Re: Interesting article about punching holes in firewalls...
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Grant Taylor wrote:
I ran across an interesting article
(http://www.heise-security.co.uk/articles/print/82481) (1) that I
think any and all firewall administrators should take a few moments to
read.
I personally have known that using "-m state --state
ESTABLISHED,RELATED" was not the most secure thing to use for
returning traffic. Namely this will allow you to make a valid
connection to a web server, say to retrieve a picture. Then said web
server could send malicious traffic back to your computer and pass
through your firewall. This is because the traffic coming from the
web server to your computer is now deemed as RELATED. Previously I
have written this off as not needing to worry about this (much) YET.
Yet being the operative word. I have long known that I would,
especially on more secure installs (read not SOHO) need to filter
inbound traffic based on source / destination port. I just have not
thought that it was important enough to do presently for my
clientele. Unfortunately, the day where we do as much filtering on
related traffic as we do on non related traffic may be closer at hand
than we all would like to admit. :(
Well, this only works for UDP, and only if you allow everything out.
Fortunately, on any non-soho setup, you should not allow everything out,
only what you really need to leave the network. problem solved.
(Well the only problem solved is hole punching, not that skype,
messenger, etc can use about any transport that is open. The only thing
they don't do yet is tunnel over DNS I think :-).
HTH,
M4
[Index of Archives]
[Linux Netfilter Development]
[Linux Kernel Networking Development]
[Netem]
[Berkeley Packet Filter]
[Linux Kernel Development]
[Advanced Routing & Traffice Control]
[Bugtraq]