[21886] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Weak TCP Sequence Numbers in Sonicwall SOHO Firewall

daemon@ATHENA.MIT.EDU (Barney Wolff)
Thu Jul 26 17:29:27 2001

Date: Wed, 25 Jul 2001 21:47:32 -0400
From: Barney Wolff <barney@databus.com>
To: Dan Ferris <danf@percept.com>
Cc: bugtraq@securityfocus.com
Message-ID: <20010725214732.A29231@tp.databus.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <ECEPLNJJBDCGPAJMKOLEKEMFCAAA.danf@percept.com>; from danf@percept.com on Wed, Jul 25, 2001 at 05:17:28PM -0600

You're nmap'ing from inside, right?  Nobody from outside should
be able to connect to the Sonicwall at all.  Sequence numbers
for connections *across* the NAT depend on the endpoint hosts,
not the NAT box.  So this is a risk only if you have enemies
already inside your house.

Barney Wolff

On Wed, Jul 25, 2001 at 05:17:28PM -0600, Dan Ferris wrote:
> This may not seem bad, but to me it seems that this defeats the point of NAT
> if somebody can steal your sessions.  Note the section on TCP sequence
> prediction.  This was a Sonicwall SOHO firewall.
> 
> =======
> Host  (192.168.1.254) appears to be up ... good.
> Initiating SYN half-open stealth scan against  (192.168.1.254)
> Adding TCP port 80 (state open).
> The SYN scan took 8 seconds to scan 1523 ports.
> For OSScan assuming that port 80 is open and port 1 is closed and neither
> are firewalled
> Interesting ports on  (192.168.1.254):
> (The 1518 ports scanned but not shown below are in state: closed)
> Port       State       Service
> 23/tcp     filtered    telnet
> 67/tcp     filtered    bootps
> 80/tcp     open        http
> 137/tcp    filtered    netbios-ns
> 514/tcp    filtered    shell
> 
> TCP Sequence Prediction: Class=64K rule
>                          Difficulty=1 (Trivial joke)

home help back first fref pref prev next nref lref last post