Cryptology ePrint Archive: Report 2015/099

Universally Composable Firewall Architectures using Trusted Hardware

Dirk Achenbach and Jörn Müller-Quade and Jochen Rill

Abstract: Network firewalls are a standard security measure in computer networks that connect to the Internet. Often, ready-to-use firewall appliances are trusted to protect the network from malicious Internet traffic. However, because of their black-box nature, no one can be sure of their exact functionality. We address the possibility of actively compromised firewalls. That is, we consider the possibility that a network firewall might collaborate with an outside adversary to attack the network. To alleviate this threat, we suggest composing multiple firewalls from different suppliers to obtain a secure firewall architecture. We rigorously treat the composition of potentially malicious network firewalls in a formal model based on the Universal Composability framework. Our security assumption is trusted hardware. We show that a serial concatenation of firewalls is insecure even when trusted hardware ensures that no new packages are generated by the compromised firewall. Further, we show that the parallel composition of two firewalls is only secure when the order of packets is not considered. We prove that the parallel composition of three firewalls is insecure, unless a modified trusted hardware is used.

Category / Keywords: cryptographic protocols / Formal Models, Universal Composability

Original Publication (in the same form): Cryptography and Information Security in the Balkans Lecture Notes in Computer Science Volume 9024, 2015, pp 57-74

Date: received 10 Feb 2015, last revised 19 Aug 2015

Contact author: dirk achenbach at kit edu

Available format(s): PDF | BibTeX Citation

Version: 20150819:105319 (All versions of this report)

Short URL: ia.cr/2015/099

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]