Firewall Wizards mailing list archives
Re: FirePass questions
From: yossarian <yossarian () planet nl>
Date: Fri, 14 Feb 2003 22:56:41 +0100
I do not know the appliance, but having researched many of the standards used, there are same things I can explain. What interests me most, is what encryption scheme they use. First interesting claim is that key lengths up to 1024 bits are supported. Oddly, they do not tell if it is symmetric or a-symmetric. For symmetric encryption, this is considered too much, and seeing that the system uses SSL and PKI, it probably means it uses 1024 bits RSA keys - maximum. If you take the key length judged necessary by Lenstra and Verheul for non-military use, published in 1999 *Plz. do Google, it is on the web, I looked it up in a white paper -, 1024 was good enough in 2001. Since you will probably use this apparatus for at least 2 years, it means your cryptographic strength needs to be at least what is considered the minimum for 2005, i.e. 1149 bits. Secondly, it use other attributes which must be clearly defined in order to verfify its security. LDAP is a good example - it is probably used to store your public keys. Private keys are to be stored on tokens - but this is optional. Private keys stored on hard disks are extremely vulnerable, as Utimaco research three years ago proved. Or you can go without a keypair for the use - SSL can live without it. But than the only certanty you offer is to the client, that knows which server he/she is connecting to. It uses 128 bit SSL with PKI and tunnels SMB shared drives. It also claims that you can have a mixed bag of full PKI for netwrok users, and password only for Extranet. This may be possible, but it means that you have to do a full PKI implementation, and give access to systems in the network and in a DMZ - well, at least I hope the extranet is in the DMZ - to separate NetBios from real traffic. This is possible, but it might be a bit complex. Most companies that have tried doing a full PKI found out it was NOT simple at all, and that it has taken years, without any or tangible RoI. The actual management of the certificates also tends be a nightmare to admins. The support for *ANY* browser with some use (not absolutely necessary thought) for ActiveX brings several issues to light. First - the PKI and SSL support in browsers varies. IE up to somewhere in IE6 is not capable of doing chain validation for key revocation, effectively disabling the users ability to check for disabled keys. Doesn't the system mind? This might pose some real problems. Secondly, on topic of IE, what security zone settings will be necessary to use the level of functionality? Users will probably want to connect to the Internet as well, so the setting must be strict.If there are conflicts in this area, support calls will be rampant. In order to support WfW and Nt4, you cannot TCP/IP without the netbios helpers. Many features in the brochure simply cannot be supplied without some middleware, like terminal emulation in the browser. This is usually very costly, allthough some solutions are very simple to use. You'll have to use their webifyers as middleware - if you need anything of the extra features. Allthough it appears to be a hardware device, it is Intel based, so it is a PC to a certain extent, with an OS, somehow. Unfortunatily, I cannot find out what kernel it uses, or which OS. You must know this. The box itself probably loads the webifyers, turning it into a SNA gateway or whatever. This means that since it is a SPOF, this is MUSTHAVE info. Judging the low-depth info the maker supplies, I must completely agree with your distrust - it basically is an oversimplified sales pitch, but if the claims are true, it will supply you with a Plug and Play PKI and LDAP, w/o setting up user accounts, access, authorisation rules, network zoning, certificate rules and - policies.... Not likely, but if it is true and it is safe, thousands of propheads have been wrong for years, and all the woes of our work have simply vanished. Quoting a Yankee group report is usually a bad sign, IMHO. good luck - you'll need it Yossarian ----- Original Message ----- From: <john.smith () minolta-qms com> To: <firewall-wizards () honor icsalabs com> Sent: Friday, February 14, 2003 5:37 PM Subject: [fw-wiz] FirePass questions
Greetings Everyone, I've searched through the 2002 and 2003 Bugtraq, Firewall Wizards and VPN
lists and not come up with anything.
A group within our company is looking at the FirePass appliance
(www.uroam.com). The appliance appears to work by punching a hole through your firewall and offers a whole range of services.
My opinion is that this is a *very* bad thing: a) The group wants connectivity from a large enough number of locations
that filtering would be next to impossible, if not impossible, therefore we would have to allow access to it from the whole world.
b) We would eliminate the firewall from the security equation. c) We would be depending on the security of the appliance to protect the
corporation, and it is designed to *grant* access, not prevent or deny it.
My questions: 1) Does anyone have any experience with the FirePass? 2) Is there a way to securely offer access to this box? 3) Am I totally off base in my above assumptions and my analysis of the
appliance?
Chances are I will be required to install this box. In this case the
middle ground I am shooting for is only granting access to the box via VPN (even though they are eliminating 'traditional' VPN from the picture according to their literature). We already use VPN, so to me only allowing external access through the VPN is a trade-off - our security stance is no worse than it was before.
Thanks for all your help. js _______________________________________________ firewall-wizards mailing list firewall-wizards () honor icsalabs com http://honor.icsalabs.com/mailman/listinfo/firewall-wizards
_______________________________________________ firewall-wizards mailing list firewall-wizards () honor icsalabs com http://honor.icsalabs.com/mailman/listinfo/firewall-wizards
Current thread:
- FirePass questions john . smith (Feb 14)
- Re: FirePass questions yossarian (Feb 14)
- Re: FirePass questions Ben Nagy (Feb 18)
- <Possible follow-ups>
- Re: FirePass questions Joseph Steinberg (Feb 18)
