Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 26 Nov 2000 13:43:03 -0800
From:      Doug Barton <DougB@FreeBSD.org>
To:        cjclark@alum.mit.edu
Cc:        Nuno Teixeira <nuno.teixeira@pt-quorum.com>, freebsd-security@FreeBSD.org
Subject:   Re: NATD: failed to write packet back (Permission denied)
Message-ID:  <3A2183E7.6039C582@FreeBSD.org>
References:  <001701c057c4$1e1ac010$0200a8c0@n2> <20001126110756.C34151@149.211.6.64.reflexcom.com> <000b01c057dd$f9423ab0$0200a8c0@n2> <20001126113720.A70192@149.211.6.64.reflexcom.com>

next in thread | previous in thread | raw e-mail | index | archive | help
"Crist J . Clark" wrote:
> 
> On Sun, Nov 26, 2000 at 07:20:41PM -0000, Nuno Teixeira wrote:
> > Hi,
> >
> > I think not. Can you tell me how to add this rule to my ruleset?
> 
> The two rules needed to get UNIX-style traceroutes to work are,
> 
>   Sfwcmd add allow  udp from any to any 33434-33474  out via ${oif}

When I do a traceroute from a freebsd machine outside my firewall to the
firewall machine, I see this:

ipfw: 1200 Deny UDP <outside machine>:38575 <firewall>:33468 in via ep0

ipfw: 1200 Deny UDP <outside machine>:38597 <firewall>:33477 in via ep0
ipfw: 1200 Deny UDP <outside machine>:38597 <firewall>:33478 in via ep0
ipfw: 1200 Deny UDP <outside machine>:38597 <firewall>:33479 in via ep0

Which supports what I've been told that unix traceroute uses udp
packets. It sounds like in order to allow traceroutes through the
firewall you have to open up a pretty big hole for udp...

Doug
-- 
    So what I want to know is, where does the RED brick road go?

	Do YOU Yahoo!?


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3A2183E7.6039C582>