Firewall providing enhanced network security and user transparency
First Claim
1. A method of authenticating the identity of a user as one authorized to communicate from a first computer, across a computer network, and through a firewall to a second computer, the method comprising the steps of:
- receiving at the firewall a request to establish a connection between the first computer and the second computer;
communicating to the user through a separate communications mechanism a key; and
requiring the user to send to the firewall information dependent upon said key in order to said connection to be established.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention, generally speaking, provides a firewall that achieves maximum network security and maximum user convenience. The firewall employs “envoys” that exhibit the security robustness of prior-art proxies and the transparency and ease-of-use of prior-art packet filters, combining the best of both worlds. No traffic can pass through the firewall unless the firewall has established an envoy for that traffic. Both connection-oriented (e.g., TCP) and connectionless (e.g., UDP-based) services may be handled using envoys. Establishment of an envoy may be subjected to a myriad of tests to “qualify” the user, the requested communication, or both. Therefore, a high level of security may be achieved. The usual added burden of prior-art proxy systems is avoided in such a way as to achieve full transparency—the user can use standard applications and need not even know of the existence of the firewall. To achieve full transparency, the firewall is configured as two or more sets of virtual hosts. The firewall is, therefore, “multi-homed,” each home being independently configurable. One set of hosts responds to addresses on a first network interface of the firewall. Another set of hosts responds to addresses on a second network interface of the firewall. In one aspect, programmable transparency is achieved by establishing DNS mappings between remote hosts to be accessed through one of the network interfaces and respective virtual hosts on that interface. In another aspect, automatic transparency may be achieved using code for dynamically mapping remote hosts to virtual hosts in accordance with a technique referred to herein as dynamic DNS, or DDNS.
-
Citations
16 Claims
-
1. A method of authenticating the identity of a user as one authorized to communicate from a first computer, across a computer network, and through a firewall to a second computer, the method comprising the steps of:
-
receiving at the firewall a request to establish a connection between the first computer and the second computer;
communicating to the user through a separate communications mechanism a key; and
requiring the user to send to the firewall information dependent upon said key in order to said connection to be established. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A firewall, comprising:
-
means for communicating a key to a user through a separate communications mechanism in response to a request to establish a connection between a first computer and a second computer; and
means for establishing the connection between the first computer and the second computer in response to a reception of information dependent upon said key.
-
-
7. A firewall, comprising:
-
a physical computer;
a first interface connecting said physical computer to a first computer; and
a second interface connecting said physical computer to a second computer, wherein said physical computer is operable to communicate a key to a user through a separate communications mechanism in response to a request to establish a connection between the first computer and the second computer, and wherein said physical computer is further operable to establish the connection between the first computer and the second computer in response to a reception of information dependent upon said key. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A computer readable medium containing computer instructions executable by a computer, the computer instruction comprising:
-
computer instructions for receiving at a firewall a request from a user to establish a connection between a first computer and a second computer;
computer instructions for communicating a key to the user through a separate communications mechanism; and
computer instructions for requiring the user to send to the firewall information dependent upon the key in order to the connection to be established. - View Dependent Claims (13, 14, 15, 16)
-
Specification