On Tue, 2003-12-02 at 19:39, Tom Eastep wrote:
> On Tue, 2 Dec 2003, Tom Eastep wrote:
> > Shorewall currently does no checking for spoofed output packets (and
> > probably won't in the future).
> 
> By "output", I mean packets originating on the firewall itself. If the
> firewall system itself is rooted, then what that system's packet filter
> does in response is immaterial and any firewall designer who worries about
> that problem is an idiot.

Tom,
Agreed.

> In terms of traffic passing through a Shorewall firewall, Shorewall itself
> has no concept of "input" and "output" or "inside" or "outside". So the
> Shorewall-generated ruleset applies exactly the same checks on all traffic
> being forwarded by the firewall system regardless of which direction you
> perceive the traffic as flowing (assuming that you apply options like
> 'routefilter' symetrically).

Ah. This is what I was looking for. So, there is probably a rule that
can be generated to stop spoofed packets from egressing the protected
LAN.

Thanks for the information. As usual it was helpful and timely. :-)

-- 
Mike Noyes <mhnoyes at users.sourceforge.net>
http://sourceforge.net/users/mhnoyes/
SF.net Projects: ffl, leaf, phpwebsite, phpwebsite-comm, sitedocs



-------------------------------------------------------
This SF.net email is sponsored by OSDN's Audience Survey.
Help shape OSDN's sites and tell us what you think. Take this
five minute survey and you could win a $250 Gift Certificate.
http://www.wrgsurveys.com/2003/osdntech03.php?site=8
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to