Other Issues
Next: Firewall Components
Up: Issues and Problems
Previous: Little Protection from
Other problems or issues with firewalls are as follows:
- WWW, gopher - Newer information servers and clients such as
those for World Wide Web (WWW), gopher, WAIS, and others were not
designed to work well with firewall policies and, due to their newness, are
generally considered risky.
The potential exists for data-driven attacks, in which data processed by
the clients can contain instructions to the clients; the instructions
could tell the client to alter access controls and important security-related
files on the host.
- MBONE - Multicast IP transmissions (MBONE) for video and voice
are encapsulated in other packets; firewalls generally forward the packets
without examining the packet contents.
MBONE transmissions represent a potential threat if the packets were
to contain commands to alter security controls and permit intruders.
- viruses - Firewalls do not protect against users downloading
virus-infected personal computer programs from Internet archives or
transferring such programs in attachments to e-mail.
Because these programs can be encoded or compressed in any number of ways,
a firewall cannot scan such programs to search for virus signatures with
any degree of accuracy.
The virus problem still exists and must be handled with other policy
and anti-viral controls.
- throughput - Firewalls represent a potential bottleneck,
since all connections must pass through the firewall and, in some cases,
be examined by the firewall.
However, this is generally not a problem today, as firewalls can
pass data at T1 (1.5 Megabitssecond) rates and most Internet sites
are at connection rates less than or equal to T1.
- all eggs in single basket - A firewall system concentrates
security in one spot as opposed to
distributing it among systems. A compromise of the firewall could be
disastrous to other less-protected systems on the subnet.
This weakness can be countered,
however, with the argument that lapses and weaknesses in security are
more likely to be found as the number of systems in a subnet increase,
thereby multiplying the ways in which subnets can be exploited.
Despite these disadvantages, NIST strongly recommends that
sites protect their resources with firewalls and other security tools and techniques.
Next: Firewall Components
Up: Issues and Problems
Previous: Little Protection from
John Wack
Thu Feb 9 18:17:09 EST 1995