Firewall Wizards mailing list archives

Re: FW-1 Pasv FTP


From: Mikael Olsson <mikael.olsson () enternet se>
Date: Sat, 12 Aug 2000 02:10:07 +0200



Stefan Norberg wrote:

It has nothing to do with authentication in the Firewall.

Yup.

However, on another note. There's another twist regarding 
authentication and the FTP PASV vulnerabilities... 
(I'm talking FTP server authentication, not firewall authentication) 

Some people listed "do not allow anonymous FTP" as a possible 
work-around against the vulnerabilities.

This would indeed work against the attacks as published.
However, I recently realized that the above workaround buys
you next to nothing.

Watch this :)

telnet ftp.example.dom 21
220 ftp.example.dom FTP server (Version wu-2.6.1(3) Thu Aug 10 12:40:57 MET DST 2000) ready.
user ..........227 get ready for some lovin (10, 0, 0, 1, 0, 23)
331 Password required for ..........227 get ready for some lovin (10, 0, 0, 1, 0, 23).

Oops. This means that you could use the "331" password query to
exploit these vulnerabilities, if the firewall in question doesn't
correctly follow the ENTIRE logon procedure before parsing "227" 
responses. I wonder how many firewalls actually do that :)


$.02 -- I'll stop beating the dead horse now.

/Mike

-- 
Mikael Olsson, EnterNet Sweden AB, Box 393, SE-891 28 ÖRNSKÖLDSVIK
Phone: +46-(0)660-29 92 00         Fax: +46-(0)660-122 50
Mobile: +46-(0)70-66 77 636
WWW: http://www.enternet.se        E-mail: mikael.olsson () enternet se

_______________________________________________
Firewall-wizards mailing list
Firewall-wizards () nfr net
http://www.nfr.net/mailman/listinfo/firewall-wizards


Current thread: