Fw: IPtables (resend)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



----- Original Message -----
From: "Jet" <yenjet.chan@eglobal.com.my>
To: "Miguel Amador L." <amador@puc.cl>
Cc: <netfilter-request@lists.netfilter.org>
Sent: Monday, January 20, 2003 11:00 AM
Subject: Re: IPtables


> (sorry, I don't speak spanish)
>
> What i do to mitigate the problem are as below:
>
> iptables -A INPUT -i eth0 -p tcp ! --syn -m state --state NEW -j DROP
>
> where eth0 is my network interface that face outside.
> I still don't know if this will break any protocol (or service) to work
> properly.
> So far, it seems to work for my testing.
>
> Basically, here is how I test my firewall (A.B.C.1)
> My firewall have a rule to allow incoming HTTP connection to my web server
> (A.B.C.8)
> At my firewall, I run a tool called iptstate to show me the connection
state
> on the firewall.
> First I try with normal SYN connection.
> hping -c 1 -S -a spoof.ip -p 80 A.B.C.8
>
> Then, the tool, iptstate shows SYN_SEND, and immediately changed to
SYN_RECV
> The TTL is set to one minute. This is good.
> And this is correct state that firewall suppose to have.
>
> Next, I try to do some evil test
> hping -c 1 -A -a spoof.ip -p 80 A.B.C .8
>
> Now,  the tool, immediately shows the state of the connection as
ESTABLISHED
> and having the
> TTL as 120 hours. This is bad because this is a packet that have the state
> "NEW" with only "ACK"
> tcp flag been turned on.
>
> Imagine, it an attacker spoof with a lot of IP addresses (maybe >10K) of
> this type of packets, then
> the firewall will filled up with all unnecessary packets that expire after
> 120 hours.
> This means a DOS attack to your firewall.
>
> I've experienced a performance slow down becasue of this.
>
>  - Jet
> Security Analyst
>
> email: jchan@trusecure.com
>
>
>
> ----- Original Message -----
> From: "Miguel Amador L." <amador@puc.cl>
> To: "Jet" <yenjet.chan@eglobal.com.my>
> Sent: Friday, January 17, 2003 10:47 PM
> Subject: Re: IPtables
>
>
> > Hi, i have the same problem, and i had to make a DMZ , on other ip range
> for
> > work with servers. (it is the correct way)
> >
> > but i know that may be can with combining DNAT and SNAT, but i don't
want
> > probe.
> >
> > if you be can do it... plase , tell me how are you do it..
> >
> > SAlu2
> > Miguel
> >
> > PS: speak spanish ?
> >
> >
> > Jet writes:
> >
> > > Can anyone pls verify that whether iptables is vulnerable to the
> following
> > > bugtraq ID?
> > >
> > > http://www.securityfocus.com/bid/6534
> > >
> > > Base on my testing (1.2.7a), it is vulnerable too.
> > >
> > >  - Jet
> > > Security Analyst
> > >
> > > email: jchan@trusecure.com
> > >
> > >
> > >
> >
> >
> >
>



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux