1 / 14

Secure Remote Access to an Internal Web Server

Secure Remote Access to an Internal Web Server. “The security policy usually amounts to total trust of all insiders and total mistrust of outsiders, where the firewall defines the boundary.”. Christian Gilmore, David Kormann, and Aviel D. Rubin ATT Labs - Research. Outline.

loren
Télécharger la présentation

Secure Remote Access to an Internal Web Server

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Remote Access to an Internal Web Server “The security policy usually amounts to total trust of all insiders and total mistrust of outsiders, where the firewall defines the boundary.” Christian Gilmore, David Kormann, and Aviel D. Rubin ATT Labs - Research

  2. Outline • Requirements vs. the current architecture constrains. • Proposed solution. • Security assessment of the proposed solution. • Conclusion. • Questions.

  3. Requirements • Access to the internal web server from outside of the firewall boundary. • Proposed solution should not involve • changes to the firewall configuration on the network or... • changes to the firewall policies

  4. Environment • Firewall • “[Inside user] …can establish TCP connection to hosts outside the firewall on any port, while inbound connections are tightly restricted.” • “[Firewall] … tears down inactive connections every 15 min.” • DWT (dumb Web Terminal) • “We strive to treat the DWT as “untrusted” as possible”

  5. Possible of the shelf solutions • Telnet or text-based browser such as Lynx • Disadvantage: • HTML travels in plain text over the network • No support for multimedia • Tunneling protocols (IPSpec, SSLtelnet). • Disadvantage: • requires advance access to the remote client browser settings and computer settings.

  6. Architecture Firewall Authentication Server Internet DWT Proxy Web Server

  7. Proxy Control Connection Web Request Web Request Web Reply Absent Web Reply DWT PushWeb Web Server Firewall Data Connection

  8. Authentication and Security • User Authentication • Hash Chaining • User has to re-enter password every 20 minutes • Connection Confidentiality • HTTP over SSL - Secure Socket Layer.

  9. Proxy Control Connection Web Request Web Request DWT Web Reply Absent Web Reply PushWeb Firewall Web Server Data Connection SSL Session

  10. Connection Confidentiality • After the user was successfully authenticated the PushWeb establishes the SSL connection to the DWT. • The SSL on the Server is configured to restrict the set of ciphers supported only to those that provide USA domestic-quality encryption.

  11. Security Assessment • Compromise of Absent • DoS attack - not preventable • Eavesdrop on the user session - SSL prevents it. • Replay attack - SSL makes it almost impossible. • Spoofing - user must check SSL certificate. • Obtain root on PushWeb or access the internal web: • data cannot be moved over control connection • the same effort as from any other outside host

  12. Security Assessment (Continued) • Compromise of PushWeb • PushWeb has limited access rights on the network • No other services are available from the PushWeb • No user data stored on the PushWeb

  13. Conclusion • The solution achieved its goal: • No changes were required to the network infrastructure • The system provides “...internal Web access from sites such as terminal rooms and Internet cafes.” • The system is using well tested protocols - one time password and SSL, but “… protocol composition is a very hard problem and has led to security problems in the past.”

  14. Absent Questions • To overcome the firewall policy authors used PushWeb / Absent configuration. Is there any security gain in connecting through Absent machine as oppose to connecting straight through a firewall? Firewall Internet Web Server DWT PushWeb SSL • If there is a gain, than against what type of attacks?

More Related