[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference noted::seal

Title:SEAL
Moderator:GALVIA::SMITH
Created:Mon Mar 21 1994
Last Modified:Fri Jun 06 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:1989
Total number of notes:8209

1879.0. "v3 access from red to blue?" by BIGUN::nessus.cao.dec.com::Mayne (A wretched hive of scum and villainy) Wed Mar 19 1997 00:18

What does v3 AKA Firewall97 offer when it comes to doing FTP/telnet/etc from the 
red side to the blue side?

One of our customers has a partner that requires access to certain internal 
systems. Each of them has an AltaVista firewall (one Digital UNIX, one Windows 
NT).

One-off passwords and HHAs are considered over the top to allow the partner 
access to the inside.

PJDM
T.RTitleUserPersonal
Name
DateLines
1879.1CHEFS::espol1.gmt.dec.com::PITTGone with the winsock ...Wed Mar 19 1997 11:4314
Well, what do they want to trust?  I have a customer (with a very
special configuration, incidentally) for whom it is reasonable to
trust a very few "red net" addresses.  They have a custom policy 
on the telnet/ftp proxies that permits those addresses inbound
without authentication.

I also have customers who use inbound access with re-usable password
authentication, where it is an "internal" firewall, so that the red
net is somewhat trusted.

Both these can be done with V2, though the second one requires 
editing outside the GUI ...

T
1879.2BIGUN::nessus.cao.dec.com::MayneA wretched hive of scum and villainyWed Mar 19 1997 16:584
Groovy. Since I don't have a firewall or any documentation handy, could you give 
a poor consultant an implementation hint, please?

PJDM
1879.3EEMELI::EINAMOThu Mar 20 1997 01:097
hi

If someone setup an seminar that deals customising AFW, mail, dns I can 
make a speech (I have done lots of customysing) there and learn also my self !

	
Marko
1879.4CHEFS::espol1.gmt.dec.com::PITTGone with the winsock ...Thu Mar 20 1997 04:0832
Marko,

I have two suggestions:

1) Use this notesfile to write-up what you've done by way
of customisations.  Several of us have done this already,
and you would be contributing to that "pool of knowledge".
Consider this notesfile the communications medium for the
"Self Help Group" that is Digital's Firewall Consultants ...

2) Write up what you've customised (preferably as html page(s),
though any other format is acceptable!) and mail it to me.  I
will then post it on the "Firewall Hints and Tips" WWW Site at
http://sector.gmt.dec.com/firewall.

Please don't think (any of you!) that you have to be an expert
to contribute to either place.  I'm not an expert on UNIX at
all.  I know what I know!  That's all ...

In addition, either place will take write-ups that are simply
lists of points that have to be addressed for a particular
customisation, or they will take detailed polished write-ups,
or they will take anything in between.

As I've said many times before, as consultants we are not in
the game of selling hardware OR software.  We are in the game
of building solutions to customers' requirements, and we use
the firewall product(s) as one part of the tool kit.  We
must get smarter about sharing the other bits and pieces that
we use ...

T
1879.5CHEFS::espol1.gmt.dec.com::PITTGone with the winsock ...Thu Mar 20 1997 05:5160
re .2:

I proposed two posible solutions to your "requirement":

1) Allowing limited inbound access

Set up a red usergroup through the GUI that lists the
allowed set of machines on the outside that can connect
inbound - specify user unknown for each of them.

(Optionally: set up a blue servergroup that contains all
the internal machines that can be accessed inbound without
authentication.)

Set up a custom security policy through the GUI for ftp
and/or telnet (and/or in V3 WWW) that permits that red
usergroup access to all servers (or to the blue server-
group).

... and you have inbound unauthenticated access ...



2) Inbound re-usable passwords

Set up the security policy on ftp and/or telnet (and/or
in V3 WWW) so that inbound authenticated access is permitted.

Set up one or more users, specifying re-usable password
for outbound authentication (note this is required!) and
any other method for inbound access - I suggest that you specify
a mechanism that won't be used at all.

Manually edit the file /usr/dfws/config/auth-keyfile.  This
file contains one record for each user defined on the firewall.
The last two fields of the record indicate the authentication
type for inbound and outbound authentication respectively - the
field separator in the record is colon (:).  You will find that
the second of these - the last field in the record - is "pw", 
while the other one is something else - "snk" if you specified
SNK for inbound authentication in the GUI, ONPW for one-time
password, RWW for Racal Watchword, etc.  Edit the record so that
the two fields both say "pw" - the record should end ":pw:pw:"
(without the quotes!).

... and you have inbound reusable password authentication.



Simple, isn't it!  Do be sure to explain the security risks
involved to your customer.  In particular, if you are trusting
external IP addresses, then you should be aware of the risk of
IP spoofing of a trusted host - a filtering router outside the
subnet including the trusted host may be able to help here - 
and with reusable passwords, you are vulnerable to people
sniffing the userid and password on the external network - 
once again, network design may be able to reduce this risk.


T
1879.6use of gxdOSL09::BJORNMYOpen but SecureThu Mar 20 1997 08:149
    If you only require one external host ('redserver') to telnet to an
    internal machine ('blueserver'):
    
    Use the generic proxy to establish a service 'intelnet' on say port
    1001. Point the internal side to 'blueserver' port 23.
    
    You can then get in by doing 'telnet firewall 1001' on 'redserver'.
    
    Bj�rn