1. Field of the Invention
The present invention relates to an access-controlling method, a repeater, and a server.
2. Description of the Related Art
First, in this specification, a position where information to be protected and a server which manages the information exist is called an inner position, and a position which communicates via a network is called an outer position compared to the inner position.
An access control (called a firewall and a packet filtering) is now used in order to protect the inner position from the following illegal access. The illegal access is for example accessing an inner position illegally from the outer position, blocking inner-position service from an outer position, and carrying out confidential information of the inner position to the outer position. Devices which take charge of the access control are one of or both of a server itself which offers service, and a repeater which relays communication to the server (for example, a router etc.).
As prior reference regarding the prior access control, there are reference 1 (published Japanese Patent Application Laid-Open No. Hei 8-44642), reference 2 (Japanese translation of PCT international application No. Hei 10-504168), and reference 3 (published Japanese Patent Application Laid-Open No. 2000-124955).
As prior references regarding bandwidth control in TCP/IP which is a typical network protocol, IPSec, and FlowLabel of IPv6, there are non-patented reference 1 (reference name: “Internet QoS,” coauthored by Paul Ferguson and Geott Huston, translation supervised by Iwao Toda, date of issue: May 5, 2000), non-patented reference 2 (reference name: RFC2401 “IP Encapsulating Security Payload (ESP),” coauthored by S. Kent and R. Atkinson, date of issue: November, 1998), and non-patented reference 3 (reference name: RFC2460 “Internet Protocol, Version6 (IPv6) Specification”, coauthored by S. Deering and R. Hinden, date of issue: November, 1998).
(Problem 1) Measures to P2P Communication
In the prior access control, control of a choice between two alternatives of whether to transmit a packet or to discard the packet is basically performed.
When a server offers service currently open to the public completely, for example, the WEB service which can be accessed from the Internet, the access control is basically just to transmit the packet to the server.
When the server offers the service with which access is restricted to the fixed range, for example, the file-sharing service by which access is limited in a network in the company, all the packets out of the fixed range are to be discarded.
However, when the server offers mail service to a computer which belongs to an employee who moved outside from the company on business trip, the above access control cannot deal with the case. It is because, in such a case, an IP address and a port number of the computer which belongs to the employee is changed, if the employee moves outside from the company.
With references 1 to 3, some proposals are made to such a subject. However, these proposals are inadequate for the P2P communication.
In these references, when the packet is transmitted to an outer position from an inner position, the judging condition of the access control is dynamically changed so that a packet in the reverse direction is allowed to be transmitted in judging transmission/discard of the packet. Thereby, it is supposed that bidirectional communication is performed between the outer position and the inner position.
However, with such an art, unless a packet is transmitted towards the outer position from the inner position, the bidirectional communication cannot be performed. In short, it is impossible to perform bidirectional communication after transmitting a packet to the inner position from the outer position first.
(Problem 2) Vulnerableness Over a DOS Attack
To cope with a problem 1, it is considered to set up a judging condition statically under which a packet that fulfills specific conditions is allowed to be transmitted. However, since an address of a terminal is dynamically set up by DHCP in the present ISP and a hot spot, it is next to impossible to lay down such specific conditions as a matter of fact.
If such a setup is performed, occurrence of DOS (Denial Of Service) attack by a person with malice who forges a packet which fulfills the judging conditions cannot be prevented.
In reference 3, usable bandwidth is controlled by using traffic shaping against illegal access of the DOS attack. However, when the packet by illegal access and the packet by legal access are intermingling and flowing, the traffic shaping may result in restricting a bandwidth of communication by the legal access unjustly, therefore, it is extremely difficult to limit the traffic shaping only to the packet by the illegal access.
(Problem 3) Measures to Encryption
In the prior access control, information in a packet is referred to in judgment of transmission/discard. However, when the packet is encrypted in order to prevent wiretapping by a third person, since the information in the packet cannot be referred to in the access control, the judgment of the transmission/discard become impossible.
An object of the present invention is to offer an access-controlling method which can perform more flexible access control and can correspond to encryption of a packet, and an art related thereto.
A first aspect of the present invention provides an access-controlling method for controlling access of a terminal of an outside network to a server of an inside network using a repeater, the inside network and the outside network being relayed by the repeater, the access-controlling method comprising: permitting transmission of packets sent by the terminal to the server under limited conditions; changing conditions to generate changed conditions that define packet transmission from the terminal to the server, when the server acknowledges connection between the terminal and the server according to the packets sent under the limited conditions; and controlling the packet transmission from the terminal to the server under the changed conditions.
According to the construction described above, a terminal of the outside network and a server of the inside network can take at least two transmission states besides discarding a packet. One is a state of performing communication restricted according to the limited conditions, and the other is a state of communicating under looser conditions, or severer conditions. Therefore, a more flexible access control can be performed than an alternative access control of the so-called transmission/discard. Furthermore, bidirectional communication can be performed after transmitting the packet to the inner position from the outer position first.
A second aspect of the present invention provides an access-controlling method as described in the first aspect, wherein the limited conditions limit bandwidth of the packet transmission from the terminal to the server within a predetermined range.
According to the construction described above, even when packets by illegal access should reach the server before the server acknowledges connection to the acknowledged packet, adding a limit of the bandwidth restricts the illegal packets in quantity and the server can be protected from the illegal access.
A third aspect of the present invention provides an access-controlling method as described in the first aspect, wherein the packets sent under the limited conditions include authentication information to be sent to the server.
According to the construction described above, transmission of authentication information is made in a state that the limited conditions are imposed. Since only the terminal attested for authentication information can access the server on the changed conditions, the server can be protected from illegal access.
A fourth aspect of the present invention provides an access-controlling method as described in the first aspect, wherein the changing conditions further comprises changing conditions of a flow that is defined using an address of the terminal, an port number of the terminal, an address of the server, and a port number of the server.
According to the construction described above, the access control can be performed only for the corresponding flow, distinguished from the other flows.
A fifth aspect of the present invention provides an access-controlling method for controlling access of a terminal of an outside network to a server of an inside network using a repeater, the inside network and the outside network being relayed by the repeater, the access-controlling method comprising: receiving encrypted packets from the terminal; decoding the encrypted packets; and notifying access control information concerning the encrypted packets to the repeater.
According to the construction described above, even when the repeater cannot acquire sufficient information to be used for the access control since packets are encrypted, the repeater can perform an exact access control using a notification from the server.
This information includes correspondence relationship of information of an encrypted portion (an upper-layer protocol class, a source/destination port number) that the repeater cannot refer, and information of the non-encrypted portion (ID of IPv4, and Flow-Label of IPv 5/6) which can be referred to from the repeater.
A sixth aspect of the present invention provides an access-controlling method as described in the first aspect, further comprising: storing access control information in the server; and storing the access control information in the repeater, wherein, when the server changes the access control information, the server notifies the repeater that the access control information has changed.
According to the construction described above, when the server tries to change the information independently, a notification is made from the server. Thereby, consistency of the access control between the server and the repeater is maintained, and unity of the access control as a whole communication system can be maintained.
The above, and other objects, features and advantages of the present invention will become apparent from the following description read in conjunction with the accompanying drawings, in which like reference numerals designate the same elements.
Hereinafter, preferred embodiments of the present invention are now explained with reference to the drawings.
As shown in
A LAN cable 2 is laid in the inside network 1. The repeater 6, a WEB server 3, an intra-office mail server 4, an intra-office DB server 5, and other client terminals (not illustrated) belonging to the inside network are connected to the LAN cable 2.
The repeater 6 is connected to both networks 8 and the LAN cable 2.
There are the networks 8 in the outside network 7, and a terminal 9 is allowed only to receive WEB service by the WEB server 3. On the other hand, a terminal 10 is a computer which an employee of a company, who usually use the inside network 1, has brought to a business trip place. The terminal 10 is allowed to receive service by the WEB server 3 and the intra-office mail server 4.
Service of the intra-office DB server 5 can be used only inside the inside network 1, and access from outside the inside network 1 is forbidden.
Here, an embodiment that the terminal 9 is allowed to use service of the WEB server 3, and forbidden to use service of the intra-office mail server 4 is can realized by the prior alternative access control of the so-called transmission/discard; thereby the explanation regarding this point is omitted.
A problem to be discussed in the present invention is to allow the terminal 10 to use the intra-office mail server 4, protecting the intra-office mail server 4 from illegal access.
The repeater 6 is explained in detail using
A communication unit 61 is connected to the networks 8 of the outside network 7. A communication unit 62 is connected to the LAN cable 2 of the inside network 1.
A storing unit 67 comprises storage media, such as a memory. As shown in FIG. 3(a), in a state before connection of the terminal 10 is acknowledged, the storing unit 67 stores information which correlatively describes, for every flow number, a flow concerning a packet transmitted via the communication units 61 and 62 (an address and a port number of a source, and an address and a port number of a destination), a threshold TH of a bandwidth of the corresponding flow (in the present embodiment, the number of packets per second is used for the bandwidth), and a measured value Vn of the bandwidth of the corresponding flow. This information is called flow-defining information hereinafter.
Flows for which connection can be acknowledged are defined in the storing unit 67 beforehand, and a flow which is not completely related to anyone of the flows defined in the storing unit 67 is eliminated as illegal access.
A transition of the contents of the storing unit 67 is briefly summarized. A threshold TH of a bandwidth in the storing unit 67 is set as a small value until the intra-office mail server 4 of the inside network 1 acknowledges connection from the terminal 10 of the outside network 7. The threshold TH is changed into a bigger value when the intra-office mail server 4 acknowledges the connection.
As shown in
A flow number 2 is related with service leaving from a terminal (a server or a client terminal) belonging to the inside network 1 to the outside network 7, and can access freely from any addresses of the inside network 1 (threshold TH=infinity).
A flow number 3 is related with service of the WEB server 3, and can access freely from any addresses of the outside network 7 (threshold TH=infinity).
A flow number 4 is related with service of the intra-office mail server 4, and can access from any addresses of the outside network 7 under limited conditions (threshold TH=10). This access is limited to a POP in which a protocol classification concerns password transmission.
As described later, the terminal 10 that is going to access the intra-office mail server 4 sends a packet according to the flow number 4 to the intra-office mail server 4 under fixed conditions. The conditions are greatly loosened, after the intra-office mail server 4 issues an explicit packet which acknowledges the communication (a packet of which the SYN-ACK flag is turned on).
In
A measuring unit 64 measures a bandwidth of a classified flow, and stores the measured value in the field of “measured value” of the corresponding flow number in the storing unit 67.
A judging unit 65 compares a measured value Vn and a threshold TH of the bandwidth which are stored in the storing unit 67 regarding the classified flow, and makes judgment of transmitting when Vn<=TH, otherwise makes judgment of discarding.
Hereinafter, in order to simplify explanation, the judging unit 65 is assumed to make only two kinds of judgments: “transmitting” and “discarding.” However, there are cases in which the judging unit 65 does not make the judgment of “discarding” a packet, but may make judgment of delaying transmission of the packet or changing priority of the packet. These alternatives are also included in the present invention.
In a bandwidth control unit 66, packets that a judging unit 65 has judged to transmit are set. The bandwidth control unit 66 sends the packets from the communication units 61 and 62 one by one according to a rule of the bandwidth control, unless the packets are discarded in the bandwidth control unit 66.
A bandwidth control method in the bandwidth control unit 66 of the present embodiment is arbitrary. For example, queuing such as FIFO, RED and RIO, and schedulers such as PQ and WRR can be freely chosen for use.
Next, the intra-office mail server 4 is explained in detail using
A storing unit 48 comprises storage media, such as a memory, and has the same contents as the storing unit 67 of the repeater 6 has. Although the contents of the storing unit 48 and the contents of the storing unit 67 may not agree with each other temporarily, the disagreement of this information will be immediately fixed by a change notice mentioned later. Of course, the transition of the storing unit 48 is basically the same as that of the storing unit 67.
An application unit 42 executes an application (mail service) that realizes the function as the intra-office mail server 4.
An encryption unit 43 decodes an encrypted packet. The information relating to the encrypted packet and usable for an access control is notified to the repeater 6 via the communication unit 41.
In the packet that is encrypted by IP-Sec etc., even information that is necessary for classifying the packet will be encrypted during the access control. Therefore, the classification of the packet becomes imperfect. The information that is necessary for the access control can be acquired only by the intra-office mail server 4 of the source or the destination. The intra-office mail server 4 can decode the encrypted packet.
In the IP of the version 6 for the TCP/IP, a flow label is introduced in order to enable the classification of packets even when two or more such encrypted packets are intermingled. However, only the source/destination terminals can judge, in terms of the flow label, a relation with the source/destination port number that is encrypted.
In the present embodiment, the encryption unit 43 is provided in the intra-office mail server 4. When the information necessary for classification in the access control is acquired from the packet that is decoded, the information is not only held at the intra-office mail server 4, but also notified to the repeater 6. Thereby, the consistency for classification processing of the repeater 6 and the classification processing of the intra-office mail server 4 is maintained.
In
Thus, the classifying unit 44 classifies the flow of the packets according to the flow-defining information stored in the storing unit 48.
The measuring unit 45 measures a bandwidth of the flow that is classified, and stores the measured value Vn in the field of “measured value” of the corresponding flow number in the storing unit 48.
As for the classified flow, the judging unit 46 compares the measured value Vn and the threshold TH of the bandwidth that are stored in the storing unit 48. If Vn<=TH, the judging unit 46 makes judgment of “transmitting”; otherwise, the judging unit 48 makes judgment of “discarding”.
Packets that are made judgment of “transmitting” by the judging unit 45 are set in the bandwidth control unit 47. The bandwidth control unit 47 sends the packets one by one from the communication unit 41 according to a rule of the bandwidth control, as long as the bandwidth control unit 47 does not discard the packets in itself.
The bandwidth control method in the bandwidth control unit 47 of the present embodiment is arbitrary. For example, queuing such as FIFO, RED and RIO, and schedulers such as PQ and WRR can be freely chosen to use.
(Change Notice)
In packet exchange communication, there are two methods: connection-oriented communication, which notifies connection request and explicit acknowledgment to the connection request, and connectionless communication, which does not notify connection request or explicit acknowledgment to the connection request.
In TCP/IP, which is currently the most spread-out communication protocol of the Internet, there are TCP as the connection-oriented communication and UDP as the connectionless communication.
In the TCP and the UDP, in order to perform plural communications independently between a pair of terminals (a server is included in the terminals), the terminals assign port number for each communication.
The classifying unit 63 of the repeater 6 refers to the source/destination address, a source/destination port, and the upper-layer protocol class that indicates either the TCP or the UDP. Thus, the classifying unit 63 of the repeater 6 is able to classify the plural communications.
In the TCP that is the connection-oriented communication, the intra-office mail server 4, which has received a packet (a packet whose SYN. flag in the TCP flag is “ON”) that requests the connection, sends a packet (a packet whose SYN-ACK flag is “ON” or a packet whose ACK flag in “ON”) that acknowledges the connection when the connection is acknowledged.
When the connection is not acknowledged, on the other hand, the intra-office mail server 4 sends a packet (a packet whose FIN flag in the TCP flag is “ON”) indicating that the connection is not acknowledged.
In the TCP/IP, to indicate explicitly that the connection is not acknowledged, a message of “Destination Unreachable” of ICMP may be sent in response, in addition to the FIN packet of the TCP. Sending the message is commonly used in the TCP and the UDP.
The UDP is the connectionless communication which does not send or receive a packet requesting connection or a packet explicitly indicating acknowledged connection/not-acknowledged connection. In the UDP, a packet may be used as a trigger for sending and receiving by referring to a set of source/destination address and source/destination port number of the packet.
Since the connectionless communication does not send or receive a packet requesting connection or a packet explicitly indicating acknowledged connection/not-acknowledged connection, the judgment of the access control in the connectionless communication may become less accurate.
In the present embodiment, when the intra-office mail server 4 makes explicit acknowledgment of connection to the terminal 10, irrelevant to the intention of the repeater 6, a change notice is issued from the intra-office mail server 4 to the repeater 6. Thereby, the storing unit 67 of the repeater 6 and the storing unit 48 of the intra-office mail server 4 can share the same information.
If the change notice is used in better way, the information of the access control may be held by the repeater 6 and the intra-office mail server 4 in a distributed manner. This feature is worthy to note, compared to the prior method in which the repeater 6 must have all the information regarding the access control. This feature reduces the amount of information that the repeater 6 should possess and also reduces processing burdens of the repeater 6. In the repeater 6, it is not necessary to hold the information of the flow that is not transmitted; therefore, the processing burdens can be further reduced.
By use of the change notice, the agreement of the contents of processing for the bandwidth control between the intra-office mail server 4 and the repeater 6 is securable.
Thus, such unfavorable situations that a packet which has reached from the intra-office mail server 4 to the repeater 6 is discarded by the repeater 6 because of insufficient bandwidth, or that a bandwidth required by other flow is pressed because the outward bandwidth is secured too much by the repeater 6, can be prevented.
(Bandwidth Control)
In a packet exchanging network, bandwidth control can be performed only by a sending side of packets because of restrictions due to the system.
Therefore, as for a packet from the intra-office mail server 4 to the repeater 6, the bandwidth control can be performed only by the intra-office mail server 4, but as for a packet from the repeater 6 to the intra-office mail server 4, the bandwidth control can be performed only by the repeater 6.
In the present embodiment, the bandwidth control units are provided in both of the repeater 6 and the intra-office mail server 4, in order to prevent the bandwidth of the intra-office mail server 4 from being used illegally by responding to an illegal access from outside.
Next, operation of the repeater 6 is explained referring to
At Step 2, when a packet arrives, the packet is confirmed whether or not it is a change notice from the intra-office mail server 4. If the packet is a change notice, at Step 3, the control unit 60 updates the contents of the storing unit 67 as the change notice describes. Thereby, the consistency of the contents for the storing unit 67 and the contents of the storing unit 48 is guaranteed.
If the packet is not a change notice, at the Step 4, the control unit 60 orders the classifying unit 63 to perform classification. Then, the classifying unit 63 confirms whether or not a flow corresponding to the packet exists in the storing unit 67.
If the corresponding flow exists, at Step 5, the classifying unit 63 confirms whether or not each value (the address, the port number, etc. regarding the source and the destination) of the flow is fixed. The classifying unit 63 starts the confirmation from a flow with the largest flow number to a flow with smaller flow number, as arrows in
When the values are not fixed, at Step 6, the classifying unit 63 adds a new entry (a flow number becomes the number that “1” is added to the largest flow number for the moment), and sets each value (the address, the port number, etc. regarding the source and the destination) that is acquired from the packet of the new entry, and moves the processing to Step 7. When the values are fixed, the classifying unit 63 moves the processing from Step 5 to Step 7, since it is not necessary to add a new flow.
At Step 4, if no corresponding flow exists, there is a possibility of illegal access. Therefore, the classifying unit 63 stops the classification and sends a notice of the possibility of illegal access to the control unit 60. Upon receipt of the notice, the control unit 60 moves the processing to Step 10 immediately and discards the packet.
At Step 7, the measuring unit 64 measures the transmission speed of a corresponding flow, and the measured value Vn is set to the field of the measured value of the corresponding flow.
At Step 8, the judging unit 65 compares the measured value Vn and the threshold TH of the corresponding flow. If Vn<=TH, the judging unit 65 makes judgment of “transmitting”, and the packet is outputted to the bandwidth control unit 66. Then, following the bandwidth control method, the bandwidth control unit 66 outputs the packet via the communication unit 61 or the communication unit 62, as long as the bandwidth control unit 66 by itself does not discard the packet.
Otherwise, the judging unit 65 makes judgment of “discarding”, and the packet is discarded without being outputted to the bandwidth control unit 66.
Then, the processing after Step 1 is repeated until the processing is completed (Step 11).
Next, operation of the intra-office mail server 4 is explained using
At Step 32, the control unit 40 waits for a packet to arrive at the communication unit 41. At Step 33, the control unit 40 performs processing of application by the application unit 42 until a packet arrives.
When a packet arrives, at Step 34, the packet is confirmed whether it has been encrypted or not. If the packet has been encrypted, the control unit 40 makes the encryption unit 43 decode the packet at Step 35, and moves the processing to Step 36. If the packet is not encrypted, the control unit 40 moves the processing to Step 36 from Step 34.
Next, at Step 36, the control unit 40 orders the classifying unit 44 to perform classification. Then, the classifying unit 44 confirms whether or not a flow corresponding to the packet exists in the storing unit 48.
If the flow exists, the classifying unit 44 confirms whether each value (the address, the port number, etc. regarding the source and the destination) of the flow is fixed or not at Step 37. As well as the classifying unit 63, the classifying unit 44 starts the confirmation from a flow with the largest flow number to a flow with smaller flow number, as arrows in
When the values are not fixed, at Step 38, the classifying unit 44 adds a new entry (a flow number becomes the number that “1” is added to the largest number for the moment), and sets each value (the address, the port number, etc. regarding the source and the destination) that is acquired from the packet of the new entry. The change flag is set to “ON”, since disagreement between the contents of the storing unit 48 and the contents of the storing unit 67 may occur due to the processing at Step 38.
Then, the processing is moved to Step 39. At Step 39, the classifying unit 44 confirms the control unit 40 whether the packet, whose flag of SYN-ACK acknowledging the connection to the terminal 10 is “ON”, will be sent or not. If the packet is sent, at Step 40, in the storing unit 48, the value of infinity (communication is accepted freely) is set to the threshold TH of the corresponding flow in order to loosen the limited conditions of the corresponding flow, and then the processing is moved to Step 41. If the packet is not sent, the classifying unit 44 moves the processing to Step 41 from Step 39.
At Step 37, if the values are fixed, the classifying unit 44 moves the processing from Step 37 to Step 41, since it is not necessary to add a new flow.
At Step 36, if no corresponding flow exists, there is a possibility of illegal access. Therefore, the classifying unit 44 stops the classification and sends a notice of the possibility of illegal access to the control unit 40. Upon receipt of the notice, the control unit 40 moves the processing to Step 44 immediately and discards the packet.
At Step 41, the measuring unit 45 measures the transmission speed of the corresponding flow, and the measured value Vn is set to the field of the measured value of the corresponding flow.
At Step 42, the judging unit 46 compares the measured value Vn and the threshold TH of the corresponding flows. If Vn<=TH, the judging unit 46 makes judgment of “transmitting”, and the packet is outputted to the bandwidth control unit 47. Then, following the bandwidth control method, the bandwidth control unit 47 outputs the packet via the communication unit 41, as long as the bandwidth control unit 47 by itself does not discard the packet.
Otherwise, the judging unit 46 makes judgment of “discarding”, and the packet is discarded without being outputted to the bandwidth control unit 47.
Then, the processing after Step 32 is repeated until the processing is completed (Step 48).
The flow of processing for communication between the terminal 10 and the intra-office mail server 4 is explained using
First, at time t1 of
Since the packet belongs to the flow number 4, the communication is acknowledged if the measured value V4 of the flow is less than the threshold TH.
However, in the present example, at around the time t1, the measured value V4 is unfortunately greater than the threshold TH; therefore, communication fails and a packet whose FIN flag is “ON” is sent back to the terminal 10 from the intra-office mail server 4 at time t2.
The terminal 10 reduces the transmission speed of the packet, and sends the packet whose SYN flag is “ON” to the intra-office server 4 once again at time t3. Then, the above-mentioned limited conditions are fulfilled, and a packet whose SYN-ACK flag is “ON”) and acknowledges the connection from the intra-office mail server 4 to the terminal 10 is returned at time t4.
At this time, the contents of the storing unit 48 once change, as shown in
As shown in
After time t5, smooth communication by a large bandwidth is performed.
At time t9, in order to receive the mail service itself this time, the terminal 10 sends a packet (information including a password) whose SYN flag is “ON” to the intra-office mail server 4 according to the MAIL protocol.
Then, as shown in
According to the present invention, instead of alternative-access controls such as transmission/discard, a more flexible access control can be performed within the limits of the bandwidth, which is controlled not to cause difficulties for other legal access communications.
Furthermore, according to the present invention, accurate judgment regarding the access control for the connectionless communication or the encrypted communication, which has been difficult with the prior art, can be made, by sending access control information to the repeater from the inside network.
Having described preferred embodiments of the invention with reference to the accompanying drawings, it is to be understood that the invention is not limited to those precise embodiments, and that various changes and modifications may be effected therein by one skilled in the art without departing from the scope or spirit of the invention as defined in the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
2003-103760 | Apr 2003 | JP | national |