Date: Fri, 1 Dec 2000 16:25:38 +0200 From: "Ari Suutari" <ari@suutari.iki.fi> To: <freebsd-net@freebsd.org> Subject: Re: filtering ipsec traffic (fwd) Message-ID: <006901c05ba2$93d715b0$0e05a8c0@intranet.syncrontech.com>
next in thread | raw e-mail | index | archive | help
Hi,
>
> So far, just one limitation comes to mind, which is that the packet
> filters cannot discriminate between a naturally non-IPsec packet, and a
> non-IPsec packet which 'was' or 'will be' an IPsec one. I don't think
> this is a big problem though.
>
But what if we are running in IPsec tunnel mode ? For example, I could
use
an IPsec tunnel to connect two 192.168.x.x networks together. In such
setup,
I would allow IPsec packets between tunnel endpoints and packets between
192.168.x.x networks but *only* if they are coming from the tunnel. Last
time I tried
that adding on 'ipfw pass any from 192.168.x.x .....' also allowed
non-ipsec traffic
between these nodes. This is a security hole, which allows someone to
send packets with spoofed source address to your system.
Ari S.
--
Ari Suutari <ari@suutari.iki.fi>
Lemi, Finland
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-net" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?006901c05ba2$93d715b0$0e05a8c0>
