Papers
Topics
Authors
Recent
Search
2000 character limit reached

Firewall Configuration Errors Revisited

Published 6 Nov 2009 in cs.CR | (0911.1240v1)

Abstract: The first quantitative evaluation of the quality of corporate firewall configurations appeared in 2004, based on Check Point FireWall-1 rule-sets. In general that survey indicated that corporate firewalls were often enforcing poorly written rule-sets, containing many mistakes. The goal of this work is to revisit the first survey. The current study is much larger. Moreover, for the first time, the study includes configurations from two major vendors. The study also introduce a novel "Firewall Complexity" (FC) measure, that applies to both types of firewalls. The findings of the current study indeed validate the 2004 study's main observations: firewalls are (still) poorly configured, and a rule-set's complexity is (still) positively correlated with the number of detected risk items. Thus we can conclude that, for well-configured firewalls, ``small is (still) beautiful''. However, unlike the 2004 study, we see no significant indication that later software versions have fewer errors (for both vendors).

Citations (9)

Summary

  • The paper introduces a new complexity measure and confirms the correlation between rule-set complexity and configuration errors in firewall systems.
  • It employs quantitative analysis on 84 firewall rule-sets from Check Point and Cisco PIX to identify 36 vendor-neutral issues.
  • Findings reveal that newer firewall versions do not reduce errors, highlighting the need for simpler rule-set designs to enhance security.

Firewall Configuration Errors Revisited

This paper, "Firewall Configuration Errors Revisited" (0911.1240), revisits the study of firewall configuration errors initially investigated in 2004. It aims to validate earlier findings with contemporary data from two major firewall vendors: Check Point FireWall-1 and Cisco PIX. The study enhances methods for evaluating firewall rule-sets by introducing a new complexity measure applicable across different firewall systems.

Introduction

The paper addresses firewall configuration errors prevalent in corporate environments. Firewalls are crucial to network security, yet errors in their configuration undermine their protective capabilities. Previous findings indicated high rule-set complexity correlated positively with configuration errors. This paper revisits these findings using updated data and methodologies. It includes rule-sets from both Check Point and Cisco PIX, broadening the scope beyond the original study.

Methodology

The study collects and analyzes data from 84 firewall rule-sets across different versions and vendors. The data collection applied non-disclosure agreements to protect sensitive corporate information. Quantitative metric analysis is utilized to identify configuration errors, expanding the set of errors to cover 36 vendor-neutral issues. The new measure of firewall complexity, denoted as $, facilitates comparison across different firewall configurations by normalizing complexity across varied syntax and semantics.

Findings and Implications

Persistency of Errors

The study confirms that firewalls remain poorly configured, with widespread errors. An alarming percentage of firewalls allow inbound traffic on potentially insecure services such as NetBIOS and SMTP. Outbound traffic management is equally concerning, with numerous firewalls permitting excessive SMTP flows, posing risks of data leakage or outbound threats.

Complexity Correlation

The paper validates the correlation between rule-set complexity and errors, underscoring the "small is beautiful" paradigm. Administrators are advised to minimize rule-set complexity where possible. Virtualization and segmentation can help create simpler, tighter configurations that are less prone to errors.

Version Analysis

Contrary to expectations, the paper finds that newer firewall software versions do not exhibit a reduction in configuration errors, attributed to unchanged fundamental filtering capabilities. This finding challenges assumptions that newer software inherently results in better configuration and performance.

Vendor Impact

The study reveals vendor-specific trends. Cisco PIX configurations generally exhibit fewer errors than Check Point configurations, potentially due to the PIX's steeper learning curve prompting more cautious configurations. However, as complexity increases, PIX rule-sets display errors akin to complex Check Point rule-sets.

Conclusion

The work reinforces findings from the previous study, asserting that firewalls are continuously misconfigured while emphasizing the necessity for simplicity in rule-set design. The complexity measure $ provides actionable insights for administrators, advocating for meticulous configuration and rule-set management. The study's broader scope and refined metrics contribute significantly to understanding firewall configuration dynamics, offering robust recommendations for enhancing corporate firewall management practices.

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Authors (1)

Collections

Sign up for free to add this paper to one or more collections.