Re: [users@httpd] Different security based on network interface

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> AragonX wrote:
> 
> > I'm afraid someone will spoof the IP addresses of the internal network
> > to bypass this security measure.

  I don't see how that's possible.  Given the following:

	M	- malicious hacker at address M
	W	- webserver
	I	- internal network machine

  M will send the following packet:

	M	->	SRC I:1234 DST W:80 SYN (ie. establish a connection)

  Assuming the packet makes it through, W will then respond:

	W	->	SRC W:80 DST: I:1234 SYN ACK

  But this will go to I, NOT back to M.  I will get this packet and will
drop it since no connection is actually being made.  Even if M can guess the
TCP sequence numbers to "fake" a connection, it still a one-way connection
where M can send packets to W, but W cannot send packets back to M (since W
thinks they're coming from I and sends its reponses back to I).

  -spc 




---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx
   "   from the digest: users-digest-unsubscribe@xxxxxxxxxxxxxxxx
For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx



[Index of Archives]     [Open SSH Users]     [Linux ACPI]     [Linux Kernel]     [Linux Laptop]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Squid]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]

  Powered by Linux