Date: Tue, 27 Jun 2000 17:39:59 GMT From: Salvo Bartolotta <bartequi@inwind.it> To: Richard Martin <dmartin@origen.com> Cc: freebsd-security@FreeBSD.ORG Subject: Re: icmp type 3 code 4: a couple of questions Message-ID: <20000627.17395900@bartequi.ottodomain.org> In-Reply-To: <3958E1C5.18593553@origen.com> References: <20000627.14530500@bartequi.ottodomain.org> <3958E1C5.18593553@origen.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Dear Richard Martin,
thanks again for replying.
Well, actually, my homebox will behave, as it were, like a Klingon
spaceship: for example, it will normally deny **all** icmptypes except
type 3 code 4 (DF). When I need to ping, traceroute, etc., I will
*temporarily* remove some restrictions. At least, this is the idea.
I have achieved "invisibility" as well as the desired incoming icmp
packets 3.4 by simply allowing all icmptypes 3, and dropping all
outward bound icmp packets. If I fully understand the matter, this
method should work without (?) side effects. If this is the case, I
thus obtain the same result -- just as if I were allowing icmp 3.4
packets and rejecting all other icmptypes.
Needless to say, I have CONSTANTLY been portscanned (nice packets
having been sent to a bunch of ports such as tcp 23) in the last few
weeks; which is the reason for such drastic decisions.
Since utilities such as Firewalk (traceroute-like program) make use of
ICMP, I wish to prevent this kind of scans.
Back to my question: AFAICS, ipfilter can allow icmp 3.4 (blocking all
other icmptypes) whereas ipfw apparently cannot **exactly** do that.
However, if my understanding of the whole affair is correct (see
above), the issue is purely academic.
Best regards,
Salvo
>>>>>>>>>>>>>>>>>> Original Message <<<<<<<<<<<<<<<<<<
On 6/27/00, 6:17:57 PM, Richard Martin <dmartin@origen.com> wrote
regarding Re: icmp type 3 code 4: a couple of questions:
> Add:
> /sbin/ipfw add pass icmp from ${oip} to any icmptypes ${icmpallow}
> /sbin/ipfw add pass icmp from any to ${oip} icmptypes ${icmpallow}
> /sbin/ipfw add deny log icmp from any to any
> this lets the firewall machine ping in and out (used by Big Brother),
but
> stops those not very useful, and blocks all ICMP to other machines
past
> the firewall
> Substitute in the ICMP types you want to allow each way, you can
specify
> different ones both in and out.
> We use
> icmpallow="0,3,4,5,8,11,12,14,16,18"
> I wonder if anyone has any comments on the appropriateness of these
> --
> Richard Martin dmartin@origenbio.com
> Salvo Bartolotta wrote:
> > Dear FreeBSD'ers,
> >
> > I am running a paranoidly closed firewall (homebox).
> >
> > Just out of curiosity, is there an *ipfw* way to allow ONLY icmp type
> > 3 code 4 packets (DF), dropping all other icmp packets onto the floor
> > ?
> >
> > The question may be academic, though; I seem to understand that
> > letting icmptypes 3 in (while letting NO icmp packets out) should
> > achieve the same (paranoid) goal. Am I missing anything ?
> >
> > Thanks in advance,
> > Salvo
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000627.17395900>
