Educause Security Discussion mailing list archives

Re: Preparing for Default Deny Firewall


From: Steven Alexander <alexander.s () MCCD EDU>
Date: Tue, 1 Feb 2005 10:09:20 -0800

Another note, if you are going to rate-limit traffic to avoid a DoS,
it's best to apply the rate-limiting on the upstream router so that the
traffic is dropped before it eats up any of your bandwidth.

        -----Original Message-----
        From: Yantis, Jonathan Lindsey [mailto:YantisJ () COFC EDU] 
        Sent: Tuesday, February 01, 2005 9:48 AM
        To: SECURITY () LISTSERV EDUCAUSE EDU
        Subject: Re: [SECURITY] Preparing for Default Deny Firewall
        
        

        Here's a list of ACLs that I happen to have for ICMP inbound.  I
can not verify all of them but I was assured they were the proper ones
to allow in:  Take from it what you will:

         

            300 permit icmp any any unreachable

            310 permit icmp any any echo-reply

            320 permit icmp any any packet-too-big

            330 permit icmp any any time-exceeded

            340 permit icmp any any traceroute

            350 permit icmp any any administratively-prohibited

            360 deny icmp any any

         

        You may want to allow echo requests in, but I would not advise
doing that unless you are going to rate-limit it as it opens you up to
DoS.  As far as your other inbound traffic, I would do a server
assessment and find out all services running and what the corresponding
ports are.  I would not recommend just allowing port 80 traffic in,
rather restrict port 80 to set of specific machines.  I hope that makes
sense.

         

        On your outbound side, I suggest everyone drop outbound requests
on port 135, 137, 139 and 445 plus whatever else you feel is necessary
while allowing all other outbound traffic.  These are common ports used
by viruses and have no real business outside your intranet.  It's also a
good idea to create an outbound rule that drops all traffic that is not
sourced from a known internal network to prevent your network being used
to launch spoofed zombie attacks.  For example, if your network is
172.16.10.0/24, you would want the following outbound ACL

         

        [truncated outbound ACLs]

        Permit ip 172.16.10.0 0.0.0.255 any

        Deny ip any any - done by default but I like to see it.

         

        Also, if you want to watch for outbound syn requests, modify
this tcpdump filter for your situation:

         

        tcpdump -n src net yournet/yourmask and "tcp[13] & 2 != 0" and
not port 80 and not port 25 and not port 443 

         

        I drop 80, 25, and 443 because they generate a lot of the
outbound syn requests.  I actually use this filter as a quick virus
check to see if any machines are making massive outbound connection
attempts but it should work for you.

         

        Hope this helps someone.

         

         -- Jonathan Yantis - yantisj () cofc edu - (843-953-7770)

        
  _____  


        From: The EDUCAUSE Security Discussion Group Listserv
[mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Scholz, Greg
        Sent: Tuesday, February 01, 2005 12:27 PM
        To: SECURITY () LISTSERV EDUCAUSE EDU
        Subject: Re: [SECURITY] Preparing for Default Deny Firewall

         

        I am looking at the same situation.  Does anyone have a
recommendation for ICMP types/codes in general?  It is obvious to me
that ECHO should not be allowed in to avoid ping scans.  What about ECHO
REPLY for insiders wanting to test general network connectivity outbound
(this may pose a problem due to infected ResNet computers) or poorly
written applications that may use ICMP to test valid hosts outside the
campus network?  Also DESTINATION UNREACHABLE, SOURCE QUENCH, TIME
EXCEEDED, etc. inbound may be of value since they are designed to help
the network/hosts react appropriately to problems outside the network.

         

        Some of my concerns with this type of change:

        When it is time to make this switch I plan to do some packet
level analysis to determine what may break.  The best idea I have come
up with would be to watch OUTBOUND traffic for "Syn/Ack".  This way I
can determine if there are any REAL services being provided that are not
documented and at that time determine if the services are legitimate.
If you have had a firewall that I refer to as "inside out" (because it
does the opposite of what firewalls are designed to do) for some time I
would expect you have a number of unapproved (although possibly valid)
services being provided by hosts inside your network.

         

         

         

        _________________________

        Thank you,

        Gregory R. Scholz

        Lead Network Engineer

        Information Technology Group

        Keene State College

        (603)358-2070

         

        
  _____  


        From: Steven Alexander [mailto:alexander.s () MCCD EDU] 
        Sent: Tuesday, February 01, 2005 11:39 AM
        To: SECURITY () LISTSERV EDUCAUSE EDU
        Subject: Re: [SECURITY] Preparing for Default Deny Firewall

         

        One small note: You should allows incoming ICMP packets of type
3 code 4 ( Fragmentation needed but no frag. bit set ).  These packets
are needed for Path Maximum Transmission Unit Discovery (PMTUD).  PMTUD
is enabled by default in Windows XP and Server 2003.  If you do not
allow these packets in, it may cause problems for some people viewing
your school's website or accessing other services.

         

        Steven

                -----Original Message-----
                From: Cary, Kim [mailto:Kim.Cary () PEPPERDINE EDU] 
                Sent: Tuesday, February 01, 2005 8:05 AM
                To: SECURITY () LISTSERV EDUCAUSE EDU
                Subject: [SECURITY] Preparing for Default Deny Firewall

                We will shortly be going to an default-deny firewall
(inbound only)
                here (8000 students 1000 staff, 7 campuses on a WAN).
                
                For those of you that have such a situation, I would
appreciate any
                tips you have for:
                1. Moving from block known bad to permit known good
inbound posture.
                2. Procedures you have to processing & approving
exceptions for new or
                changed services.
                
                For those of you that decided against this type of
firewall, I think
                our implementation would be informed of some things to
look out for by
                hearing from you about your issues that prevent you from
going to this
                position.
                
                We also are in receipt of a recommendation that states
our router ACLs
                should also be default deny. Any tips/comments on that
recommendation
                would be welcome as well.
                
                Kim Cary
                Infrastructure Security Administrator
                Pepperdine University
                310 506 6655
                
                **********
                Participation and subscription information for this
EDUCAUSE Discussion Group discussion list can be found at
http://www.educause.edu/groups/.
                
        
______________________________________________________________________
                This email has been scanned by the MessageLabs Email
Security System.
                For more information please visit
http://www.messagelabs.com/email
        
______________________________________________________________________


        
______________________________________________________________________
        This email has been scanned by the MessageLabs Email Security
System.
        For more information please visit
http://www.messagelabs.com/email 
        
______________________________________________________________________
        ********** Participation and subscription information for this
EDUCAUSE Discussion Group discussion list can be found at
http://www.educause.edu/groups/. ********** Participation and
subscription information for this EDUCAUSE Discussion Group discussion
list can be found at http://www.educause.edu/groups/. **********
Participation and subscription information for this EDUCAUSE Discussion
Group discussion list can be found at http://www.educause.edu/groups/.


**********
Participation and subscription information for this EDUCAUSE Discussion Group discussion list can be found at 
http://www.educause.edu/groups/.

Current thread: