Date: Sun, 15 Feb 2004 12:19:18 +0300 From: "Oleg Y. Ivanov" <freebsd@dwec.ru> To: <freebsd-ipfw@freebsd.org> Subject: Re: Strange leakage of private source addresses w/ipfw and natd Message-ID: <006f01c3f3a4$cd109cf0$0305a8c0@oivanovmob> References: <3F833434.5090506@tenebras.com><ekx0paff.fsf@ID-23066.news.dfncis.de><020201c39c6e$5f0fea40$080ba8c0@admin> <oes1amix.fsf@ID-23066.news.dfncis.de>
next in thread | previous in thread | raw e-mail | index | archive | help
Ok - it should be blocked and it is blocked. But some ICMP packets (more precisely - ICMP unreach messages) somehow are passed to the World not altered from time to time. So actually it's not the bad ipfw ruleset issue, but NATd itself. > * 2003-10-27 freebsd@dwec.ru: > > Ok, maybe not THAT important but definitely a Bad Surprise. Here's > > the sample (and in current configuration only ICMP packets from time > > to time are being passed through unaltered): > > snort: [1:0:0] POSSIBLE address leakage - ICMP {ICMP} 192.168.5.2 -> > > 208.115.104.193 > > [**] POSSIBLE address leakage - ICMP [**] > ICMP is connectionless, so anybody can ping/traceroute/whatever your > machine if you don't block those private IPs, and this is what people > usually do. > > clemens > > _______________________________________________ > freebsd-ipfw@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw > To unsubscribe, send any mail to "freebsd-ipfw-unsubscribe@freebsd.org" > >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?006f01c3f3a4$cd109cf0$0305a8c0>