On Sun, 28 Mar 1999, Frank Knobbe wrote:

> Paul,
> 
> you seem to read too much between the lines. I never said I want to
> leave the risk at the end user, I never said that I defend NetMeeting.
> Let me try to explain one last time:
> 
> Our discussions and judgements should not just focus on the protocols
> but review the implementation of the discussed
> requirement/application.
> 
> According to your reasoning, you see the security risks with
> NetMeeting in the protocols its using. For that reason, you deny
> NetMeeting any chance of discussion. You come down to 'Protocol
> flawed, Application out of question. Period'.

No, I deny the protocol from my internal network.  It seems that you wish 
to do the same.  I'd allow it on a client out on an external network, but 
my users wouldn't want to get off their butt to use it.  

> 
> This is exactly that kind of reasoning that got me to started on this
> thread. In my opinion, its a very arrogant attitude. If every list
> members would behave like this, then we would have the 'Firewalls
> Discussion List' successfully converted into a voting ballot for
> protocols. (User1: What about NetMeeting? User2: Don't use it, to
> unsecure. User3: Yeah, protocol sucks. Etc.)

We'd probably end up in a better state as an industry if we did because 
protocol designers would then be forced to consider the risks their 
protocol brings to the table.  

> This list charter reads: The Firewalls mailing list is for discussions
> of Internet firewall security systems and related issues. Relevant
> topics include the design, construction, operation, maintenance, and
> philosophy of Internet firewall security systems. 
> 
> In other words we can discuss the design and philosophy of a
> NetMeeting implementation. I don't want to hear 'No, don't use it. I
> don't use it either.' If you don't have a suggestion on how to
> securely implement NetMeeting, then don't post. Again, I'm not trying

It's been my observation that without a thorough discussion of the negative 
aspects of protocols many administrators make choices they wouldn't otherwise 
make.  That makes it a related issue and therefore in-charter.  When you sign 
up for a list, you end up with the opinions of people on the list.  Procmail 
is usually a good solution if you'd rather close your mind to the negative 
aspects of what you're doing.

> to defend NetMeeting, I'm trying to defend the approach. 
> 
> Following brought you back on track in your reply.
> 
> > [...]
> > Tunneling application data streams places the security burden on the
> 
> > applicaiton.  How much analysis of NetMeeting's application 
> > code have you 
> > done?
> 
> None. How much have you or anyone else out there done? In my opinion,

I've done a cursorary analysis of the binary and it's behaviour, but didn't
go so far as to run it through any type of disassembly or call analysis.  
The protocol just wasn't there and it succumbed to crude DoS attacks, add 
in the remote execution risk and it wasn't worth persuing a full client 
analysis. 

> NetMeetings main risk is remote application sharing. Even if the code
> turns out ok, without any bugs and back doors, there is still the risk
> of users executing uploaded code. This can happen very quickly. A
> macro virus or even an executable, that the attacker carries in his
> clip board, can quickly be pasted and executed on the users end.
> Depending on deception techniques even without the users knowledge.

This was indeed one of the bigger issues in our thinking followed by some 
local bandwidth issues on the target networks that wouldn't support the 
client function amongst the necessary number of participants.

> 
> The second risk that comes with NetMeeting is the requirements of
> opening port on the firewall.
> 
> Now, can NetMeeting still be implemented securely without the user
> having to move to a different workstation? Yes, I think so. Here is my
> proposal:
> 
> +----------+
> | Internet |
> +----------+
>      |
>   Router
>      |       +--DMZ Server, i.e. Mail
>   Firewall---|
>      |       +--NetMeeting Server
>  +--------+
>  |Internal|
>  |Network |
>  +--------+

Depending on your firewall, you may wish to add another filtering layer 3 
device between the firewall and the Citrix server.  Having a layer 2 device on 
the same network as a firewall interface can expose you to risks such as 
packet leaking (significant especially for Solaris), attacks against 
switching protocols (spanning tree and its cousins), and if "Firewall" == 
Firewall-1 potentially some protocol leakage into the internal network for a 
subset of protocols that you'd rather not have attacking your internal 
network.  Any low-cost router with basic screening rules can protect from 
this eventuality.

> NetMeeting Server: Windows NT Terminal Server, Citrix MetaFrame
> Add-On, NetMeeting. Local User accounts different from internal
> accounts.
> 
> Firewall rules (S/D/Serv/Cond)
> Internet / NetMeeting Server / 1494 TCP / Deny
> Internet / NetMeeting Server / 1024 - 65535 TCP / Allow
> Internet / NetMeeting Server / 1024 - 65535 UDP / Allow
> Internet / NetMeeting Server / 389 TCP / Allow
> Internet / NetMeeting Server / 522 TCP / Allow
> Internal Net / NetMeeting Server / 1494 TCP / Allow
> 
> Imagine return paths enabled. (i.e. NM servers 1494 back into Internal
> Net)
> 
> 
> The idea is that any user of the internal network can execute the
> NetMeeting application residing on the TS in the DMZ. The only
> protocol that has to be allowed through the firewall is Citrix ICA
> protocol (1494 TCP). TS is configured not to map to client drives and

I've not analyzed the Citrix protocol to date, so you'll be left with 
your own assessment of its weaknesses unless anyone else has anything to 
share.  

Also, our experiences with Citrix on the internal network hasn't been the 
best testament to stability.  If your test users can run for two days 
without a reboot you're doing much better than ours are on certified 
hardware (the current average is three boots a day.)  

> printers, so there is no network connectivity between the NM server
> and the internal network. The only thing that gets transmitted is
> video/mouse/keyboard/audio via the ICA protocol. Should the NetMeeting
> Server be compromised by an unknown vulnerability in the T.120
> protocol or (more likely) malicious code executed (i.e. netcat
> listening on 6000), the internal network is still protected since no

s/is/may be/

> other route back into network exist. Above configuration lets you log
> IP addresses for intrusion response purposes, but not session content.
> However, once the server is compromised, it may be quarantined and
> examined. This server may even replace your existing honey pot.
> 
> Disadvantages are: Shared applications need to reside on TS. Should
> not be an issue with general purpose apps. However, maintenance of
> these apps may be cumbersome. Also, documents to be shared need to be
> uploaded separately (i.e. FTP). Audio should work with latest ICA
> client, but video may not be available. However, for whiteboarding and
> application sharing, this should suffice.

You may want to test response.  Even internally we weren't thrilled with 
the traffic levels generated by the early releases.  It may help to dual-home 
both the Citrix server and the firewall to have exclusive in and outbound 
interfaces (assuming Ethernet or FastEthernet not FDDI or Token-Ring) to take 
away the collision domain on an interface if you get excessive collisons (it's
cheap for about a 40% bandwidth increase)

> 
> As you can see it is possible to securely implement NetMeeting, even
> though the protocols used by it are not fit for transport back into
> the corporate network.

Therefore it's not possible to secure the protocol.  Remote display can 
work, but it's prohibitively expensive to smaller shops, and can be an 
administrative nightmare if the original machine configuration isn't very 
exacting.  I'm not in the habit of fielding compromisable machines even 
on a service network.  YPMV.  You're also moving the trust issue to 
another protocol which may, or may not be worthy of that trust, so it's 
still not a definite win.  

> If folks would just discuss alternatives instead of disregarding a
> discussion based on their opinion of the protocol used, then this list
> may see a higher volume once again (It's been relatively quite
> lately). This would also give the list a higher value, because folks
> can train creativity and approach methods. As of now, the list
> transfers existing information (about protocols or firewall setups).
> It would be nice if it would also give the member the opportunity to
> collectively create new information such as design and implementation
> strategies...

Remote display has been beaten to near-death several times here as an 
alternative.  It sometimes presents a viable alternative (Bennett's 
comments on the subject in conjunction with SSL spring to mind), but 
sometimes just moves the problems over a protocol.  It also does nothing to 
address poor protocol design.  While you might be more interested in winning 
battles, I'd much rather win the war.

Paul
-----------------------------------------------------------------------------
Paul D. Robertson      "My statements in this message are personal opinions
[EMAIL PROTECTED]      which may have no basis whatsoever in fact."
                                                                     PSB#9280
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to