Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 27 Nov 2002 21:00:54 +0100
From:      Borja Marcos <borjamar@sarenet.es>
To:        freebsd-stable@freebsd.org
Subject:   New ipfw+IPSEC behavior
Message-ID:  <200211272100.54796.borjamar@sarenet.es>

next in thread | raw e-mail | index | archive | help


	Hello,

	I have just upgraded from RELENG_4_7 to -STABLE and found a behavior change 
between IPSec and IPFW.

	The previous system did not apply IPFW rules to packets after being extracted 
from a tunnel, and it seems that this behavior has changed.

	I know that tunnels had a problem: you could not filter anything coming 
through the tunnel, but that behavior had some advantages. Perhaps a 
compromise would be great.

	In my case, I am using IPsec in a wireless network. Now I have two machines, 
with one in hostap mode. The ipfw rules are configured like this:

add 200 allow udp from 192.168.2.0/24 500 to me 500 via wi0
add 210 allow udp from me 500 to 192.168.2.0/24 500 via wi
add 300 allow esp from 192.168.2.0/24 to me via wi0
add 310 allow esp from me to 192.168.2.0/24 via wi0
add 400 deny log all from any to any via wi0

	This may seem odd, but it is very effective. It completely blocks traffic 
from the wi interface unless it is IKE traffic or ESP. The advantages?

	1 - A wardriver cannot "touch" your machine unless he/she can succesfully set 
up a tunnel, guessing the IKE pre-shared key or exploiting a vulnerability in 
racoon.

	2 - You are protected from configuration errors. If, for whatever reason, 
unencrypted traffic "tries" to leave of reach the interface, it will not 
pass. Moreover, you can see it in the system log.

	Any ideas? It would be great to keep this behavior. Perhaps as an option?



	Borja.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200211272100.54796.borjamar>