Date: Mon, 4 Dec 2000 08:43:32 +0200 From: "Ari Suutari" <ari@suutari.iki.fi> To: "Dominick LaTrappe" <seraf@2600.com> Cc: <freebsd-net@freebsd.org> Subject: Re: filtering ipsec traffic (fwd) Message-ID: <001801c05dbd$859d1400$0e05a8c0@intranet.syncrontech.com> References: <Pine.NEB.4.21.0012011404440.20734-100000@phalse.2600.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi, > On Fri, 1 Dec 2000, Ari Suutari wrote: > > But what if we are running in IPsec tunnel mode ? > > Then there's no problem. Please read the original post. I thought that I read it but maybe I didn't understand. > > > Last time I tried that adding on 'ipfw pass any from 192.168.x.x .....' > > also allowed non-ipsec traffic between these nodes. > > Of course, because you didn't specify any particular protocol in the rule. Hmmm (I tested this with FreeBSD 4.1). I didn't want any protocol limitation between VPN sites, since they trust each other (they are just different offices in same company). I just wanted that between IPsec tunnel gateways only esp is allowed and there are no limitations betwen VPN sites *EXCEPT* that packets must be coming through IPsec tunnel. So what I was missing is something like ipfw pass any from 192.168.x.x to .... via this-ipsec-tunnel I am able to configure system this way when using pipsecd, since it passes traffic coming from tunnel to tunX device. > > This is a security hole, which allows someone to > > send packets with spoofed source address to your system. > > IP spoofing is a routing issue, totally irrelevant to this thread. The spoofing was only one problem that comes to my mind with this. The real problem is that I wasn't able to force use of IPsec with ipfw + kame. Ari S. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-net" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?001801c05dbd$859d1400$0e05a8c0>