Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 4 Jul 2002 04:34:09 -0700
From:      Luigi Rizzo <rizzo@icir.org>
To:        ipfw@freebsd.org
Subject:   RFC: inconsistent behaviour on packets generated by the firewall
Message-ID:  <20020704043409.A26837@iguana.icir.org>

next in thread | raw e-mail | index | archive | help
Hi,
i was looking at the implementation of ipfw rules which generate
a feedback packet back to the source (reset, reject and unreach)
and i realised that there is a potential problem here...
 
Some ICMP packets generated by the host bypass the firewall, but
TCP RST do not, so they can be blocked themselves (this is the way
the old ipfw works, and there is code to prevent loops).

I think policies should be consistent -- either all packets (including
icmps generated by the firewal) should go through the firewall again
(with proper countermeasures to avoid loops), or all packets generated
by the firewall should bypass the firewall and go to the correct
destination.

So, what do we want to do ?

        cheers
	luigi

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ipfw" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020704043409.A26837>