Firewalls defenceless against new attack, security vendor claims

Why are apparently well-defended networks belonging to the government, military and monied corporates falling to large-scale targeted attacks so regularly?

According to Finnish security vendor Stonesoft, part of the answer could lie with what the company terms ‘Advanced Evasion Techniques’ (AETs), jargon for an obscure class of packet-based probing at the ground level of the TCP/IP stack that firewalls are designed to stop.

The trouble, claims Stonesoft, is that for a clutch of 31 obscure AETs nobody has paid much attention to until recently, the protection level turns out to be close to zero.

It’s a contentious claim and the evidence is hazy, but does it stand up? Just about, although the hard-to-assess bit is whether such attacks have actually been used to do any real damage.

The role of AETs is to probe for vulnerable servers and other systems in an industrial and automated way without being detected by security systems. In Stonesoft’s analysis, the range of AETs being employed against networks is far greater than previously believed, and they are being combined in complex, multiprotocol probes that firewalls just can’t see.

If accurate, this sounds significant. It means that every firewall in the world is unable to detect probes used to hunt down servers vulnerable to the application-layer exploits that fuelled major cyber-infrastructure incidents of recent times such as Stuxnet and this year’s Aurora attacks on Google and others.

The company arrived at its conclusion, it said, after trying to fix problems in its own security appliances during certification programs, during which it built its own testing tools.

“The dynamic and undetectable nature of these advanced evasion techniques has the potential to directly affect the network security landscape,” said Stonesoft COO, Juha Kivikoski. “The industry is facing a non-stop race against this type of advanced threats and we believe only dynamic solutions can address this vulnerability.”

It has no direct evidence that high-profile attacks have been preceded by AET probing but suspects that given the vulnerability of firewalls they have uncovered, they might turn out to be a missing ‘missing link’ in an unknown number of incidents.

Stonesoft reported its findings to CERT-FI in Finland some time ago and has had the results verified by leading certification organisation, ICSA Labs, which lends some support to its claims.

A contentious issue is what can be done to patch the problem in security appliances, which covers intrusion prevention systems, firewalls, and even major classes of router.''

Stonesoft pins some of the blame on the ASIC-based design of modern appliances, which is supposed to improve performance but at the cost of baking in static security rules and defences into hardware. Conveniently, its own design is based on virtual appliances driven by software, which would be easier to update or ‘patch’ dynamically to take account of emerging AETs.

This key question is whether AETs are important to modern cybercrime and it seems plausible that in some form they might be. It has long been assumed that advanced probing and bypassing techniques were used by hackers who, understandably, failed to document the success of such techniques. What Stonesoft has possibly uncovered found the assumption that they couldn’t or wouldn’t be used in sophisticated combinations is probably out of date at the very least.

Intrusion prevention systems (IPS) have a spotty record at best for blocking carefully-crafted attacks and some have even questioned whether they are worth bothering with at all.

The company has published more detail on AETs on a special website. Prepare for rival firewall and security companies to rubbish its claims as marketing spin.

Source: Firewalls defenceless against new attack, security vendor claims - Techworld.com

Wow! If this is true then the internet is screwed. Being able to bypass all firewalls means that this could most probably be the single biggest flawed hole in the history of the internet. If it is a problem, it needs to be resolved quickly else everyone might as well unplug their internet connection now.
 
The internet doesn't depend on firewalls for security ... non/poorly updated OS's on back-end networks behind a non pure forwarding firewall depend on firewalls for security, but they're fucked by design.

In the end internet security is very easy, if the computer can be connected from the internet assume it's compromised, if the computer can only connect to the internet ... assume it's compromised unless it only ever connects to known services. If your network is too important to allow that assumption to be true don't bloody well connect it to the internet.

Also stuxnet was distributed by usbkey.
 
Last edited by a moderator:
sigh..... articals like that make me a sad panda......

Seriously, firewalls defenceless :rolleyes: .
it isn't a traditional firewalls job to do any deep payload inspection or hollistic correlation of network data. there is an entire segment of network secuirty dedicated to that task.
 
Am I crazy in lending a lot of credibility to this article just by the fact that the guys who uncovered the vulnerabilities are Finnish? :?:
 
I don't know if you should because deploying a Finnish firewall appliance involves constructing a sauna.
 
Back
Top