[11494] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: [nsp] known networks for broadcast ping attacks

daemon@ATHENA.MIT.EDU (root@gannett.com)
Wed Jul 30 18:09:16 1997

From: root@gannett.com
Date: Wed, 30 Jul 1997 17:35:23 -0400 (EDT)
To: Systems Engineer <snash@lightning.net>
cc: Netstat Webmaster <feh@netstat.net>, "Alex.Bligh" <amb@xara.net>,
        nanog@merit.edu
In-Reply-To: <33DFB454.9C3A370B@lightning.net>

On Wed, 30 Jul 1997, Systems Engineer wrote:

> Well ever since this but was introduced to the outside world,  I have
> since modified my present Firewall (ipfwadm v2.3.0) to accomodate.
> 
> type  prot source               destination          ports
> deny  icmp 0.0.0.0              0.0.0.255            any
> deny  icmp 0.0.0.255            0.0.0.0              any
> 

My rule is:

deny icmp   0.0.0.0 0.0.0.0 any

With perhaps specific permits above that for devices that I find have
a legitimate need for ICMP (be it unreachables, or echo/echo reply).

I was wondering more if there were a good reason, other than for dial-up 
users who may need connectivity checks, to allow any ICMP in, or ICMP to 
say anything more than a terminal server's address range and certain hosts.

Hence my prior discussion on ping-mapping netblocks, and its lack of
applicability to the number of hosts on my network.

Paul
-------------------------------------------------------------------------
Paul D. Robertson
gatekeeper@gannett.com


home help back first fref pref prev next nref lref last post