At a very high level, it is not clear what this document is set out to achieve 
and what it really delivers.
Particularly section 2, I really cant tell what value that this section adds.
The document says it is a BCP, so should it have a set of requirements from a 
firewall vendor and operator to be effective.
Without a set of requirements, this looks more like an informational document 
than a BCP.
Specific comments below:

Section 1:
I would add the following about the generic nature of firewalls.

"Firewalls generally operate under the notion of trusted and untrusted network 
domains.
For example, an enterprise that employs the firewall will be considered a 
trusted domain.
Flows that are originated from the trusted domain is considered as untrusted.
The packets are filtered using static and dynamic policies as defined or 
learned "

Nit:
An application-layer gateway (ALG) in front of a server creates a
      perimeter between that server and the network it is connected to.
      The ALG blocks some of the flows in the application protocol based
      on policies such as "do not all traffic from this network" and "do
      not allow the client to send a message of this type".


s/do not all/do not allow/


Layer 4: Most firewalls can filter based on TCP and UDP ports.
      Many (but, frustratingly, not all) firewalls can also filter based
      on transports other than TCP and UDP.


- Most L4 firewalls filter packets based on TCP sequence and ack numbers. This 
essentially makes

the firewall a single point of failure and hence preventing asymmetric routing.

- Firewalls handle out of order fragments and in some cases reassembling the 
fragments to be able to inspect the

L7 payload.

- When a firewall suspects an attack, it sends a reset to both ends to clean up 
the connection. I personally don’t like that, but firewalls spoof these resets.


"Note that many firewall devices can only create policies at one or two of the 
layers."


 Can you please add some text on why that is the case or basis for the above.


Section 3.2:


The section introduces the outside and inside terminology without defining what 
they are.

A terminology section may be necessary or some context of what outside and 
inside are.

I would rather prefer trusted and untrusted instead of inside and outside, 
respectively.


Section 4.

I would highlight the inability of firewall to do Deep Packet Inspection on 
encrypted traffic and hence

Firewalls that look deep into the payload to make decisions are ineffective.


There are a lot of firewall capabilities that are useful to the operators like:

- Syn attacks can be avoided

Tiny  fragment attacks


Should have logs turned on for major events.


Section 5

I think it is pretty useful to require the firewall vendors to align the 
timeouts between NAT & Firewall, as they are deployed together.

Similarly a device that has both NAT & firewall should work in tandem when the 
ALGs are deployed otherwise the applications wont work.

This can be in the section 4 too, as it requires the operators to understand 
that these ALGs should be enabled for both NAT & Firewall.

Provide firewall logging facility of suspected attacks.

I don’t believe there is a standard firewall MIB, but that would be a useful 
one to suggest too.

Firewalls do handle fragmented traffic and deal with out of order fragments.


It seems both sections 4 & 5 need some focused text on what the requirements 
are from a vendor and from an operator.


Appendix A:

 Their security is a side-effect of their design. [[[ MORE HERE about
   the history and why some operators mistake the security policy of
   NATs with firewalls. ]]]


I would suggest the following text for appendix A:


"Many NAT devices implement End-point dependent mapping [as defined in RFC 
4787] and as a result,

only the flows that are originated from a trusted or inside domain, will result 
in a NAT mapping creation. This mapping

Will have the destination address & port information, unless the return traffic 
comes from the same destination address & port,

NAT will drop the packet. This is not because of a security policy but since 
NAT's mapping database cannot find a matching entry.

This gives an illusion that NAT is a security feature by disallowing traffic 
that was originated from outside.

For traffic originated from the untrusted domain, the NATs most likely wont 
have a matching mapping entry to allow the traffic through and

 hence the traffic is dropped."











_______________________________________________
OPSAWG mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to