Date: Thu, 25 Sep 1997 10:20:37 -0600 (MDT) From: Nate Williams <nate@mt.sri.com> To: Chris Stenton <jacs@gnome.co.uk> Cc: security@freebsd.org Subject: Re: rc.firewall weakness? Message-ID: <199709251620.KAA18291@rocky.mt.sri.com> In-Reply-To: <199709251454.PAA06399@hawk.gnome.co.uk> References: <199709251454.PAA06399@hawk.gnome.co.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
> I have just been looking at the latest rc.firewall for 2.2.2-stable > and it appears to me that it is somewhat weak. As far as I can see > the following rules:- > > # Allow DNS queries out in the world > $fwcmd add pass udp from any 53 to ${oip} > $fwcmd add pass udp from ${oip} to any 53 > > # Allow NTP queries out in the world > $fwcmd add pass udp from any 123 to ${oip} > $fwcmd add pass udp from ${oip} to any 123 > > allows anyone from outside to connect to any udp port and get a reply if they > can get their hacking prog to connect from port 53 or 123 on their own machine? > Yes, that is true. This is also the case with TCP ports that have similar rulesets, most notably FTP-DATA. > The whole area of UDP as far as I can see is difficult to administer > under ipfw. What I feel is required is "dynamic packet filtering" on > UDP connections so that ipfw remembers the outgoing UDP packets it has > seen. I think the above solution is adequate, so both the source/destination port are the same. > It can then let in corresponding packets from the host and port > that has been sent to. This I think is the case for products from > Morning Star et. al. It wasn't that way when I first used MorningStar, but that was a couple of years ago. Nate
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199709251620.KAA18291>