Penetration Testing mailing list archives

RE: Clueless firewall configuration ?


From: "Ng, Kenneth (US)" <kenng () kpmg com>
Date: Thu, 17 Aug 2006 12:49:48 -0400

I use something similar, the internet accessible segments need to be
physically separate from the internal ones.

I don't think its just Cisco certified people, I think it's a general
failing of tech people who are not security trained.  Its an aura of
"I'm smarter than everyone else because I can configure XYZ".  Security,
on the other hand teaches you that that are people both smarter and
luckier and more patient than you are.  I think Schneier once said that
the sole advantage defenders have is their ability to architect strong
defenses. 

-----Original Message-----
From: Smith, Michael J. [mailto:Michael.J.Smith () unisys com] 
Sent: Tuesday, August 15, 2006 11:00 PM
To: cableguy clueless; pen-test () securityfocus com
Subject: RE: Clueless firewall configuration ?

My networking guys try to do this stuff all the time--what happens when
you have too many Cisco-certified people in one room at the same time.
Do a google search for "vlan hopping" and decide for yourself it that is
enough of a risk.  I think the biggest problem is that it is way too
easy to misconfigure any piece of this setup.  The important thing to
say is that instead of a defense-in-depth, you're now looking at a
single device being the keystone of your security.

Since I deal with this scenario all the time, I hit upon a somewhat
compromise.  I enforce hardware segregation for external/Internet-facing
vlans, but I'm OK with all the DMZ vlans being on the same switch, and
all the internal DMZs on another switch.  Depending on the criticality
of the system and how much I trust the admins, I might be convinced to
do DMZ and internal together, but it's on a case-by-case basis.

HTH
--Mike



Michael J Smith, CISSP-ISSEP michael.j.smith () unisys com Information
Security Architect
703.579.2552 O
703.855.0890 C
"Those who do not understand Unix are condemned to reinvent it, poorly."
--Henry Spencer 

 

-----Original Message-----
From: Ng, Kenneth (US) [mailto:kenng () kpmg com]
Sent: Monday, August 14, 2006 1:41 AM
To: cableguy clueless; pen-test () securityfocus com
Subject: RE: Clueless firewall configuration ?

This is very difficult to set up completely correctly.  And your 
always open to the possibility of an unpublished exploit being able to

get around your rules.  And while I do not know if it is still 
possible, I remember someone demonstrating injecting packets from one 
vlan to another a few years ago.
And as the infrastructure changes, you have to make double sure that 
you are entirely correct.  Conversely, if you use physically separate 
hardware, it's a lot easier to get it right, or
close enough to right that it doesn't matter much.   

-----Original Message-----
From: cableguy clueless [mailto:cluelesscableguy () gmail com]
Sent: Friday, August 11, 2006 4:08 PM
To: pen-test () securityfocus com
Subject: Clueless firewall configuration ?

Guys, I need to ask a favor, my boss knows nothing of IT 
infrastructure, and our "cableguy" (manages the firewall through a 
third party contract) proposed to him an architecture as  follows :

2 cisco 6509 each with firewall blade in them. These function as core 
switches for a 1000 users site with lots of vlans and FW roules 
between the vlans (oh and we are a big production site that relies on 
these cores to let our ciritical bussiness process machines 
communicate to the servers).

He wants to create 2 vlans, 1 for untrusted traffic and 1 vlan for DMZ

machines and assign physical ports to these to connect to the 
internet.
The DMZ vlan would also have some physical ports. These ports would 
not be on the core switch but on the access layer switches that are 
fiber attached to the distribution switches that attach to the 
cores...

Does anyone care to comment on the security issues a setup as this 
would pose? would this be pentest bonanza for you guys?
and what would the hackers make of a dmz vlan living in a big switch 
together with other vlans?

I have some ideas myself, but would appreciate your take on this. I 
know this is the pentest list but it is you guys who get to poke holes

in these designs...

CCG

--------------------------------------------------------------
----------
------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the 
Analyst's Choice Award from eWeek. As attacks through web applications

continue to rise, you need to proactively protect your applications 
from hackers. Cenzic has the most comprehensive solutions to meet your

application security penetration testing and vulnerability management 
needs. You have an option to go with a managed service (Cenzic
ClickToSecure) or an enterprise software (Cenzic Hailstorm). 
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm 
your results from other product. Contact us at request () cenzic com for 
details.
--------------------------------------------------------------
----------
------




**************************************************************
***************
The information in this email is confidential and may be 
legally privileged.  It is intended solely for the addressee. 
Access to this email by anyone else is unauthorized. 

If you are not the intended recipient, any disclosure, 
copying, distribution or any action taken or omitted to be 
taken in reliance on it, is prohibited and may be unlawful. 
When addressed to our clients any opinions or advice 
contained in this email are subject to the terms and 
conditions expressed in the governing KPMG client engagement letter.  
**************************************************************
***************



--------------------------------------------------------------
----------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php
--------------------------------------------------------------
----------



------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php
------------------------------------------------------------------------




*****************************************************************************
The information in this email is confidential and may be legally privileged.  It is intended solely for the addressee. 
Access to this email by anyone else is unauthorized. 

If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken 
in reliance on it, is prohibited and may be unlawful. When addressed to our clients any opinions or advice contained in 
this email are subject to the terms and conditions expressed in the governing KPMG client engagement letter.  
*****************************************************************************



------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php
------------------------------------------------------------------------


Current thread: