Building Internet Firewalls, 2nd Edition (2024)

22.5. Network Time Protocol (NTP)

NTPallows you to set the clocks on your systems very accurately, towithin 1 to 50 ms of the time on a central server. Knowing the exacttime is extremely important for certain types of applications andprotocols:

  • It's much easier to correlate information from multiplemachines (log files, for example, when analyzing a break-in attempt)when all the clocks on those machines are synchronized. It'shelpful to know exactly who was attacked, and in what order, ifyou're going to understand what the attacker was after -- and what might be coming next.
  • Some security protocols depend on anaccurate source of time information in order to prevent"playback" attacks. Such protocols tag theircommunications with the current time, so that those samecommunications (e.g., a login/password interaction or even an entirecommunication) can't be replayed at a later date as part of anattack. This tagging can be circumvented if the clock can be set backto the time the communication was recorded.

NTP servers communicate with other NTP servers in a hierarchy todistribute clock information. The closer a system is to a referenceclock (an atomic clock, radio clock, or some other definitive clock),the higher it is in the hierarchy. Servers communicate with eachother frequently to estimate and track network delay betweenthemselves, so that this delay can be compensated for. NTP clientscan track network delay the same way servers do or can simply askservers for the current date and time without worrying aboutcompensating for communication delays.

NTP is provided with several vendors' versions of Unix; a fewvendors (notably Silicon Graphics) include services based on theolder Time protocol instead of or in addition to NTP. NTP is notprovided with Windows NT but is supported bytimeserv, which is part of the Server ResourceKit.

By default, NTP does not include any authentication; as a result,it's easy for an attacker to forge packets with incorrect timesettings. It's possible to use authentication starting inNTPv3, and you should do so.

22.5.1. Packet Filtering Characteristics of NTP

NTP is a UDP-based service. NTP servers use well-known port 123 totalk to each other and to NTP clients. NTP clients use random portsabove 1023. As with DNS, you can tell the difference between thefollowing:

An NTP client-to-server query
Source port above 1023, destination port 123
An NTP server-to-client response
Source port 123, destination port above 1023
An NTP server-to-server query or response
Source and destination ports both 123

Unlike DNS, NTP never uses TCP, and NTP has no analog to the DNS zonetransfer operation.

NTP servers may also talk to each other using broadcast or multicast;the multicast address 224.0.1.1 is reserved for this purpose.

DirectionSourceAddr.Dest.Addr.ProtocolSourcePortDest.PortNotes
InExtIntUDP>1023123Query, external client to internal server
OutIntExtUDP123>1023Response, internal server to external client
OutIntExtUDP>1023123Query, internal client to external server
InExtIntUDP123>1023Response, external server to internal client
InExtIntUDP123123Query or response between two servers
OutIntExtUDP123123Query or response between two servers
InExt224.0.1.1UDP123123ulticast query or response from an external server
OutInt224.0.1.1UDP123123ulticast query or response from an internal server

Figure 22-1 shows how packet filtering works withNTP.

Building Internet Firewalls, 2nd Edition (1)

Figure 22-1. NTP with packet filtering

22.5.2. Proxying Characteristics of NTP

As a UDP-based application, NTP can't be proxied by SOCKS4 butcan be used with the UDP Packet Relayer or SOCKS5. Because NTPemploys a hierarchy of servers, it can be configured to run on abastion host without using explicit proxying, as shown later in thischapter.

22.5.3. Network Address Translation Characteristics of NTP

NTP does not use embedded IP addresses and will work transparentlywith network address translation.

22.5.4. Configuring NTP to Work with a Firewall

Do you really need to configure NTP towork with a firewall? That's your first decision. You may notneed to if either of the following cases is true at your site:

  • If you have an accurate source of time within your internal network -- for example, a radio clock receiving time signals from theNational Bureau of Standards atomic clocks on one of their radiostations (or the equivalent from non-U.S. standards organizations),or a satellite clock receiving data from the Global PositioningSystem (GPS) satellites.
  • If you're more worried about having time be consistentwithin your network thanbetween your network and the outside world.

In either of these cases, you don't need to run NTP across yourfirewall; you can simply run it internally.

If you do want to run NTP across your firewall, the best way is toset up an NTP server on a bastion host that talks to multipleexternal NTP servers and another NTP server on some internal hostthat talks to the bastion host. (You want the bastion host to talk tomultiple external NTP servers because it increases accuracy and makesit harder to fool.) Next, configure internal NTP clients and otherinternal NTP servers to talk to the internal server that talks to thebastion server. You need to configure any packet filtering systembetween the internal server and the bastion host to allow thefollowing:

Queries from the internal NTP server to the bastion host NTP server
UDP packets from port 123 on the internal server to port 123 on thebastion host
Answers from the bastion host NTP server to the internal NTP server
UDP packets from port 123 on the bastion host to port 123 on theinternal host

22.5.5. Summary of Recommendations for NTP

  • Consider running NTP purely internally.
  • If you run NTP to the Internet, use an NTP server on a bastion hostas a proxy for an internal server.
Building Internet Firewalls, 2nd Edition (2)Building Internet Firewalls, 2nd Edition (3)Building Internet Firewalls, 2nd Edition (4)
22.4. ICMP and Network DiagnosticsBuilding Internet Firewalls, 2nd Edition (5)22.6. File Synchronization

Building Internet Firewalls, 2nd Edition (6)

Copyright © 2002 O'Reilly & Associates. All rights reserved.

Building Internet Firewalls, 2nd Edition (2024)

FAQs

What type of firewall is known as a second generation firewall? ›

Early 2000s: Second Generation of Firewalls—Stateful Firewalls. In the early 2000s, stateful firewalls emerged, ushering in the second generation in firewall technology. These systems represented a significant evolution from their predecessors, the simple packet filters.

Are firewalls still a thing? ›

The Present Day. Network security systems today must exist in several different states. As networks have grown more complex, so too has the job of the Firewall. With modern business practices, personnel and organisations need to access a network from various means and locations, even perhaps the mythical 'cloud'.

What are the two main types of firewalls? ›

Types of Firewalls. A firewall can either be software or hardware. Software firewalls are programs installed on each computer, and they regulate network traffic through applications and port numbers. Meanwhile, hardware firewalls are the equipment established between the gateway and your network.

What is the function of the firewall? ›

A firewall is a security system designed to prevent unauthorized access into or out of a computer network. Firewalls are often used to make sure internet users without access are not able to interface with private networks, or intranets, connected to the internet.

What is the strongest type of firewall? ›

Proxy servers are the most secure type of firewall, as they filter packets through a protected proxy server. This is done before traffic even reaches the network perimeter.

What is the next generation firewall system? ›

Topsec next-generation firewall system integrates AI-driven unified intelligent detection engine and combines multiple security modules such as intrusion prevention, WAF, TVD, URL filtering, DDoS protection, HTTPS traffic detection, advanced threat protection, anomalous behavior analysis, DLP, threat intelligence, ...

Can you build your own firewall? ›

It is achievable to build the best next-generation firewall (NGFW) for home use combining an open-source firewall, a fanless mini PC, and a packet inspection module. In this tutorial, we'll describe how to create a next-generation firewall (NGFW) to protect a home network with a few hundred dollars.

What is the biggest problem with a firewall? ›

The Firewall Challenges

Vulnerabilities and Misconfigurations: No system is foolproof. Over time, firewall configurations can become outdated or misconfigured, leading to potential vulnerabilities. This can inadvertently allow unauthorized access or cyberattacks.

Are firewalls becoming obsolete? ›

Although they may have their limitations within the realm of ZTNA, firewalls are far from becoming obsolete. They can maintain a pivotal role in zero trust environments by evolving to meet the dynamic demands of this security model.

What are 2 limitations of firewalls? ›

  • Firewalls cannot stop users from accessing malicious websites, making it vulnerable to internal threats or attacks.
  • Firewalls cannot protect against the transfer of virus-infected files or software.
  • Firewalls cannot prevent misuse of passwords.
  • Firewalls cannot protect if security rules are misconfigured.
Mar 20, 2022

What is DMZ in network? ›

A DMZ or demilitarized zone is a perimeter network that protects and adds an extra layer of security to an organization's internal local-area network from untrusted traffic.

How much does a firewall cost? ›

Firewall Security Price. Hardware for a firewall for a small business can run anywhere from $700-$1,000. Businesses that have anywhere from 15 to 100 users can expect to pay between $1,500 and $4,000 for firewall hardware.

How to install a firewall? ›

Physical Installation

Start by powering off your modem and any existing routers. Connect your firewall to the modem, and then connect it to your network switch or directly to your devices. Ensuring all connections are secure and correctly configured is essential for the smooth operation of your network.

Is a firewall a hardware or software? ›

Firewalls appear in both a hardware and software format. Both formats provide a different set of benefits to the safety of a network. However, using them in conjunction with one another is the smartest route to take.

What is 2 layer firewall? ›

Layer 2 Firewall

Within the OSI model, Layer 2 is the data link layer, which enables data transfers between devices on the same network. It breaks packets into pieces, or frames, and handles the flow and error control of the data.

What is secondary firewall? ›

One firewall is configured as the primary firewall, and an identical firewall is configured as the secondary firewall. In the event of the failure of the primary firewall, the secondary firewall takes over to secure a reliable connection between the protected network and the Internet.

Which type of firewall is known as a proxy firewall? ›

A proxy firewall, also known as an application firewall or a gateway firewall, limits the applications that a network can support, which increases security levels but can affect functionality and speed.

What is the next generation firewall? ›

A next-generation firewall (NGFW) is a security appliance that processes network traffic and applies rules to block potentially dangerous traffic. NGFWs evolve and expand upon the capabilities of traditional firewalls.

Top Articles
How to Use Cheater Buster AI to Catch a Cheating Partner on Tinder
Do I Need an Accountant for My Small Business?
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Pearson Correlation Coefficient
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Carmelo Roob

Last Updated:

Views: 6032

Rating: 4.4 / 5 (65 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Carmelo Roob

Birthday: 1995-01-09

Address: Apt. 915 481 Sipes Cliff, New Gonzalobury, CO 80176

Phone: +6773780339780

Job: Sales Executive

Hobby: Gaming, Jogging, Rugby, Video gaming, Handball, Ice skating, Web surfing

Introduction: My name is Carmelo Roob, I am a modern, handsome, delightful, comfortable, attractive, vast, good person who loves writing and wants to share my knowledge and understanding with you.