Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Oct 2000 00:34:57 -0400
From:      "Andrew Penniman" <apenniman@adelphia.net>
To:        "Mike Hoskins" <mike@adept.org>, <freebsd-security@FreeBSD.ORG>
Subject:   Re: request for example rc.firewall script
Message-ID:  <002d01c03f06$18b2d260$29a63018@bur.adelphia.net>
References:  <Pine.BSF.4.21.0010250134510.47737-100000@snafu.adept.org>

next in thread | previous in thread | raw e-mail | index | archive | help
> On Tue, 24 Oct 2000, Crist J . Clark wrote:
>
> > > check-state
> > > allow ip from a.b.c.d to any keep-state
> > > allow ip from x.y.z.z/24 to any keep-state
> > Eep! You've left yourself _very_ vulnerable to spoofing.
>
> From the internal net you mean?  If so, I agree.  Given I'm the only
> person using my 'LAN', I've accepted that as a liveable risk.  ;)

The spoofing threat is external.  An evil bad person could spoof your
external IP and have full access to your services by the first rule.  They
could do the same by spoofing any of the x.y.z.z/24 addresses.

Why would your external IP be talking to the internal system?  I think I'd
get rid of that rule completely.

To prevent spoofing on the x.y.z.z/24 network, add the following rule to
prevent x.y.z.z/24 sourced traffic coming into the machine from the ouside
world:

    deny ip from x.y.z.z/24 to any via xx0 in

where xx0 is your external interface.

No?



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?002d01c03f06$18b2d260$29a63018>