Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 30 May 2000 09:48:59 -0700 (PDT)
From:      Archie Cobbs <archie@whistle.com>
To:        krentel@dreamscape.com (Mark W. Krentel)
Cc:        freebsd-ipfw@FreeBSD.ORG
Subject:   Re: rc.firewall rule 200
Message-ID:  <200005301648.JAA32109@bubba.whistle.com>
In-Reply-To: <200005290407.AAA20103@dreamscape.com> from "Mark W. Krentel" at "May 29, 2000 00:07:29 am"

next in thread | previous in thread | raw e-mail | index | archive | help
Mark W. Krentel writes:
> Last week, I asked about some of the rc.firewall rules.  I've looked
> at them in more detail and I have a few more comments.  I apologize in
> advance if I'm being dense about this.
> 
> (1) My conclusion is that rule 200 doesn't really add anything for
> security.
> 
>    ${fwcmd} add 100 pass all from any to any via lo0
>    ${fwcmd} add 200 deny all from any to 127.0.0.0/8
> 
> Now, I realize that anything matching rule 200 cannot possibly be
> legitimate, and that's reason enough to deny it.  But the claim was
> that someone on the same network could circumvent the firewall by
> using the machine's 127.0.0.1 address, as in the following attack.
> 
>    ifconfig lo0 down delete
>    route add 127.0.0.0 <your-machine-ip-address>
>    telnet 127.0.0.1
> 
> I don't see where this attack accomplishes anything.  An outside
> packet destined for 127.0.0.1 must first enter on an interface other
> than loopback.  At that point it's confronted with the same rules
> whether it's destined for 127.0.0.1 or the machine's legit address.
> The point is that a hacker can just as easily use the machine's legit
> address and face the same set of rules.

But.. sometimes sensitive services are running bound (only) to the address
127.0.0.1, and there are no firewall rules to protect them, because
normally none are needed. By doing the 'route add ..' trick an adversary
can negate this assumption. If you happen to be relying on it, you're
in trouble.

As an example, you have to look no farther than FreeBSD two years ago:

  http://www.freebsd.org/cgi/cvsweb.cgi/src/etc/rc.firewall (revision 1.19)
  http://www.FreeBSD.org/cgi/query-pr.cgi?pr=6406

-Archie

___________________________________________________________________________
Archie Cobbs   *   Whistle Communications, Inc.  *   http://www.whistle.com


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ipfw" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200005301648.JAA32109>