S 4.223 Integration of proxy servers into the security gateway

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

HTTPS security proxy

The HTTPS proxy should decrypt the incoming data traffic, forward it to the content filter, and then re-encrypt the data traffic. The temporarily unencrypted data traffic can be examined for undesired content.

Ideally, the application level gateway (ALG) used supports an HTTPS proxy. The relatively simple design shown in the figure below can be used in this case. For the sake of clarity, the case where the data traffic is filtered by a separate component is considered. In many cases, though, filtering has already been integrated into the ALG by the manufacturer.

Integration of an internal HTTPS proxy
Figure: Integration of an internal HTTPS proxy

Advantages of an "HTTPS proxy on the ALG" Disadvantages of an "HTTPS proxy on the ALG"
  • Easy to configure, because there are configuration interfaces available in general.
  • When compared to an external HTTPS proxy, there are fewer communication relationships between the modules involved in SSL decryption and in filtering content (since the data does not have to leave the ALG).
  • The complexity of SSL makes the development of the proxy software prone to error, which may then result in vulnerabilities. Errors in the SSL implementation could make it possible to take control of the entire ALG.
  • The maximum data throughput is low due to the processor-intensive key handling and the resulting higher load placed on the ALG.

Table: Advantages and disadvantages of an HTTPS proxy on the ALG

If the ALG does not offer an HTTPS proxy, the structure shown in the figure below can be used. In this case, the HTTPS proxy is located in a separate DMZ. In contrast to the previous figure, the figure below illustrates the case where malicious content is filtered by the ALG.

Integration of an external HTTPS proxy
Figure: Integration of an external HTTPS proxy

Advantages of an "HTTPS proxy in a DMZ" Disadvantages of an "HTTPS proxy in a DMZ"
  • The products can be selected independently of the ALG.
  • Lower load on the ALG, because the processor-intensive key administration is performed on a separate computer.
  • Several proxies need to be set up on the ALG.
  • Faulty configurations are more likely due to the complex communication relationships between the components involved.
  • Higher latency times when retrieving data as compared to when the HTTPS proxy is integrated into the ALG since several TCP or UDP connections need to be established between the individual modules.

Table: Advantages and disadvantages of an HTTPS proxy in a DMZ

The strength of the encryption in the trustworthy network could be adapted to the protection requirements and the trustworthiness of the participants in both of the solutions presented. It may also be possible to do without encryption in the trustworthy network or to use a less processor-intensive and weaker encryption procedure in order to increase the performance.

Caching proxy

When services are used, access to the untrustworthy network could be restricted to certain proxies (e.g. to a caching proxy for HTTP). The clients are not able to bypass the ("forced") proxy in order to communicate with external partners, since the IP address of the client is rejected by the security gateway (only the IP address of the caching proxy is accepted by the security gateway).

Advantages of ("forced") caching proxies Disadvantages of ("forced") caching proxies
  • Wide range of capabilities for logging the HTTP traffic if only a single-tier security gateway (consisting of a packet filter) is used.
  • Extended filtering capabilities if only a single-tier design consisting of a packet filter is used. The following can be filtered, for example, using a caching proxy:
    - Cookies
    - URLs
    - HTTP referrers
    - HTTP Via
    - HTTP Server
  • Reduction in the volume of data transmitted due to the use of the caching functionality.
Comments: In general, caching proxies are not developed with security aspects in mind. A dedicated security proxy should be preferred over the caching proxies, if possible.
  • Complete failure of HTTP/HTTPS when the proxy fails. Temporary operation without the use of the proxy requires extensive configuration work (the blacklists on the packet filter need to be changed and the proxy settings of the clients need to be changed accordingly if the caching proxy was not operated transparently). As a general rule, it is therefore necessary to design the proxy redundantly.

Table: Advantages and disadvantages of forced caching proxies

Reverse proxy

"Reverse proxies" are used in the context of providing (web) servers, but can also be used to achieve the following security objectives:

The following figure illustrates a situation in which two servers are provided for access from the untrustworthy network. In the scenario shown, it is necessary to open two communication links that pass through the ALG and the external packet filter.

Reverse proxy used to reduce the number of communication links passing through the ALG. The reverse proxy and the servers are located in the same DMZ.
Figure: Reverse proxy used to reduce the number of communication links passing through the ALG. The reverse proxy and the servers are located in the same DMZ.

The number of communication relationships shown in the previous figure can be reduced with the help of a reverse proxy. In the figure, clients in the untrustworthy network are only allowed to access the reverse proxy while access to server 1 and server 2 is blocked. Only the reverse proxy can access these two servers.

Reverse proxy used to reduce the number of communication links passing through the ALG. The reverse proxy and the servers are located in different DMZs.
Figure: Reverse proxy used to reduce the number of communication links passing through the ALG. The reverse proxy and the servers are located in different DMZs.

To increase the security of the servers, the servers can also be operated in a separate DMZ where they are separated from the reverse proxy by a security proxy. It is more difficult to take control of a server in this case, but the number of communication relationships passing through the ALG increases.

Review questions: