At 3:42 PM -0500 8/24/01, Robert C. Wessel wrote:
>Well, so long as the (interior) dynamic routing protocol is solidly blocked
>at the router at the edge of your network, *my* opinion is that is doesn't
>make too much difference.  I'd be pretty hesitant to run BGP on a firewall
>though...


I've heard this sort of argument back and forth for years, and it 
seems like folks overlook a few basics.

1) routing updates, like IP traffic generally, are *filterable*. Thus 
you would configure a dynamic routing daemon running on the firewall 
just as you would configure a firewall rule, permitting only certain 
speakers to be heard.  In point of fact you have *more* control, 
because with any reasonable routing daemon you have control over not 
only *who* you listen to, but *what content* you would accept from 
that speaker. Thus your customer-site internet router a.b.c.d could 
be hijacked and spend its days happily announcing your internal 
networks to your firewall, but the routing daemon rightly should only 
listen to non-internal route updates from that source, and would 
ignore the updates for routes pertaining to the internal network.

2) for internet-facing systems, most often the only dynamic route you 
want to hear is a default from multiple routers, simple to accept 
only "0.0.0.0" in most routing daemon configs, and ignore all other 
updates.

3) I'm not sure how the earlier comment on antispoofing comes into 
this - antispoofing is configured based upon the firewall owner's 
complete knowledge of the full set of 'internal' networks - i.e. 
those which should never appear on the outside interface of a 
firewall as *source* addresses. I'm not seeing where the source of 
one's routing updates would break or make configuration of 
antispoofing difficult.

Now I know somewhere on the list somebody's going to say "but what if 
someone breaks into your internet router and redirects your 
webserver/mailserver/etc segments to networks that they attacker 
controls. To which one can only answer "That is an attack for which 
routing-on-the-firewall is irrelevant" - Ask what would happen if a 
router somewhere else on the internet started announcing your 
publicly-shown internet addresses - it could happen even with a 
statically routed firewall could it not?

Remember that an improperly configured firewall is just as unsafe as 
an improperly configured routing daemon. If you want to run dynamic 
routing on your firewalls (and I can think of a number of reasons why 
you would gain benefits from that), you need to configure the 
routing setup properly -- the same is true of FW1 - just as you 
wouldn't put a rule in saying "any any any", you wouldn't configured 
a routing daemon to promiscuosly accept all routing updates 
(including one's own internal networks) from an *external* router.

-james





>
>OTOH, setting up the static routes for a typical firewall isn't usually
>that much work, and if you're using NAT, you probably need some anyway, so...
>
>-Robert
>
>At 05:32 AM 8/24/01 -0400, Chris Koger wrote:
>>
>>OK, hello to all and TIA for any advice that you may have.
>>
>>There seems to be two schools of thought on the subject of dynamic routing
>>protocols on firewalls.  The first says that firewalls should be purely
>>static and that dynamic protocols such as OSPF, IGMP, and RIP break that
>>principal.  And, that they have the potential to pose a security risk by
>>allowing an intruder to break in to the routing tables and perhaps send data
>>somewhere it should not go, or gain intimate knowledge of the internal
>>network structure.
>>
>>The second says that a routing protocol such as OSPF, and the like, assist
>>in the administration of internal routing and that running them on the
>>internal interface of a firewall is no different than running them on the
>>hub routers.  This school of thought seems to feel that the likelihood of
>  >someone breaking in to a routing table by exploiting OSPF may not even be
>>possible, and that even if it is, running it on the firewall isn't going to
>>make any difference.
>>
>>I have been asked for my opinion on this matter and although I know both
>>schools of thought well, I tend to agree with the first making a firewall a
>>purely static device.  Aside from the usual someone could do this or that,
>>could some of you give me some firepower to either help me defend this
>>stance or good reasons why I should abandon it?  Does anyone have any
>>experience with problems that arose from actually running one of these
>>protocols (specifically OSPF) on a firewall and perhaps the consequences
>>that were incurred?
>>
>>Again, thanks for any input that any of you may have, and I am open to
>>discussion on the topic if anyone has some input.
>>
>>Chris Koger
>>
>>
>>
>>===========================================================================
>=====
>>      To unsubscribe from this mailing list, please see the instructions at
>>                http://www.checkpoint.com/services/mailing.html
>>===========================================================================
>=====
>>
>>
>
>
>================================================================================
>      To unsubscribe from this mailing list, please see the instructions at
>                http://www.checkpoint.com/services/mailing.html
>================================================================================


-- 
James P. O'Shea III
[EMAIL PROTECTED]



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to