Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 8 Oct 2001 19:20:05 -0700 (PDT)
From:      tburgess@whitley.unimelb.edu.au
To:        freebsd-bugs@FreeBSD.org
Subject:   Re: kern/31130: ipfw tee functionality causes malfunction and security hole
Message-ID:  <200110090220.f992K5X47373@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
The following reply was made to PR kern/31130; it has been noted by GNATS.

From: tburgess@whitley.unimelb.edu.au
To: cristjc@earthlink.net, tburgess@whitley.unimelb.edu.au
Cc: freebsd-gnats-submit@FreeBSD.ORG,
	tburgess-sent@whitley.unimelb.edu.au
Subject: Re: kern/31130: ipfw tee functionality causes malfunction and security hole
Date: Tue, 9 Oct 2001 12:15:52 +1000 (EST)

 OK, sorry for the cloudy explanation.
 
 Yeah ipfw says the packet is accepted.  But what i mean is:
 
 We have a machine with interfaces 203.5.71.6, 10.0.0.1 and others.  
 It forwards packets between the inside network and outside network, 
 through natd.  It also runs a webserver, squid proxy etc.
 
 if 10.0.1.53 (me) tries to access a webpage, say 64.1.2.3:80.  The 
 packet actually gets accepted by the apache server on the gateway 
 machine!!
 
 So the packet is 'accepted' but not in the normal sense of the 
 firewall 'accepting' the packet.  It's original destination is just 
 completely ignored.
 
 The daemon listening on 8665 is a traffic accounting program I have 
 written.  It does not inject any packets back into the socket.  In 
 fact, the behaviour is reproducible even when the userspace program 
 is not running (ie the packets from the tee are getting blackholed).
 
 Hope this helps to clarify things...
 
 I'll see if I can get a tcpdump of the behaviour in a few days.  
 Since it's a relatively important machine, I'll have to set up the 
 firewall rules to only create the problem for me and then do it.
 
 Thanks for your help,
 
 Tim
 
 
 ---- Original Message ----
 From:		Crist J. Clark
 Date:		Mon 10/8/01 20:24
 To:		Tim Burgess
 Cc:		freebsd-gnats-submit@FreeBSD.ORG
 Subject:	Re: kern/31130: ipfw tee functionality causes 
 malfunction and security hole
 
 On Mon, Oct 08, 2001 at 02:14:18AM -0700, Tim Burgess wrote:
 
 [snip]
 
 > >Description:
 > It looks to me like using the ipfw 'tee' function on incoming 
 packets actually accepts the packets as destined for the localhost.  
 Hence a rule such as:
 > 
 > 600 tee 8665 ip from any to any in
 > 
 > Means that anyone browsing the web on the subnet behind the gateway 
 sees the gateway machine's webserver no matter which url they enter.  
 www.hotmail.com/wi actually goes to www.whitley.unimelb.edu.au/wi !
 
 I am not sure what you are saying here. The fact that the original
 packet is accepted is clearly documented in ipfw(8). Not ideal
 behavior, but documented behavior. As for this issue where you believe
 that you have redirected packets, what is listening on 8665/divert?
 Can we see a tcpdump(8) of this behavior?
 -- 
 Crist J. Clark                           cjclark@alum.mit.edu
                                          cjclark@jhu.edu
                                          cjc@freebsd.org
 

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200110090220.f992K5X47373>