Application firewall
An application firewall is a form of firewall that controls input, output, and/or access from, to, or by an application or service. It operates by monitoring and potentially blocking the input, output, or system service calls that do not meet the configured policy of the firewall. The application firewall is typically built to control all network traffic on any OSI layer up to the. It is able to control applications or services specifically, unlike a stateful network firewall, which is - without additional software - unable to control network traffic regarding a specific application. There are two primary categories of application firewalls, network-based application firewalls and host-based application firewalls.
Network-based application firewalls
A network-based application layer firewall is a computer networking firewall operating at the application layer of a protocol stack, and is also known as a proxy-based or reverse-proxy firewall. Application firewalls specific to a particular kind of network traffic may be titled with the service name, such as a web application firewall. They may be implemented through software running on a host or a stand-alone piece of network hardware. Often, it is a host using various forms of proxy servers to proxy traffic before passing it on to the client or server. Because it acts on the application layer, it may inspect the contents of traffic, blocking specified content, such as certain websites, viruses, or attempts to exploit known logical flaws in client software.Modern application firewalls may also offload encryption from servers, block application input/output from detected intrusions or malformed communication, manage or consolidate authentication, or block content that violates policies.
History
of Purdue University, Bill Cheswick at AT&T Laboratories, and Marcus Ranum described a third generation firewall known as an application layer firewall. Marcus Ranum's work, based on the firewall created by Paul Vixie, Brian Reed and Jeff Mogul, spearheaded the creation of the first commercial product. The product was released by DEC, named the DEC SEAL by Geoff Mulligan - Secure External Access Link. DEC's first major sale was on June 13, 1991, to Dupont.Under a broader DARPA contract at TIS, Marcus Ranum, Wei Xu, and Peter Churchyard developed the Firewall Toolkit, and made it freely available under license in October 1993. The purposes for releasing the freely available, not for commercial use, FWTK were: to demonstrate, via the software, documentation, and methods used, how a company with 11 years' experience in formal security methods, and individuals with firewall experience, developed firewall software; to create a common base of very good firewall software for others to build on ; and to "raise the bar" of firewall software being used. However, FWTK was a basic application proxy requiring the user interactions.
In 1994, Wei Xu extended the FWTK with the Kernel enhancement of IP stateful filter and socket transparent. This was the first transparent firewall, known as the inception of, beyond a traditional application proxy, released as the commercial product known as Gauntlet firewall. Gauntlet firewall was rated one of the top application firewalls from 1995 until 1998, the year it was acquired by Network Associates Inc,. Network Associates continued to claim that Gauntlet was the "worlds most secure firewall" but in May 2000, security researcher Jim Stickley discovered a large vulnerability in the firewall, allowing remote access to the operating system and bypassing the security controls. Stickley discovered a second vulnerability a year later, effectively ending Gauntlet firewalls security dominance.
The key benefit of application layer filtering is that it can "understand" certain applications and protocols, and it can detect whether an unwanted protocol is being sneaked through on a non-standard port or whether a protocol is being abused in any harmful way.
Host-based application firewalls
A host-based application firewall can monitor any application input, output, and/or system service calls made from, to, or by an application. This is done by examining information passed through system calls instead of or in addition to a network stack. A host-based application firewall can only provide protection to the applications running on the same host.Application firewalls function by determining whether a process should accept any given connection. Application firewalls accomplish their function by hooking into socket calls to filter the connections between the application layer and the lower layers of the OSI model. Application firewalls that hook into socket calls are also referred to as socket filters. Application firewalls work much like a packet filter but application filters apply filtering rules on a per process basis instead of filtering connections on a per port basis. Generally, prompts are used to define rules for processes that have not yet received a connection. It is rare to find application firewalls not combined or used in conjunction with a packet filter.
Also, application firewalls further filter connections by examining the process ID of data packets against a ruleset for the local process involved in the data transmission. The extent of the filtering that occurs is defined by the provided ruleset. Given the variety of software that exists, application firewalls only have more complex rulesets for the standard services, such as sharing services. These per process rulesets have limited efficacy in filtering every possible association that may occur with other processes. Also, these per process ruleset cannot defend against modification of the process via exploitation, such as memory corruption exploits. Because of these limitations, application firewalls are beginning to be supplanted by a new generation of application firewalls that rely on mandatory access control, also referred to as sandboxing, to protect vulnerable services. Examples of next generation host-based application firewalls that control system service calls by an application are AppArmor and the TrustedBSD MAC framework in Mac OS X.
Host-based application firewalls may also provide network-based application firewalling.
Sandboxing systems can also control file and process accesses as well as network access. Commercial sandboxing systems are available for both Windows and Unix type OSes.
Implementations
There are various application firewalls available, including both free and open source software and commercial products.Mac OS X
Mac OS X, as of Leopard, includes an implementation of the TrustedBSD MAC framework, which is taken from FreeBSD. The TrustedBSD MAC framework is used to sandbox some services, such as mDNSresponder, much like AppArmor is used to sandbox services in some Linux distributions. The TrustedBSD MAC framework provides a default layer of firewalling given the default configuration of the sharing services in Mac OS X Leopard and Snow Leopard.The Application firewall located in the security preferences of Mac OS X starting with Leopard provides the functionality of this type of firewall to a limited degree via the use of code signing apps added to the firewall list. For the most part, this Application firewall only manages network connections by checking to see if incoming connections are directed toward an app in the firewall list and applies the rule specified for those apps. Third-party applications can provide extended functionality, including filtering out outgoing connections by app.
Linux
This is a list of security software packages for Linux, allowing filtering of application to OS communication, possibly on a by-user basis:- Kerio Control - a commercial Product
- AppArmor
- ModSecurity - also works under Windows, Mac OS X, Solaris and other versions of Unix. ModSecurity is designed to work with the web-servers IIS, Apache2 and NGINX.
- Systrace
- Zorp
Windows
- WinGate
Network appliances
NextGeneration Firewalls:
- Check Point
- Fortinet FortiGate Series
- Juniper Networks SRX Series
- Palo Alto Networks
- SonicWALL TZ/NSA/SuperMassive Series
- A10 Networks Web Application Firewall
- Barracuda Networks Web Application Firewall/Load Balancer ADC
- Citrix NetScaler
- F5 Networks BIG-IP Application Security Manager
- Fortinet FortiWeb Series
- KEMP Technologies
- Imperva
- CloudFlare
- Meraki
- Smoothwall
- Snapt Inc
Specialized application firewalls
History
Large-scale web server hacker attacks, such as the 1996 PHF CGI exploit, lead to the investigation into security models to protect web applications. This was the beginning of what is currently referred to as the web application firewall technology family. Early entrants in the market started appearing in 1999, such as Perfecto Technologies’s AppShield,, which focused primarily on the ecommerce market and protected against illegal web page character entries. NetContinuum approached the issue by providing pre-configured ‘security servers’. Such pioneers faced proprietary rule-set issues, business case obstacles and cost barriers to wide adoption, however, the need for such solutions was taking root.In 2002, the open source project ModSecurity, run by Thinking Stone and later acquired by Breach Security in 2006, was formed with a mission to solve these obstacles and make WAF technology accessible for every company. With the release of the core rule set, a unique open source rule set for protecting Web applications, based on the OASIS Web Application Security Technical Committee's vulnerability work, the market had a stable, well documented and standardized model to follow.
In 2003, the WAS TC's work was expanded and standardized across the industry through the work of the Open Web Application Security Project's Top 10 List. This annual ranking is a classification scheme for web security vulnerabilities, a model to provide guidance for initial threat, impact, and a way to describe conditions that can be used by both assessment and protection tools, such as a WAF. This list would go on to become the industry benchmark for many compliance schemes.
In 2004, large traffic management and security vendors, primarily in the network layer space, entered the WAF market through a flurry of mergers and acquisitions. Key among these was the mid-year move by F5 to acquire Magnifire WebSystems, and the integration of the latter's TrafficShield software solution with the former's Big-IP traffic management system. This same year, F5 acquired AppShield and discontinued the technology. Further consolidation occurred in 2006 with the acquisition of Kavado by Protegrity, and Citrix Systems’ buying of Teros.
Until this point, the WAF market was dominated by niche providers who focused on web application layer security. Now the market was firmly directed at integrating WAF products with the large network technologies – load balancing, application servers, network firewalls, etc. – and began a rush of rebranding, renaming and repositioning the WAF. Options were confusing, expensive and still hardly understood by the larger market.
In 2006, the Web Application Security Consortium was formed to help make sense of the now widely divergent WAF market. Dubbed the Web Application Firewall Evaluation Criteria project, this open community of users, vendors, academia and independent analysts and researchers created a common evaluation criterion for WAF adoption that is still maintained today.
Wide-scale interest in the WAF began in earnest, tied to the 2006 PCI Security Standards Council formation and compliance mandate. Major payment card brands formed PCI as a way to regulate security practices across the industry and curtail the rampant credit card fraud taking place. In particular, this standard mandated that all web applications must be secure, either through secure development or use of a WAF. The OWASP Top 10 forms the backbone of this requirement.
With the increased focus on virtualization and Cloud computing to maximize existing resources, scaling of WAF technology has become the most recent milestone.
By 2010, the WAF market had matured to a market exceeding $200M in size according to Forrester. In a February 2010 report, Web Application Firewall: 2010 And Beyond, Forrester analyst Chenxi Wang wrote, "Forrester estimates the 2009 market revenue of the WAF+ market to be nearly $200 million, and the market will grow by a solid 20% in 2010. Security and risk managers can expect two WAF trends in 2010: 1) midmarket-friendly WAFs will become available, and 2) larger enterprises will gravitate toward the increasingly prevalent WAF+ solutions." She also wrote that "Imperva is the stand alone WAF leader."