Mise En Place D'une Solution De Sécurité Open Source

Total Page:16

File Type:pdf, Size:1020Kb

Mise En Place D'une Solution De Sécurité Open Source Dédicace "En termes de sécurité, les ordinateurs sont un problème, les réseaux une horreur et les utilisateurs une catastrophe". Bruce Schneier-in"secrets and lies" On a le plaisir de dédier ce travail reflétant notre effort consenti durant le cursus universitaire à : Nos chers parents, pour lesquels nulle dédicace ne peut exprimer nos sincères sentiments, pour leur patience illimitée, leurs encouragements continus, leur aide, en témoignage de nos profond amour et respect pour leurs grands sacrifices. A nos chers frères et sœurs pour leur grand amour et leur soutien ; qu’ils trouvent ici l’expression de notre haute gratitude. A Toutes nos familles sans exception, à tous nos chers amis(e) pour leurs encouragements, et à tous ceux qu’on aime. A tous nos enseignants. A tout le personnel du département Informatique. A toutes les personnes qui m’ont apporté de l’aide. Remerciement C’est avec le plus grand honneur que j’ai réservé cette page en signe de gratitude et De reconnaissance à tous ceux qui m’ont aidé de près ou de loin à la réalisation de ce Rapport de stage. Nos remerciements s’adressent à Mr Nabhen BOUCHAALA, le directeur général de l’Entreprise COTREL qui m’a accueillies dans son établissement. Nos remerciements vont aussi à notre encadreur Mr Hedi FELFOUL qui a assuré notre Encadrement tout au long de ce stage et par leurs conseils et leurs aides précieuses, m’a guidé Pendant notre projet. Notre sincère gratitude s’adresse également à tous nos enseignants du département Informatique de l’Université Virtuelle de Tunis UVT qui ont assuré notre Formation pendant ces deux années d’étude. De même je tiens à remercier les membres de jury pour l’honneur qui m’ont fait en Acceptant de juger notre travail. Table des matières Introduction Générale ........................................................................................................................................ 1 I. Présentation de l’entreprise et étude de l’existant ..................................................................................... 3 I.1 – Présentation de l’entreprise ................................................................................................................... 3 I.2 - Etude de l’existant ................................................................................................................................... 7 I.3 - Critique de l’existant et problèmes soulevés .......................................................................................... 7 I.4 - Cahier des charges ................................................................................................................................... 8 II. Etude de l’art : Solutions de sécurité et de filtrage ...................................................................................... 9 II.1 La sécurité des réseaux et des systèmes. ................................................................................................. 9 II.2 Technologies et Solutions de sécurité .................................................................................................... 10 II.3 Étude et choix de la solution ................................................................................................................... 12 II.4 Présentation technique de la solution retenue ...................................................................................... 14 III. Présentation et déploiement de la solution ............................................................................................... 16 III.1 Présentation de la topologies actuelle .................................................................................................. 16 III.2 Présentation de la topologie .................................................................................................................. 18 IV. Réalisation .................................................................................................................................................. 21 IV.1 Installation et configuration de PFsense ............................................................................................. 21 IV.2 Mise en place de la solution dual firewall ........................................................................................... 26 IV.3 Serveur proxy ....................................................................................................................................... 33 IV.4 Solution antivirale ................................................................................................................................ 42 V. Réalisation de scan réseau ......................................................................................................................... 48 V.1 Les systèmes d’exploitation dédiés sécurité .......................................................................................... 48 V.2 Choix du système d’exploitation le plus adéquat ................................................................................... 48 V.3 Scan des ports ......................................................................................................................................... 50 V.2 Scan de vulnérabilités ............................................................................................................................. 54 VI. TEST DE LA SOLUTION DE SECURITE........................................................................................................... 66 VI.1 Les attaques ........................................................................................................................................... 66 VI.2 Les scénarios de tests ............................................................................................................................ 67 VI.3 Test de la haute disponibilité ................................................................................................................ 76 VI.4 Test de la solution antivirale .................................................................................................................. 76 VI.5 Test de fonctionnement du serveur proxy ............................................................................................ 77 VI.6 Test du système de détection d’intrusion ............................................................................................. 79 Conclusion Générale ......................................................................................................................................... 81 Liste des figures Figure 1.1 : les marchés de COTREL Figure1.2 : Organigramme de la société COTREL Figure 3.1 Topologie réseau de COTREL Figure 3.2 Topologie réseau de COTREL Figure 4.1: Configuration des Vmnet Figure 4.2: Interfaces de PFsense Master Figure 4.3: Interfaces de PFsense Slave Figure 4.4: Première interface de PFsense Master Figure 4.5: Adressage réseau de PFsense Master Figure 4.6: Adressage réseau de PFsense Slave Figure 4.7: PFsense en haute disponibilité Figure 4.8: General Setup de master-pfsense Figure 4.9: General Setup de slave-pfsense Figure 4.10: Configuration de l’interface LAN Figure 4.11: Règle de communication entre les interfaces SYNC Figure 4.12: Test de Ping entre les interfaces SYNC Figure 4.13: Configuration de CARP sur master-PFsense Figure 4.14: Configuration de l’adresse IP virtuelle de l’interface WAN Figure 4.15: Liste des adresses IP virtuelles Figure 4.16: Paramétrage de NAT Figure 4.17: Statue de CARP sur master-PFsense Figure 4.18: Statue de CARP sur slave-PFsense Figure 4.19: Maquette de mise en place de Squid Figure 4.20: Installation de Squid Figure 4.21: Configuration de Squid sous PFsense Figure 4.22: « Access Control » de Squid Figure 4.23: « Whitelist » et « Blacklist » de Squid Figure 4.24: Authentification sous Squid Figure 4.25: « General Settings » de SquidGuard Figure 4.26: Ajout de la liste noire Figure 4.27: Restreindre l'accès par le temps Figure 4.28: Configurer « Groups ACL » Figure 4.29: Configuration de « Port Forward » Figure 4.30: Principe de fonctionnement de HAVP Figure 4.31: Installation de HAVP antivirus sous PFsense Figure 4.32: Chaînage Squid-HAVP Figure 4.33: Mise à jour de la base antivirus Figure 4.34: Démarrage de HTTP Antivirus Proxy + Antivirus Server Figure 4.35: Logo BackTrack Figure 4.36: Menu de BackTrack Figure 4.37: Profil Zenmap Figure 4.38: Résultat d’un scan de port Figure 4.39: Les modules d’OpenVas Figure 4.40: Menu de BackTrack Figure 4.41: Création d’utilisateur OpenVas Figure 4.42: Création de certificat Figure 4.43: Chargement de module NVT Figure 4.44: Démarrage d’OpenVas Server Figure 4.45: Certificat client d’OpenVas Manager Figure 4.46: Reconstruction de la Base De Données Figure 4.47: Démarrage de Greenbone Security Assistant Figure 4.48: Interface d’authentification de Greenbone Security Desktop Figure 4.49: Création « New Target » Figure 4.50: Création de « New Task » Figure 4.51: Scan de vulnérabilité Figure 4.52: Rapport de scan Figure 4.53: Scan de vulnérabilité par Greenbone Security Desktop Figure 5.1: Déroulement d’une attaque. Figure 5.2: Scan des ports de la machine victime Figure 5.3: Attaque Déni de service par LOIC Figure 5.4: Schéma d’ARP poisoning. Figure 5.5: Lancement d’Ettercap à partir le menu de BackTrack Figure 5.6: Choisir l’interface de sniff Figure 5.7: Sniff sur l’interface eth1 Figure 5.8: Sélection des cibles Figure 5.9: Lancement de l’attaque ARP Poisoning Figure 5.10: Test de fonctionnement de l’attaque ARP Poisoning Figure 5.11: Sniff
Recommended publications
  • The Title Title: Subtitle March 2007
    sub title The Title Title: Subtitle March 2007 Copyright c 2006-2007 BSD Certification Group, Inc. Permission to use, copy, modify, and distribute this documentation for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE DOCUMENTATION IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS DOCUMENTATION INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CON- SEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEG- LIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS DOCUMENTATION. NetBSD and pkgsrc are registered trademarks of the NetBSD Foundation, Inc. FreeBSD is a registered trademark of the FreeBSD Foundation. Contents Introduction vii 1 Installing and Upgrading the OS and Software 1 1.1 Recognize the installation program used by each operating system . 2 1.2 Recognize which commands are available for upgrading the operating system 6 1.3 Understand the difference between a pre-compiled binary and compiling from source . 8 1.4 Understand when it is preferable to install a pre-compiled binary and how to doso ...................................... 9 1.5 Recognize the available methods for compiling a customized binary . 10 1.6 Determine what software is installed on a system . 11 1.7 Determine which software requires upgrading . 12 1.8 Upgrade installed software . 12 1.9 Determine which software have outstanding security advisories .
    [Show full text]
  • Active-Active Firewall Cluster Support in Openbsd
    Active-Active Firewall Cluster Support in OpenBSD David Gwynne School of Information Technology and Electrical Engineering, University of Queensland Submitted for the degree of Bachelor of Information Technology COMP4000 Special Topics Industry Project February 2009 to leese, who puts up with this stuff ii Acknowledgements I would like to thank Peter Sutton for allowing me the opportunity to do this work as part of my studies at the University of Queensland. A huge thanks must go to Ryan McBride for answering all my questions about pf and pfsync in general, and for the many hours working with me on this problem and helping me test and debug the code. Thanks also go to Theo de Raadt, Claudio Jeker, Henning Brauer, and everyone else at the OpenBSD network hackathons who helped me through this. iii Abstract The OpenBSD UNIX-like operating system has developed several technologies that make it useful in the role of an IP router and packet filtering firewall. These technologies include support for several standard routing protocols such as BGP and OSPF, a high performance stateful IP packet filter called pf, shared IP address and fail-over support with CARP (Common Address Redundancy Protocol), and a protocol called pfsync for synchronisation of the firewalls state with firewalls over a network link. These technologies together allow the deployment of two or more computers to provide redundant and highly available routers on a network. However, when performing stateful filtering of the TCP protocol with pf, the routers must be configured in an active-passive configuration due to the current semantics of pfsync.
    [Show full text]
  • David Gwynne <[email protected]>
    firewalling with OpenBSD's pf and pfsync David Gwynne <[email protected]> Thursday, 17 January 13 introduction ‣ who am i? ‣ what is openbsd? ‣ what are pf and pfsync? ‣ how do i use them? ‣ ask questions whenever you want Thursday, 17 January 13 who am i? ‣ infrastructure architect in EAIT at UQ ‣ i do stuff, including run the firewalls ‣ a core developer in openbsd ‣ i generally play with storage ‣ but i play with the network stack sometimes Thursday, 17 January 13 what is openbsd? ‣ open source general purpose unix-like operating system ‣ descended from the original UNIX by way of berkeley and netbsd ‣ aims for “portability, standardization, correctness, proactive security and integrated cryptography.” ‣ supports various architectures/platforms Thursday, 17 January 13 what is openbsd? ‣ one source tree for everything ‣ kernel, userland, doco ‣ bsd/isc/mit style licenses on all code (with some historical exceptions) ‣ 6 month dev cycle resulting in a release ‣ 3rd party software via a ports tree ‣ emergent focus on network services Thursday, 17 January 13 what is openbsd? ‣ it is very aggressive ‣ changes up and down the stack (compiler to kernel) to make a harsher, stricter, and less predictable runtime environment ‣ minimal or no backward compatibility as things move forward ‣ whole tree is checked for new bugs ‣ randomise as much as possible all over Thursday, 17 January 13 what is openbsd? ‣ it is extremely conservative ‣ tree must compile and work at all times ‣ big changes go in at the start of the cycle ‣ we’re not afraid to back stuff out ‣ peer review is necessary ‣ we do back away from some tweaks for the sake of usability Thursday, 17 January 13 what is pf? ‣ short for packet filter ‣ the successor to IP Filter (ipf) ‣ ipf was removed due to license issues ‣ the exec summary is that it is a stateful filter for IP (v4 and v6) traffic ‣ does a little bit more than that though..
    [Show full text]
  • Ask Bjørn Hansen Develooper LLC
    If this text is too small to read, move closer! http://groups.google.com/group/scalable Real World Web: Performance & Scalability Ask Bjørn Hansen Develooper LLC http://develooper.com/talks/ April 14, 2008 – r17 Hello. • I’m Ask Bjørn Hansen perl.org, ~10 years of mod_perl app development, mysql and scalability consulting YellowBot • I hate tutorials! • Let’s do 3 hours of 5 minute° lightning talks! ° Actual number of minutes may vary Construction Ahead! • Conflicting advice ahead • Not everything here is applicable to everything • Ways to “think scalable” rather than be-all-end-all solutions • Don’t prematurely optimize! (just don’t be too stupid with the “we’ll fix it later” stuff) Questions ... • How many ... • ... are using PHP? Python? Python? Java? Ruby? C? • 3.23? 4.0? 4.1? 5.0? 5.1? 6.x? • MyISAM? InnoDB? Other? • Are primarily “programmers” vs “DBAs” • Replication? Cluster? Partitioning? • Enterprise? Community? • PostgreSQL? Oracle? SQL Server? Other? Seen this talk before? Slide count 200 No, you haven’t. • 150 • :-) 100 • ~266 people * 3 hours = half a work year! 50 0 2001 2004 2006 2007 2008 Question Policy! http://groups.google.com/group/scalable • Do we have time for Slides per minute questions? 1.75 • Yes! (probably) • Quick questions anytime • Long questions after 1.00 • or on the list! • (answer to anything is likely “it depends” or “let’s talk about it 0.25 after / send me an email”) 2001 2002 2004 2005 2006 2007 2008 • The first, last and only lesson: • Think Horizontal! • Everything in your architecture, not just the front end web servers • Micro optimizations and other implementation details –– Bzzzzt! Boring! (blah blah blah, we’ll get to the cool stuff in a moment!) Benchmarking techniques • Scalability isn't the same as processing time • Not “how fast” but “how many” • Test “force”, not speed.
    [Show full text]
  • Documento Completo
    UNIVERSIDAD AUTÓNOMA DE CIUDAD JUÁREZ Instituto de Ingeniería y Tecnología Departamento de Ingeniería Eléctrica y Computación Caracterización de firewall de alta disponibilidad con filtro de contenido en un ambiente virtualizado. Reporte Técnico de Investigación presentado por: Alejandra Juana Torres Pérez 98709 Lucero Martínez Castrillo 98750 Requisito para la obtención del título de INGENIERO EN SISTEMAS COMPUTACIONALES Profesor Responsable: Mtro. Eduardo Castillo Luna Mayo de 2015 ii iii iv Índice de contenidos Autorización de Impresión…………………………………………………………....¡Error! Marcador no definido. Declaración de Originalidad………………………………………………………….¡Error! Marcador no definido. Lista de Figuras ... ……………………………………………………………………….viii Lista de Tablas .... ………………………………………………………………………..iix Introducción ......…………………………………………………………………………...1 Capítulo 1. Planteamiento del problema ......………………………………………………2 1.1 Antecedentes ......……………………………………………………………………2 1.2 Definición del problema......………………………………………………………...4 1.3 Objetivos de la investigación .....…………………………………………………....4 1.4 Preguntas de investigación.....……………………………………………………....5 1.5 Justificación de la investigación ....………………………………………………....5 1.6 Limitaciones y delimitaciones de la investigación ....……………………………...6 Capítulo 2. Marco Teórico .....……………………………………………………………..7 2.1 Seguridad informática ....……………………………………………………………7 2.1.1 Tipos de Seguridad……………………………………………………………..8 2.1.2 Seguridad en redes de comunicación………………………………………......9 2.2 Firewall ......………………………………………………………………………..10 2.2.1
    [Show full text]
  • The Book of PF Covers the Most • Stay in Control of Your Traffic with Monitoring and Up-To-Date Developments in PF, Including New Content PETER N.M
    EDITION3RD BUILD A Covers OpenBSD 5.6, MORE SECURE FreeBSD 10.x, and NETWORK EDITION NETWORK 3RD NetBSD 6.x WITH PF THETHE BOOKBOOK THE BOOK OF PF OF THE BOOK THE BOOK OF PF OF THE BOOK OFOF PFPF OpenBSD’s stateful packet filter, PF, is the heart of • Build adaptive firewalls to proactively defend against A GUIDE TO THE the OpenBSD firewall. With more and more services attackers and spammers NO-NONSENSE placing high demands on bandwidth and an increas- OPENBSD FIREWALL • Harness OpenBSD’s latest traffic-shaping system ingly hostile Internet environment, no sysadmin can to keep your network responsive, and convert your afford to be without PF expertise. existing ALTQ configurations to the new system The third edition of The Book of PF covers the most • Stay in control of your traffic with monitoring and up-to-date developments in PF, including new content PETER N.M. HANSTEEN visualization tools (including NetFlow) on IPv6, dual stack configurations, the “queues and priorities” traffic-shaping system, NAT and redirection, The Book of PF is the essential guide to building a secure wireless networking, spam fighting, failover provision- network with PF. With a little effort and this book, you’ll ing, logging, and more. be well prepared to unlock PF’s full potential. You’ll also learn how to: ABOUT THE AUTHOR • Create rule sets for all kinds of network traffic, whether Peter N.M. Hansteen is a consultant, writer, and crossing a simple LAN, hiding behind NAT, traversing sysadmin based in Bergen, Norway. A longtime DMZs, or spanning bridges or wider networks Freenix advocate, Hansteen is a frequent lecturer on OpenBSD and FreeBSD topics, an occasional • Set up wireless networks with access points, and contributor to BSD Magazine, and the author of an lock them down using authpf and special access often-slashdotted blog (http://bsdly.blogspot.com/ ).
    [Show full text]
  • Download the Fourth Chapter
    4 Implementation At this point, you should have a clear operational policy that governs how your users may make use of network services. You should also have good network monitoring tools installed and collecting data, so you can tell at a glance pre- cisely how your network is actually being used. With these major components in place, you are now ready to make changes to the network configuration that bring actual utilisation in line with policy. The implementation phase of net- work building closes the feedback loop that allows policy to be consulted upon and revised, and network services to be implemented and changed, based on information provided by the monitoring systems. This chapter will show you the essential technical components that should be in place in virtually every network connected to the Internet. These techniques will allow you to limit, prioritise, and optimise the flow of information between the Internet and your users. While these technical constraints are necessary to maintain the health of the network, there is one management technique that is often overlooked, yet nearly always makes the greatest impact on network utilisation: communica- tion with your users. If your users don't understand that their actions directly impact the performance of the network, how can they be expected to know that the network is overutilised and not "just broken?" When users are frustrated with network performance, and met with indifference (or outright contempt) by network administrators, they tend to try to find ways around the rules in order to "get their work done." More often than not, these workarounds will consume even more bandwidth, causing problems for users and administrators alike.
    [Show full text]
  • Pfsense Tutorial Slides (Application/Pdf
    pfSense Tutorial BSDCan 2008 From zero to hero with pfSense May 13, 2008 Chris Buechler <[email protected]> Scott Ullrich <[email protected]> History of pfSense Started as a work project 13 years ago when we needed a internal firewall Originally Linux, switched to FreeBSD 2.2 Evolution of this path shrunk the firewall down to a Soekris size Moatware was started Met Chris Buechler during this time Sell a number of products Sales guy moves to Florida Moatware fails Chris and myself debate starting over fresh pfSense is forked from m0n0wall roughly 4 years ago Still going strong today pfSense Overview Customized FreeBSD distribution tailored for use as a firewall and router. pfSense has many base features and can be extended with the package system including one touch installations of popular 3rd party packages such as SpamD (spam filter) and Squid (web caching). Includes many features found in commercial products such as Cisco PIX, Sonicwall, Watchguard, etc. Many support avenues available, mailing lists, forum and commercial support. Has the best price on the planet.... Free! pfSense Platforms Live CD Full Install Embedded Developers pfSense Stable Versions 1.0 - October 4, 2006 * 1.0.1 - October 20, 2006 * 1.2 - RELENG_1_2 - February 25, 2008 Downloaded more than 500,000 times to date * Not branched in CVS pfSense Development Versions Current Development Versions 1.3-ALPHA - RELENG_1 2.0-ALPHA-ALPHA-ALPHA - HEAD Snapshots are built every two hours available at http://snapshots.pfsense.org Bonus for attendees - 1.3 snapshots
    [Show full text]
  • Firewalling with Openbsd's PF Packet Filter
    Firewalling with OpenBSD’s PF packet filter Peter N. M. Hansteen [email protected] Copyright © 2005 - 2012 Peter N. M. Hansteen This document is © Copyright 2005 - 2012, Peter N. M. Hansteen. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The document is a ’work in progress’, based on a manuscript prepared for a lecture at the BLUG (see http://www.blug.linux.no/) meeting of January 27th, 2005. Along the way it has spawned several conference tutorials as well as The Book of PF (http://nostarch.com/pf2.htm) (second edition, No Starch Press November 2010), which expands on all topics mentioned in this document presents several topics that are only hinted at here.
    [Show full text]
  • The Book of PF Is the PETER N.M
    With a foreword by BUILDBUILD THETHE BOB BECK, NETWORKNETWORK YOUYOU Director of NEEDNEED WITHWITH PFPF the OpenBSD Foundation THETHE BOOKBOOK THE BOOK OF PF OF THE BOOK THE BOOK OF PF OF THE BOOK OpenBSD’s stateful packet filter, PF, offers an amazing • Use PF to create a wireless access point, and lock it OFOF PFPF feature set and support across the major BSD platforms. down tight with authpf and special access restrictions A NO-NONSENSE GUIDE TO THE Like most firewall software though, unlocking PF’s full • Maximize availability by using redirection rules for potential takes a good teacher. OPENBSD FIREWALL load balancing and CARP for failover Peter N.M. Hansteen’s PF website and conference • Use tables for proactive defense against would-be tutorials have helped thousands of users build the attackers and spammers networks they need using PF. The Book of PF is the PETER N.M. HANSTEEN product of Hansteen’s knowledge and experience, • Set up queues and traffic shaping with ALTQ, so your teaching good practices as well as bare facts and network stays responsive software options. Throughout the book, Hansteen • Master your logs with monitoring and visualization, emphasizes the importance of staying in control by because you can never be too paranoid having a written network specification, using macros to make rule sets more readable, and performing rigid The Book of PF is written for BSD enthusiasts and network testing when loading in new rules. admins at any level of expertise. With more and more services placing high demands on bandwidth and Today’s system administrators face increasing challenges increasing hostility coming from the Internet at large, you in the quest for network quality, and The Book of PF can can never be too skilled with PF.
    [Show full text]
  • BSD Firewalling, Pfsense and M0n0wall
    BSD Firewalling, pfSense and m0n0wall Scott Ullrich ([email protected]) Chris Buechler ([email protected]) BSDCan 2006 May 10th - May 12th Agenda BSD Firewalling Overview of packet filters on the BSD’s m0n0wall pfSense BSD Firewalling Options Which to use when After looking at the comparison table, select the best filter for the task. If you have a personal preference or comfortability level, go with it. Userland vs kerneland NAT daemon? Better handling of NAT broken protocols such as FTP, SIP depending on Firewalling stack. Firewalling Options on FreeBSD IPFW PF IPFilter Firewalling Options on OpenBSD PF IPFilter Firewalling Options on NetBSD PF IPFilter Firewalling Options on DragonFlyBSD PF IPFW IPFilter BSD Firewalling Options FEATURE IPFW IPFILTER PF QUEUE DUMMYNET QUEUE ALTQ SKIPTO RULESETS CONNECTION FORWARDING IPTOS IPTTL IPPOS IPVERSION LAYER2 MATCHING MAC ADDRESS FILTERING TABLES PROBABILITY (PROB) COUNT BSD Firewalling Options FEATURE IPFW IPFILTER PF TEE “ME” SUPPORT IPV6 JAIL IPSEC IPTOS - LOW DELAY IPTOS - THROUGHPUT IPTOS - RELIABILITY IPTOS - MINCOST IPTOS - CONGESTION UID VERREVPATH QUICK BSD Firewalling Options FEATURE IPFW IPFILTER PF KEEP STATE MODULATE STATE SYNPROXY STATE OVERLOAD SUPPORT FINGERPRINT SCANNING LIMIT STATES PER RULE m0n0wall Mission Statement m0n0wall is a project aimed at creating a complete, embedded firewall software package that, when used together with an embedded PC, provides all the important features of commercial firewall boxes (including ease of use) at a fraction of the price (free software). m0n0wall is based on a bare-bones version of FreeBSD, along with a web server, PHP and a few other utilities. The entire system configuration is stored in one single XML text file to keep things transparent.
    [Show full text]
  • Lorenz Henrique Helleis Apresentação Do Estudo De Caso De Uma Rede De Grande Porte Usando PF Com Openbsd Para Segurança De Pe
    Lorenz Henrique Helleis Apresentação do estudo de caso de uma rede de grande porte usando PF com OpenBSD para segurança de perímetro de rede com alta disponibilidade Monografia de Pós-Graduação “Lato Sensu” apresentada ao Departamento de Ciência da Computação para obtenção do título de Especialista em “Administração em Redes Linux” Orientador Prof. Msc. Sandro Melo Co-Orientador Prof. Esp. Hermano Pe- reira Lavras Minas Gerais - Brasil 2008 Lorenz Henrique Helleis Apresentação do estudo de caso de uma rede de grande porte usando PF com OpenBSD para segurança de perímetro de rede com alta disponibilidade Monografia de Pós-Graduação “Lato Sensu” apresentada ao Departamento de Ciência da Computação para obtenção do título de Especialista em “Administração em Redes Linux” Aprovada em 28/08/2008 Prof. Msc. Denilson Vedoveto Martins Prof. Esp. Heitor Augustus Xavier Costa Prof. Msc. Sandro Melo (Orientador) Prof. Esp. Hermano Pereira (Co-Orientador) Lavras Minas Gerais - Brasil Dedico este trabalho primeiramente a Deus, pois sem Ele, nada seria possível e não estaríamos aqui reunidos, desfrutando, juntos, destes momentos que nos são tão importantes. Dedico também a minha mãe, a qual sempre me apoiou em tudo o que eu fiz na minha vida. Em especial, ao meu grande amigo e professor Hermano Pereira, por sua confiança e credibilidade em minha pessoa, o qual sempre esteve me ajudando a crescer profissionalmente e sempre me desafiando a ir cada vez mais longe. v vi Agradecimentos Agradeço a Deus por sempre estar comigo em todas as circunstâncias. Sempre esta me ensinando a ser uma pessoa melhor. Agradeço a minha mãe por ter me apoiado em todos meus estudos, muitas vezes se sacrificando financeiramente pra me dar o melhor pos- sível.
    [Show full text]