Firewall
Traversals
By Prof. Kirti Ahirrao
Index:
1. Introduction to Firewall
2. Firewall Traversals
3. Issues with the use of firewalls
4. Types of firewalls
5. SSL / TLS Tunnelling
6. SSL Proxy
7. Working of SSL Proxy
8. Benefits of SSL Proxy
9. SSL / TLS Proxy Servers
Prof. Kirti Ahirrao 2
1. Introduction to Firewall:
• A technology that provides secure pathways through a firewall and enables multiple data streams to
pass through the firewall on the same port (e.g., audio and video data on the same port).
• It refers to a strategy of bypassing firewalls which are commonly used to block access to certain
sites and communication protocols.
• Firewalls are an essential line of defense for personal computers and corporate networks, but many
times they need to be bypassed.
• It permits the outflow of authentic traffic while restricting the inflow of harmful transmissions.
• It monitors both outcoming and incoming traffic and decides whether to block this flow based on a
set of pre-determined rules.
• A firewall can be hardware, software, or both.
Prof. Kirti Ahirrao 3
2. Firewall Traversals:
• It is a major barrier to dynamic, cross-domain Grid computing today is the
existence of firewalls.
• Firewalls provide limited value within a dynamic Grid environment.
• However, it is also the case that firewalls are unlikely to disappear anytime soon.
• Thus, the OGSA(Open Grid Service Architecture) security model must take them
into account.
• It provide mechanisms for cleanly traversing them without compromising local
control of firewall policy.
Prof. Kirti Ahirrao 4
2. Firewall Traversals(contd.)
• Firewall Transversal is automatically provided when Transparent Firewalls
are utilized.
• However the issue remains for both versions of non-transparent firewalls.
• The typical mechanism for allowing transversal (e.g. from outside a Security
Domain to inside) is via a proxy service or a set of firewall supplied cookies.
• There are several issues about sending/receiving such information in the clear.
Therefore, encryption is desired.
Prof. Kirti Ahirrao 5
3. Issues with use of firewalls
1. They are typically invasive and perform address translation without providing
a useable audit record.
2. They can perform state-based inspection are not capable of analyzing the
complex protocols that IntelliGrid Architecture is considering.
3. Firewalls are difficult to manage and must be monitored as part of the SMI
process.
Prof. Kirti Ahirrao 6
4. Types of firewalls:
1. Transparent: It perform OSI layer 2 or 3 bridging and do not typically
provide state inspection. However, they do not obscure addressing information
and tend to be the fastest type of firewall. Since these are transparent, these
types are the easiest to transverse when properly configured.
2. Non-Transparent: These firewalls typically performing packet filtering and
proxy service (e.g. address translation).
3. Non-Transparent with Stateful Inspection: Same capability as non-
transparent but has the additional ability to examine the contents of each
packet. This is typically the lowest performance type of firewall when
performance is measured regarding packet throughput.
Prof. Kirti Ahirrao 7
5.SSL
Tunneling
Prof. Kirti Ahirrao 8
5. SSL / TLS Tunneling:
• SSL Tunneling involves a client that
requires an SSL connection to a backend
service or secure server via a proxy
server.
• This proxy server opens the connection
between the client and the backend
service and copies the data to both sides
without any direct interference in the
SSL connection.
Prof. Kirti Ahirrao 9
5. SSL / TLS Tunneling(contd.):
• A tunneling request CONNECT is made by the client on port 443 for HTTPS. This request is sent
to the proxy server automatically for the HTTPS request.
• The CONNECT request is used by the RFC 2616 to establish a tunnel.
• The proxy server receives the tunneling request on the port 8080. Then it connects the secure
destination server to the port that is requested by the client.
• The proxy server sends back a 200 OK response to the client to confirm that an SSL connection is
created.
• A TLS handshake occurs effectively between the client and the server as the proxy server plays no
part in it.
• After the TLS handshake, the encrypted data is passed from the client to the server via the proxy
server and vice versa. This data is only decrypted at the client or the server and never the proxy
server.
• When the closure of the connection is requested by the client or the server, the connections at ports
443 and 8080 are closed by the proxy server and normal operations resume.
Prof. Kirti Ahirrao 10
6. SSL Proxy
• The SSL proxies control Secure Sockets Layer – SSL traffic -to ensure secure
transmission of data between a client and a server.
• The SSL proxy is transparent, which means it performs SSL encryption and
decryption between the client and the server.
• The SSL proxy also reproduces server certificates so the server can make a secure
(SSL) or unsecure (HTTP) connection to a web server.
Prof. Kirti Ahirrao 11
7. Working of SSL Proxy:
1. It acts as a client for the server by determining the keys to encrypt and decrypt.
2. It acts as a server for the client by first authenticating the original server
certificate and issuing a new certificate along with a replacement key.
3. Decryption and encryption take place in each direction (client and server), and
the keys are different for both encryption and decryption.
4. Hands off HTTPS traffic to the HTTP proxy for protocol optimization and other
acceleration techniques.
Prof. Kirti Ahirrao 12
8. Benefits of SSL Proxy:
1. Decrypts SSL traffic to obtain granular application information.
2. Enforces use of strong protocols and algorithms by the client and the server.
3. Provides visibility and protection against threats embedded in SSL encrypted
traffic.
4. Controls what needs to be decrypted by using SSL Proxy.
Prof. Kirti Ahirrao 13
SSL / TLS
Proxy Servers:
Prof. Kirti Ahirrao 14
9. SSL / TLS Proxy Servers:
• A proxy server is an intermediary between a user’s computer and the Internet.
• A user first connects to a proxy server when requesting web pages, videos or any data online.
• The proxy server then retrieves data that have been previously cached. If an entirely new request,
the proxy server gets data from the original source and caches it for future use.
• A Secure Sockets Layer (SSL) proxy server ensures secure transmission of data with encryption
technology.
• Security in an SSL connection relies on proxy SSL certificates and private-public key exchange
pairs.
• SSL offload and SSL inspection features require the servers to share their secret keys to be able to
decrypt the SSL traffic.
Prof. Kirti Ahirrao 15
References:
• https://blog.vpncity.com/what-is-easy-firewall-traversal/
• http://xanthus-
consulting.com/IntelliGrid_Architecture/New_Technologies/Tech_Firewall_Traversal.htm
• https://avinetworks.com/glossary/ssl-
proxy/#:~:text=SSL%20proxy%20SSL%20proxy%20is,connections%20and%20becoming%20mo
re%20prominent.
• https://en.wikipedia.org/wiki/TLS_termination_proxy
• https://www.geeksforgeeks.org/what-is-ssl-tunneling/
Prof. Kirti Ahirrao 16

More Related Content

PPT
SSL & TLS Architecture short
PPTX
TLS v1.3
PDF
Information System Security
PPT
Secure Socket Layer
PDF
Transport Layer Security
PPTX
Ssl and tls
PDF
Web Security
SSL & TLS Architecture short
TLS v1.3
Information System Security
Secure Socket Layer
Transport Layer Security
Ssl and tls
Web Security

What's hot (19)

PDF
SSL Secure socket layer
PPTX
TLS - Transport Layer Security
PPSX
authentication and access control(http://4knet.ir)
PPTX
PKI & SSL
PDF
15 intro to ssl certificate & pki concept
PPSX
Secure socket layer
PPT
Barriers to TOR Research at UC Berkeley
PPTX
web security
PPTX
Bao cao vpn
PPTX
Secure Socket Layer
PPT
Secure Socket Layer (SSL)
PPTX
Transport Layer Security (TLS)
PPTX
Transport layer security (tls)
DOCX
What is TLS/SSL?
PPTX
Heartbleed Bug: A case study
PPTX
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPTX
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
SSL Secure socket layer
TLS - Transport Layer Security
authentication and access control(http://4knet.ir)
PKI & SSL
15 intro to ssl certificate & pki concept
Secure socket layer
Barriers to TOR Research at UC Berkeley
web security
Bao cao vpn
Secure Socket Layer
Secure Socket Layer (SSL)
Transport Layer Security (TLS)
Transport layer security (tls)
What is TLS/SSL?
Heartbleed Bug: A case study
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
Ad

Similar to Firewall traversals (20)

DOCX
Transport Layer Security
PDF
BAIT1103 Chapter 4
PDF
Https interception proxies
PDF
Proxy Server
PPT
Proxy servers
PDF
PPTX
Internet security
PDF
F5 TLS & SSL Practices
PPT
CTO-CybersecurityForum-2010-RonWilliams
PPT
Chapter_Five[1].ppt
PDF
VULNERABILITIES OF THE SSL/TLS PROTOCOL
PDF
Vulnerabilities of the SSL/TLS Protocol
PPT
Web security.ppt and Information Security introduction and management.pptx
PDF
CS6004 CYBER FORENSICS
PPTX
Firewalls and proxies are both use for security
PPTX
Proxy Server: A Comprehensive Guide
PPT
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
PDF
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
PDF
Details about the SSL Certificate
PDF
SSL/TLS Handshake
Transport Layer Security
BAIT1103 Chapter 4
Https interception proxies
Proxy Server
Proxy servers
Internet security
F5 TLS & SSL Practices
CTO-CybersecurityForum-2010-RonWilliams
Chapter_Five[1].ppt
VULNERABILITIES OF THE SSL/TLS PROTOCOL
Vulnerabilities of the SSL/TLS Protocol
Web security.ppt and Information Security introduction and management.pptx
CS6004 CYBER FORENSICS
Firewalls and proxies are both use for security
Proxy Server: A Comprehensive Guide
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Details about the SSL Certificate
SSL/TLS Handshake
Ad

More from Kirti Ahirrao (6)

PPTX
BusTopolgy.pptx
PDF
Attack on Sony
PDF
Application layer security protocol
PDF
Internet layer security protocol & IPsec
PDF
Network access layer security protocol
PDF
Chapter 1 introduction(web security)
BusTopolgy.pptx
Attack on Sony
Application layer security protocol
Internet layer security protocol & IPsec
Network access layer security protocol
Chapter 1 introduction(web security)

Recently uploaded (20)

PDF
Hazard Identification & Risk Assessment .pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
Empowerment Technology for Senior High School Guide
PDF
IGGE1 Understanding the Self1234567891011
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
Trump Administration's workforce development strategy
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
Complications of Minimal Access-Surgery.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
HVAC Specification 2024 according to central public works department
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Hazard Identification & Risk Assessment .pdf
What if we spent less time fighting change, and more time building what’s rig...
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Empowerment Technology for Senior High School Guide
IGGE1 Understanding the Self1234567891011
TNA_Presentation-1-Final(SAVE)) (1).pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Trump Administration's workforce development strategy
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
AI-driven educational solutions for real-life interventions in the Philippine...
Share_Module_2_Power_conflict_and_negotiation.pptx
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Complications of Minimal Access-Surgery.pdf
Introduction to pro and eukaryotes and differences.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
HVAC Specification 2024 according to central public works department
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf

Firewall traversals

  • 2. Index: 1. Introduction to Firewall 2. Firewall Traversals 3. Issues with the use of firewalls 4. Types of firewalls 5. SSL / TLS Tunnelling 6. SSL Proxy 7. Working of SSL Proxy 8. Benefits of SSL Proxy 9. SSL / TLS Proxy Servers Prof. Kirti Ahirrao 2
  • 3. 1. Introduction to Firewall: • A technology that provides secure pathways through a firewall and enables multiple data streams to pass through the firewall on the same port (e.g., audio and video data on the same port). • It refers to a strategy of bypassing firewalls which are commonly used to block access to certain sites and communication protocols. • Firewalls are an essential line of defense for personal computers and corporate networks, but many times they need to be bypassed. • It permits the outflow of authentic traffic while restricting the inflow of harmful transmissions. • It monitors both outcoming and incoming traffic and decides whether to block this flow based on a set of pre-determined rules. • A firewall can be hardware, software, or both. Prof. Kirti Ahirrao 3
  • 4. 2. Firewall Traversals: • It is a major barrier to dynamic, cross-domain Grid computing today is the existence of firewalls. • Firewalls provide limited value within a dynamic Grid environment. • However, it is also the case that firewalls are unlikely to disappear anytime soon. • Thus, the OGSA(Open Grid Service Architecture) security model must take them into account. • It provide mechanisms for cleanly traversing them without compromising local control of firewall policy. Prof. Kirti Ahirrao 4
  • 5. 2. Firewall Traversals(contd.) • Firewall Transversal is automatically provided when Transparent Firewalls are utilized. • However the issue remains for both versions of non-transparent firewalls. • The typical mechanism for allowing transversal (e.g. from outside a Security Domain to inside) is via a proxy service or a set of firewall supplied cookies. • There are several issues about sending/receiving such information in the clear. Therefore, encryption is desired. Prof. Kirti Ahirrao 5
  • 6. 3. Issues with use of firewalls 1. They are typically invasive and perform address translation without providing a useable audit record. 2. They can perform state-based inspection are not capable of analyzing the complex protocols that IntelliGrid Architecture is considering. 3. Firewalls are difficult to manage and must be monitored as part of the SMI process. Prof. Kirti Ahirrao 6
  • 7. 4. Types of firewalls: 1. Transparent: It perform OSI layer 2 or 3 bridging and do not typically provide state inspection. However, they do not obscure addressing information and tend to be the fastest type of firewall. Since these are transparent, these types are the easiest to transverse when properly configured. 2. Non-Transparent: These firewalls typically performing packet filtering and proxy service (e.g. address translation). 3. Non-Transparent with Stateful Inspection: Same capability as non- transparent but has the additional ability to examine the contents of each packet. This is typically the lowest performance type of firewall when performance is measured regarding packet throughput. Prof. Kirti Ahirrao 7
  • 9. 5. SSL / TLS Tunneling: • SSL Tunneling involves a client that requires an SSL connection to a backend service or secure server via a proxy server. • This proxy server opens the connection between the client and the backend service and copies the data to both sides without any direct interference in the SSL connection. Prof. Kirti Ahirrao 9
  • 10. 5. SSL / TLS Tunneling(contd.): • A tunneling request CONNECT is made by the client on port 443 for HTTPS. This request is sent to the proxy server automatically for the HTTPS request. • The CONNECT request is used by the RFC 2616 to establish a tunnel. • The proxy server receives the tunneling request on the port 8080. Then it connects the secure destination server to the port that is requested by the client. • The proxy server sends back a 200 OK response to the client to confirm that an SSL connection is created. • A TLS handshake occurs effectively between the client and the server as the proxy server plays no part in it. • After the TLS handshake, the encrypted data is passed from the client to the server via the proxy server and vice versa. This data is only decrypted at the client or the server and never the proxy server. • When the closure of the connection is requested by the client or the server, the connections at ports 443 and 8080 are closed by the proxy server and normal operations resume. Prof. Kirti Ahirrao 10
  • 11. 6. SSL Proxy • The SSL proxies control Secure Sockets Layer – SSL traffic -to ensure secure transmission of data between a client and a server. • The SSL proxy is transparent, which means it performs SSL encryption and decryption between the client and the server. • The SSL proxy also reproduces server certificates so the server can make a secure (SSL) or unsecure (HTTP) connection to a web server. Prof. Kirti Ahirrao 11
  • 12. 7. Working of SSL Proxy: 1. It acts as a client for the server by determining the keys to encrypt and decrypt. 2. It acts as a server for the client by first authenticating the original server certificate and issuing a new certificate along with a replacement key. 3. Decryption and encryption take place in each direction (client and server), and the keys are different for both encryption and decryption. 4. Hands off HTTPS traffic to the HTTP proxy for protocol optimization and other acceleration techniques. Prof. Kirti Ahirrao 12
  • 13. 8. Benefits of SSL Proxy: 1. Decrypts SSL traffic to obtain granular application information. 2. Enforces use of strong protocols and algorithms by the client and the server. 3. Provides visibility and protection against threats embedded in SSL encrypted traffic. 4. Controls what needs to be decrypted by using SSL Proxy. Prof. Kirti Ahirrao 13
  • 14. SSL / TLS Proxy Servers: Prof. Kirti Ahirrao 14
  • 15. 9. SSL / TLS Proxy Servers: • A proxy server is an intermediary between a user’s computer and the Internet. • A user first connects to a proxy server when requesting web pages, videos or any data online. • The proxy server then retrieves data that have been previously cached. If an entirely new request, the proxy server gets data from the original source and caches it for future use. • A Secure Sockets Layer (SSL) proxy server ensures secure transmission of data with encryption technology. • Security in an SSL connection relies on proxy SSL certificates and private-public key exchange pairs. • SSL offload and SSL inspection features require the servers to share their secret keys to be able to decrypt the SSL traffic. Prof. Kirti Ahirrao 15
  • 16. References: • https://blog.vpncity.com/what-is-easy-firewall-traversal/ • http://xanthus- consulting.com/IntelliGrid_Architecture/New_Technologies/Tech_Firewall_Traversal.htm • https://avinetworks.com/glossary/ssl- proxy/#:~:text=SSL%20proxy%20SSL%20proxy%20is,connections%20and%20becoming%20mo re%20prominent. • https://en.wikipedia.org/wiki/TLS_termination_proxy • https://www.geeksforgeeks.org/what-is-ssl-tunneling/ Prof. Kirti Ahirrao 16