S 2.75 Selection of a suitable application-level gateway

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: IT Security Officer, Administrator

In the application layer, the functions of a security gateway are assumed by application-level gateways (ALG). Implicitly, ALGs also perform functions in layers 1 to 3. ALGs are often referred to as "security proxies", but in this safeguard the term "proxy" will be used for short. Proxies are positioned in the network in such a way that they come between the source and destination, thus interrupting the direct flow of data between the two. When a client on one side of the proxy and a server on the other side of a proxy communicate, the proxy receives the requests from the client and forwards them to the server. Where the connection is established in the opposite direction, i.e. from the server to the client, the proxy does the same, but in the opposite direction. In this case, all communications between the two computers run directly through the proxy.

Some of the advantages and disadvantages of security proxies are summarised below:

Advantages of proxies

Depending on the service, more extensive data can be logged (e.g. URL in the case of HTTP).

Disadvantages of proxies

There may be restrictions on the functionality of client programs (e.g. through filtering of active content).

Proxies can function in two different modes of operation, transparent and non-transparent. A transparent proxy does not have to be communicated to the clients. It reads all the IP packets in the network and decides on the basis of IP address and port number which of them should be forwarded to another network. Where a non-transparent proxy is used, on the other hand, its IP address and port number have to be entered in the client software (e.g. the web browser) before a connection can pass through the proxy.

Before purchasing anything, it is necessary to check which of the requirements listed below the ALG will need to meet. Depending on the application context, it may be possible to dispense with some of the requirements.

The requirements listed must be evaluated in the context of the application. If one particular protocol is not used, then the ALG does not need to offer support for that protocol. If the ALG supports protocols that are not used, then it should be possible to deactivate the protocol concerned.

If it has been specified in the security gateway policy that one or more of the protocols listed below should not be allowed, then it goes without saying that they do not have to be supported.

The criteria used in the evaluation and the decisions made must be documented in a comprehensible manner.

General information

Some more specific requirements for particular protocols that are commonly used are presented below:

HTTP:

HTTPS:

SMTP:

FTP (passive and active):

NNTP:

Telnet:

POP:

UDP and TCP relays:

IP relay:

DNS:

Plaintext protocols like Telnet and FTP should if possible no longer be used in public networks, and should be replaced by more secure alternatives (SSH/SCP). Even on internal networks, they should only continue to be used if there are compelling reasons that prevent switching to SSH or another secure protocol.

If required and feasible, POP should continue to be used internally. If e-mails are retrieved from an external mail server (possibly with a provider), the variant "POP over SSL" is to be preferred. However, in this case an SSL proxy (analogous to the HTTPS proxy) that interrupts the encrypted connection on the security gateway and thus enables e-mails to be centrally scanned for viruses and other malicious content is required.

Review questions: