Re: Ambiguities in TCP/IP - firewall bypassing

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, 19 Oct 2002, Florian Weimer wrote:
> 
> As a result of this bug, it's quite complicated (if not impossible in
> some configurations) to properly filter connection attempts to Linux 
> hosts on Cisco IOS routers.
  
Actually, not really provided you are IOS 11.3 or higher.
  
> If your access list is a whitelist with a "permit tcp any any
> established" statement somewhere, it's very likely that you can bypass
> the filter just by setting the RST in the initial SYN packet

True, which is why if you are relying on ACL's as your only line of 
defense you are better off doing a:

ip access-list extended filterout
permit tcp 219.80.71.0 0.0.0.255 any reflect tcp-state

ip access-list extended filterin
evaluate tcp-state

Yes you will take a bigger performance hit with reflexive filters, but
it's worth it if it's your only line of defense. 

HTH,
C 



[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux