mailing list archives
Re: Ambiguities in TCP/IP - firewall bypassing
From: cbrenton () slartibartfast pa net
Date: Sat, 19 Oct 2002 13:20:47 -0400 (EDT)
On Sat, 19 Oct 2002, Florian Weimer wrote:
As a result of this bug, it's quite complicated (if not impossible in
some configurations) to properly filter connection attempts to Linux
hosts on Cisco IOS routers.
Actually, not really provided you are IOS 11.3 or higher.
If your access list is a whitelist with a "permit tcp any any
established" statement somewhere, it's very likely that you can bypass
the filter just by setting the RST in the initial SYN packet
True, which is why if you are relying on ACL's as your only line of
defense you are better off doing a:
ip access-list extended filterout
permit tcp 184.108.40.206 0.0.0.255 any reflect tcp-state
ip access-list extended filterin
Yes you will take a bigger performance hit with reflexive filters, but
it's worth it if it's your only line of defense.
Re: Ambiguities in TCP/IP - firewall bypassing Florian Weimer (Oct 19)
Re: Ambiguities in TCP/IP - firewall bypassing David Wagner (Oct 19)
RE: Ambiguities in TCP/IP - firewall bypassing Ofir Arkin (Oct 22)