Page 312 - DCAP103_Principle of operating system
P. 312

Unit 9: System Security



            Third-generation  firewalls,  in  addition  to  what  first-  and  second-generation  look  for,  regard   Notes
            placement of each individual packet within the packet series. This technology is generally referred
            to as a stateful packet inspection as it maintains records of all connections passing through the
            firewall and is able to determine whether a packet is the start of a new connection, a part of
            an existing connection, or is an invalid packet. Though there is still a set of static rules in such
            a firewall, the state of a connection can itself be one of the criteria which trigger specific rules.
            This type of firewall can actually be exploited by certain Denial-of-service attacks which can fill
            the connection tables with illegitimate connections.
            9.6.4 Subsequent Developments

            In 1992, Bob Braden and Annette DeSchon at the University of Southern California (USC) were
            refining the concept of a firewall. The product known as “Visas” was the first system to have
            a visual integration interface with colours and icons, which could be easily implemented and
            accessed  on a computer operating system such as Microsoft’s  Windows or Apple’s MacOS.
            In 1994, an Israeli company called Check Point Software Technologies built this into readily
            available software known as FireWall-1.
            The existing deep packet inspection functionality of modern firewalls can be shared by Intrusion-
            prevention systems (IPS).

            Currently, the Middlebox Communication Working Group of the Internet Engineering Task Force
            (IETF) is working on standardizing protocols for managing firewalls and other middleboxes.

            Another axis of development is about integrating identity of users into Firewall rules. Many
            firewalls provide such features by binding user identities to IP or MAC addresses, which is very
            approximate and can be easily turned around. The NuFW firewall provides real identity-based
            firewalling, by requesting the user’s signature for each connection. authpf on BSD systems loads
            firewall rules dynamically per user, after authentication via SSH.
            9.6.5 Types

            There are several classifications of firewalls depending on where the communication is taking
            place, where the communication is intercepted and the state that is being traced.
            9.6.5.1 Network Layer and Packet Filters

            Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP
            protocol stack, not allowing packets to pass through the firewall unless they match the established
            rule set. The firewall administrator may define the rules; or default rules may apply. The term
            “packet filter” originated in the context of BSD operating systems.

            Network  layer  firewalls  generally  fall  into  two  subcategories,  stateful  and  stateless.  Stateful
            firewalls maintain context about active sessions, and use that “state information” to speed packet
            processing. Any existing network connection can be described by several properties, including
            source and destination IP address, UDP or TCP ports, and the current stage of the connection’s
            lifetime (including session initiation, handshaking, data transfer, or completion connection). If
            a packet does not match an existing connection, it will be evaluated according to the rule set
            for new connections. If a packet matches an existing connection based on comparison with the
            firewall’s state table, it will be allowed to pass without further processing.





                                             LOVELY PROFESSIONAL UNIVERSITY                                   305
   307   308   309   310   311   312   313   314   315   316   317