How secure is a firewall?

aadesh119

New Member
Feb 25, 2021
1
0
1
35
Let me frame the context. I'm not interested in any exploits that get pulled in by the user nor the issues with apps on a machine. I'm interested in understanding how secure a firewall is in and of itself, e.g., and one which is configured to not allow incoming connections.

What other exploits exist assuming no physical access and a good configuration, strictly incoming from the WAN port. I ask because I keep hearing so much that any firewall is penatrable. I'm starting to think that the majority of these attack vectors originate (knowingly or unknowingly) from the inside.

Can the most talented organization penetrate a properly configured firewall with no help from an inside machine? If so, how so?

Just looking for a better understanding? Thanks.
 
If you use the Linux based firewall technology netfilter, which interfaces like iptables (Proxmox VE currently uses that one) or nftables (a newer, easier to write manual rules for as a human) build upon, then you use a FW technology which is backed into the Linux Kernel network receive and transmit path. That means, there's about no way that a rule gets circumvented there, for that a grave kernel bug need to be there or introduced, and while the kernel is certainly not bug free, firewalls are just used so much around the globe, that it's a subsystem which is quite vetted and tested in practice.
So as the only real vector are network packets, and the FW is just so deeply engrained in the Kernel network packet flow, it seems about impossible to enforce some magic route around it (besides using grave (zero-day) bugs, which are rather unlikely)
If you're more interested in learning about that technology check
https://netfilter.org/
And https://en.wikipedia.org/wiki/Netfilter plus the linked (re)sources.

The penetrable firewalls are seldom loss or circumvention of basic firewall function, normally they are either hijack the host providing the FW itself, this is quite common for proprietary ones which seems to just not be able to enforce a secure default password or keep their backdoors at bay.

Then there are the whole attack class where a loose configuration plus some extra can be misused, often they need already inside access (e.g., to open a connection to the outside where connection tracking tries to allow that the counterpart can talk back securely) or missing some rules etc.

Can the most talented organization penetrate a properly configured firewall with no help from an inside machine? If so, how so?
State actors with money, legal and illegal resources and time at their hand - I'd not bet against those to be honest.
And even if they would not be able to penetrate your perfectly setup shiny firewall they could always infiltrate your org in other was (e.g., through cleaner or maintenance personnel or by threaten a colleague) or just build some (bogus or not) case and seize your stuff in a legal way.

So for the sake of this question to make sense lets assume you do not brought upon you the wrath of a capable government, and talk smaller stuff, script kiddies, mysterious hacker orgs (i.e., script kiddies++) or some good skilled people just wanting to show off or need money and get paid by the competition.

Those, I'd wager, have actually a quite hard to impossible time to figure their way around a well-thought-out firewall setup basing off Linux (or BSD, e.g., pfSense) technology. Social engineering and the like are normally the easier way.
 
  • Like
Reactions: Dunuin

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!