RE: Clueless firewall configuration ?

From: Ng, Kenneth (US) (kenng@kpmg.com)
Date: Thu Aug 17 2006 - 12:49:48 EDT


I use something similar, the internet accessible segments need to be
physically separate from the internal ones.

I don't think its just Cisco certified people, I think it's a general
failing of tech people who are not security trained. Its an aura of
"I'm smarter than everyone else because I can configure XYZ". Security,
on the other hand teaches you that that are people both smarter and
luckier and more patient than you are. I think Schneier once said that
the sole advantage defenders have is their ability to architect strong
defenses.

-----Original Message-----
From: Smith, Michael J. [mailto:Michael.J.Smith@unisys.com]
Sent: Tuesday, August 15, 2006 11:00 PM
To: cableguy clueless; pen-test@securityfocus.com
Subject: RE: Clueless firewall configuration ?

My networking guys try to do this stuff all the time--what happens when
you have too many Cisco-certified people in one room at the same time.
Do a google search for "vlan hopping" and decide for yourself it that is
enough of a risk. I think the biggest problem is that it is way too
easy to misconfigure any piece of this setup. The important thing to
say is that instead of a defense-in-depth, you're now looking at a
single device being the keystone of your security.

Since I deal with this scenario all the time, I hit upon a somewhat
compromise. I enforce hardware segregation for external/Internet-facing
vlans, but I'm OK with all the DMZ vlans being on the same switch, and
all the internal DMZs on another switch. Depending on the criticality
of the system and how much I trust the admins, I might be convinced to
do DMZ and internal together, but it's on a case-by-case basis.

HTH
--Mike

Michael J Smith, CISSP-ISSEP michael.j.smith@unisys.com Information
Security Architect
703.579.2552 O
703.855.0890 C
"Those who do not understand Unix are condemned to reinvent it, poorly."
--Henry Spencer

 

> -----Original Message-----
> From: Ng, Kenneth (US) [mailto:kenng@kpmg.com]
> Sent: Monday, August 14, 2006 1:41 AM
> To: cableguy clueless; pen-test@securityfocus.com
> Subject: RE: Clueless firewall configuration ?
>
> This is very difficult to set up completely correctly. And your
> always open to the possibility of an unpublished exploit being able to

> get around your rules. And while I do not know if it is still
> possible, I remember someone demonstrating injecting packets from one
> vlan to another a few years ago.
> And as the infrastructure changes, you have to make double sure that
> you are entirely correct. Conversely, if you use physically separate
> hardware, it's a lot easier to get it right, or
> close enough to right that it doesn't matter much.
>
> -----Original Message-----
> From: cableguy clueless [mailto:cluelesscableguy@gmail.com]
> Sent: Friday, August 11, 2006 4:08 PM
> To: pen-test@securityfocus.com
> Subject: Clueless firewall configuration ?
>
> Guys, I need to ask a favor, my boss knows nothing of IT
> infrastructure, and our "cableguy" (manages the firewall through a
> third party contract) proposed to him an architecture as follows :
>
> 2 cisco 6509 each with firewall blade in them. These function as core
> switches for a 1000 users site with lots of vlans and FW roules
> between the vlans (oh and we are a big production site that relies on
> these cores to let our ciritical bussiness process machines
> communicate to the servers).
>
> He wants to create 2 vlans, 1 for untrusted traffic and 1 vlan for DMZ

> machines and assign physical ports to these to connect to the
> internet.
> The DMZ vlan would also have some physical ports. These ports would
> not be on the core switch but on the access layer switches that are
> fiber attached to the distribution switches that attach to the
> cores...
>
> Does anyone care to comment on the security issues a setup as this
> would pose? would this be pentest bonanza for you guys?
> and what would the hackers make of a dmz vlan living in a big switch
> together with other vlans?
>
> I have some ideas myself, but would appreciate your take on this. I
> know this is the pentest list but it is you guys who get to poke holes

> in these designs...
>
> CCG
>
> --------------------------------------------------------------
> ----------
> ------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> Why not go with the #1 solution - Cenzic, the only one to win the
> Analyst's Choice Award from eWeek. As attacks through web applications

> continue to rise, you need to proactively protect your applications
> from hackers. Cenzic has the most comprehensive solutions to meet your

> application security penetration testing and vulnerability management
> needs. You have an option to go with a managed service (Cenzic
> ClickToSecure) or an enterprise software (Cenzic Hailstorm).
> Download FREE whitepaper on how a managed service can help you:
> http://www.cenzic.com/news_events/wpappsec.php
> And, now for a limited time we can do a FREE audit for you to confirm
> your results from other product. Contact us at request@cenzic.com for
> details.
> --------------------------------------------------------------
> ----------
> ------
>
>
>
>
> **************************************************************
> ***************
> The information in this email is confidential and may be
> legally privileged. It is intended solely for the addressee.
> Access to this email by anyone else is unauthorized.
>
> If you are not the intended recipient, any disclosure,
> copying, distribution or any action taken or omitted to be
> taken in reliance on it, is prohibited and may be unlawful.
> When addressed to our clients any opinions or advice
> contained in this email are subject to the terms and
> conditions expressed in the governing KPMG client engagement letter.
> **************************************************************
> ***************
>
>
>
> --------------------------------------------------------------
> ----------
> This List Sponsored by: Cenzic
>
> Need to secure your web apps?
> Cenzic Hailstorm finds vulnerabilities fast.
> Click the link to buy it, try it or download Hailstorm for FREE.
> http://www.cenzic.com/products_services/download_hailstorm.php
> --------------------------------------------------------------
> ----------
>
>

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php
------------------------------------------------------------------------

*****************************************************************************
The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this email by anyone else is unauthorized.

If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken in reliance on it, is prohibited and may be unlawful. When addressed to our clients any opinions or advice contained in this email are subject to the terms and conditions expressed in the governing KPMG client engagement letter.
*****************************************************************************

------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:45 EDT