Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 5 Jan 2002 10:56:30 -0800
From:      "Crist J. Clark" <cristjc@earthlink.net>
To:        Joe & Fhe Barbish <barbish@a1poweruser.com>
Cc:        FBSD Questions <questions@FreeBSD.ORG>
Subject:   Re: How to Stop IP spoofing in ipfw
Message-ID:  <20020105105630.A204@gohan.cjclark.org>
In-Reply-To: <LPBBIGIAAKKEOEJOLEGOEEGLCLAA.barbish@a1poweruser.com>; from barbish@a1poweruser.com on Sat, Jan 05, 2002 at 01:21:39PM -0500
References:  <20020104161354.D1205@gohan.cjclark.org> <LPBBIGIAAKKEOEJOLEGOEEGLCLAA.barbish@a1poweruser.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Jan 05, 2002 at 01:21:39PM -0500, Joe & Fhe Barbish wrote:
> So are you recommending keep-state for tcp over 
> dynamic table using setup, established, frag? 

"It depends." That was just what I used in the example.

Stateless packet filtering has many known issues. With a stateless
packet filter, you can still host scan through a firewall. Stateless
packet filters will not stop Ping O' Death and similar (known or
not-yet-known) attacks. Stateless packet filters tend to leave you
pretty wide open when talking about any protocol other than TCP.

That said, if you are using NAT with non-registered addresses, it
makes such attacks more difficult. But they are still quite possible
to "near-by" attackers (e.g. if you are on an untrustd LAN, like a
coaxial cable LAN, there may be some shady characters local to you,
and there are _definately_ clueless people who might have their
computers hijaked by those shady types) unless you remember to block
such attacks,

  ipfw add drop ip from any to $net1:$mask1 in via $oif

Before your divert(4) rule to natd(8). You can combine NAT and a
stateless filter rules to get a stateful firewall (for the machines
behind the firewall, but not the firewall itself).

The plus for stateless filtering is that it is easier and there are
less things that may break or have bugs. It typically isn't practical
for the home user, but one of the best approaches is to put a
stateless packet filter in front of your stateful one for a layered
defense. This is often as simple as putting (stateless) access rules
on an existing border router and then putting a more complex stateful
firewall behind it.
-- 
"It's always funny until someone gets hurt. Then it's hilarious."

Crist J. Clark                     |     cjclark@alum.mit.edu
                                   |     cjclark@jhu.edu
http://people.freebsd.org/~cjc/    |     cjc@freebsd.org

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020105105630.A204>