Home page logo

oss-sec logo oss-sec mailing list archives

Re: Attack on badly configured Netfilter-based firewalls
From: Eric Leblond <eric () regit org>
Date: Sat, 25 Feb 2012 23:16:06 +0100


On Sat, 2012-02-25 at 21:10 +0100, Yves-Alexis Perez wrote:
On sam., 2012-02-25 at 19:37 +0100, Eric Leblond wrote:
An attacker on a local network can open some pinholes in a firewall
which is not correctly protected.
None, the issue has to be fixed in the firewall configuration.
Apply a strict anti-spoofing policy for IPv4 and IPv6 as described in
the document "Secure use of iptables and connection tracking helpers" 
This document was written after private disclosure of the attack to the
Netfilter's team.

Did you check how the various frontends to iptables (ferm, ufw,
shorewall and the gazillon others)? They might generate an “insecure”
ruleset and might be candidate to a fix.

I've done some research on various frontend to iptables. Most of them
were secure for IPv4 but the IPv6 case was more complicated. But given
the fact there is a gazillon of them this was difficult to check them
all. On Netfilter side, we've decided  to publish the document
explaining how to secure helpers to explain how to fix this. It was some
months ago and I hope it has been read.

I've contacted the frontend developers and Netfilter/Linux firewalls
vendors I knew to have them test their software/equipment. I've started
this some months ago. I've also tried to contact the various CERT but
they refused to handle the case or did not reply to my requests. 

Eric Leblond 
Blog: http://home.regit.org/

Attachment: signature.asc
Description: This is a digitally signed message part

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]