On 23 Mar 2008 at 7:58, Ed Flecko wrote:

> The book is called "Counter Hack Reloaded: A Step-by-Step Guide to
> Computer Attacks and Effective Defenses (2nd Edition)" -
> http://www.amazon.com/Counter-Hack-Reloaded-Step-Step/dp/0131481045/re
> f=pd_bb
> s_1?ie=UTF8&s=books&qid=1206284032&sr=8-1
> 
> The author makes several references to "proxy firewalls" and implies
> they are more secure than "traditional" firewalls because they
> ignore
> typical reconnaissance, probing attempts like nmap, etc. because
> they
> function at the application layer.

Assuming you have correctly understood the author's intent, then he is 
completely wrong. There is no difference in the abilities of either 
proxy or packet-filtering firewalls to block probing (reconnaissance) 
attempts. In fact, it is much much easier to configure a stealthy (or 
"invisible") firewall with a powerful packet filtering engine like 
OpenBSD's pf.

The main argument about proxy firewalls being more secure focuses on 
the ease of configuration, or more specifically on the fact that it is 
fairly easy for a novice to mis-configure a packet-filter wide open, 
whereas a well designed application gateway will preclude such a faux-
pas.

The second half of the same argument has to do with content analysis -- 
application gateways (proxies) by definition operate at the application 
layer and have an inherent ability to analyze the application specific 
data content and react accordingly, including extensive data re-writing 
and manipulation. A properly designed packet filter operates only on 
TCP/IP headers and is oblivious of the payload (data content). This is 
the reason OpenBSD's pf(4) requires the support of ftp-proxy(8) to 
allow FTP data transfers across the firewall. For a thorough discussion 
of this issue (payload manipulation on the firewall) please check the 
list archives -- there has been a number of excellent threads recently.

If you've come from Linux world or have looked at some Linux-based 
commercial firewalls, you have probably seen the term "deep packet 
inspection". That is an ugly hack whereby the packet filter uses 
various special cases to examine the payload of the packets passing the 
firewall. While at first glance this approach seems to provide more 
control than generic packet header filtering, it still falls way short 
of the capabilities and reliability of a true proxy -- after all, it 
still operates on individual packets and will miss many things due to 
normal or malicious fragmentation.

So, to bring it back to your original question, a typical SOHO OpenBSD 
firewall is a packet filtering firewall even with a Squid Cache 
running. After all, which part of the firewall actually implements the 
security policy and handles the traffic control?

BTW, even if you were to add some application gateways to your OpenBSD 
firewall, you would only have a "hybrid" firewall, i.e. one that 
combines the features and functionality of both packet filtering and 
proxying. The classic, or "true" proxy firewall turns IP forwarding off 
and requires that any traffic crossing the firewall use a dedicated 
proxy. Such firewalls are never transparent -- the client computers 
always make their connections to the firewall itself regardless of what 
the ultimate destination may be. Moreover, because they require a 
specialized application (the proxy) for every type of communication 
that is to be supported across the firewall, they are typically very 
expensive -- too many development hours for a share of a relatively 
small market of deep-pocketed customers ;-)

> 
> Ed
> 
> On Sat, Mar 22, 2008 at 7:38 AM, Lars Noodin
> <[EMAIL PROTECTED]>
> wrote:
> > Ed Flecko wrote:
> >  > I'm reading a book on network security and it mentions "proxy
> >  > firewalls" ... are there other "proxy firewalls" the
> >  > author is referring to?
> >
> >  Which book?  Title, author, ISBN would help.  Or send a link to a
> review.
> >
> >
> >  > As a matter of curiosity, has anyone ran an nmap scan against
> an
> >  > OpenBSD box with Squid? What did the scan results indicate?
> >
> >  The results depend entirely on how you have Squid set up and how PF
> is
> >  configured.
> >
> >  Regards,
> >  -Lars
> 
> 

---------------------------------------------------------
System Administrator                    [EMAIL PROTECTED]
Bitwise Internet Technologies, Inc.
22 Drydock Avenue                     tel: (617) 737-1837
Boston, MA 02210                      fax: (617) 439-4941

Reply via email to