Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 01 Nov 1999 16:22:37 +0100
From:      sthaug@nethelp.no
To:        adam@algroup.co.uk
Cc:        security@FreeBSD.ORG
Subject:   Re: hole(s) in default rc.firewall rules
Message-ID:  <46576.941469757@verdi.nethelp.no>
In-Reply-To: Your message of "Mon, 01 Nov 1999 15:16:57 %2B0000"
References:  <381DAEE9.75C2EDA5@algroup.co.uk>

next in thread | previous in thread | raw e-mail | index | archive | help
> By setting their source port to 53 or 123, an attacker can bypass your
> firewall and connect to any UDP listener.
> 
> I propose the following alternative:
> 
>     # Block low port incoming UDP (and NFS) but allow replies for DNS,
> NTP
>     # and all other high ports. Allow outgoing UDP.
>     $fwcmd add pass udp from any to ${ip} 123
>     $fwcmd add deny udp from any to ${ip} 0-1023,1110,2049
>     $fwcmd add pass udp from any to any

If you block incoming UDP traffic with source port 53, you have very
effectively blocked answers from all name servers outside your firewall.
Is that what you want to do?

Steinar Haug, Nethelp consulting, sthaug@nethelp.no


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?46576.941469757>