Ok, so recently Glynn made a comment about using the -b switch in ipfwadm
(which also applies to ipchains). So, with an open mind I reviewed my
firewall rules.

And I noticed something :). Consider this example:

ipchains -A input -j ACCEPT -i ppp+ -s 0/0 domain -p udp 

My philosophy behind this is since udp is connectionless, I can't use the
'! -y' notation (SYN cleared, ACK |& FIN set) to allow replies back into
my localnet, I have to allow for the following:

local machine sends DNS request via udp from a random port to port 53 on
   an outside DNS server (no firewall rules apply, I have very few output
   chain rules). 
outside DNS server sends a reply back from port 53 to 
   localhost:randomport (the above rule would allow this to happen)

Now, the problem I see is that suddenly, ANY udp port locally is now
accessable as long as it originates from port 53 on the outside. This is a
massive security hole as far as I'm concerned.

What can be done about this? Suggestions? Comments? ... Glynn? :)

G'day!

--                                          n i c h o l a s  j  l e o n
  /  elegance through simplicity   / 
 /  good fortune  through truth   /          http://mrnick.binary9.net
/ not all questions have answers /          mailto:[EMAIL PROTECTED]
 

-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]

Reply via email to