Linux | Cloud | DevOps | Scripting

Breaking

Monday, 17 June 2019

Firewall


Port Number:

A port number is a local address of a service. Generally, the port numbers are from 0 to 65535. Out of these 65535 ports, some ports are known as 'well-known ports', categorized between 0 to 1024. Beyond these, other ports are known as 'Ephermal ports' or 'Dynamic ports', depending upon OS to OS. These ports are assigned when there is a need.

Socket:

A Socket is a network address of a service (IP_addr + Port_number)

Endpoint:

(IP_address) + (Port_number) + (Service) & (Version_of_the_service)

Firewall:

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. The firewall works in three modes:
  1. Incoming,
  2. Outgoing and 
  3. Forwarding.
In Cloud, we can only 'ALLOW' and 'BLOCK' firewall using firewall rules.

Types of Firewall:

* Generally, there are two types of firewall:
  1. Software Firewall
  2. Hardware Firewall

1. Software Firewall: 
Software Firewalls are mainly made for operating system protection and hardening (hardening means stopping unnecessary services to get access inside my OS).

2. Hardware Firewall: 
Hardware Firewalls are used for enterprise-level protection.

* In the cloud also there are two types of firewalls:
  1. Security Group
  2. Network Access Control List

1. Security Group (SG): 
SG works at instance level security.

2. Network Access Control List (NACL): 
NACL works at subnet level security.

We will see three types of troubleshooting if not able to access a server.

Ephermal Ports:

An ephemeral port is a short-lived transport protocol that is created by the operating system when a program requests any available user port. Ranges for these ports depends on OS to OS:

For Windows: Port Range is from 49152 to 65535 and
For Linux: Port Range is from 32768 to 61000

In AWS, there are three levels of security. From which, we can allow and deny access to our server. 

Troubleshooting steps when Web Server is not able to access:

  1. Operating System level troubleshooting
  2. Security Group level troubleshooting
  3. NACL level troubleshooting


CASE #1: OPERATING SYSTEM LEVEL TROUBLESHOOTING

Steps we need to follow:

  1. Launch a Windows instance
  2. Disable the service on OS level
  3. Troubleshoot and enable the service on OS level


Step 1: Launch a Windows instance:

I am launching a Windows instance, named 'win-web-iis' in Public Subnet of my VPC, named 'webshack-vpc':

AWS âž” Services âž” EC2 âž” Instances âž” Launch Instance âž” [*] Free Tier only âž” Select 'Windows Server 2008' AMI (because this is a very tiny image and takes less time to start) âž” Instance Type: t2.micro âž” Next âž” Number of instances: 1 âž” Network: select own created 'webshack-vpc' VPC âž” Subnet: Select the subnet which has public access (as we are creating this instance for Web Server, so we require Internet) âž” Auto-assign Public IP: (already enabled as we have enabled it at the time of creation of public subnet) âž” Next âž” Next: tags âž” Name: 'win-web-iis' âž” Next: SG âž” Create a new SG or select an old one which is allowing port number 3389 âž” Rule âž” RDP: TCP: 3389: Anywhere âž” Review and Launch âž” Launch âž” Create a new key-pair OR select any existing key pair âž” Launch Instances âž” View Instances.

For OS level troubleshooting, we are going to disable the service on OS level:

Step 2: Disable the service on OS level:

Login to Windows instance âž” Run âž” paste command: 'control.exe /name Microsoft.NetworkAndSharingCenter' (this command will open Network and Sharing Center) âž” Windows Firewall âž” Allow a program or feature through Windows Firewall âž” Disable HTTP access âž” OK.

This will block HTTP access from OS level, means if you access the web server from inside Windows instance, this will work but any outside person cannot access this. (you can verify it from accessing the web server from the laptop, using its public IP).

Disable HTTP access from Network and Sharing Center
Disable HTTP access from Network and Sharing Center

We use this when we want to do hardening. Hardening means we do not want to allow unnecessary access on my PC. 

Step 3: Troubleshoot and enable the service on the Operating System level:

Again enable HTTP access from the web server, so that we can learn next level troubleshooting:
Login to Windows instance âž” Run âž” paste command: control.exe /name Microsoft.NetworkAndSharingCenter (this will open Network and Sharing Center) âž” Windows Firewall âž” Allow a program or feature through Windows Firewall âž” Enable HTTP access âž” OK.


CASE #2: SECURITY GROUP LEVEL TROUBLESHOOTING

Features of Security Group:

  1. All inbound traffic is blocked by default.
  2. All outbound traffic is allowed by default.
  3. We can attach multiple security groups to Ec2 instance.
  4. Security Groups are STATEFUL.
  5. If we have created inbound traffic, that traffic is automatically allowed back out again.
  6. We can not block any specific IP Address from the Security Group.
  7. We can specify only to allow rules not deny rules.
  8. Security Group protects instances and Interfaces.

WINDOWS:

Steps we need to follow:
  1. Launch a Windows instance
  2. Login to the Windows instance and install web server
  3. Create a new SG, which allows port number 80
  4. Attach this SG to the web server instance
  5. Verify the browser on the laptop

Step 1: Launch a Windows instance and a Linux instance:

We are going to use the instance, which we created for OS level troubleshooting.

Step 2: Login to the Windows instance and install web server:

Copy public IP from instance's description âž” Run âž” Type 'mstsc' and hit Enter âž” paste IP and get access by using username 'administrator' and decrypt password from AWS âž” Login.

After login to the instance click on Start âž” Administrative Tools âž” Server Manager âž” Roles âž” Add Roles âž” Next âž” [*] Web Server IIS âž” Next âž” Close.

Now, the web server is created. Verify this by accessing localhost on the browser in Windows instance, which is working now. 

Also, verify this Web Server, by using public IP of windows instance in laptop browser, which is not working here. The reason is all inbound traffic is blocked by default in Security Group.

Step 3: Create a new SG, which allows port number 80: 

We can change in current SG but in that case, all other instances which are using this SG will get RDP and Web Server both accesses. So, we will create a new SG:

AWS âž” Services âž” EC2 âž” Security Groups âž” Create Security Group âž” Security Group Name: web-access âž” Description: web access for any OS web server âž” VPC: select your VPC like I have my created VPC named 'webshack-vpc' âž” Inbound: Add Rule âž” Type: HTTP âž” Source: Anywhere (for learning purpose we can select anywhere but in industry there must be specific IPs) âž” Create. 

Step 4: Attach this SG to web server instance:

SG always attaches to the NIC card of the instance. So, navigate to the NIC card of web server instance:

AWS âž” Services âž” EC2 âž” Instances âž” Select instance âž” Description âž” Click on Network Interface: eth0 âž” Now, click on Interface ID âž” Actions âž” Change Security Groups âž” As previous SG is selected, select one more SG named 'web-access', which we created for web server âž” Save.

Step 5: Verify the browser on the laptop:

Laptop âž” Broswer âž” use public IP to verify.


Yaayyyy...It's working now!!


LINUX:

Steps we need to follow:
  1. Create a Linux instance
  2. Create a new Security Group with no rules
  3. Replace this SG with the SG you attached in Linux instance
  4. Open one port for SSH access
  5. Open port for ping command in Linux instance

Step 1: Create a Linux instance:
I am launching an instance in Public Subnet of my VPC, named 'webshack-vpc':

AWS âž” Services âž” EC2 âž” Instances âž” Launch Instance âž” [*] Free Tier only âž” Select 'Amazon Linux' AMI âž” Instance Type: t2.micro âž” Next âž” Number of instances: 1 âž” Network: select own created 'webshack-vpc' VPC âž” Subnet: select public subnet of your VPC âž” Auto-assign Public IP: (already enabled as we have enabled it at the time of creation of public subnet) âž” Next âž” Next: tags âž” Name: 'linux-server' âž” Next: SG âž” Create a new SG or select an old one which is allowing port number 22 âž” Description: linux-access is created to access linux instances âž” Rule âž” SSH: TCP: 22: Anywhere âž” Review and Launch âž” Launch âž” Create a new key-pair OR select any existing key pair âž” Launch Instances âž” View Instances.

Step 2: Create a new Security Group with no rules:

AWS âž” Services âž” VPC âž” Security Groups âž” Create Security Group âž” Security group name: testing-sg âž” This SG is created only for testing purpose âž” VPC: Select VPC, named webshack-vpc âž” Create âž” Close. 

Select security group, named 'testing-sg' âž” Inbound Rules âž” See Inbound Rule (there is no rule listed) âž” See Outbound Rules (we have one rule here) âž” Select and Edit rule âž” delete this rule by clicking on cross in the right side (if we attach this SG to any instance, then we will not get any access on that instance âž” After deleting that rule click on Save rules âž” Close.

Step 3: Replace this SG with the SG you attached in Linux instance:

AWS âž” Services âž” EC2 âž” Instances âž” Select Linux instance named 'linux-server' âž” In Description, click on the interface ID, which is 'eth0' âž” In the popup click on 'eni-ID' (this will take us to the Network Interface) âž” un-check old security group and give a tick mark in front of 'testing-sg' security group âž” Save.

Network Interfaces
Network Interfaces

Now, the security group of Linux instance is changed and we can not access this instance from outside.

Step 4: Open one port for SSH access:

Now, if you try to access your Linux instance using PuTTY, this will not work because of Implicit Deny. So, just provide SSH access to 'testing-sg' security group:

AWS âž” Services âž” EC2 âž” Security Group âž” Select 'testing-sg' security group âž” On INBOUND click 'Edit' âž” Type: SSH âž” Source: Anywhere (we are selecting Anywhere only for the practical purpose. In production you must provide IP or IP range) âž” Save.

IMPORTANT:

1. Now, if you try to access to your Linux instance, you can (try to do it by using 'ec2-user' username). Here, traffic comes in, from port number 22 but there is no outbound rule, then how did we get access. We got access because of SG's one more feature, which is "STATEFUL". In this case, Ephermal Ports became active to take the traffic out. We can see which Ephermal Port was active to take our traffic out by using command 'netstat'. Use this command with sudo privileges for the full descriptive result.

$ sudo netstat -antlpu

$ sudo netstat -antlpu
$ sudo netstat -antlpu
2. We can access the instance now but we can not get any outside access to this instance. Like, if we ping google.com, it's disabled. Although, all outbound traffic is allowed by default in the security group. But we deleted the rule. So, explicit deny is blocking the traffic.

Step 5: Open port for ping command in Linux instance:

If we want to access ping command, then traffic will be originated from our instance. So, we need to write outbound rules in our 'testing-sg' security group:

AWS âž” Services âž” EC2 âž” Security Group âž” Select 'testing-sg' security group âž” On Outbound click 'Edit' âž” Type: All ICMP - IPv4 âž” Source: Anywhere (we are selecting Anywhere only for a practical purpose. In production you must provide IP or IP range) âž” Save.

We can ping Google now but we can not access any other service outside of this instance. Now, if we want to provide access to all traffic, we need to allow 'All traffic':

AWS âž” Services âž” EC2 âž” Security Group âž” Select 'testing-sg' security group âž” On Outbound click 'Edit' âž” Type: All traffic âž” Destination: Anywhere âž” and delete ICMP rule because we are not allowing all traffic form this âž” Save.

Now any traffic can go to this Linux instance and simultaneously comes out.


CASE#3: NACL LEVEL TROUBLESHOOTING


NACL (Network Access Control List) provides a rule-based tool for controlling network traffic at the subnet level protocol.

Features of NACL:


  1. Your VPC automatically comes with default NACL, and by default allows all the inbound and outbound traffic
  2. NACL operates at the Subnet level.
  3. Each subnet in your VPC must be associated with a NACL. If you do not associate explicitly, the subnet will be associated with default NACL.
  4. You can associate NACL with multiple Subnets, however, a subnet can be associated with only one NACL at a time.
  5. NACL contains a number list (start with 100) of rule that is evaluated in order.
  6. NACL has a separate inbound and outbound rule, and each rule either allow or deny traffic (Based on IP address)
  7. NACL is a STATELESS service.

Steps we need to follow:

  1. Create a Linux instance
  2. Create a Network ACL
  3. Associate NACL to Subnet
  4. Give Inbound rule to 'my-custom-nacl'
  5. Give Outbound rule to 'my-custom-nacl'

Step 1: Launch a Linux instance:

I am going to use the same instance, named 'linux-server', which I created for previous practical.

Step 2: Create a Network ACL:

If we go to the NACL by navigating:
AWS âž” Services âž” VPC âž” Network ACLs

Default NACLs
Default NACLs


Here, we can see there are two Network ACLs, one is belonging to default VPC and another is belonging to my VPC, named 'webshack-vpc'. If we check its rules, then we can see that there is a Rule #, which is valued 100, also there is a Deny policy for the same rule. So, if we want to update any rule here, we need to write a rule which is lower than precedence because rules get read by numbers sequentially.

Default NACL Rules
Default NACL Rules
Default NACL, does not has very good rules, so we are going to create a new Network ACL:
AWS âž” Services âž” VPC âž” Network ACLs âž” Create Network ACLs âž” Name tag: my-custom-nacl âž” VPC: select your VPC (I'm selecting my VPC named 'webshack-vpc') âž” Create.

Select NCAL and verify Inbound rules and Outbound rules. Neither there is any Inbound rule nor any outbound rule.

Step 3: Associate NACL to Subnet:

IMPORTANT:
One NACL can be associated with multiple subnets, but one subnet can only have one NACL.

AWS âž” Services âž” VPC âž” Network ACLs âž” Select newly created NACL 'my-custom-nacl' âž” Subnet associations âž” Edit subnet associations âž” Select the subnet on which you want to associate this NACL (I am selecting public subnet 'webshack-sub1-pub') âž” Edit.

FIG: NACL SUBNET ASSOCIATIONS

Right now, we do not have any Inbound or outbound rule with our NCAL. So, we can not access to our Linux instance named 'linux-server' (try to access Linux instance using PuTTY). There will be an error 'Request time out'.

Step 4: Give Inbound rule to 'my-custom-nacl':

AWS âž” Services âž” VPC âž” Network ACLs âž” Select 'my-custom-nacl' âž” Inbound Rules âž” Edit inbound rules âž” Add Rule âž” Rule #: (provide Rule # on priority, like on which priority you wish this rule should be active. I am providing '1' âž” Type: SSH âž” Source: 0.0.0.0/0 âž” Allow/Deny: Allow âž” Save.

Now again try to do SSH, but still, this is not connecting. Because NCAL is stateless, it requires both Inbound and Outbound rules.

Step 5: Give Outbound rule to 'my-custom-nacl':

We provided SSH for the inbound rule but SSH is only to get in, so for outbound, we can not provide port number 22. Here. Ephermal ports come into the picture. We can not decide which Ephermal port will be active at that time. Because these port numbers activate only for one time. Another time when we access that service, there is no guarantee that we will get the same port number or not. So, we need to allow 'All Traffic', so that each port can get access to take traffic outside.

AWS âž” Services âž” VPC âž” Network ACLs âž” Select 'my-custom-nacl' âž” Outbound Rules âž” Edit Outbound rules âž” Add Rule âž” Rule #: (provide Rule # on priority, like on which priority you wish this rule should be active. I am providing '1' âž” Type: All Traffic âž” Destination: 0.0.0.0/0 âž” Allow/Deny: Allow âž” Save.

Step 6: Verify we are getting the access or not:
AWS âž” Services âž” EC2 âž” Instances âž” Select Linux Instance âž” Copy Public IP âž” Open PuTTY âž” Paste Public IP âž” Navigate SSH âž” Click on 'Auth' âž” Browse: Select ppk file âž” Open âž” Provide username 'ec2-user'.

Enjoyyyyyy!!







No comments:

Post a Comment

Pages