Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 24 May 2005 14:28:58 -0600
From:      Stephane Raimbault <stephane@enertiasoft.com>
To:        Charles Swiger <cswiger@mac.com>
Cc:        freebsd-ipfw@freebsd.org
Subject:   Re: named error sending response: permision denied
Message-ID:  <33C31ADD-A2A0-47FC-968D-267278F63F89@enertiasoft.com>
In-Reply-To: <0E1A6107-FB85-4D9F-9873-7E5FBE8EB4C5@mac.com>
References:  <39F3A41D-9555-452F-8B41-3EA03E1AC460@enertiasoft.com> <1116435784.34699.23.camel@jose> <DBDEAE42-4CD3-4989-AEB8-CF4794942240@enertiasoft.com> <5D5EFEE7-F123-43CB-A40E-7FF7EAF03C07@enertiasoft.com> <428DEB28.5030505@mac.com> <FCDE429D-2518-453D-B0EA-9CF55F539D70@enertiasoft.com> <96966222-05C1-4686-9F07-EA8A43738B4E@mac.com> <F4C0013C-245C-41AE-9E4C-226829631D84@enertiasoft.com> <0E1A6107-FB85-4D9F-9873-7E5FBE8EB4C5@mac.com>

next in thread | previous in thread | raw e-mail | index | archive | help

On 24-May-05, at 2:12 PM, Charles Swiger wrote:

> On May 24, 2005, at 2:25 PM, Stephane Raimbault wrote:
>
>>> I hate to ask something silly, but you do have a check-state rule  
>>> somewhere, right?
>>>
>>>
>> it's not silly..., what's silly is now I'm asking how would I  
>> check :) or what would the rule look like.
>>
>
> You've have an "ipfw add check-state" rule somewhere.
>
>
>>> The rules you've added permit traffic in both directions, which  
>>> shouldn't be needed unless the stateful matching wasn't working  
>>> right.  Anyway, you don't need to use stateful rules if you  
>>> permit traffic in both ways, but the possible tradeoff is making  
>>> the systems more accessible to scanning and some DoS attacks  
>>> using forged traffic.
>>>
>>> Not using keep-state with UDP is quite reasonable, but you might  
>>> consider adding a "keep-state" with your TCP rules for port 53.   
>>> You should also be aware that your nameservers will want to make  
>>> outbound connections using TCP themselves sometimes....
>>>
>>
>> you've actually kinda answered the other question I neglected to  
>> ask... which is, would I really need the keep-state, since it  
>> seemed to work without it being there when I did my testing  
>> earlier today.  Regarding adding keep-state to my tcp rule...  
>> would this not do the same thing... ? am I confused... or is it  
>> just insecure of doing it this way:
>>
>> # Allow TCP through if setup succeeded
>> ${fwcmd} add pass tcp from any to any established
>>
>
> Stateful matching of connections can be more secure than passing  
> any traffic which is established, but that depends on the other  
> rules which are being used.  However, the IPFW manpage has a good  
> description of this:
>
>      The typical use of dynamic rules is to keep a closed firewall  
> configura-
>      tion, but let the first TCP SYN packet from the inside network  
> install a
>      dynamic rule for the flow so that packets belonging to that  
> session will
>      be allowed through the firewall:
>
>            ipfw add check-state
>            ipfw add allow tcp from my-subnet to any setup keep-state
>            ipfw add deny tcp from any to any
>

That's very interesting and makes sense.  I do not have the check- 
state in there, and just specify each port that is open, I'm guessing  
I did not run into this problem with anything else, as dns is a very  
stateful type of protocol?  Would this be hand with an FTP server,  
right now I just tell the ftp server to use specific passive ports,  
and open up the firewall to allow connections on there.  Would I be  
able to elmininate that with simply setting up check-state and also  
having keep-state at the end of the tcp allow rules ?

Thanks,
Stephane.



> -- 
> -Chuck
>
> _______________________________________________
> freebsd-ipfw@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
> To unsubscribe, send any mail to "freebsd-ipfw- 
> unsubscribe@freebsd.org"
>




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?33C31ADD-A2A0-47FC-968D-267278F63F89>