Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 27 Jun 2000 17:39:59 GMT
From:      Salvo Bartolotta <bartequi@inwind.it>
To:        Richard Martin <dmartin@origen.com>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: icmp type 3 code 4: a couple of questions
Message-ID:  <20000627.17395900@bartequi.ottodomain.org>
In-Reply-To: <3958E1C5.18593553@origen.com>
References:  <20000627.14530500@bartequi.ottodomain.org> <3958E1C5.18593553@origen.com>

next in thread | previous in thread | raw e-mail | index | archive | help

Dear Richard Martin,

thanks again for replying.

Well, actually, my homebox will behave, as it were, like a Klingon 
spaceship: for example, it will normally deny **all** icmptypes except 
type 3 code 4 (DF). When I need to ping, traceroute, etc., I will 
*temporarily* remove some restrictions. At least, this is the idea. 

I have achieved "invisibility" as well as the desired incoming icmp 
packets 3.4 by simply allowing all icmptypes 3, and dropping all 
outward bound icmp packets. If I fully understand the matter, this 
method should work without (?) side effects. If this is the case, I 
thus obtain the same result -- just as if I were allowing icmp 3.4 
packets and rejecting all other icmptypes.  




Needless to say, I have CONSTANTLY been portscanned (nice packets 
having been sent to a bunch of ports such as tcp 23) in the last few 
weeks; which is the reason for such drastic decisions. 

Since utilities such as Firewalk (traceroute-like program) make use of 
ICMP, I wish to prevent this kind of scans.

Back to my question: AFAICS, ipfilter can allow icmp 3.4 (blocking all 
other icmptypes) whereas ipfw apparently cannot **exactly** do that. 
However, if my understanding of the whole affair is correct (see 
above), the issue is purely academic.

Best regards,
Salvo
 

>>>>>>>>>>>>>>>>>> Original Message <<<<<<<<<<<<<<<<<<

On 6/27/00, 6:17:57 PM, Richard Martin <dmartin@origen.com> wrote 
regarding Re: icmp type 3 code 4: a couple of questions:


> Add:

>     /sbin/ipfw add pass icmp from ${oip} to any icmptypes ${icmpallow}
>     /sbin/ipfw add pass icmp from any to ${oip} icmptypes ${icmpallow}
>     /sbin/ipfw add deny log icmp from any to any

> this lets the firewall machine ping in and out (used by Big Brother), 
but
> stops those not very useful, and blocks all ICMP to other machines 
past
> the firewall

> Substitute in the ICMP types you want to allow each way, you can 
specify
> different  ones both in and out.

> We use

>     icmpallow="0,3,4,5,8,11,12,14,16,18"

> I wonder if anyone has any comments on the appropriateness of these

> --
> Richard Martin       dmartin@origenbio.com



> Salvo Bartolotta wrote:

> > Dear FreeBSD'ers,
> >
> > I am running a paranoidly closed firewall (homebox).
> >
> > Just out of curiosity, is there an *ipfw* way to allow ONLY icmp type
> > 3 code 4 packets (DF), dropping all other icmp packets onto the floor
> > ?
> >
> > The question may be academic, though; I seem to understand that
> > letting icmptypes 3 in (while letting NO icmp packets out) should
> > achieve the same (paranoid) goal. Am I missing anything ?
> >
> > Thanks in advance,
> > Salvo










To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000627.17395900>