RE: [fw-wiz] Dynamic routing on a firewall
From: Ben Nagy (ben_at_iagu.net)
To: "'Dawes, Rogan (ZA - Johannesburg)'" <firstname.lastname@example.org>, <email@example.com> Date: Fri, 28 Nov 2003 17:47:15 +0100
My quick 0.02.
It's a bad idea.
The PIX is a terrible router, for a start, but even so the idea makes my
flesh creep. For your scenario, how about using statics with different
metrics, or an external load balancing solution (which is the 'standard' way
of handling the problem on the Internet interface).
If you do decide to do it, then you can use route filtering per interface to
restrict what networks you will allow updates for - this is how it's done in
WANs and the Internet (or how it _should_ be done ;)
> -----Original Message-----
> From: firstname.lastname@example.org
> [mailto:email@example.com] On Behalf
> Of Dawes, Rogan (ZA - Johannesburg)
> Sent: Friday, November 28, 2003 10:39 AM
> To: firstname.lastname@example.org
> Subject: [fw-wiz] Dynamic routing on a firewall
> I just wanted to pick the list's brain with regards to
> dynamic routing on a firewall.
> Is it a good idea to allow a firewall to participate in
> dynamic routing? My first thoughts are that it sounds like a
> really dangerous thing - you certainly don't want to have
> routes changing so that a DMZ moves from one interface to a
> different one, for instance.
> But if the routing can be controlled so that traffic always
> goes through the right interface (but possibly to a different
> upstream router), that should be OK, I would think.
> What mechanisms do the various firewalls (mostly interested
> in Pix and FW-1) have to sanity-check routing updates that
> they receive?
> A (simplistic) scenario that could illustrate my concerns:
> You have a firewall controlling access to third parties
> (competitors) which provide services to your company. Each
> party is in their own DMZ. You have dynamic routing enabled
> on the firewall, since there are two redundant routers for
> each party in each parties DMZ, and you need to be able to
> fail over from one to the other.
> Party A sends a routing update to say that party B is now
> reachable via Party A's networks. Any packets that you try to
> send to party B end up going to Party A, where they can be
> captured, etc.
> Leaving out the question of how A gets the packets to B
> eventually, to complete the connection, is this a realistic
> scenario? How can one protect against something like this,
> using the abovementioned firewalls, if one still chooses to
> use dynamic routing?
> "Using encryption on the Internet is the equivalent of
> arranging an armored car to deliver credit card information
> from someone living in a cardboard box to someone living on a
> park bench."
> - Gene Spafford
> Deloitte & Touche Security Services Group
> Tel: +27(11)806-6216 Fax: +27(11)806-5202 Cell:
> Important Notice: This email is subject to important
> restrictions, qualifications and disclaimers ("the
> Disclaimer") that must be accessed and read by clicking here
> or by copying and pasting the following address into your
> Internet browser's address bar:
> http://www.Deloitte.co.za/Disc.htm. The Disclaimer is deemed
> to form part of the content of this email in terms of Section
> 11 of the Electronic Communications and Transactions Act, 25
> of 2002. If you cannot access the Disclaimer, please obtain a
> copy thereof from us by sending an email to
> firewall-wizards mailing list
firewall-wizards mailing list