Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 30 Jan 1999 17:08:06 -0500 (EST)
From:      the man <rmuir@gibralter.net>
To:        freebsd-security@FreeBSD.ORG
Subject:   icmp redirects
Message-ID:  <199901302208.RAA12943@mail.gibralter.net>

index | next in thread | raw e-mail

The other day I was having issues with a router at work sending me icmp
redirect messages after I rebooted a firewall. I deleted the "D" flagged routes 
but I am searching for a permanent solution. I compiled an icmp-redirect sender 
from http://www.squirrel.com onto a solaris box for testing and first tried:

# sysctl -w net.inet.ip.redirect=0
net.inet.ip.redirect: 1 -> 0

That still didnt prevent them.
I suppose blocking icmp type 5 in ipfw rules would prevent them, but it seems
a bit redundant to load ipfw on machines that are already firewalled.

The next thing that bothered me was that I could add those same routes to my 
freebsd box at home (freebsd-2.2.8) that has ip forwarding enabled.
I really dont like the idea of someone being able to send redirects etc to my 
gateway box. 
I believe linux has icmp redirects disabled by default if ip forwarding is 
enabled, and i also think it logs attempts to syslog. (I'm not sure about this, 
I don't deal with linux much).

Could someone tell me a non-ipfw way of blocking these, and why it is not 
disabled by default if ip forwarding is on?

-----------------------------------------------------
Robert Muir
rmuir@gibralter.net, robert@coastal.cc.nc.us
252 633 3737

Someone thought The Big Red Button was a light switch.



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message


help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199901302208.RAA12943>