Sentry administrators are usually very familiar with building API Security Management policies for handling SOAP, XML, REST, JSON type API traffic, however, they are usually less familiar with using Forum Sentry to secure browser-based traffic using the same API Security Management technology. Below are a few simple steps to help you pass your web traffic through Forum Sentry.
1. Use an HTML Policy for Browser Traffic
With web browser traffic, there may be multiple Content-Types and HTTP methods in use and the filtering of these may not be important. Therefore the Message Type filters for HTML policies are more open. Contrast this to a WSDL policy, where the HTTP method should always be a POST and the Content-Types are known entities.
There are different Content Policies in Sentry designed to handle different types of traffic. For instance, XML policies are built for XML traffic, REST policies for RESTful web services, and HTML policies for HTML or other web browser based traffic.
Technically any supported data types can be passed through any of the Content Policies. So for example, you can pass HTML traffic over an XML policy. However, each Content Policy has default configuration options for specific types of data and message flows. Specifically, each Content Policy has unique Message Type Filters enabled (associated to the virtual directory) which specify the Content-Type and HTTP Methods expected for each type of traffic flow. If data hits a virtual directory and the wrong Content-Type or Method is used, no Message Type Filter will be matched an a default IDP rule will trigger and block the message.
If you see the Invalid HTTP Message failure, see: FAQ: Triggering the “Invalid HTTP Message” IDP Rule in Forum Sentry –https://helpdesk.forumsys.com/entries/39885696
2. Configure the Virtual Directories for the HTML Policy: Using a root directory and modifying the Filter Expression
Note that when Sentry is simply acting as an HTTP proxy for browser based traffic, there are often many more requests/responses (transactions) than with web service calls. All of the calls for images, and other files needed by the browser to render the page correctly are potentially Sentry transactions.
If all of these requests and responses will go through Sentry they need to be explicitly allowed. These messages may use different URIs, specifically different paths. Therefore using a root virtual directory with just / for the virtual path will process all requests that come into a directory that are not explicitly defined.
In many form post / cookie based SSO use cases, there may be multiple virtual directories in a single HTML policy. For example:
/login/login.html – a public directory used to proxy the browser request to the login page behind Sentry
/login – where the form post credentials are submitted to and consumed by Sentry, which then generates a cookie, then redirects to /
/ – the root directory that is requiring a cookie authentication then proxying all requests to the remote web servers. If auth fails, redirect to /login/login.html
/ logout – where the cookie can be logged out and the session terminated
In addition to the path, the characters allowed at the end of the URL are also filtered by default with Sentry policies. This is the Filter Expression field on the virtual directory page and you may need to adjust the from the default of (/.*)? to just .* which is a wild card. Leave the Replace Expression as $0 if you want Sentry to keep all characters that the browser sends in the URL.
3. Setup SSL Policies and Security
Forum Sentry does not use OpenSSL and therefore is not vulnerable to the many and widespread OpenSSL vulnerabilities such as Heartbleed. Many Sentry customers have replaced older unsecured Apache reverse proxies with Sentry. Forum Systems always recommends SSL Termination at Sentry rather than at the upstream load balancer. Many popular load balancers use OpenSSL are impacted by all known and future OpenSSL vulnerabilities.
The SSL policies in Sentry can be configured with or without client/server cert validation, with or without cert mapping to a user. You can also control which versions of TLS / SSL protocol to be used and which cipher suites are allowed.
SSL Policies are associated to the Network Policies. SSL Termination to HTTP Listener policies, and SSL Initiation to HTTP Remote policies.
At the layer 7 level, Sentry can protect against many other types of attacks. WAF rules are built for the OWASP top ten vulnerabilities and are used to protect against things like SQL injections and cross site scripting attacks. Sentry task lists can do query parameter filtering. URL rewriting, custom HTTP header processing, full pattern matching on request and response documents, target or general AV scanning, attachment processing or stripping, and much more.
To seamlessly redirect browser requests that come in via HTTP to HTTP, see:
4. Enable Single Sign-On for Browser Based Traffic Flows
In addition to securely proxying the browser based traffic, Sentry can be used to enable SSO through a variety of technologies.
While there are many options for this, the most common for browser based traffic are:
- Form Post Authentication with FSSESSION Cookies
- OAuth 2.0
- SAML SSO Web Browser Profile
5. Load Balancing – Routing Considerations for Browser Based Traffic Flows
Most Sentry deployments consist of multiple active instances where the load balancer routes the traffic to based on a specific load balancing strategy (ie: failover, round robin, etc.).
When there are multiple remote web servers behind Sentry, the Group Remote Policies in Sentry allow for load balancing to these servers. There are a variety of load balancing strategies available as well as the ability to set server affinity (stickiness).
Sentry also supports content based routing, so that a specific request can be routed to a specific server based on variety of criteria.. including the client IP, a header value, a query parameter value, a user attribute, etc.
6. Using the Same HTTP/S Listener with Multiple Virtual Directories
The use case may call for securing multiple web sites using the same IP:Port combination (HTTP/S Listener Policy) with Forum Sentry. The HTTP/S Listener policies can be reused across multiple virtual directories, with the caveat that each virtual directory has some unique criteria.
When Sentry receives a request it has to match the request to a defined virtual directory. If it cannot match, it will issue the “Server Error 404 The requested virtual directory was not found” error.
Sentry uses 3 criteria to match the incoming request URL to a virtual directory. One of these 3 has to be unique for each virtual directory:
Using the Request URL below as an example:
- Protocol://IP_Address:Port combination – the HTTP/S Listener. In the example above this is https://192.168.82.24:443.
- Virtual Path – everything following the Port number in the URL. In the example above, this is /login.
- Incoming Host Header – set by the client using the value of the hostname, DNS name, or IP entered to access the Sentry virtual directory. In the example above, this is 192.168.82.28.
When you want to have multiple virtual directories using the same IP:Port/VirtualPath, use the Virtual Host option on the virtual directory, specifying what the incoming Host header value will be. Sentry will now use this 3rd criteria to match the Request URL to the virtual directory. Note that the Sentry log at DEBUG level will show the full Request URL and which virtual directory it was matched to.
Summary – Essentials for Passing Browser Based Traffic through Sentry
- Use an HTML policy for browser based traffic flows
- Create the appropriate virtual directories correctly for the traffic flow and modify the Filter Expression on each
- Use SSL and other Sentry features for security
- Enable SSO with Sentry
- Use Sentry load balancing and dynamic routing options with multiple back-end web servers
- Use the Virtual Host option on the virtual directory to allow for using the same HTTP/S listener policy for multiple sites