On Wed, 22 Dec 1999, Dave Wreski wrote:

> Do you happen to know where there is any information on the net that
> explains why ICQ/RA is a risk?  Something that I can present to
> management?

I don't know that there's anything specific anywhere (don't know that 
there isn't either.)  My preference is that every protocol to be passed 
go through a protocol analysis, risk analysis and business analysis to 
determine if it should be passed.  The second question is always the 
"Why can't you get off your butt and go to an externally connected 
machine?" question (the first is generally a business case and if you're 
feeling especially user-hostile, the case for stopping abuse for 
non-business purposes- users can't write those very well at all ;).)  

Upper management should clearly understand the risks of tunneling, the 
fact that the entire firewall's protection model is based on *blocking* 
traffic, the analogy that I use is the difference between trying to bail 
water with a pot with a hole or two in it (HTTP and SMTP generally) and 
trying to bail water with a strainer- your boat's gonna sink a heck of a 
lot quicker in the latter case.  Anyone who thinks that just because a 
firewall "supports" a particular protocol that it's safe to pass it doesn't 
understand the protection model.

> [...]
> 
> > request changes to it.  Be aware that requesting change doesn't always
> > mean it will happen, native RealAudio is something I'd *never* allow
> > to a business network I was responsible for without something in
> 
> I understand fwtk can be used to proxy it.  Is this not sufficient?

Not natively, the native stuff is UDP.  There's a "reference" TCP proxy 
available on Progressive's site.  Last time I analyzed the code, I was 
underwhelmed at the level of "proxy" going on (my recollection was that 
it was check for a sting in the traffic stream), but it might be sufficient 
for some people (obviously it is, since a lot of commercial firewall vendors 
include it in their products).  If anything, fwtk can be used to plug it, 
but plug-gw *isn't* proxying and shouldn't be confused as anything but a 
last-ditch worst-case attempt to bring a compromising protocol past the 
border.  Finally, the tunneled-over-HTTP version works through http-gw 
from the toolkit.

Finally, without end-to-end QoS (if any of my Cisco account team reads 
firewalls- Ob: "QoS sucks!"), figure out how many employees listening 
to "Internet radio stations" or watching "Internet TV" over RealVideo it 
takes to saturate the available Internet bandwidth (don't forget that 
you're stuck with single in/out bound gateways in most cases, so you'll 
end up with collisions and shouldn't use more than a 60% figure in those 
cases if it's Ethernet.)  So, if you have a T-3 or 2 of bandwidth, but 
your firewall has 10Mb/s interfaces, you're stuck at around 6Mb/s maximum 
available bandwidth in a switched environment.  Put 150 radio stations on 
there (without multicast it's bandwidth*lusers) then ask management where the 
critical e-mail and Web stuff goes.  

Or draw up a "routing by business-critical protocol" plan and see how 
happy they'd be to fund a seperate Internet connection for RA/RV, then point 
out that combining the traffic is a worse scenerio since it infringes on 
mission-critical traffic without any ability to limit it.  


Paul
(No I haven't forgotten, been kinda busy, you'll hear from me directly soon)
-----------------------------------------------------------------------------
Paul D. Robertson      "My statements in this message are personal opinions
[EMAIL PROTECTED]      which may have no basis whatsoever in fact."
                                                                     PSB#9280

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to