Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Jewfish (jewfishjewfish.net)
Date: Sat Jun 23 2001 - 14:32:24 CDT
These are the rules I have come up with on my own firewall to disable
tracerouting and pinging (something which might not be for everybody),
but allows me to traceroute and pring from the host and recieve all the
allow icmp from any to any in recv ep0 icmptype 0,3,11,14,16,18
allow icmp from any to any out xmit ep0 icmptype 8
ep0 being, of course, my external interface. This seems to qork quite
well for me. Some other ideas were brought up about denying the
"time-to-live-exceeded" icmptype (11) because of packets that may take a
long time to reach the host. However, this is the easiest method I
could come up with using firewall rules.
Obviously, these rules also deny ping traffic, which is not recommended
for everyone. However, I have recently gotten a lot of ping floods, so
I enacted this (possibly on a temporary basis) to deal with this, while
still allowing me to ping out (icmptype 8) and recieve the replies
Igor Podlesny wrote:
>>is it possible to disable using ipfw so people won't be able to traceroute
>Yes, of course.
>You should know how do traceroute-like utilities work.
>The knowledge can be easily extracted from a lot of sources, for e.g.
>from Internet, cause you seem to be connected ;) but, it also should
>be mentioned that man pages coming with FreeBSD (I guess as well as
>with other *NIX-likes OSes) also describe the algo.
>so man traceroute says, that it uses udp ports starting with 33434 and
>goes up with every new hop. but this could be easily changed with -p
>option. Besides, windows' tracert works using icmp proto, so the
>decision isn't here. It lies in what does the box do when answering to
>them. It does send 'time exceeded in-transit' icmp message cause TTL
>value is set too low to let the packet jump forward. So it is the
>answer -- you should disallow it with your ipfw. for e.g. using such
>deny icmp from any to any icmptype 11
>(yeah, you should carefully think about whether or not to use ANY
>cause if you're box is a gateway other people will notice your
>cutting-edge knowledge cause it will hide not only your host ;)
>This is not the end, alas. unix traceroute will wait for port unreach
>icmp so after meeting, it stops and displays the end-point of your
>trace. Windows' tracert will wait for normal icmp-echo-reply for the
>same purpose. So if you also wish to hide the end point, you need to
>disallow this also. I bet you can figure out the way how by yourself,
>P.S. there are also other ways (even more elegant) of doing that in
>practice... they called 'stealth routing' and can be implemented via
>FreeBSD kernel mechanism (sysctl + built-in kernel support) or with
>read the man pages, man, they are freely available...
To Unsubscribe: send mail to majordomoFreeBSD.org
with "unsubscribe freebsd-security" in the body of the message