Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 15 Feb 2004 12:19:18 +0300
From:      "Oleg Y. Ivanov" <freebsd@dwec.ru>
To:        <freebsd-ipfw@freebsd.org>
Subject:   Re: Strange leakage of private source addresses w/ipfw and natd
Message-ID:  <006f01c3f3a4$cd109cf0$0305a8c0@oivanovmob>
References:  <3F833434.5090506@tenebras.com><ekx0paff.fsf@ID-23066.news.dfncis.de><020201c39c6e$5f0fea40$080ba8c0@admin> <oes1amix.fsf@ID-23066.news.dfncis.de>

next in thread | previous in thread | raw e-mail | index | archive | help
Ok - it should be blocked and it is blocked.
But some ICMP packets (more precisely - ICMP unreach messages) somehow are
passed to the World not altered from time to time. So actually it's not the
bad ipfw ruleset issue, but NATd itself.


> * 2003-10-27 freebsd@dwec.ru:
> > Ok, maybe not THAT important but definitely a Bad Surprise.  Here's
> > the sample (and in current configuration only ICMP packets from time
> > to time are being passed through unaltered):
> > snort: [1:0:0] POSSIBLE address leakage - ICMP {ICMP} 192.168.5.2 ->
> > 208.115.104.193
> > [**] POSSIBLE address leakage - ICMP [**]
> ICMP is connectionless, so anybody can ping/traceroute/whatever your
> machine if you don't block those private IPs, and this is what people
> usually do.
>
>   clemens
>
> _______________________________________________
> freebsd-ipfw@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-ipfw
> To unsubscribe, send any mail to "freebsd-ipfw-unsubscribe@freebsd.org"
>
>




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?006f01c3f3a4$cd109cf0$0305a8c0>