Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 14 May 2001 22:06:10 +0700
From:      Igor Podlesny <poige@morning.ru>
To:        freebsd-security@FreeBSD.ORG
Subject:   Re[2]: ipfw rules and securelevel
Message-ID:  <19322552168.20010514220610@morning.ru>
In-Reply-To: <10320318256.20010514212856@morning.ru>
References:  <Pine.LNX.4.33.0105141802230.18115-100000@apsara.barc.ernet.in> <10320318256.20010514212856@morning.ru>

next in thread | previous in thread | raw e-mail | index | archive | help

>> Dear friends,
>>         Even in securelevel 3 I can bypass ipfw rules. In securelevel 3 I
>> as root can change the variable "net.inet.ip.fw.enable" using sysctl. When
>> I run a command

>>         sysctl -w net.inet.ip.fw.enable=0

>>         It disables the ipfw rules.

>> Is it a feature or hole in freebsd.

> doesn't matter how it is called, only matters how it hurts... (it does)

>> please help

the "patch" (hard to call it a patch, but nevertheless) is adding
CTLFLAG_SECURE to the relevant definition of the node:

this diff out is for 3.5 stable:

92c92
< SYSCTL_INT(_net_inet_ip_fw, OID_AUTO, enable, CTLFLAG_RW,                
---                                                                        
> SYSCTL_INT(_net_inet_ip_fw, OID_AUTO, enable, CTLFLAG_RW|CTLFLAG_SECURE, 

-- 
 Igor                            mailto:poige@morning.ru



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19322552168.20010514220610>