[9608] in bugtraq

home help back first fref pref prev next nref lref last post

Re: NT DoS on FW-1

daemon@ATHENA.MIT.EDU (Malikai)
Tue Feb 16 16:00:37 1999

Date: 	Mon, 15 Feb 1999 14:52:21 -0600
Reply-To: Malikai <malikai@INTERACTIVEALIEN.COM>
From: Malikai <malikai@INTERACTIVEALIEN.COM>
To: BUGTRAQ@NETSPACE.ORG

This issue can be fixed by simply implementing a stealthing rule on the
firewall itself. The problem is in NT's stack, not the FireWalls.

> Jamie Thain wrote:
>
> > Timothy,
> >
> > > I was running nmap against a client's Checkpoint FW-1
> > > when they called to inform me that it had crashed.  I
> > > was not on site so unfortunately I have little
> > > details.
> >
> > I have seen this befor where a high speed port scanner running against
a
> > FW-1 on NT seems to crash it. FW-1 does not exhibit this behaviour on
> > Sun. You may want to check and make sure you have the most recent
patch
> > level. That information is on the FW-1 site.
> >
> > > I DO know that they were running it on a NT
> > > box and it was behind a Cisco 3640.
> >
> > Since they are running this behind a Cisco, why not do something
> > creative like install and access list on the external interface to
help
> > protect the FW-1. Suppose for example, you have the following
situation.
> >
> > fw-1 external interface         209.111.222.10
> > work stations hide behind               .12.
> > the SMTP server is on                   .50
> > and the WEB server is on                .50
> >
> > ( port translated to diff machines )
> > You use an external mail relay at the ISP at 192.167.10.1 and You use
> > for DNS servers on the same network as the SMTP as forwarders in a
split
> > horizion.
> >
> > On the inbound interface of your cisco you could add the following.
> > Cisco does not allow for these comments, they are just there to help.
> >
> > # short cut established packetes
> > access-list 101 permit ip any 209.111.222.0 0.0.0.255 established
> >
> > # prevent non-routed address, anti-spoofing
> > access-list 101 deny ip any 10.0.0.0     0.255.255.255
> > access-list 101 deny ip any 172.16.0.0   0.15.255.255
> > access-list 101 deny ip any 192.168.0.0  0.0.255.255
> >
> > # allow high ports
> > access-list 101 permit tcp any 209.111.222.0 0.0.0.255 gt 1023
> >
> > # allow web service and email. Note the email is to the relay.
> > access-list 101 permit tcp any host 209.111.222.50 eq http
> > access-list 101 permit tcp host 192.167.10.1 host 209.111.222.50 eq
smtp
> >
> > # only allow udp to the network with the DNS on it
> > access-list 101 permit udp 209.111.222.0 0.0.0.255 192.167.10.1
> > 0.0.0.255
> >
> > # don't allow ping (echo) to any port but the smtp/http server
> > # people are funny if they can't ping the hosts...
> >
> > access-list 101 permit icmp any host 209.111.222.50 eq echo
> > access-list 101 deny icmp any any eq echo
> > access-list 101 permit icmp any any
> >
> > # only allow access to 12 and 50 in any case.
> >
> > access-list 101 permit ip any host 209.111.222.12
> > access-list 101 permit ip any host 209.111.222.50
> >
> > interface serial0.1 point-to-point
> >         ip address 209.111.221.252
> >         no ip directed-broadcast
> >         ip access-group 101 in
> >
> > # And on the inbound access list, I normally put a set that only
allows
> > # the two interesting interfaces out...
> >
> > access-list 103 permit ip host 209.111.222.12 any
> > access-list 103 permit ip host 209.111.222.50 any
> >
> > interface ethernet0
> >         ip address 209.111.222.254
> >         no ip directed-broadcast
> >         ip access-group 103 in
> >
> > This of course does not prevent a DOS attack against your FW-1, but it
> > does make attacking it much more difficult. It also has some good
> > things, because the only interfaces that can be accessed are virtual
> > numbers and not the real interface of cards. Also by overloading a
> > single address and doing port translation, for all of your inbound
> > services lets your write far simpler rules in the router.
> >
> > There is no ping requests to any address on any address including the
> > router and FW-1. Of course the only down-side is nmap recognizes that
> > this is Firewalled because of all of the rejects going out. So you
might
> > want to suppress all outbound unreachables on the serial interface. I
> > think that would fix it.
> >
> > Even if you are not this agressive, your router can add a good layer
of
> > security by just chucking stupid scanner requests. I hope CISCO comes
up
> > with a DROP for there access list.
> >
> > The flags that go red in your FW-1 have additional meaning as most of
> > the crap is gone now...
> >
> > regards:jamie
> >
> > PLEASE NOTE::: This access list was typed directly from my head, and
you
> > would need to
> > test it before using it...
>




 Jason Ihde					malikai@interactivealien.com
 Networked Systems Consultant     &		Internet Systems Security
 PGP Key available via finger or http://interactivealien.com/~malikai/pgp
 	Experience is what you get when you don't get what you want.

home help back first fref pref prev next nref lref last post