The use and usability of direction-based filtering in firewalls

被引:24
作者
Wool, A [1 ]
机构
[1] Tel Aviv Univ, Sch Elect Engn, IL-69978 Ramat Aviv, Israel
关键词
firewalls; packet filtering; network security; anti-spoofing;
D O I
10.1016/j.cose.2004.02.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The common match fields in firewall rules refer to a packet's source and destination IP addresses, protocol, and source and destination port numbers. However, most firewalls are also capable of filtering based on a packet's direction: which network interface card the packet is crossing, and whether the packet is crossing the interface from the network into the firewall ("inbound") or vice versa ("outbound"). Taking a packet's direction into account in the firewall's rules is extremely useful: it lets the firewall administrator protect against source address spoofing, write effective egress-filtering rules, and avoid unpleasant side-effects when referring to subnets that span the firewall. Unfortunately, the firewall's definition of a packet's direction is different from what users normally assume. If interface ethO connects the firewall to the internal network, then, from a user's perspective, "inbound on ethO" is actually "Outbound" traffic. This discrepancy makes it very confusing for firewall administrators to use the packet direction correctly, and creates a significant usability problem. In this paper we review the usefulness of direction-based filtering, identify the usability problem, and critically review the approaches taken by several major firewall vendors. Most vendors expose the raw and confusing functionality to the firewall administrators, white one vendor (Check Point) hides the functionality entirely. Both approaches leave much to be desired. However, recent advances in firewall research show that better alternatives exist: the Firmato prototype demonstrates that the firewall management software can compute the directions algorithmically for a perimeter firewall. (C) 2004 Elsevier Ltd. All rights reserved.
引用
收藏
页码:459 / 468
页数:10
相关论文
共 21 条
  • [1] [Anonymous], CISCO SECURE PIX FIR
  • [2] Firmato:: A novel firewall management toolkit
    Bartal, Y
    Mayer, A
    Nissim, K
    Wool, A
    [J]. PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, : 17 - 31
  • [3] Bellovin S. M., 1989, Computer Communication Review, V19, P32, DOI 10.1145/378444.378449
  • [4] Chapman D., 1995, Building internet firewalls
  • [5] EDMEAD MT, 2002, TISC INSIGHT JAN, V4
  • [6] FERGUSON P, 2000, 2827 INT ENG TASK FO
  • [7] *FIR WIZ, 1997, EL MAIL LIST
  • [8] HELD G, 1999, CISCO ACCESS LISTS
  • [9] JENDRICKE U, 2000, P 16 ANN COMP SEC AP
  • [10] KROGER VP, 1999, SECURITY USER INTERF