[65628] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Firewall stateful handling of ICMP packets

daemon@ATHENA.MIT.EDU (Owen DeLong)
Wed Dec 3 18:58:54 2003

Date: Wed, 03 Dec 2003 15:57:37 -0800
From: Owen DeLong <owen@delong.com>
To: Sean Donelan <sean@donelan.com>, nanog@merit.edu
In-Reply-To: <Pine.GSO.4.44.0312031710570.2919-100000@clifden.donelan.com>
Errors-To: owner-nanog-outgoing@merit.edu


--==========AA8D11B3F7C4006AC505==========
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

Actually, any halfway decent firewall allows you to permit certain ICMP
type codes while rejecting others.  Not a perfect solution, but, for the
most part, there aren't a lot of fragmentation-needed exploits running
around.  (In fact, I'm hard pressed to imagine how a Frag needed packet
for an invalid session could do much of anything).

Owen


--On Wednesday, December 3, 2003 5:12 PM -0500 Sean Donelan=20
<sean@donelan.com> wrote:

>
>
> You could drop ICMP packets at your firewall if the firewalls properly
> implemented stateful inspection of ICMP packets.  The problem is few
> firewalls include ICMP responses in their statefull analysis.  So you are
> left with two bad choices, permit "all" ICMP packets or deny "all" ICMP
> packets.
>
>
>



--=20
If it wasn't crypto-signed, it probably didn't come from me.

--==========AA8D11B3F7C4006AC505==========
Content-Type: application/pgp-signature
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (Darwin)

iD8DBQE/znhxn5zKWQ/iqj0RAk0/AJ9fRvwkqsFE8RPlrqr4qW428nq+wwCdFtkc
GPznCRrmlTmugoTEsbRoI3s=
=KCv1
-----END PGP SIGNATURE-----

--==========AA8D11B3F7C4006AC505==========--


home help back first fref pref prev next nref lref last post