Firewall Wizards mailing list archives
Re: Citrix ICA through port 80?
From: "TC Wolsey" <twolsey () realtech com>
Date: Wed, 16 Feb 2000 10:57:22 -0500
Lance Spitzner <lance () ksni net> 02/15/00 01:10AM On Sat, 12 Feb 2000, Crispin Cowan wrote:Firewalls are to keep the bad packets out. Firewalls are completely ineffective at keeping the users in. They were not designed to contain users, and are completely incapable of containing a determined user.I'm going to disagree with you on this one :) Firewalls are designed to enforce policy. They do not work in only "one" direction, they work however you configure them to. You state the firewalls only keep users out. How does a firewall know what is 'out' and 'what' is in, they don't. Below you give an example of how traffic can be tunneled, any user can do this, in or out. In general, outbound rules do tend to be easier to subvert. However, with your DNS example, if that is allowed inbound, it to can be tunneled.For a counter-example to the idea of using firewalls to contain inside users, consider MJR's demo-ware that implemented TCP/IP over top of DNS requests. If you can get any data at all out, then you can put TCP/IP on top of it, and from there you can do anything.Thus for security purposes, firewalls are strictly access control devices to control what outsiders can do to your inside. Your firewall may be performing some kind of control on what your inside users can pass out, but it is strictly a convenience factor. A determined user can always push out if they want to.A firewall is basically a ACL device, definitely agree. Yes, a determined user can subvert outbound access (httptunnel). However, based on most production rulebases I have seen, they can also be subverted inbound.
Inbound channels can only be subverted if the consumer of the information evaluates it in a different context than the firewall. It is really about the difference between content and context. Firewalls (hopefully) evaluate the content of the data stream but they must make some assumptions about how the endpoints use that data stream. If you control the inside host that uses the inbound data and you are sure that the inside host and the firewall have the same ideas about what effects the content will have, you are set. If the firewall sees content that it judges to be benign (say ICMP echo payload) but the inside host uses that content for something other than the usual diagnostic pupose (control of a DDoS agent) there are problems.
This is why I am a big fan of proper rule base design. Personally, I feel there is too much discussion on the techinical merits of competing firewalls, and too little discussion on their implementation (i.e., architecture and rulebase design).
Any access control method has some assumptions made during the design phase. The control method can be correct, but it is only effective as long as the assumptions made regarding the environment are correct. I have to agree that more discussion on the implementation of secured networks and environments would be encouraging, at least until I can find the checkbox in the firewall GUI that reads 'Secure the environment surrounding this firewall' - don't think that I have not looked ;-)
Lance Spitzner http://www.enteract.com/~lspitz/papers.html
Regards, tcw
Current thread:
- Citrix ICA through port 80? SF BA (Feb 11)
- Re: Citrix ICA through port 80? Ivan Fox (Feb 12)
- Re: Citrix ICA through port 80? Crispin Cowan (Feb 14)
- Re: Citrix ICA through port 80? Lance Spitzner (Feb 15)
- Re: Citrix ICA through port 80? Crispin Cowan (Feb 14)
- Re: Citrix ICA through port 80? Mikael Olsson (Feb 12)
- <Possible follow-ups>
- RE: Citrix ICA through port 80? Troy Henley (Feb 12)
- Re: Citrix ICA through port 80? fgb (Feb 12)
- RE: Citrix ICA through port 80? Henry Sieff (Feb 14)
- RE: Citrix ICA through port 80? Bill Stout (Feb 15)
- RE: Citrix ICA through port 80? Sigler, Karl (Feb 15)
- Re: Citrix ICA through port 80? TC Wolsey (Feb 16)
- Re: Citrix ICA through port 80? Ivan Fox (Feb 12)
