Heyaz. Just so everyone is on the same page without
wandering thru that whole doc, I thought I'd summarize ICSA's
"criteria requirements" here. I may offer an interpretation 
as well, so feel free to call me on something I flubbed.
        Also, of course, feel free to identify what you
know/think to be done already in a current LEAF distro.
As you can very well imagine, it's very doable if not done
already.

-Scott

---------------

        Essentially, there are six total pieces:

RS: Required Services   
LO: Logging Requirements
AD: Administration
FT: Functional Testing
ST: Security Testing
DO: Documentation

        Each of those sections has about 3 or 4 subsections,
some of them labeled "conditional". The go as follows:

RS.1.1:  A list of services that the firewall must be able to
         allow real world access to. IE, the firewall must
         support active FTP, HTTP/S, SMTP and DNS servers 
         located behind the firewall. No mention of NAT. It's
         allowable (but not required) that the firewall require 
         these services to be on a DMZ.
      
RS.1.2:  A list of services the LAN machines must be able to
         use without trouble. Same list as above plus TELNET.
         It's allowable (but not required) that the firewall
         require these services to be proxy'd (eg, SOCKS).

RS.1.3:  All other traffic gets denied. No Napster I guess.

RS.2:    All of this must be accomplished without having to
         install anything proprietary on the clients or the
         servers (with the exception of management software
         for the firewall itself). IE, it's transparent for 
         anything that speaks vanilla TCP/IP.

LO.1:    Once it's up and running such a policy as specified by
         the RS section, the firewall must have the ability to 
         log the following events:
         1. Successful inbound connections to a protected server
         2. Successful outbound connections to a public server
         3. All attempts, from either side, to access some 
            service not explicitly allowed
         4. All attempts, from either side, to send traffic to 
            the firewall itself that's not associated with an
            explicitly allowed service.

LO.2:    For each event that is logged, the following must be
         recorded:
         1. A date and time. Accuracy of time is in LO.3.
         2. Protocol (eg, PROTO=6, 17, etc)
         3. Source IP Address (is this really useful? ;)
         4. Dest IP Address.
         5. Destination port for TCP/UDP or Message Type for
            ICMP.
         6. How the event was handled (eg, ACCEPT, DENY, REJECT).

LO.3:    Timestamp must be date, hours, minutes seconds. No
         mention of NTP here, but its strongly implied.

LO.4:    Logs must be human readable (ie, straightforward ASCII)

LO.5:    Conditional: If logging is stored remotely from the
         firewall, the FQDN or real-world IP number of the 
         firewall itself must also be logged.

LO.6:    Conditional: If multiple logs are recorded for a single
         event, there must be some clear means with which to
         correlate the multiple logs to the single event.

AD.1:    The firewall must have administrative functions to
         support:
         1. Setting up the above specified policy.
         2. Enable the logging as specified above.
         3. Conditional: if remote-administration is allowed,
            either from the public side or LAN based, the firewall 
            itself must have the ability to configure that remote
            administration.

AD.2:    The functions of AD.1 must be accessible thru, gasp,
         an interface.

AD.3:    To access the Administration Interface, authentication
         must be done; a password check at a minimum.

AD.4:    Conditional: If remote-administration is allowed, then
         at least one of the following must be enforced:
         1. If being admin'd from the private side, use of the 
            IP# of the administrative client shall not be the sole 
            means of authentication.
         2. If being admin'd via the public-side, then the admin
            session must either be encrypted and/or a "strong
            authentication" mechanism must be used (eg, but not
            limited to, a one-time password).
         3. if not #1 or #2, the remote-admin is disabled.
  
FT.1:    Once it's up and running, the certification process will
         test to see that every service which should work does,
         and everything that should not work does not.

ST.1     Once it's up and running, the certification process will
         test to see if it can obtain illegal access to the 
         administrative *functions*. Note that it doesn't say 
         access to the functions via the intended admin interface.
         So buffer overflows here seem fair game to me.

ST.2     Once it's up and running, the certification process will
         unleash some scanners on the firewall to test for known
         vulnerabilities. Expect "ISS Internet Scanner" and 
         "Netect HackerShield" at a minimum. Reality, test with
         NMAP and Nessus.

ST.3     Once it's up and running, the certification process will
         test to see that nothing except the specified allowable 
         traffic can traverse from the public-side to the LAN side.

ST.4     Once it's up and running, the certification process will
         test to see that the firewall correctly handles some DoS 
         attacks. It must:
         1. Survive the trivial ones (eg, SYN flood, Ping of Death).
         2. Fail *closed* for the DoS attacks of no known defense.

DO.1     The firewall must be accompanied with some documentation,
         either written or electronic, detailing how to install it.

DO.2     The firewall must be accompanied with some documentation,
         either written or electronic, detailing how to administer
         and maintain it.

Last Updated: 29 Dec 2000

<END>


_______________________________________________
Leaf-devel mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/lists/listinfo/leaf-devel

Reply via email to