450 likes | 597 Views
Check Point Authentication Methods A short comparison. Overview. General Aspects – Authentication at a Firewall General Aspects – The Rule Base Authentication Methods User Authentication Client Authentication Session Authentication Securing the Authentication
E N D
Check Point Authentication Methods A shortcomparison
Overview • General Aspects – Authentication at a Firewall • General Aspects – The Rule Base • Authentication Methods • User Authentication • Client Authentication • Session Authentication • Securingthe Authentication • ComparisonandConclusion Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Chapter 1 – General Aspects (Firewall Authentication) Whyfirewallauthentication? Difficultieswithfirewallauthentication Client sideandserversideaspects Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
The scenario Somecompaniesallowinternetaccessbygroupmembership Most aspects in thepresentationcould also beusedfor DMZ access No Remote Access VPN! Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
The Authentication Problem • Firewall isnoproxy! Gettinguserinformation(clientside) Choosingthebestauthenticationprocedures(serverside) Securingthe Connections Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
The Client Side – Authentication Methods • How do I gettheinformation I need? • User Authentication • Firewall as transparent Proxy • HTTP, FTP, Telnet, Rlogin • Client Authentication • Identifyingthe Client bythe IP-Address • How do I getthecorrelation? • Session Authentication • ProprietaryMethod • Requiering an Agent Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
The Server Side – Authentication Schemes Check Point Password RADIUS SecurID TACACS OS Password LDAP?? Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Chapter 2 – General Aspects (Rulebase) RuleStructure RulePositioning Common Configurations Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
The RuleStrcuture In Source ColumneitherUser Access orAny In Action ColumneitherUser, Session or Client Authentication Service Columnentrydepends on Authentication Method Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
The Rules Paradoxon Existenceofrule 5 has an impact on rule 4 Authentication onlyif packet wouldbedroppedotherwise Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
User Location Source Columnvs User Properties Authentication objectdefinesprecedence Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
The User Object Login Name Group Membership Authentication Scheme Locationand Time Restrictions Certificate Remote Access Parameters Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Firewall Properties Allowed Authentication Schemes Authentication timeoutforone-time passwords Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Global Properties Numberofallowedloginfailures Limitingcertificatestospecial CA Delayingreauthenticationtries Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Chapter 3 – Authentication Methods • User Authentication • Client Authentication • Session Authentication • Different Aspects: • Configuration • Limitations • Packet Flows • SmartViewTracker Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
User Authentication - Principles Firewall behaveslike transparent proxy Client does not knowthat he isspeakingwiththefirewall HTTP, FTP, Telnet, Rloginonly Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
User Authentication with HTTP – A goodstart SYN tothewebserver Firewall interceptsandanswerswithwebservers IP 401 becausenocredentialsare in therequest After gettingthecredentialsfromtheuserthebrowserrestartsthesessionautomatically Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
User Authentication with HTTP – A badfollow-up Browsers cachecredentials, but theyarecorrelatedtowebservers Requeststo same webserverarenoproblem; sometimessessionevenstays open Request tootherwebserverrequiresreauthentication User Authentication with HTTP isnogoodidea! Lessproblemswith FTP or Telnet Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
User Authentication – firewallas explicit proxy • With explicit proxy Setting Browser resendscredentialswitheveryrequest • Changing Check Point firewallto explicit proxymode • AdvancedConfiguration in Global Prperties • http_connection_method_proxyforproxymode • http_connection_methode_tunnelingfor HTTPS connections Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
User Authentication – Special Settings Default Setting does not workbydefault HTTP accesstointernetrequiresAll servers HTTP accessto DMZ servercouldusePredefined Servers Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
User Authentication – A packet Capture Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn Packet Flow New serverrequiresreauthentication Clear textpassword
User Authentication in SmartViewTracker Onlyfirstauthenticationresults in Userentry NoRuleentryfor subsequent requests Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Client Authentication • Necessary: User hastobecorrelatedto IP-Address • No NAT • Nocommon Terminal Server • Duration ofthecorrelation • Necessary: Firewall hastolearnaboutcorrelation • Manual Sign-On • Using User Authentication • Using Session Authentication • Askingsomeoneelse • Rule Position • Interaction withStealthRule • Usableforanyservice Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Client Authentication – Gettingthe Information Manual:http://x.x.x.x:900telnetx.x.x.x 259 Partial automatic:First requestwithUser Authentication Agent automatic:First requestwith Session Authentication agent Single Sign On:Asking User Authority server Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Client Authentication – Duration ofcorrelation Time limitornumberofsessionlimit Time limit = Inactivity time limitwithRefreshabletimeoutset For HTTP: Numberof Sessions shouldbe infinite Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Client Authentication – Improvingthe HTTP • Partial Automatic • Limit: 1 Minute, 5 Sessions • User connectstosinglewebsite, authenticatesandrequestsnextwebsite after 1 minute • Questiontotheaudience: What will happen after 1 minute? • User will bechallengedagainforcredentials • User won´tbechallengedagain but reauthenticated • User will getaccesswithoutreauthentication • User will beblocked Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Client Authentication – A packet Capture • Redirectiontofirewall!! • Noreauthen-ticationwithinfirstminute • Automatic reauthentication after oneminute • Browser cachescredentials • HTTPS can´tbeauthenticated!! Check Point Authentication Methods- A short comparison, Dr. CarstenLöhn
Client Authentication – Manual Sign-On HTTP Port 900 (FW1_clntauth_http) Telnet Port 259 (FW1_clntauth_telnet) Noautomaticreauthenticationbybrowser -> chooselimitswisely Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Client Authentication – Customizing HTML files • $FWDIR/conf/ahclientd/ • ahclientd#.html • 1: Greeting Page (Enter Username) • 2: End-of-session Page • 3: Signing Off Page • 4: Successful Login Page • 5: SpecificSign-On Page • 6: Authentication Failure Page • 7,8: Password Pages • Becarefulwith %s and %d entries! Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Client Authentication in theSmartViewTracker Reauthentication after exceeding time limitorconnectionlimit Every requesthasUserentry Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Client Authentication – Rule Position • Partial Automatic • RuleaboveStealthRule • Manual • Login RuleaboveStealthRule • Session Automaticor SSO • Norequirement Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Session Authentication Requires Session Authentication Agent Authenticateseverysession Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Session Authentication Agent – Packet Capture Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Session Authentication – SmartViewTracker Authenticatingeverysession Severalrequestswithinone TCP sessionwith HTTP 1.1 Every sessionshowsUserentry Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Chapter 4 – Securingthe Authentication • Server sideusually easy • E.g. LDAP SSL • Client Side • HTTP requestisunencrypted • Default settingsdon´tsupportencryption Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Securing Session Authentication In Session Authentication Agent Global Properties – AdvancedConfiguration BTW, defaultsettings on bothsidesareconflicting Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Securing Client Authentication - Manual • 900 fwssdin.aclientdwait 900 ssl:ICA_CERT • Restartdemon Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Securing Client Authentication – Partial Automatic Thatshouldhaveworked Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Securing User Authentication Noredirecttofirewall => Session can´tbesecured Don´tuseCheck Point Password! Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
The Comparison - Barry´sOverview • Thanksto Barry forprovidingthenicetable • (slightlymodified) Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Final words • Severalpossibilities • All havebenefitsandlimitations • Proxiesoftenhavemorepossibilities, but Check Point allowsfilecustomization • Don´tneglectperformanceimpact on firewall! Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn
Check Point Authentication Methods- A short comparison, Dr. Carsten Löhn