2014
DOI: 10.4204/eptcs.150.3
|View full text |Cite
|
Sign up to set email alerts
|

Directed Security Policies: A Stateful Network Implementation

Abstract: Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this policy is often implemented in the network, for example by firewalls, such that A can establish a connection to B and all packets belonging to established connections are allowed. This stateful implementation is usually required for the network's functionality… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
2
2
1

Relationship

5
0

Authors

Journals

citations
Cited by 5 publications
(12 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…But the policy does currently not permit packets to flow from the web frontend to the Internet. Therefore, using the specification of the security goals again, topoS can convert a security policy into a stateful policy [17]. The result is shown in Figure 6.…”
Section: B Policy Construction With Toposmentioning
confidence: 99%
See 1 more Smart Citation
“…But the policy does currently not permit packets to flow from the web frontend to the Internet. Therefore, using the specification of the security goals again, topoS can convert a security policy into a stateful policy [17]. The result is shown in Figure 6.…”
Section: B Policy Construction With Toposmentioning
confidence: 99%
“…Their core functionality can also be reused as a library in further projects. In this article, we will not present the formal background [7], [12], [14], [15], [17], instead, we demonstrate applicability from an operator's point of view; not requiring a single formula.…”
Section: Introductionmentioning
confidence: 99%
“…Unfolded Synology Firewall allows non-terminating rulesets; however, the only rulesets that are interesting for analysis are the ones actually accepted by the Linux kernel. 6 Since it rejects rulesets with loops, both our algorithm and the resulting ruleset are guaranteed to terminate. Corollary 1.…”
Section: Custom Chain Unfoldingmentioning
confidence: 99%
“…The ESTABLISHED rule essentially allows packet flows in the opposite direction of all subsequent rules [6]. Unless there are special security requirements (which is not the case in any of our analyzed scenarios), the ESTABLISHED rule can be excluded when analyzing the connection setup [6, Corollary 1].…”
Section: The Relatedestablished Rulementioning
confidence: 99%
“…Note that a flow with the stateful attribute might allow packets in the opposite direction of the policy rule and thus potentially violate security invariants. Defining the following two consistency criteria, the stateful attributes can be computed automatically [9]: 1) No information flow violation must occur 2) No access control side effects must be introduced To compute the stateful policy, not only a single rule but a set S is to be upgraded to stateful rules. However, the interaction of the rules and answer paths of S must not introduce negative implications.…”
Section: Constructing the Stateful Policymentioning
confidence: 99%