Re: Rejecting udp

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



----- Original Message -----
From: "Michael K" <micke@klintan.se>
To: <netfilter@lists.netfilter.org>
Sent: Monday, March 03, 2003 6:28 PM
Subject: Rejecting udp


> I saw this rule someware on the net.
> $IPTABLES -A FORWARD -o $EXTERNALIF -p udp --dport 137 -j REJECT
>
> Whats the use to use reject on a UDP packet? Isn't udp connection-less
> A more correct shouldn't that be "-j DROP"? Or am I thinking wrong here?
>
> Regards Klintan
>

First of all: This has little to do with TCP or UDP (or connection-less
stuff).

Many firewalls have a policy to drop packets coming from the outside when
nothing on the inside has started communicating to the internet (outside).
But, port 137 is part of the SMB (filesharing) protocol. It starts inside
your network, broadcasting that services are available. The firewall will
see this as legitimate traffic, since it started on the inside.
If you wouldn't block port 137, you'd be broadcasting to the internet that
you have filesharing enabled on your network, thereby opening up port 137 to
the internet, as the firewall sees no danger.
The next step for a cracker would be easy, get into your filesharing
network, steal passwords or worse...
Simply: Things that "You Don't Want to Happen" (TM).

Short answer: You do want to filter port 137 (and 138/139).

A good approach is to block all traffic to the firewall/internet from the
inside, then open op ports (POP, SMTP, HTTP and other services) as needed,
but no more then what's needed.

HTH,
Willem



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux