On Mar 5, 20:07, Neil W Rickert wrote:
> I am surprised to see this described as a flaw.  It is behavior I
> have been relying on for some time.  Specifically, on my client
> machines, I add a route to the alternate interface of my servers via
> the direct interface of the same server.  This allows direct
> connection to the server without relying on a router, regardless of
> which IP address is used for the service.  For NFS clients, I
> consider it important to be able to do this.

We use a similar trick to provide failover between internal LANs for
our servers: Every functioning interface announces the 'well-known'
server address via a routing protocol, and the clients either run gated
or rely on a router to pick the best route that they see an
announcement for.

> If there is a flaw, it is surely in the thinking of people who
> mistakenly assumed that multi-homed systems would not behave so as to
> allow this.

I concur totally. Back when I designed security solutions (admittedly
high end) for a living, best practice was that any system with a reason
to distinguish its interfaces must have the less secure one on a
dedicated LAN segment to a real router with antispoofing filters in
place. And that includes commercial firewalls.

(Of course a firewall should by default discard packets arriving at the
wrong interface, but better safe than sorry).

The farm of misconfigured NT web servers should be on a different LAN
interface on the router, so rooting one won't enable an attacker to
install password sniffers or send malformed or misrouted packets to the
firewall/ mail gateway/ whatever.

--
[EMAIL PROTECTED]
ECMWF, Shinfield Park,
Reading, Berks.
RG2 9AX  England

Reply via email to