Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 10 Feb 2001 18:17:04 -0800
From:      "Crist J. Clark" <cjclark@reflexnet.net>
To:        Dan Debertin <airboss@bitstream.net>
Cc:        Borja Marcos <borjamar@sarenet.es>, "freebsd-security@freebsd.org" <freebsd-security@FreeBSD.ORG>
Subject:   Re: nfsd support for tcp_wrapper -> General RPC solution
Message-ID:  <20010210181703.A62368@rfx-216-196-73-168.users.reflex>
In-Reply-To: <Pine.LNX.4.30.0102091657280.7608-100000@dmitri.bitstream.net>; from airboss@bitstream.net on Fri, Feb 09, 2001 at 05:12:42PM -0600
References:  <3A8474A6.D5D0DCE9@sarenet.es> <Pine.LNX.4.30.0102091657280.7608-100000@dmitri.bitstream.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Feb 09, 2001 at 05:12:42PM -0600, Dan Debertin wrote:
> On Fri, 9 Feb 2001, Borja Marcos wrote:
> >
> > 	Yes, and what about having portmap set the right firewall
> > rules to protect RPC services? Whenever a service registers itself
> > to portmap, it puts firewall rules to block access to the port.
> > That is what I am proposing!
> 
> I posted on this subject last month. You can trivially update your
> firewall rules with the following set of pipes:
> 
> (assuming your NFS server is at 10.0.0.1, and the service you're looking
> for is mountd)
> 
> UDPMOUNTD=`rpcinfo -p 10.0.0.1|awk '$5~/mountd/&&$3~/udp/{print $4}'|uniq`
> 
> Then, build your ipfw (of ipf, whatever) rules using $UDPMOUNTD:
> 
> # ipfw add deny udp from $EXTERNAL_NET to 10.0.0.1 $UDPMOUNTD

This is, of course, backwards, you should have,

  # ipfw add pass udp from $INTERNAL_NET to 10.0.0.1 $UDPMOUNTD

And deny by default. :)
-- 
Crist J. Clark                           cjclark@alum.mit.edu


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010210181703.A62368>