Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 5 Oct 2014 11:33:38 -0400
From:      el kalin <kalin@el.net>
To:        freebsd-net <freebsd-net@freebsd.org>, freebsd-users@freebsd.org,  freebsd-security@freebsd.org
Subject:   Re: remote host accepts loose source routed IP packets
Message-ID:  <CAMJXockiQ%2B0gFbxSY43OyMbNqTjdzR1i16w%2Byiqmm=cQ8HR=pQ@mail.gmail.com>
In-Reply-To: <CAMJXoc=5gs17ZgQ7LYALwKFRPN5hQ38OOuBtDk=EjZzi82EFMA@mail.gmail.com>
References:  <CAMJXoc=s=Ud52NJ0dbK-6qKEcszbni4bi1MA8mgRtQSo=2Uuyw@mail.gmail.com> <CAMJXoc=5gs17ZgQ7LYALwKFRPN5hQ38OOuBtDk=EjZzi82EFMA@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
should is submit this as a bug?



On Sun, Oct 5, 2014 at 2:04 AM, el kalin <kalin@el.net> wrote:

> hi again=E2=80=A6  i have disabled the icmp pings=E2=80=A6  same result..=
.
>
> currently:
>
> /etc/pf.conf:
>
> tcp_in =3D "{ www, https }"
> udp =3D "{ domain, ntp, snmp }"
> ping =3D "echoreq"
>
> set skip on lo
> scrub in
> antispoof for xn0 inet
> block in all
> pass out all keep state
> pass out inet proto udp from any to any port 33433 >< 33626 keep state
> pass proto udp to any port $dup
> ### pass inet proto icmp all icmp-type $ping keep state
> pass in inet proto tcp to any port $tcp_in flags S/SAF synproxy state
> pass proto tcp to any port ssh
>
>
> # sysctl -a | grep sourceroute
> net.inet.ip.sourceroute: 0
> net.inet.ip.accept_sourceroute: 0
>
> in /etc/defaults/rc.conf:
>
> forward_sourceroute=3D"NO"
> accept_sourceroute=3D"NO"
>
>
> what am i missing? this is pretty important=E2=80=A6.
>
> thanks=E2=80=A6..
>
>
>
> On Sat, Oct 4, 2014 at 11:46 PM, el kalin <kalin@el.net> wrote:
>
>>
>> hi all=E2=80=A6
>>
>> i'm setting up a freebsd 10 on aws (amazon) to be as secure as possible=
=E2=80=A6
>> i used openvas to scan it and pretty much everything is fine except this=
:
>>
>>  "The remote host accepts loose source routed IP packets.
>> The feature was designed for testing purpose.
>> An attacker may use it to circumvent poorly designed IP filtering
>> and exploit another flaw. However, it is not dangerous by itself.
>>  Solution:
>>  drop source routed packets on this host or on other ingress
>> routers or firewalls."
>>
>> there is no "other ingress routers or firewalls." except the AWS
>> "security group" which only has open ports 80, 443 and 22 and allICMP fo=
r
>> pinging...
>>
>> on the instance itself i have this already set up...
>>
>> in /etc/sysctl.conf i have:
>>
>> net.inet.ip.accept_sourceroute=3D0
>>
>> in /etc/derfaults/rc.conf i got:
>>
>> accept_sourceroute=3D"NO"
>>
>>
>>  # sysctl -a | grep accept_sourceroute
>> net.inet.ip.accept_sourceroute: 0
>>
>> i also have a pf enabled locally pretty much with the same ports as the
>> security group. can i use pf to drop those packets?
>>
>> how do i drop the source routed packets?
>> without this i can't pass a pci scan=E2=80=A6
>>
>> thanks...
>>
>>
>>
>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAMJXockiQ%2B0gFbxSY43OyMbNqTjdzR1i16w%2Byiqmm=cQ8HR=pQ>