Date: Tue, 27 Jun 2000 16:57:30 -0700 From: Dragos Ruiu <dr@dursec.com> To: "Rodney W. Grimes" <freebsd@gndrsh.dnsmgr.net>, dmartin@origen.com (Richard Martin) Cc: bartequi@inwind.it (Salvo Bartolotta), freebsd-security@FreeBSD.ORG Subject: Re: icmp type 3 code 4: a couple of questions Message-ID: <00062717070013.00364@smp.kyx.net> In-Reply-To: <200006271818.LAA92561@gndrsh.dnsmgr.net> References: <200006271818.LAA92561@gndrsh.dnsmgr.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 27 Jun 2000, Rodney W. Grimes wrote:
> > We use
> >
> > icmpallow="0,3,4,5,8,11,12,14,16,18"
> >
> > I wonder if anyone has any comments on the appropriateness of these
> >
>
> 4=ICMP_SOURCEQUENCH, useless as most machines ignore it, can be
> abused easily.
> 5=ICMP_REDIRECT, you don't want that one can be used to redirect
> traffic to unwanted places.
> 14=ICMP_TSTAMPREPLY, useless without 13=ICMP_TSTAMP.
> 18=ICMP_MASKREPLY, useless without 17=ICMP_MASKREQ
>
> We usually run
> icmpallow="0,3,8,11"
> with special rules to allow 5 on the inside only.
> We don't allow 12, and we don't see hits due to this, except for abuse.
>
> Complete rule set looks like this:
> 01000 23000 1969619 allow icmp from any to any icmptype 0,3,4,8,11
> 01010 0 0 allow icmp from any to any via dc0 icmptype 5
> 01010 0 0 allow icmp from any to any via dc1 icmptype 5
> 01010 0 0 allow icmp from any to any via dc2 icmptype 5
> 01010 0 0 allow icmp from any to any via dc3 icmptype 5
> 01020 0 0 deny log logamount 100 icmp from any to any
>
> (Note that the counts are not very high here, due to data collection
> resetting the rules ever few hour.)
To chorus support of the above...
IMHO The four types of magic ICMP packets to let through a firewall are:
3 - Destination Unreachable - important for many applications
(I haven't seen anyone implement subtype filters yet as
but this may be useful as there is a _lot_ of info to be gleaned
here, and it might be nice to strip some messages out instead
of just letting the whole category through. I'm also wondeing
if anyone ever sees "Host Isolated" messages on their net?)
8 - Echo Request
0 - Echo Reply - ping, traceroute and friends
11 - Time Exceeded - traceroute needs this for sure and maybe
RTT/window estimation and fragmentation need it
The following may also be included in the allow list
but may enable DOS/mapping:
4 - Source Quench
5 - Redirection (suggest blocking but may be important in multi-router env)
12 - Parameter Problem (never ever seen this meself)
Should be Denied/Blocked:
2 - Undefined in rfc792
13 - timestamp request
14 - timestamp reply
15 - Info Request
16 - Info Reply
17 - Address Mask Request
18 - Address Mask Reply
and anything else...
And in case you were wondering about IPv6...from (rfc2463)
it seems like all the crap above has been cleaned up:
ICMPv6 error messages:
1 Destination Unreachable
2 Packet Too Big
3 Time Exceeded
4 Parameter Problem
ICMPv6 informational messages:
128 Echo Request
129 Echo Reply
(Messages 130-132 replace IGMP)
Nice neat and clean....
cheers,
--dr
--
dursec.com ltd. / kyx.net - we're from the future http://www.dursec.com
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?00062717070013.00364>
