Query: iptables Conflict Policy Avoidance/Reduction

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Dear all,

Configuring a larger firewall policy is error prone. Rules can be redundant to others, rules can be shadowed by proceeding rules whereby they are never activated and so forth.

How do conflicts arise when the iptable rules use the NIC interface option.

Simple Redundancy example:

Internet ---> (eth1)Firewall ---> Web Server
Intranet ---> (eth0)

Firewall with two interfaces eth1 (Internet facing) and eth0 (Intranet LAN facing), eth+ is the wildcard for both.

Rule 1: iptables -A FORWARD -i eth+ -s 0/0 -d 192.168.1.2 --dport 80 -j ACCEPT
Rule 2: iptables -A FORWARD -i eth+ -s 192.168.1.0/24 -d 192.168.1.2 --dport 80 -j ACCEPT

In the above scenario, Rule 2 is REDUNDANT to Rule 1 in that, the source IP of Rule 2 is covered by the source IP of Rule 1.

However, aren't these generic style rules not considered *best practice* given that the above rules when applied to all interfaces could allow IP Spoofing of reserved IP address range 192.168.1.0/24

So in order to avoid spoofing, one has to create the following two rules and apply them to specific interfaces.
iptables -A FORWARD -i eth1 -s 0/0 -d 192.168.1.2 --dport 80 -j ACCEPT
iptables -A FORWARD -i eth0 -s 192.168.1.0/24 -d 192.168.1.2 --dport 80 -j ACCEPT


Simple Shadowed example:

Internet ---> (eth1)Firewall ---> Web Server
Partner ---> (eth1) Firewall ---> VPN Server

Default Policy: iptables -P FORWARD DROP
Rule 1: iptables -A FORWARD -i eth1 -s 0/0 -d webIP --dport 80 -j ACCEPT
Rule 2: iptables -A FORWARD -i eth1 -s 0/0 -d vpnIP --dport 22 -j DROP
Rule 3: iptables -A FORWARD -i eth1 -s partnerIP -d vpnIP --dport 22 -j ACCEPT

Rule 2 blocks the intended partners access via Rule 3. A simple swap of rule 2 and rule 3 prevents this. But why bother with Rule 2 in the first place, given the default policy is DROP and so there is no way for anyone else other than the partners to get access (Rule 3). Looking at various example policies on the web, I find that there are explicitly defined DROP rules in conjunction with ACCEPT rules like rules 2 and 3 above. Its as if, one does not trust the default policy.

I am just wondering, if all rules are applied to specific Interfaces, specific destination IP address, specific destination ports and some trust in the default policy would a lot of the possible policy conflicts be ruled out?

If anyone could provide me with some scenarios/examples to the contrary that would be great.

It would even be better if I could get a hold of some real firewall policies (anonymised internal IP ranges of course).

I have done some formal modelling on detecting conflicts with more complex scenarios then above on an already defined policy.

But lately its dawning on me that formal synthesis or creation of rules *may* completely rule out such conflicts. Of course the assumption is that you begin with an empty rule-less policy.

For example (trivial scenario):
Using formal logic to generate iptables syntax based on the fact that its best practice to allow both public and lan ip addresses access to the public web server.

Inface  SrcIP   SrcPort  DstIP  DstPort Target
eth1    anyIP   >1024    webIP    80    Accept
eth0    lanIP   >1024    webIP    80    Accept

Where the above is much better than:
SrcIP   SrcPort  DstIP  DstPort Target
anyIP   >1024    webIP    80    Accept

And where the above is much better than:
SrcIP   SrcPort  DstIP  DstPort Target
anyIP   >1024    dmz    80    Accept

It appears to me at least, that creating rules to be more specific than generic, while it increases the number rules, is probably a better solution more likely to be free of conflicts.

Again all feedback is welcome. Perhaps reality is not as black and white!

regards,
Will.
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux