Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application-Level Firewalls: Smaller Net, Tighter Filter: Page 11 of 19

We tested the ability of the proxies to block methods and HTTP URL filtering
based on length or text matching. Application firewalls aren't meant to provide
full-blown Web application protection; however, simple URL matching shouldn't be
difficult. We tested whether the HTTP proxy could block a common
directory-traversal attack. We used regular expressions or simple strings,
depending on what the firewall supported. We tested the blocking by sending the
offending URL containing the offending strings and even Unicode encoded them to
bypass the filter proxies.

DNS Cache Poisoning

We set up a Bind DNS server on the external network and created a new zone under
our domain name called zone-1-1. We also created a zone called zone-1-2. We
created an alias, "spoof" on zone-1-1 that points to "real" in zone-1-2. In
zone-1-2, we created an A record that resolved "real" to an IP address. When we
queried zone-1-2 for "spoofed," the DNS server returned the answer as an alias
for real.zone-1-2 and the address for real.zone-1-2. Our misconfigured DNS
server promptly cached both entries.

SMTP testing

Because none of the firewalls had true POP3 and IMAP application proxies, we
focused on SMTP. We tested open relaying of e-mail by configuring the SMTP proxy
only to allow e-mail to our domain, and then, using an SMTP client on the
outside, we tried to relay mail by direct relay and used bang-path strings such
as victim![email protected] or victim%[email protected].

Glossary
• Application-level firewall: A proxy that examines network traffic at the application-protocol level and can enforce protocol syntax and filter specific protocol commands and content.

• Circuit-level gateway (also known as a proxy): A circuit-level gateway is similar to a stateful packet filter except the circuit-level gateway proxies connections passing through it. Clients and servers never communicate directly.
• Stateful packet-filtering firewall: A firewall that monitors TCP session state and drop/reject packets that are not part of a current session or are out of state with a current session. Application filtering is usually limited to handling randomly assigned connections within protocols like FTP or H.323.