16
Firewalls and encryption How deep the rabbit hole goes?

Firewalls and encryption How deep the rabbit hole goes?

Embed Size (px)

Citation preview

Page 1: Firewalls and encryption How deep the rabbit hole goes?

Firewalls and encryptionHow deep the rabbit hole goes?

Page 2: Firewalls and encryption How deep the rabbit hole goes?

Introduction

Márton IllésBalaBit

Product Manager

[email protected]

Page 3: Firewalls and encryption How deep the rabbit hole goes?

Agenda...

• Bridge of Death, or „you have to know these things when you're a king”

– You have to know these things, when your an Ethical Hacker!

• Modern net-tale about Alice, Bob, Mallory and Trent where it turns out that Mallory might not be such a bad boy and Trent is not as trustworthy as we have thought before...

Page 4: Firewalls and encryption How deep the rabbit hole goes?

A word on firewalls

• A firewall is a network-aware access control device, which enforces rules

• Different firewall technologies– Packet Filter– Proxy– Intrusion Prevention System

Page 5: Firewalls and encryption How deep the rabbit hole goes?

Our problem

• We want to encrypt our communications

• We want to control all communications on the firewall

• If the communication is encrypted the firewall could not look inside → can not control it!

• Which shell we throw away?– The firewall or the encryption?

Page 6: Firewalls and encryption How deep the rabbit hole goes?

How deep the rabbit hole goes?

• Man-in-the-middle „attack”– We stand between client and server– Independent client and server side encryption

• In the middle we do what we want! ;)

• Is Mallory now the good guy?!

Page 7: Firewalls and encryption How deep the rabbit hole goes?

Very deep the rabbit hole goes?

• In case of SSL there is no Perfect Forward Secrecy

– Having the private key the encrypted traffic can be check transparently

• Now Mallory is the good guy!

Page 8: Firewalls and encryption How deep the rabbit hole goes?

Firewall vs. server vs. encryption

• Against what does a firewall in front of the server protect? - „Az ellen nem véd!” (Bad hungarian humor)

• Besides IP/port filtering what can we do with application layet?

• We got the private key!

Page 9: Firewalls and encryption How deep the rabbit hole goes?

SSL client authentication

• It is possible to check and authenticate the certificate of the client

– Mutal X.509 authentication

• Are we positive that the certificate matches the user?

Page 10: Firewalls and encryption How deep the rabbit hole goes?

Virus, p0rn and the trojans

• Many „application” uses port 443/tcp

• This is an unfiltered full-speed covert channel– Trojans, backdoors, skype

• Why p0rn sites not available over https?– It is kind a confidental information... :)

• Mallory is here to save us!

Page 11: Firewalls and encryption How deep the rabbit hole goes?

Is the man visible in the middle?

• Could the client recognize that the server certificate has changed?

– No, Joe user does not care about such unimporant details.

– Yes, but the certificate is issued by our Trusted Certificate Authority

• We generate a new certificate based on the server's and sign it using our – trusted - authority.

Page 12: Firewalls and encryption How deep the rabbit hole goes?

Is the man visible in the middle?

Page 13: Firewalls and encryption How deep the rabbit hole goes?

One minute on PKI...

• It should be rather pkI• How much can you trust CAs?

– Who checks and oversees them?– What is the criteria for a CA to be included in

a browser pre-defined trusted CA set?

Page 14: Firewalls and encryption How deep the rabbit hole goes?

Life beyond SSL

• There is life beyond SSL– SSH, IPSec, GPG/PGP etc.

• In case of GPG/PGP therea solution called„key escrow”

Page 15: Firewalls and encryption How deep the rabbit hole goes?

Lessons learned

• Goal: control enctypted communications

• Control and inspect all the details of the enctypted communication on the firewall

– Rabbit holes are deep...

• MITM could be used for nice purposes!– Mallory is our friend, he is our best friend!

Page 16: Firewalls and encryption How deep the rabbit hole goes?

Thanks for listening!