Re: Blocking direct private IP address

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



From: Jan Engelhardt <jengelh@xxxxxxxxxxxxxxx>
To: Andrew Kraslavsky <andykras@xxxxxxxxxxx>
CC: netfilter@xxxxxxxxxxxxxxxxxxx
Subject: Re: Blocking direct private IP address
Date: Thu, 1 Mar 2007 00:35:14 +0100 (MET)


On Feb 28 2007 15:20, Andrew Kraslavsky wrote:
>
> If I set up a host on the external/public network with a static route that
> causes it to send traffic addressed to 192.168.0.0/24 to the 10.0.0.1
> external/public IP address of the firewall/router and then attempt to access > the Web server using 192.168.0.99 as the address, these directly addressed
> packets get through the firewall.

I did not find the question in your mail, but:

Activate "rp_filter", and any hosts on 10.0.0.0/24 that uses a
non-10.0.0.0/24 address as source will be ignored.


Jan
--

Thanks for the pointer but the question here is about the destination IP address, not the source.

When I create the DNAT rule, the private IP address to which I want my public address to map suddenly becomes directly accessible to hosts on the public network.

I.e. I want hosts on the public network to _have_to_ send traffic to the public IP of 10.0.0.1 but, after adding that rule, they can actually send traffic to that address _AND_ also directly to the private IP address of the Web server at 192.168.0.99.

_________________________________________________________________
Find a local pizza place, movie theater, and more?.then map the best route! http://maps.live.com/?icid=hmtag1&FORM=MGAC01



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux