Você está na página 1de 6

Firewall (computing)

1

Firewall (computing)

A firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a brigade between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted. [1]

Firewall (computing) Firewall (computing) A firewall can either be software-based or hardware-based and is used tooperating system s include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions. History The term firewall originally referred to a wall intended to confine a fire or potential fire within a building. Later uses refer to similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment. Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and An example of a user interface for a firewall on Ubuntu ( Gufw ) connectivity. The predecessors to firewalls for network security were the routers used in the late 1980s: • Clifford Stoll 's discovery of German spies tampering with his system • Bill Cheswick's "Evening with Berferd" 1992 in which he set up a simple electronic to observe an attacker • In 1988, an employee at the NASA Ames Research Center in California sent a memo b y email to his collea g ues • that read , "We are currentl y under attack from an Internet VIRUS ! It has hit Berkeley , UC San Diego , Lawrence Livermore , Stanford , and NASA Ames ." The Morris Worm spread itself through multiple vulnerabilities in the machines of the time. Although it was not malicious in intent, the Morris Worm was the first large scale attack on Internet security; the online community was neither expecting an attack nor prepared to deal with one. " id="pdf-obj-0-16" src="pdf-obj-0-16.jpg">

An illustration of where a firewall would be located in a network.

Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions. [2]

History

The term firewall originally referred to a wall intended to confine a fire or potential fire within a building. Later uses refer to similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment.

Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and

Firewall (computing) Firewall (computing) A firewall can either be software-based or hardware-based and is used tooperating system s include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions. History The term firewall originally referred to a wall intended to confine a fire or potential fire within a building. Later uses refer to similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment. Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and An example of a user interface for a firewall on Ubuntu ( Gufw ) connectivity. The predecessors to firewalls for network security were the routers used in the late 1980s: • Clifford Stoll 's discovery of German spies tampering with his system • Bill Cheswick's "Evening with Berferd" 1992 in which he set up a simple electronic to observe an attacker • In 1988, an employee at the NASA Ames Research Center in California sent a memo b y email to his collea g ues • that read , "We are currentl y under attack from an Internet VIRUS ! It has hit Berkeley , UC San Diego , Lawrence Livermore , Stanford , and NASA Ames ." The Morris Worm spread itself through multiple vulnerabilities in the machines of the time. Although it was not malicious in intent, the Morris Worm was the first large scale attack on Internet security; the online community was neither expecting an attack nor prepared to deal with one. " id="pdf-obj-0-35" src="pdf-obj-0-35.jpg">

An example of a user interface for a firewall on Ubuntu (Gufw)

connectivity. The predecessors to firewalls for network security were the routers used in the late 1980s: [3]

Clifford Stoll's discovery of German spies tampering with his system [3]

Bill Cheswick's "Evening with Berferd" 1992 in which he set up a simple electronic to observe an attacker [3]

In 1988, an employee at the NASA Ames Research Center in California sent a memo by email to his colleagues [4]

that read, "We are currently under attack from an Internet VIRUS! It has hit Berkeley, UC San Diego, Lawrence Livermore, Stanford, and NASA Ames." The Morris Worm spread itself through multiple vulnerabilities in the machines of the time. Although it was not malicious in intent, the Morris Worm was the first large scale attack on Internet security; the online community was neither expecting an attack nor prepared to deal with one. [5]

Firewall (computing)

2

First generation: packet filters

The first paper published on firewall technology was in 1988, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls. This fairly basic system was the first generation of what became a highly involved and technical internet security feature. At AT&T Bell Labs, Bill Cheswick and Steve Bellovin were continuing their research in packet filtering and developed a working model for their own company based on their original first generation architecture. [6]

Packet filters act by inspecting the "packets" which transfer between computers on the Internet. If a packet matches the packet filter's set of rules, the packet filter will drop (silently discard) the packet, or reject it (discard it, and send "error responses" to the source).

This type of packet filtering pays no attention to whether a packet is part of an existing stream of traffic (i.e. it stores no information on connection "state"). Instead, it filters each packet based only on information contained in the packet itself (most commonly using a combination of the packet's source and destination address, its protocol, and, for TCP and UDP traffic, the port number). [7]

TCP and UDP protocols constitute most communication over the Internet, and because TCP and UDP traffic by convention uses well known ports for particular types of traffic, a "stateless" packet filter can distinguish between, and thus control, those types of traffic (such as web browsing, remote printing, email transmission, file transfer), unless the machines on each side of the packet filter are both using the same non-standard ports. [8]

Packet filtering firewalls work mainly on the first three layers of the OSI reference model, which means most of the work is done between the network and physical layers, with a little bit of peeking into the transport layer to figure out source and destination port numbers. [9] When a packet originates from the sender and filters through a firewall, the device checks for matches to any of the packet filtering rules that are configured in the firewall and drops or rejects the packet accordingly. When the packet passes through the firewall, it filters the packet on a protocol/port number basis (GSS). For example, if a rule in the firewall exists to block telnet access, then the firewall will block the TCP protocol for port number 23. [10]

Second generation: "stateful" filters

From 1989-1990 three colleagues from AT&T Bell Laboratories, Dave Presetto, Janardan Sharma, and Kshitij Nigam, developed the second generation of firewalls, calling them circuit level firewalls.

Second-generation firewalls perform the work of their first-generation predecessors but operate up to layer 4 (transport layer) of the OSI model. This is achieved by retaining packets until enough are available to make a judgement about its state. [11] Known as stateful packet inspection, it records all connections passing through it determines whether a packet is the start of a new connection, a part of an existing connection, or not part of any connection. Though static rules are still used, these rules can now contain connection state as one of their test criteria.

Certain denial-of-service attacks bombard the firewall with thousands of fake connection packets to in an attempt to overwhelm it by filling up its connection state memory. [12]

Firewall (computing)

3

Third generation: application layer

The key benefit of application layer filtering is that it can "understand" certain applications and protocols (such as File Transfer Protocol (FTP), Domain Name System (DNS), or Hypertext Transfer Protocol (HTTP). This is useful as it is able to detect if an unwanted protocol is attempting to bypass the firewall on an allowed port, or detect if a protocol is being abused in any harmful way.

The existing deep packet inspection functionality of modern firewalls can be shared by Intrusion prevention systems (IPS).

Currently, the Middlebox Communication Working Group of the Internet Engineering Task Force (IETF) is working on standardizing protocols for managing firewalls and other middleboxes.

Another axis of development is about integrating identity of users into Firewall rules. Many firewalls provide such features by binding user identities to IP or MAC addresses, which is very approximate and can be easily turned around. The NuFW firewall provides real identity-based firewalling, by requesting the user's signature for each connection. authpf on BSD systems loads firewall rules dynamically per user, after authentication via SSH.

Types

There are different types of firewalls depending on where the communication is taking place, where the communication is intercepted and the state that is being traced. [13]

Network layer or packet filters

Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. The firewall administrator may define the rules; or default rules may apply. The term "packet filter" originated in the context of BSD operating systems.

Network layer firewalls generally fall into two sub-categories, stateful and stateless. Stateful firewalls maintain context about active sessions, and use that "state information" to speed packet processing. Any existing network connection can be described by several properties, including source and destination IP address, UDP or TCP ports, and the current stage of the connection's lifetime (including session initiation, handshaking, data transfer, or completion connection). If a packet does not match an existing connection, it will be evaluated according to the ruleset for new connections. If a packet matches an existing connection based on comparison with the firewall's state table, it will be allowed to pass without further processing.

Stateless firewalls require less memory, and can be faster for simple filters that require less time to filter than to look up a session. They may also be necessary for filtering stateless network protocols that have no concept of a session. However, they cannot make more complex decisions based on what stage communications between hosts have reached.

Modern firewalls can filter traffic based on many packet attributes like source IP address, source port, destination IP address or port, destination service like WWW or FTP. They can filter based on protocols, TTL values, netblock of originator, of the source, and many other attributes.

Commonly used packet filters on various versions of Unix are ipf (various), ipfw (FreeBSD/Mac OS X), pf (OpenBSD, and all other BSDs), iptables/ipchains (Linux).

Firewall (computing)

4

Application-layer

Application-layer firewalls work on the application level of the TCP/IP stack (i.e., all browser traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or from an application. They block other packets (usually dropping them without acknowledgment to the sender).

On inspecting all packets for improper content, firewalls can restrict or prevent outright the spread of networked computer worms and trojans. The additional inspection criteria can add extra latency to the forwarding of packets to their destination.

Application firewalls function by determining whether a process should accept any given connection. Application firewalls accomplish their function by hooking into socket calls to filter the connections between the application layer and the lower layers of the OSI model. Application firewalls that hook into socket calls are also referred to as socket filters. Application firewalls work much like a packet filter but application filters apply filtering rules (allow/block) on a per process basis instead of filtering connections on a per port basis. Generally, prompts are used to define rules for processes that have not yet received a connection. It is rare to find application firewalls not combined or used in conjunction with a packet filter. [14]

Also, application firewalls further filter connections by examining the process ID of data packets against a ruleset for the local process involved in the data transmission. The extent of the filtering that occurs is defined by the provided ruleset. Given the variety of software that exists, application firewalls only have more complex rulesets for the standard services, such as sharing services. These per process rulesets have limited efficacy in filtering every possible association that may occur with other processes. Also, these per process ruleset cannot defend against modification of the process via exploitation, such as memory corruption exploits. Because of these limitations, application firewalls are beginning to be supplanted by a new generation of application firewalls that rely on mandatory access control (MAC), also referred to as sandboxing, to protect vulnerable services. An example of a next generation application firewall is AppArmor included in some Linux distributions. [15]

Proxies

A proxy server (running either on dedicated hardware or as software on a general-purpose machine) may act as a firewall by responding to input packets (connection requests, for example) in the manner of an application, while blocking other packets. A proxy server is a gateway from one network to another for a specific network application, in the sense that it functions as a proxy on behalf of the network user. [16]

Proxies make tampering with an internal system from the external network more difficult and misuse of one internal system would not necessarily cause a security breach exploitable from outside the firewall (as long as the application proxy remains intact and properly configured). Conversely, intruders may hijack a publicly-reachable system and use it as a proxy for their own purposes; the proxy then masquerades as that system to other internal machines. While use of internal address spaces enhances security, crackers may still employ methods such as IP spoofing to attempt to pass packets to a target network.

Network address translation

Firewalls often have network address translation (NAT) functionality, and the hosts protected behind a firewall commonly have addresses in the "private address range", as defined in RFC 1918. Firewalls often have such functionality to hide the true address of protected hosts. Originally, the NAT function was developed to address the limited number of IPv4 routable addresses that could be used or assigned to companies or individuals as well as reduce both the amount and therefore cost of obtaining enough public addresses for every computer in an organization. Hiding the addresses of protected devices has become an increasingly important defense against network reconnaissance.

Firewall (computing)

5

References

[1] Oppliger, Rolf (May 1997). "Internet Security: FIREWALLS and BEYOND". Communications of the ACM 40 (5): 94.

[2]

[3] Ingham, Kenneth; Forrest, Stephanie (2002). "A History and Survey of Network Firewalls" (http:/ / www. cs. unm. edu/ ~treport/ tr/ 02-12/

(pdf). .

Retrieved 2011-11-25.

[4]

[5] RFC 1135 The Helminthiasis of the Internet (http:/ / tools. ietf. org/ html/ rfc1135)

[6] Ingham, Kenneth; Forrest, Stephanie (2002). "A History and Survey of Network Firewalls" (http:/ / www. cs. unm. edu/ ~treport/ tr/ 02-12/

4. .

Retrieved 2011-11-25.

[7]

[8]

[9] William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin (2003). " Google Books Link (http:/ / books. google. com/

[11] Conway, Richard (204). Code Hacking: A Developer's Guide to Network Security. Hingham, Massachusetts: Charles River Media. pp. 281. ISBN 1-58450-314-9. [12] Chang, Rocky (October 2002). "Defending Against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial.". IEEE Communications Magazine 40 (10): 42-43.

[16] Oppliger, Rolf (May 1997). "Internet Security: FIREWALLS and BEYOND". Communications of the ACM 40 (5): 94.

External links

Internet Firewalls: Frequently Asked Questions (http:/ / www. faqs. org/ faqs/ firewalls-faq/ ), compiled by Matt Curtin, Marcus Ranum and Paul Robertson.

Evolution of the Firewall

Industry

scf4ch3. htm) - Discusses different architectures and their differences, how packets are processed, and provides a timeline of the evolution. A History and Survey of Network Firewalls (http:/ / www. cs. unm. edu/ ~treport/ tr/ 02-12/ firewall. pdf) -

provides an overview of firewalls at the various ISO levels, with references to the original papers where first firewall work was reported. Software Firewalls: Made of Straw? Part 1 (http:/ / www. securityfocus. com/ infocus/ 1839) and Software

Firewalls: Made of Straw? Part 2 (http:/ / www. securityfocus. com/ infocus/ 1840) - a technical view on software firewall design and potential weaknesses Building Internet Firewalls (http:/ / oreilly. com/ catalog/ 9781565928718) Second Edition, OReilly - a thorough reference and tutorial

Article Sources and Contributors

6

Article Sources and Contributors

Firewall (computing) Source: http://en.wikipedia.org/w/index.php?oldid=494782307 Contributors: !Darkfire!6'28'14, 123Hedgehog456, 4twenty42o, 9Nak, =Josh.Harris, A13ean, AAriel42, Abaddon314159, Acrosser, Addihockey10, Aejr120, Ahoerstemeier, Ahunt, Aitias, Alan216, Alansohn, Ale jrb, AlephGamma, Alexius08, AlistairMcMillan, Alphachimp, Altzinn, Anabus, Anclation, Andem, Andrei Stroe, Android Mouse, Aneah, Angr, Anna Lincoln, Ans-mo, Antandrus, Anthony Appleyard, Apparition11, Apy886, Arakunem, Ash, Asqueella, Athn, Aviv007, Avono, Backpackadam, Badgernet, BananaFiend, Bangowiki, Barticus88, Bazsi, Beetstra, Beezhive, Bencejoful, Berford, Bevo, Biot, Bkil, Black Falcon, Blanchardb, Bluebusy, Bobo192, Boomshadow, Booster4324, Borgx, Brianga, Bryon575, Bswilson, Bucketsofg, C'est moi, C.Fred, CGuerrero-NJITWILL, Calabraxthis, Can't sleep, clown will eat me, CanadianLinuxUser, Capi, Capricorn42, Captain-tucker, Celarnor, Cellspark, Cffrost, CharlotteWebb, Ched Davis, Chetvorno, Chrisdab, Chriswaterguy, Chuck369, Chun-hian, Chzz, Cimorcus, Cit helper, CliffC, Closedmouth, ConradPino, CoolingGibbon, Copsewood, Corvus cornix, Cougar w, CraigB, Crazysane, Creed1928, Cryptosmith, Cubbyhouse, Cvarta, DESiegel, DJ Clayworth, DSatz, DStoykov, DVdm, Da Vynci, Dan6hell66, Danhm, Danshelb, Danski14, Danutz, David.bar, DavidChipman, Davidoff, Dbrooksgta, Dcampbell30, Dcoetzee, Dean14, Debby5.0, Debresser, Deelkar, Deewiant, DemonThing, DerHexer, DevastatorIIC, Diberri, Discospinster, Djdancy, Dman727, Dmccreary, Doctorfluffy, Dols, DonDiego, DoogieConverted, Dougher, Dse, Duesseljan, Dzordzm, E Wing, ENeville, EQ5afN2M, EddieNiedzwiecki, Eequor, Egil, El C, ElKevbo, Elagatis, Elcasc, Eldraco, EliasAlucard, Elieb001, Emailtonaved, Enric Naval, Epbr123, Eponymosity, Equazcion, Equendil, Escape Orbit, Everyking, Expertour, Fabioj, Fahadsadah, Femto, Feureau, Fightingirishfan, FleetCommand, Flewis, Frap, FreplySpang, FunkyBike1, Fynali, G7yunghi, GDallimore, Gaiterin, Gascreed, Gc9580, Giftlite, Gilliam, Gogo Dodo, Gonzonoir, Goodyhusband, Graham87, Grand Edgemaster, Grapht, Greg Grahame, Gstroot, Guitardemon666, Gurch, Haakon, Hadal, Halmstad, Hamzanaqvi, Hans Persson, HarisM, Harland1, Harryboyles, Hax0rw4ng, Hazawazawaza, Henry W. Schmitt, Hetar, Hokiehead, Hoods11, Hps@hps, Hu12, Hugger and kisser, ILRainyday, Ilpostinouno, Info lover, Interiot, Intgr, Isilanes, Iune, J.delanoy, JDavis680, JForget, JSpung, Jackrockstar, Jaho, Jalara, Jan1nad, Jaraics, JasonTWL, Jay, Jchandlerhall, Jclemens, Jebba, Jeff G., Jennavecia, Jhi247, Jigesh, Jlavepoze, Jmprtice, Jobeard, JohnCD, JonHarder, JonnyJinx, Josemi, Joy, Joyous!, Jpbowen, Jpgordon, Jramsey, Jusdafax, Just James, Justin20, KCinDC, Kamathvasudev, Kandarp.pande.kandy, Kanwar47, Karnesky, Kbdank71, Kenyon, Kgentryjr, Khym Chanur, Killiondude, Kjwu, KnowledgeOfSelf, Kralizec!, Kubanczyk, Kyleflaherty, L'Aquatique, L33th4x0rguy, La Pianista, Lakshmin, LeaveSleaves, LegitimateAndEvenCompelling, LeinaD natipaC, LeoNomis, LeonTang, Leszek Jańczuk, Lets Enjoy Life, Lincolnite, Linkoman, Lolsalad, Loren.wilton, Lubos, Lucy1981, Lukevenegas, MER-C, MMuzammils, Maheshkumaryadav, Malo, Manop, Marcuswittig, Marek69, Mashby, Materialscientist, Mattgibson, Matthäus Wander, Mattloaf1, Maxamegalon2000, Mcicogni, Mcj220, Meaghan, Meandtheshell, Megaboz, Mernen, Michael Hardy, Mike.batters, Milan Kerslager, Mindmatrix, Miremare, Mitaphane, Monkeyman, Mortein, MrBenCai, MrOllie, Muheer, Mwalsh34, Mwanner, Mygerardromance, Nachico, NawlinWiki, Nealmcb, NellieBly, NeonMerlin, Netalarm, Neurolysis, Newone, NightFalcon90909, Njmanson, Nnp, Noctibus, Nperrakis, Nposs, Ntolkin, Nuno Tavares, Nuttycoconut, Od Mishehu, Ohnoitsjamie, OisinisiO, OlEnglish, OlavN, Oli Filth, OneWeirdDude, OpenToppedBus, Otisjimmy1, OwenX, Oxymoron83, Pabouk, Paul, Paulwray97, Pb30, Peter.C, Peyre, Phatom87, Philip Trueman, PhilipFoulkes, Phirenzic, Phoenix314, Piano non troppo, Piet Delport, Pinethicket, Pmattos, Pnm, Possum, Prari, Prasan21, Prashanthns, PrestonH, Prunesqualer, Purpleslog, Quentin X, R'n'B, Raanoo, Rafiwiki, Randilyn, Random name, Rbmcnutt, Rchandra, Rebel, Red Thrush, Regancy42, Richard, Rick Sidwell, Ricky, Rjwilmsi, Rl, RoMo37, Robbie Cook, Roseurey, RoyBoy, Rror, Rsrikanth05, Rtouret, Rumping, Rwxrwxrwx, SGGH, Sanfranman59, Sceptre, Seb az86556, Seba5618, SecPHD, Seddon, Sensiblekid, Sepersann, Sephiroth storm, Sferrier, Sg313d, Shawniverson, Shawnj99, Sheridp, Shiro jdn, Shuipzv3, ShyShocker, Simeon H, Skrewz, SkyWalker, Smalljim, Smyth, Snigbrook, SoCalSuperEagle, Socialservice, Spearhead, Stephenb, Stephenman882, Steve2011, Stevietheman, Suicidalhamster, Sysy909, T Houdijk, Talyian, Taxman, Tbhotch, Tbird1965, Tcosta, Teenboi001, Terronis, TexasAndroid, Tgeairn, Thatguyflint, The Thing That Should Not Be, The undertow, Thearcher4, Theymos, Tide rolls, Tim874536, Timotab, Tobias Bergemann, Tombomp, Tommysander, Topspinslams, Trevor1, Turnstep, Tushard mwti, TutterMouse, Ulrichlang, UncleBubba, Unschool, Vakanuvis789, VasilievVV, Velella, Vendettax, Venom8599, VernoWhitney, Vilerage, Viriditas, Vlhsrp, Voidxor, Vrenator, WPANI, Wai Wai, Wavelength, Weylinp, Why Not A Duck, Wiki Wikardo, Wiki13, WikiDao, WikiLaurent, Wikialoft, WilliamSun, Wimt, Wk muriithi, Wknight94, Wmahan, Woohookitty, Wordwizz, Wtmitchell, Wyatt915, XandroZ, Xaosflux, YUL89YYZ, Yama, Yk Yk Yk, Yorick8080, Zabanio, Zeroshell, ZimZalaBim, Zntrip, Πrate, 1341 anonymous edits

Image Sources, Licenses and Contributors

File:Firewall.png Source: http://en.wikipedia.org/w/index.php?title=File:Firewall.png License: Creative Commons Attribution-Sharealike 3.0,2.5,2.0,1.0 Contributors: Bruno Pedrozo Image:Gufw 10.04.4.png Source: http://en.wikipedia.org/w/index.php?title=File:Gufw_10.04.4.png License: GNU General Public License Contributors: BenIsaacs, Körnerbrötchen

License

Creative Commons Attribution-Share Alike 3.0 Unported

//creativecommons.org/licenses/by-sa/3.0/