Internet & Intranet Security

Team-Fly

10.4 CONCLUSIONS

Application-level gateways and proxy servers provide a sophisticated and advanced technology to secure TCP-based applications and application protocols for the Internet. There are advantages and disadvantages that should be kept in mind when discussing the suitability of application-level gateways and proxy servers:

Against this background (i.e., the second disadvantage), an interesting field of study refers to the secure handling of multicast traffic. Note that multicast traffic, as deployed on the Multicast Backbone (MBone), is based on UDP as a transport layer protocol. MBone holds great potential for many organizations because it supports low-cost audio- and video-conferencing and carries live broadcasts of an increasing number of public interest events. MBone conferences are transmitted by way of unauthenticated multicast traffic, which unfortunately conveys significant security vulnerabilities to any system that receives them. For this reason, most application gateways block MBone traffic sent from the Internet and prevent it from reaching internal hosts. It is not until recently that firewall vendors have begun to address the UDP and multicast challenge. For example, in 1999, Trusted Information Systems, Inc., extended its set of proxy servers for the FWTK version 2.0 with a set of facilities that can be used to participate in MBone conferencing [8]. The basic idea is to have proxy servers running on the firewall that forward inbound multicast traffic using unicast addressing on the corporate intranet. Obviously, this approach is appropriate for individual users participating in MBone conferencing. However, this approach is not very efficient and may run into scalability problems if too many users on the corporate intranet want to participate in multicast sessions. In this case, the efficiency advantages of multicast routing are entirely lost.

Now that the basic components of a firewall configuration (i.e., packet filters and application gateways) have been introduced and examined, we can combine them to provide some higher levels of security and flexibility than if either were used alone. In Chapter 11 we provide some examples of firewall configurations to give a more concrete and comprehensive understanding of the firewall technology as a whole.

[5]It would still be possible, if the application protocol were reverse-engineered.


Team-Fly

Категории