Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 01 Nov 1999 15:16:57 +0000
From:      Adam Laurie <adam@algroup.co.uk>
To:        Group Paranoia <security@FreeBSD.ORG>
Subject:   hole(s) in default rc.firewall rules
Message-ID:  <381DAEE9.75C2EDA5@algroup.co.uk>

next in thread | raw e-mail | index | archive | help
*,

It seems to me that the following rules (and multiple variations)
provide a Great Big Hole(tm) through ipfw into your UDP services...

    # Allow DNS queries out in the world
    $fwcmd add pass udp from any 53 to ${ip}
    $fwcmd add pass udp from ${ip} to any 53

    # Allow NTP queries out in the world
    $fwcmd add pass udp from any 123 to ${ip}
    $fwcmd add pass udp from ${ip} to any 123

By setting their source port to 53 or 123, an attacker can bypass your
firewall and connect to any UDP listener.

I propose the following alternative:

    # Block low port incoming UDP (and NFS) but allow replies for DNS,
NTP
    # and all other high ports. Allow outgoing UDP.
    $fwcmd add pass udp from any to ${ip} 123
    $fwcmd add deny udp from any to ${ip} 0-1023,1110,2049
    $fwcmd add pass udp from any to any

cheers,
Adam
--
Adam Laurie                   Tel: +44 (181) 742 0755
A.L. Digital Ltd.             Fax: +44 (181) 742 5995
Voysey House                  
Barley Mow Passage            http://www.aldigital.co.uk
London W4 4GB                 mailto:adam@algroup.co.uk
UNITED KINGDOM                PGP key on keyservers


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?381DAEE9.75C2EDA5>