[14443] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Security Problems with Linux 2.2.x IP Masquerading

daemon@ATHENA.MIT.EDU (Darren Reed)
Wed Mar 29 12:51:59 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <200003290559.PAA18421@cairo.anu.edu.au>
Date:         Wed, 29 Mar 2000 15:59:09 +1000
Reply-To: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
From: Darren Reed <avalon@COOMBS.ANU.EDU.AU>
X-To:         Nigel.Metheringham@VDATA.CO.UK
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <E12a1vv-00038E-00@rioja.localnet> from "Nigel Metheringham" at
              Mar 28, 2000 08:45:47 PM

In some mail from Nigel Metheringham, sie said:
>
> hdm@SECUREAUSTIN.COM said:
> > The UDP masquerading code only checks the DESTINATION PORT to
> > determine if a packet coming from the external network is to be
> > forwarded inside.
>
> this is due to a number of hosts/services returning UDP from an IP
> other than that which the original UDP packet went to - for example it
> is frequently the case that NFS servers just use the interface ip
> address "closest" to that which the NFS op came from.

Common sense would suggest that the client should be using that address
too...

> I'll give this some thought to work out a way of narrowing this hole (I
> don't think it can be completely closed without causing other problems).

Here's some advice from the implementation of IP Filter:
I've had it closed since day 0 and had 0 reports of problems because of it.

Cheers,
Darren

home help back first fref pref prev next nref lref last post