Firewall: Role of Firewalls in Web Security
Firewall: Role of Firewalls in Web Security
1) Packet filtering
2) Application gateways
3) Logging and detection of suspicious activity
The last item may range in capability, from creating log entries for excessive login
attempts to notification of operators via e-mail or pagers to intrusion/detection
systems that build user profiles and raise alarms when out-of-bound behavior occurs.
Up until now, the term ``firewall'' has been used here somewhat loosely, since firewall
systems can range greatly in how well they implement the above components. The
most common type of firewall is simply a router that has the capability to filter
TCP/IP packets based on information fields in each packet. Less common but more
secure are systems that include packet filtering as well as logging and application
gateways for telnet, ftp, or e-mail. These firewalls may actually be a collection of
systems such as a router, an application gateway system, and a system for logging.
Also found are firewall systems that simply block all traffic, thus completely cutting
off network access except for those users with accounts on the firewall system.
However, since packet filtering capability appears to be the common component in
most firewall systems, the following paragraphs go into more detail on packet filtering
than the other components.
1) Packet Filtering
The primary activity of a firewall is filtering packets that pass to and from the Internet
and the protected subnet. Filtering packets can limit or disable services such as NFS
or telnet, restrict access to and from specific systems or domains, and hide
information about subnets. A firewall could filter the following fields within packets:
In almost all cases, packet filtering is done using a packet filtering router designed for
filtering packets as they pass between the router's interfaces.
2) Application Gateways
After packet filtering and logging, application gateways function to provide a higher
level of security for applications such as telnet, ftp, or SMTP that are not blocked at
the firewall. An application gateway is typically located such that all application
traffic destined for hosts within the protected subnet must first be sent to the
application gateway (in other words, any application traffic that is not directed at the
application gateway gets rejected via packet filtering). After performing some action,
the application gateway may pass the traffic on to a host or may reject the traffic if it
is not authorized. Application gateways are also referred to as ``proxy servers.''
A site would use application gateways to provide a ``guarded gate'' through which
application traffic must first pass before being permitted access to specific systems.
As an example of an application gateway for telnet, a site might advertise only the
name of the telnet gateway to outside users and not the names of specific hosts. The
protocol for connecting to specific internal hosts would be as follows:
1. a user first telnets to the application gateway and enters the name of the desired
host;
2. the gateway perhaps checks the user's source IP address and accepts or rejects it
according to any access criteria in place;
3. the user may need to authenticate herself using an authentication token such as
a challenge-response device;
4. the gateway then creates a telnet connection to the desired host;
5. the user's system knows only that the telnet session is between the user's system
and the application gateway; and
6. the application gateway logs the connection, including the connection's
origination address, destination, time of day, and duration.
Application gateways, then, have a number of advantages over the default mode of
permitting application traffic directly to internal hosts:
What type of traffic should be logged? In addition to standard logging that would
include statistics on packet types, frequency, and source/destination addresses, the
following types of activity should be captured:
Logs will have to be read frequently. If suspicious behavior is detected, a call to the
site's administrator can often determine the source of the behavior and put an end to it,
however the firewall administrator also has the option of blocking traffic from the
offending site.
Firewall Limitations