Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 20 Sep 1999 16:13:41 -0500 (CDT)
From:      John Heyer <john@arnie.jfive.com>
To:        security@FreeBSD.ORG
Subject:   port-blocking ipfw rules with NAT - necesary?
Message-ID:  <Pine.BSF.3.96.990920154858.3314A-100000@snake.supranet.net>
In-Reply-To: <19990920162742.A12619@bitbox.follo.net>

index | next in thread | previous in thread | raw e-mail


In the firewall section of the handbook, it recommends something like:
- Stop IP spoofing and  RFC1918 networks on the outside interface
- Deny most (if not all) UDP traffic
- Protect TCP ports 1-1024,2000,2049,6000-6063 on the internal network

These rules make sense, but I think they make the assumption the network
you're protecting is routable.  If I'm running NAT and my internal network is 
non-routable, do I really need to continue blocking ports?  For example,
let's say someone was running an open relay mail server or vulnerable FTP
server - would it be possible for an intruder to someone access the
internal machine assuming I'm not using -redirect_port or
-redirect_address with natd?

--
"Your illogical approach ... does have its advantages."
				-- Spock, after being Checkmated by Kirk



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.990920154858.3314A-100000>