A moment of silence for a fallen comrade...

2004-12-09 Thread James Cammarata
I'd just like to have a moment of silence for my company's OpenBSD firewall
It has served us well for over a year (no intrusions is well isn't it?), 
but the powers that be are demanding we actually install the Cisco PIX that 
we bought a couple of months ago.  So this weekend we're throwing the 
switch on the super reliable whitebox we've been using to guard our company 
and installing the PIX.  My coworker and myself both use OpenBSD for our 
home networks so not all is lost, hopefully in the future we'll be able to 
swing the pendulum back our way again :)

James Cammarata
[EMAIL PROTECTED]
www.sngx.net
home: 314-966-5976
work: 314-872-2426
cell: 314-409-0583
__
Out the Ethernet, through the router,
down the fiber, off another router,
down the T1, past the fire-wall
..nothing but Net


Re: Internal IP Address Detection Through NAT

2004-12-09 Thread Jason Opperisano
On Wed, 2004-12-08 at 14:34, messmate wrote:
 This is correct.  Squid by default includes a X-Forwarded-For: header
 on each HTTP request showing the original requesting IP address.  This
 can be disabled in squid.conf with forwarded_for off.
 
 Sorry, not correct. I'm behind my squid and forwarded on or off the
 header is there !

the X-Forwarded-For header is present whether you set the
forwarded_for directive to on or off--the difference is that with
it set to off the header reads:

X-Forwarded-For: unknown\r\n

which would rule it out as the source of the IP leak that the OP is
asking about.

you can also control what is shown in the Via header by setting the
visible_hostname directive.  again--ruling out squid as the source of
the leak...

oh--and if the Via:  header bugs you:

header_access Via deny all

works without and recompile...  as does:

header_access X-Forwarded-For deny all

-j

--
Oh, so they have internet on computers now!
--The Simpsons


Re: Internal IP Address Detection Through NAT

2004-12-09 Thread messmate
On Wed, 08 Dec 2004 19:22:53 -0500
Jason Opperisano [EMAIL PROTECTED] wrote:

On Wed, 2004-12-08 at 14:34, messmate wrote:
 This is correct.  Squid by default includes a X-Forwarded-For:
header on each HTTP request showing the original requesting IP
address.  This can be disabled in squid.conf with forwarded_for
off. 
 Sorry, not correct. I'm behind my squid and forwarded on or off the
 header is there !

the X-Forwarded-For header is present whether you set the
forwarded_for directive to on or off--the difference is that with
it set to off the header reads:

X-Forwarded-For: unknown\r\n


I agree :)

which would rule it out as the source of the IP leak that the OP is
asking about.

you can also control what is shown in the Via header by setting the
visible_hostname directive.  again--ruling out squid as the source of
the leak...

oh--and if the Via:  header bugs you:

header_access Via deny all

Tested and works on openbsd without a recompile :)

works without and recompile...  as does:

header_access X-Forwarded-For deny all

-j
Thanks
mess-mate


Re: A moment of silence for a fallen comrade...

2004-12-09 Thread James Cammarata
At 03:15 AM 12/9/2004, David A. Ulevitch wrote:
It'd probably be smart to just keep the openbsd firewall in place, even
with a blank ruleset, behind the PIX.
A PIX can't handle any traffic once it has a serious ruleset.
-davidu
That is actually our plan down the road.  We're going to have another 
firewall protecting our servers from our user base, and as a second line or 
protection in case of an intrusion.  My boss knows you shouldn't have two 
of the same firewall protecting your network, so we'll definitely be using 
OpenBSD for that.

At 10:54 AM 12/9/2004, you wrote:
What was their reasoning from switching from OBSD -- Cisco?  They weren't
spending enough money? ;)
~M
Apparently.  We had a consulting company come in that has a lot of sway 
with upper management and their big buzzword was Cisco (we're also forced 
to ditch our 3com switches for Cisco's...).  So our steering committee is 
making us do the transition, even though this consulting company did an 
intrusion test on us and got nowhere ;)

James Cammarata
[EMAIL PROTECTED]
www.sngx.net
home: 314-966-5976
work: 314-872-2426
cell: 314-409-0583
__
Out the Ethernet, through the router,
down the fiber, off another router,
down the T1, past the fire-wall
..nothing but Net


Queue name, no error!

2004-12-09 Thread Manuel Pata
PF doesn't notice if I add a queue to a rule with the wrong name.
http_aut should be http_out, and there's no http_aut queue.
pass out on $ext inet proto { tcp, udp } from any to any port www keep 
state queue http_aut

And pf goes on... and on... and on... :-)
Anyway, great packet filter and great documentation! Congratulations!
--
Manuel Pata
pata (ate) alface (dote) de


Re: Internal IP Address Detection Through NAT

2004-12-09 Thread William Culler
Hello,

  Thanks everyone for your comments.  I should have guessed that it
  would be a Java script or something.  I disabled Java in
  Internet Explorer and the site I was talking about was not able
  to get the internal ip address anymore.  Thanks again.

  

-- 
Best regards,
 William  mailto:[EMAIL PROTECTED]