rules:- No of rules implementing thepolicy. (contains sources, destinations,service objects) Can have more than one interfaces in onenetwork.Configuration Errors No stealth rule – From anywhere to thefirewall, with any service, DROP.Checkpoint implicit rules – DNS-TCP,DNS-UDP, TCMP-any to any.Insecure firewall management. Accessto the firewall over insecure,unencrypted, and poorly authenticatedprotocols—such as telnet, ftp, orx11—counted as errorConfiguration Errors..Too many management machines -Allowing management sessions frommore than five machines was countedas a configuration error.External management machines. Anerror was counted if machines outsidethe network’s perimeter could managethe firewall. Allowing any NetBIOS service to crossthe firewall in any direction counted asan error.Configuration Errors.. RPCs include theNetwork File Systemprotocol, whichpotentially exposesall the organization’sfile system.Zone-spanningobjects“Any” service oninbound rules.“Any” destination onoutbound rules.Results and AnalysisResults and AnalysisTake Away:- Small is beautifulTHANK


View Full Document

PSU CSE 543 - A Quantitative Study of Firewall Configuration Errors

Documents in this Course
Agenda

Agenda

14 pages

HYDRA

HYDRA

11 pages

PRIMA

PRIMA

15 pages

CLIMATE

CLIMATE

15 pages

Load more
Download A Quantitative Study of Firewall Configuration Errors
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view A Quantitative Study of Firewall Configuration Errors and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view A Quantitative Study of Firewall Configuration Errors 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?