Hi,
> > It looks like the Netfilter has problems with the NATed
> > icmp-administration messsages. The original IP can be leaked into the
> > public network from the protected area.
[...]
>
> don't forget that ICMP error messages only quote the first 64 bytes of the
> original packet. Adding up IP and TCP headers (both 20 bytes without
> options), you only have 24 bytes of original payload. This might be somewhat
> more in UDP though due to its shorter header.
>
> A full length PORT command is 28 bytes, though a common scenario fits into
> 24 bytes.
>
> I see two solutions:
> * truncate the packet, and remove the payload area of deNATed ICMP messages,
> if the inner header is either TCP or UDP (because in this case we _KNOW_
> what is header and what is payload)
> * don't use packet filtering if separating the two zones is so important
>
> The first one could also be implemented using an ICMPTRIM target in your
> mangle table, which could also trim ICMP echo request/reply payloads. (which
> can easily be used to tunnel a whole IP stack through a firewall)
Ok, I didn't know the IPv4-ICMP RFC. I just sent a special packet with
TCP payload and I got back the payload. It was only a first check.
(In IPv6-ICMP the length-limit is ~1298 bytes, ...)
kisza
--
Andras Kis-Szabo Security Development, Design and Audit
-------------------------/ Zorp, NetFilter and IPv6
[EMAIL PROTECTED] /-----Member of the BUTE-MIS-SEARCHlab------>