On Wed, 20 Jan 1999, Schaar, Norbert wrote:

> I assume this problem has or will have the majority of companies worldwide.
> But, you don't find any documentation describing firewall architectures
> which you simply apply. There's no all-in-one solution or something like
> this, even if most secrurity companies claim to have one.

True.
There can't be such an all-in-one solution because "EC" is not a 
technical term. EC can be done in many, technically very different ways. 
The first secure EC system I built many years ago was mail based. From 
the firewall point of view it was simple mail and didn't need any special 
care. For example CORBA based EC is very different.

>  Always, if you'd
> like to secure applications, services and communications it's essential to
> take a look behing the scenes: How does the communication work? Where are
> potential exploints? Could I proxy the aaps? What about NAT? Consider
> everything, even if you already have an installed firewalling complex.

It is very common to develop and deploy an application _and_ _then_ start 
thinking about security. IMHO this is a very bad idea. 
Security has to be kept in mind from the very beginning of an application 
project. Different technologies have very different security 
characteristics, so it is very important to choose the right technology 
first. During the whole development process thinking about security is 
necessary. For example CORBA based EC can be done in a secure manner. You 
have to think about an IIOP firewall, about authentication, 
authorisation, message protection and more. Building a secure CORBA 
application is not simple, but it can be done.
But securing e.g. an existing DCOM based distributed application is 
impossible. 
 
> For you problem with access of externals to internal ressources, I would
> suggest usage of encryption (for integrity of your data), certificate
> techniques (for authentication and authorization of each individual) and
> directory services (for access control to particular hosts, services, files
> and directories).

I would be more general: strong authentication and message protection are 
needed in all cases. How this is done depends on the circumstances: The 
application, the risks and so on. You mention certificates. Public key 
based encryption is usefull in many cases, but it is not applicable 
everywhere. For example it is too "heavy" for tightly coupled object 
systems with many connects. 
Authorization is too often ignored. Many applications programmers overlook
that systems like SSL don't provide any authorization. The clients 
authenticate for example to a CORBA server. But then they can invoke all 
operations on all objects on this server. This is a very typical 
security  flaw of CORBA based systems and can't be fixed at the firewall. The 
enforcement of authorisation has to be integrated into the application.

Using directory services for security is IMHO still a little bit 
risky. They might be secure enough for IntraNet use, but I'm not sure 
whether I'd allow others to access such services. It depends.
 
What we need is an integrated and secure application system, not just a 
firewall which supports some application protocols. 

> For sure, nobody is interested in broadcasting his solution in detail,
> because secret is one part of security.

No, not at all!
Security by obscurity doesn't work. Security has to be based on the 
strength of your mechanism. A good security system can be public except 
some secrets like passwords and keys. 
The real reason for not  broadcasting a solution is simply competition. 

Rudi

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to