FWS: Analyzing, maintaining and transcompiling firewalls
-
Published:2021-02-03
Issue:1
Volume:29
Page:77-134
-
ISSN:1875-8924
-
Container-title:Journal of Computer Security
-
language:
-
Short-container-title:JCS
Author:
Bodei Chiara1, Ceragioli Lorenzo1, Degano Pierpaolo1, Focardi Riccardo2, Galletta Letterio3, Luccio Flaminia2, Tempesta Mauro4, Veronese Lorenzo4
Affiliation:
1. Dipartimento di Informatica, Università di Pisa, Pisa, Italy. E-mails: chiara@di.unipi.it, lorenzo.ceragioli@phd.unipi.it, degano@di.unipi.it 2. DAIS, Università Ca’ Foscari, Venezia, Italy. E-mails: focardi@unive.it, luccio@unive.it 3. IMT School for Advanced Studies, Lucca, Italy. E-mail: letterio.galletta@imtlucca.it 4. TU Wien, Wien, Austria. E-mails: mauro.tempesta@tuwien.ac.at, lorenzo.veronese@tuwien.ac.at
Abstract
Firewalls are essential for managing and protecting computer networks. They permit specifying which packets are allowed to enter a network, and also how these packets are modified by IP address translation and port redirection. Configuring a firewall is notoriously hard, and one of the reasons is that it requires using low level, hard to interpret, configuration languages. Equally difficult are policy maintenance and refactoring, as well as porting a configuration from one firewall system to another. To address these issues we introduce a pipeline that assists system administrators in checking if: (i) the intended security policy is actually implemented by a configuration; (ii) two configurations are equivalent; (iii) updates have the desired effect on the firewall behavior; (iv) there are useless or redundant rules; additionally, an administrator can (v) transcompile a configuration into an equivalent one in a different language; and (vi) maintain a configuration using a generic, declarative language that can be compiled into different target languages. The pipeline is based on IFCL, an intermediate firewall language equipped with a formal semantics, and it is implemented in an open source tool called FWS. In particular, the first stage decompiles real firewall configurations for iptables, ipfw, pf and (a subset of) Cisco IOS into IFCL. The second one transforms an IFCL configuration into a logical predicate and uses the Z3 solver to synthesize an abstract specification that succinctly represents the firewall behavior. System administrators can use FWS to analyze the firewall by posing SQL-like queries, and update the configuration to meet the desired security requirements. Finally, the last stage allows for maintaining a configuration by acting directly on its abstract specification and then compiling it to the chosen target language. Tests on real firewall configurations show that FWS can be fruitfully used in real-world scenarios.
Subject
Computer Networks and Communications,Hardware and Architecture,Safety, Risk, Reliability and Quality,Software
Reference27 articles.
1. P. Adão, C. Bozzato, G. Dei Rossi, R. Focardi and F.L. Luccio, Mignis: A semantic based tool for firewall configuration, in: Proc. of the 27th IEEE CSF, 2014, pp. 351–365. 2. P. Adão, R. Focardi, J.D. Guttman and F.L. Luccio, Localizing firewall security policies, in: Proc. of the 29th IEEE CSF, Lisbon, Portugal, June 27–July 1, 2016, pp. 194–209. 3. C.J. Anderson, N. Foster, A. Guha, J.-B. Jeannin, D. Kozen, C. Schlesinger and D. Walker, NetKAT: Semantic foundations for networks, in: Proc. of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2014), ACM, 2014. 4. Firmato: A novel firewall management toolkit;Bartal;ACM Transactions on Computer Systems,2004 5. C. Bodei, P. Degano, R. Focardi, L. Galletta and M. Tempesta, Transcompiling firewalls, in: Proc. 7th International Conference on Principles of Security and Trust, L. Bauer and R. Küsters, eds, LNCS, Vol. 10804, 2018, pp. 303–324.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Firewall Management: Rapid Anomaly Detection;2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2022-12 2. Research and application of next-generation firewall technique in medical network;Journal of Computational Methods in Sciences and Engineering;2022-09-05 3. Computer Security Issues and Legal System Based on Cloud Computing;Computational Intelligence and Neuroscience;2022-07-11 4. Can my firewall system enforce this policy?;Computers & Security;2022-06 5. Continuous Verification of Network Security Compliance;IEEE Transactions on Network and Service Management;2021
|
|