JS Wong wrote:
   For the firewalls I've played with, at least, stateful inspection doesn't
   work for the UDP protocol because it's connectionless. Stateful inspection
   allows traffic to be initiated only in one direction, e.g. by allowing only a
   request from a transient port (above 1023) to port 80, client to server, this
   prevents someone from tunneling a connection through an otherwise legitimate
   connection (for web access) by initiating the connection first from the
   attacker's port 80 to a user's transient port. If I'm not mistaken, stateful
   inspection knows the "direction" of the traffic initiation by checking out a
   three-way TCP handshake. UDP doesn't have such handshaking procedure, hence
   any UDP traffic that needs to be allowed through a stateful packet filter has
   to be "stateless", e.g. for DNS, you have to have two filter lines - Client
   to server: UDP>1023 to UDP=53, and server to client: UDP=53 to UDP>1023. I
   hope this helps.

   Regards,

   JS Wong

   Swamy Patil wrote: can any one answer this question about stateful inspection
   State tables are maintained and checked against SYN,FIN,ACK etc..  but what
   about UDP does it just check against rule base and then give a green
   orredsignal based on the rule base itself? ThanQ all those giving the reply
   for earlier mail

There is a way to get a pseudo state with UDP by using the IP Identifier with
the source port field to make a key for your state table, This works for UDP
services that allow an ephemeral source port and don't mangle IP identification
on reply.


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to