
Firewall Wizards mailing list archives
Re: Thoughts on the new Cisco ASA 5500 firewalls
From: Chris Byrd <cbyrd01 () gmail com>
Date: Sat, 21 May 2005 21:57:15 -0500
Marcus J. Ranum wrote:
Every vendor in the security space has marketing departments, and the job of marking folks has always been to overhype products, so try to not let it bother you so much. The trick is in seperating the wheat from the chaff.The problem with that approach is that in order to make a wise decision about trade-offs and compromises you need to understand what you are measuring - and virtually nobody does that. They just jump to "Well, we CAN'T compromise on performance so we'll put a swiss-cheese 'stateful' firewall in because their powerpoints say they're really FAST and their competitors are really slow and we don't really even KNOW what loads our network really handles anyhow so since we're so completely ignorant we'll buy the SHINY one."
I doubt that 'virtually nobody' models traffic and understands traffic loads, at least I'd hope not. However, I do agree that on Internet facing firewalls the performance problems are often downplayed or overhyped, depending on what suits the Suits. Most good network designs include firewalls in the interior of the network, and often that is where the performance bottlenecks occur.
Are you proposing that all security functions should be consoldated into a single device? If not, I don't see why stateful firewalls lack of application proxies means that 'they suck'. Security controls should be implimented at several layers of the network.Most implementations of stateful firewalls are backed up by application proxies on the most popular protocols such as HTTP and FTP.Yeah, because they suck. :)
That is why security professionals have jobs, to guide them to better decisions. Will some network managers make the wrong decision? Sure. But that won't be a first.The purpose of the DI firewall in this case is to remove the "low hanging fruit" of worms, network scans, etc., and let the application proxy catch the rest.No, you're wrong. What's going on is that network managers are going to put these "deep inspection" devices in place, feel safe, and never make any effort to understand if they are effective or not.
A simple NAT router can block some worms and scans. A properly configured stateful firewall blocks more. Even if a DI firewall only blocked an additional 12 worms with signatures, that would be 12 more than the stateful firewall. Am I saying that this should be the only line of defence for a company? Not at all. Most companies have something that looks like this:You fell for it too. Observe your comment above: "worms, network scans, etc." *WHICH* worms? Hey, some of these "deep inspection" devices know how to block 12 different worms! WOW! *WHICH* scans? Guess what? NONE of them block scans. Go find me a "deep inspection" firewall that "knows" how to block scans. They don't block scans because a lot of scans look like Chuck's 'legitimate' traffic and cannot be blocked. They don't block denial-of-service attacks - except for a few that aren't being used anymore like ping-of-death that are easy to detect. So you're already talking like this device does something useful and haven't made any assessment as to what it actually does and whether that'd be useful to you in the first place.
Internet --> Screening router --> IPS --> Stateful FW --> Application proxies/AV/Content filter --> Host-based IPS
... and that is on top of all the other security controls such as rulesets, AV, policies, device hardening, patching, etc.
Also, note that an application proxy cannot stop ANY attack or payload that conforms to protocol specifications, unless it has been configured to do so. For an example, take a look at skape's paper on tunneling traffic through HTTP via hijacking IE to load an ActiveX control at: http://www.uninformed.org/?v=1&a=3&t=pdf
Because I have not seen an application proxy firewall that impliments the proxies in ASICs, FPGAs, or other logic chips, hence the assertion that they are done in gereral purpose processors. For example, the Sidewinder G2 runs Sendmail for SMTP proxying. If you know of an exception to this, please share it with us.Further, proxy firewalls have their downsides. Application proxies are implemented in general purpose processors, limiting their overall performance.They are? *ALL* of them? Really? Why?
No, but I doubt it's much worse than doing the same on a proxy fw. Signatures and "basic" protocol conformance can be implimented in ASICs, something that Cisco is claiming to have done.Have you measured what happens to a "deep inspection" firewall when you turn on URL screening and it's no longer going through the fast path in the switch and is being vectored instead to the general purpose processor running Web Trends? 'Cuz that's what happens.
I havn't looked at Juniper's fw specifically, but I doubt that they ignore their stateful firewall rules if traffic doesn't match a supported DI protocol, and I have a hunch that they have a default deny any rule at the end of their rulebase.An application proxy must be written for every possible protocol.So does a "deep inspection" module, if it's "deep" in any sense of the word. Look at something like NetScreen's documentation on their current firewall - it has "deep inspection" for 6 whole Internet application protocols! WOW! What does it do with protocols it doesn't have "deep inspection" for? Well, it lets the traffic scream right through, doesn't it? WOW! That sounds to me like 'default permit' which is idiot quality security.
You've got a good point there. As much as I'd like to point out that several IPS products can use a pre-loaded private key for an "authorized MITM" to analyze the traffic, so could proxy firewalls.Encrypted traffic often defies proxying.Encrypted traffic always defies "deep inspection"
Good luck selling that to management for the line-of-business applications. Anyone else on the list able to make the "I don't care if you need it, you can't have it, because the firewall I chose doesn't support it" proposition work? I've got a hunch the answer is no, illustrated by the Sidewinder G2 having a stateful traffic filter for unsupported application traffic.And, despite best intentions, sometimes applications don't always follow protocol rules.Yes, and when they don't, they should be blocked and investigated.
- Chris _______________________________________________ firewall-wizards mailing list firewall-wizards () honor icsalabs com http://honor.icsalabs.com/mailman/listinfo/firewall-wizards
Current thread:
- Thoughts on the new Cisco ASA 5500 firewalls Chris Byrd (May 18)
- Re: Thoughts on the new Cisco ASA 5500 firewalls Paul D. Robertson (May 19)
- RE: Thoughts on the new Cisco ASA 5500 firewalls Paul Melson (May 19)
- Re: Thoughts on the new Cisco ASA 5500 firewalls ArkanoiD (May 20)
- Message not available
- Re: Thoughts on the new Cisco ASA 5500 firewalls Chris Byrd (May 19)
- Re: Thoughts on the new Cisco ASA 5500 firewalls Tichomir Kotek (May 20)
- Re: Thoughts on the new Cisco ASA 5500 firewalls ArkanoiD (May 20)
- Re: Thoughts on the new Cisco ASA 5500 firewalls Marcus J. Ranum (May 20)
- Message not available
- Re: Thoughts on the new Cisco ASA 5500 firewalls Marcus J. Ranum (May 21)
- Re: Thoughts on the new Cisco ASA 5500 firewalls Chris Byrd (May 24)
- RE: Thoughts on the new Cisco ASA 5500 firewalls Paul Melson (May 19)
- Re: Thoughts on the new Cisco ASA 5500 firewalls Paul D. Robertson (May 19)