[20128] in bugtraq

home help back first fref pref prev next nref lref last post

Re: A fragmentation attack against IP Filter

daemon@ATHENA.MIT.EDU (Manuel Bouyer)
Tue Apr 10 11:31:10 2001

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-ID:  <20010410144801.A20072@antioche.lip6.fr>
Date:         Tue, 10 Apr 2001 14:48:01 +0200
Reply-To: Manuel Bouyer <bouyer@ANTIOCHE.LIP6.FR>
From: Manuel Bouyer <bouyer@ANTIOCHE.LIP6.FR>
X-To:         Thomas Lopatic <thomas@lopatic.de>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <5.0.2.1.2.20010409140226.00b444c8@lopatic.de>; from Thomas
              Lopatic on Mon, Apr 09, 2001 at 02:12:22PM +0200

On Mon, Apr 09, 2001 at 02:12:22PM +0200, Thomas Lopatic wrote:
> [...]
> For the packet filtering code you are perfectly right. The advisory should
> have said so. Still, the NAT code seems to also add entries to the decision
> cache. Unfortunately I do not currently have the time to take a closer look
> at the NAT code, so I do not know about the implications of this for packet
> filtering.
>
> If you find anything interesting in there let us know. :-)

I has a closer look at this. It looks like entries are added to the desision
cache only for proxies:ip_ftp_pxy, ip_raudio_pxy, ip_rcmd_pxy. Basic NAT
shouldn't change the desision cache, but I very well may have missed
something :)

--
Manuel Bouyer, LIP6, Universite Paris VI.           Manuel.Bouyer@lip6.fr
--

home help back first fref pref prev next nref lref last post