Firewalls and cryptography


 
Thread Tools Search this Thread
Special Forums Cybersecurity Firewalls and cryptography
# 1  
Old 10-12-2006
Firewalls and cryptography

As we know, firewall is designed to keep unauthorized outsiders from tampering with a computer system or network. We don't talk about computer security without cryptography.
In this case, may I know,How does cryptographic protection (at the TCP/IP layers or at the application layer) affect a firewall's ability to protect against viruses?

thanks!!!!
# 2  
Old 10-13-2006
Quote:
Originally Posted by heroine
...In this case, may I know,How does cryptographic protection (at the TCP/IP layers or at the application layer) affect a firewall's ability to protect against viruses?
Your average firewall doesn't have anti-virus features built into it. *But*, this really depends on your firewall, what proxy features are built in, etc. This is not a simple area, it's one that touches on many aspects of information security.

If you have an encrypted zip/rar/whatever archive file being downloaded via your proxy, then I know of no products which will attempt to decrypt these and inspect them. Some proxy products such as WEBSweeper/MAILSweeper can be configured to block/quarantine/notify on detection of such files, but actual inspection is very difficult, if not impossible (depending on the algorithm used, key space, etc).

If you have a SSL connection to a website (let's say your online banking site) then strictly speaking the connection and its contents are secured from inspection (including AV checking) between the bank's servers and your desktop PC. Some firewalls (such as Bluecoat) support SSL interception whereby when you connect to the bank site, you actually connect to the firewall proxy service by SSL then it connects by SSL to the bank. It can then operate as a "man in the middle" and "see" the data in the clear, thereby being able to pass the intercepted data into whatever content filters you need. I found a brief article outlining the procedure (not my site!) here.

IPSEC & SSL VPNs etc are also problematic for content scanning. I suggest reading some books on Security engineering and network security for in-depth advice on all these topics.

In short, your best bet is to adopt a layered defence approach by not relying on your firewall as a single point of control. Security needs to be applied to all devices/nodes/interfaces across your network, from your routers and mail servers to your print servers and workstations. AV protection should not be limited to your web proxy, it should be on every desktop and server in addition to an approved standardised OS build with restricted permissions and system policies configured to only permit the software, file types, network traffic and users which you have explicitly specified. This should all be supported with regular log monitoring and having appropriate procedures in place to deal with incidents that arise.

Nick
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. Homework & Coursework Questions

Need help in allowing symmetric cryptography[2]

The server that provides the time synchronization must be configured to allow its clients to verify its authenticity using symmetric cryptography. 4. Singapore Polytechnic, Dover, Singapore,Mr Kam, and Computer Engineering I don't think there is any coding since it is just configuring... (3 Replies)
Discussion started by: wilsonljx
3 Replies

2. Red Hat

Need help in allowing symmetric cryptography[2]

I have encountered some problems in my school work. Here is the question: The server that provides the time synchronization must be configured to allow its clients to verify its authenticity using symmetric cryptography. Much Appreciated!:) (1 Reply)
Discussion started by: wilsonljx
1 Replies

3. Shell Programming and Scripting

Cryptography

Hi, I have a file which contains 4 columns. I want to encrypt only the first column. The rest of data must be as it is. flat file: 12234333 jakdjf 394839 343874 73746373 5jdkfdj 383993 958939 83473843 lksdjfj 388383 349399 so, 1 should be replace by 4, 2 with 8, 3 with 7..... the... (4 Replies)
Discussion started by: javeed7
4 Replies

4. UNIX for Advanced & Expert Users

Firewalls

Hi, I was doing abit of reading on firewalls when this question came up. Is there any command which sets up a firewall that will only allow packets through if they come from a port number less than 1024? How about a command which allows packets through if they are destined for a port... (3 Replies)
Discussion started by: sleepster
3 Replies

5. UNIX for Dummies Questions & Answers

Firewalls and other security measures...

One day, while using my PC with Windows XP, my router just stopped working. So, for the ability to connect to the web at that moment, I connected directly to the cable modem without my router. I noticed immediately that people were trying to hack into my computer because my personal firewall would... (2 Replies)
Discussion started by: Minnesota Red
2 Replies

6. Cybersecurity

firewalls and proxys

what can I use to find out whether a computer has a firewall or proxy??? What can I use do erase it? (5 Replies)
Discussion started by: Phatress
5 Replies

7. IP Networking

Halted Firewalls by Mike Murray

Secure packet filtering on high-bandwidths fw/rtr for large business tasks. Has anyone tried this concept on openbsd? The article is posted at www.sysadminmag.com on page 27. January 2002 issue. I believe Mike has hit upon something that can be applied in the field today and prevent fw... (0 Replies)
Discussion started by: dpatel
0 Replies

8. UNIX for Advanced & Expert Users

Linux Firewalls

I've been considering switching my companies production firewall from FreeBSD and OpenBSD to Linux. The reason being is having so many different flavors of Unix on our production network from FreeBSD, OpenBSD, Solaris, and Linux makes things more difficult to manage from a standardized... (2 Replies)
Discussion started by: mstevenson
2 Replies
Login or Register to Ask a Question