Re: Prevent circumventing dansguardian with pf

2007-05-08 Thread Bruce Bauer
Any working TCP/IP connection can transmit covert data by encoding the data in the sequence numbers. Let's not forget to block/allow new protocols such as described in RFC 1149 On 5/7/07, Open Phugu [EMAIL PROTECTED] wrote: On 5/7/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: From: Sebastian

Re: Prevent circumventing dansguardian with pf

2007-05-07 Thread a666
From: Sebastian Benoit [EMAIL PROTECTED] If you want deny users the possiblility to smuggle data outside of their workplace (or whatever) then don't connect them to the internet. No, no, no. You must go one step beyond this if you want to prevent employees from smuggling data. To do this

Re: Prevent circumventing dansguardian with pf

2007-05-07 Thread Bryan Irvine
On 4/25/07, Allen Theobald [EMAIL PROTECTED] wrote: Greetings! Included below is my pf.conf set up to use dansguardian (proxyport 3128, filterport 8080) and tinyproxy (listen port 3128) as a transparent proxy. What changes do I need to make to keep someone on int_if/int_net from circumventing

Re: Prevent circumventing dansguardian with pf

2007-05-07 Thread Open Phugu
On 5/7/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: From: Sebastian Benoit [EMAIL PROTECTED] If you want deny users the possiblility to smuggle data outside of their workplace (or whatever) then don't connect them to the internet. No, no, no. You must go one step beyond this if you want to

Re: Prevent circumventing dansguardian with pf

2007-05-04 Thread Henning Brauer
* Chad M Stewart [EMAIL PROTECTED] [2007-04-25 19:31]: On Apr 25, 2007, at 11:05 AM, Allen Theobald wrote: pass in inet proto icmp all icmp-type $icmp_types keep state This can be used as a covert communication channel. Allowing internal IPs to send/receive ping is bad. that is the

Re: Prevent circumventing dansguardian with pf

2007-05-04 Thread Open Phugu
On 5/4/07, Henning Brauer [EMAIL PROTECTED] wrote: * Chad M Stewart [EMAIL PROTECTED] [2007-04-25 19:31]: On Apr 25, 2007, at 11:05 AM, Allen Theobald wrote: pass in inet proto icmp all icmp-type $icmp_types keep state This can be used as a covert communication channel. Allowing internal

Re: Prevent circumventing dansguardian with pf

2007-05-04 Thread Henning Brauer
* Open Phugu [EMAIL PROTECTED] [2007-05-04 15:36]: On 5/4/07, Henning Brauer [EMAIL PROTECTED] wrote: * Chad M Stewart [EMAIL PROTECTED] [2007-04-25 19:31]: On Apr 25, 2007, at 11:05 AM, Allen Theobald wrote: pass in inet proto icmp all icmp-type $icmp_types keep state This can be used

Re: Prevent circumventing dansguardian with pf

2007-05-04 Thread Bret Lambert
On Fri, 2007-05-04 at 07:26 -0600, Open Phugu wrote: if you deny icmp, you shall burn in hell You may burn in hell, but ICMP can be used to infiltrate and exfiltrate data: http://www.cs.uit.no/~daniels/PingTunnel/ This looks like it's pretty trivially defeated; bzero()'ing the data

Re: Prevent circumventing dansguardian with pf

2007-05-04 Thread Antoine Jacoutot
On Friday 04 May 2007 15:42:58 Henning Brauer wrote: so can underwear, so let us require everybody to work naked Actually, depending who you work with, this can be a good thing... -- Antoine

Re: Prevent circumventing dansguardian with pf

2007-05-04 Thread Joachim Schipper
On Fri, May 04, 2007 at 07:26:32AM -0600, Open Phugu wrote: On 5/4/07, Henning Brauer [EMAIL PROTECTED] wrote: * Chad M Stewart [EMAIL PROTECTED] [2007-04-25 19:31]: On Apr 25, 2007, at 11:05 AM, Allen Theobald wrote: pass in inet proto icmp all icmp-type $icmp_types keep state This can

Re: Prevent circumventing dansguardian with pf

2007-05-04 Thread Sebastian Benoit
Bret Lambert([EMAIL PROTECTED]) on 2007.05.04 09:47:43 +: This looks like it's pretty trivially defeated; bzero()'ing the data portion of the ICMP echo request/response removes the piggybacked data channel. Then I'll encode my data with the morse over ping protocol. If a user can send any

Re: Prevent circumventing dansguardian with pf

2007-05-04 Thread Jeffrey C. Ollie
On Fri, 2007-05-04 at 09:47 -0400, Bret Lambert wrote: On Fri, 2007-05-04 at 07:26 -0600, Open Phugu wrote: if you deny icmp, you shall burn in hell You may burn in hell, but ICMP can be used to infiltrate and exfiltrate data: http://www.cs.uit.no/~daniels/PingTunnel/ This looks like

Re: Prevent circumventing dansguardian with pf

2007-04-26 Thread Timo Schoeler
On Wed, 25 Apr 2007 16:29:17 -0600 Tobias Weingartner [EMAIL PROTECTED] wrote: On Wednesday, April 25, Timo Schoeler wrote: actually, me thinks the same about allowing/denying ICMP as you, tobias. however, we recently had a CCIE/NSA certified blahblah guy in our company, tuning our,

Prevent circumventing dansguardian with pf

2007-04-25 Thread Allen Theobald
Greetings! Included below is my pf.conf set up to use dansguardian (proxyport 3128, filterport 8080) and tinyproxy (listen port 3128) as a transparent proxy. What changes do I need to make to keep someone on int_if/int_net from circumventing dansguardian by changing their browser to point to

Re: Prevent circumventing dansguardian with pf

2007-04-25 Thread Chad M Stewart
On Apr 25, 2007, at 11:05 AM, Allen Theobald wrote: pass in inet proto icmp all icmp-type $icmp_types keep state This can be used as a covert communication channel. Allowing internal IPs to send/receive ping is bad. As for your question, only allow internal devices to do what you want

Re: Prevent circumventing dansguardian with pf

2007-04-25 Thread Tobias Weingartner
Chad M Stewart wrote: On Apr 25, 2007, at 11:05 AM, Allen Theobald wrote: pass in inet proto icmp all icmp-type $icmp_types keep state This can be used as a covert communication channel. Allowing internal IPs to send/receive ping is bad. Bull. Not allowing ICMP is just as bad.

Re: Prevent circumventing dansguardian with pf

2007-04-25 Thread Timo Schoeler
On Wed, 25 Apr 2007 20:19:42 + (UTC) Tobias Weingartner [EMAIL PROTECTED] wrote: Chad M Stewart wrote: On Apr 25, 2007, at 11:05 AM, Allen Theobald wrote: pass in inet proto icmp all icmp-type $icmp_types keep state This can be used as a covert communication channel. Allowing

Re: Prevent circumventing dansguardian with pf

2007-04-25 Thread Chad M Stewart
On Apr 25, 2007, at 4:19 PM, Tobias Weingartner wrote: Chad M Stewart wrote: On Apr 25, 2007, at 11:05 AM, Allen Theobald wrote: pass in inet proto icmp all icmp-type $icmp_types keep state This can be used as a covert communication channel. Allowing internal IPs to send/receive ping

Re: Prevent circumventing dansguardian with pf

2007-04-25 Thread Timo Schoeler
On Wed, 25 Apr 2007 23:56:50 +0200 Joachim Schipper [EMAIL PROTECTED] wrote: On Wed, Apr 25, 2007 at 10:40:45PM +0200, Timo Schoeler wrote: On Wed, 25 Apr 2007 20:19:42 + (UTC) Tobias Weingartner [EMAIL PROTECTED] wrote: Chad M Stewart wrote: On Apr 25, 2007, at 11:05 AM,

Re: Prevent circumventing dansguardian with pf

2007-04-25 Thread viq
On 25/04/07, Joachim Schipper [EMAIL PROTECTED] wrote: On Wed, Apr 25, 2007 at 10:40:45PM +0200, Timo Schoeler wrote: On Wed, 25 Apr 2007 20:19:42 + (UTC) Tobias Weingartner [EMAIL PROTECTED] wrote: Chad M Stewart wrote: On Apr 25, 2007, at 11:05 AM, Allen Theobald wrote:

Re: Prevent circumventing dansguardian with pf

2007-04-25 Thread Mathieu Sauve-Frankel
I did NOT suggest blocking ALL ICMP, just echo-request and echo- replies from internal hosts to untrusted IPs. Trojans have used echo-request and echo-reply as a method of covert communication. If you had read the original post you'd see that $icmp_types was defined to be echoreq.

OT: Blocking of ICMP type 3 code 4 packets [Was: Prevent circumventing dansguardian with pf]

2007-04-25 Thread chefren
Although it's not well known TCP seriously depends on ICMP packets of type 3 code 4 for Path MTU Discovery (PTMTUD). Blocking of these packets lead to congested IP connections, broken transmissions and thus to frustrated users. Some documentation: http://en.wikipedia.org/wiki/Pmtud

Re: OT: Blocking of ICMP type 3 code 4 packets [Was: Prevent circumventing dansguardian with pf]

2007-04-25 Thread Stuart Henderson
On 2007/04/26 01:01, chefren wrote: Although it's not well known TCP seriously depends on ICMP packets of type 3 code 4 for Path MTU Discovery (PTMTUD). Blocking of these packets lead to congested IP connections, broken transmissions and thus to frustrated users. for PF, 'keep state' on

Re: Prevent circumventing dansguardian with pf

2007-04-25 Thread Stuart Henderson
On 2007/04/26 08:02, Mathieu Sauve-Frankel wrote: I did NOT suggest blocking ALL ICMP, just echo-request and echo- replies from internal hosts to untrusted IPs. Trojans have used echo-request and echo-reply as a method of covert communication. If you had read the original post

Re: Prevent circumventing dansguardian with pf

2007-04-25 Thread Tobias Weingartner
On Wednesday, April 25, Chad M Stewart wrote: I did NOT suggest blocking ALL ICMP, just echo-request and echo- replies from internal hosts to untrusted IPs. And how is this not violating RFCs? Trojans have used echo-request and echo-reply as a method of covert communication. I've you've

Re: Prevent circumventing dansguardian with pf

2007-04-25 Thread Jason Dixon
Tobias Weingartner wrote: Telling people to worry about the door to the barn after the horse has left is not FUD? It's not misdirection? Tell them to solve the root of their problems instead. Don't poo-poo his effort to mitigate information leaks. Did you realize that even LAMP can be used

Re: Prevent circumventing dansguardian with pf

2007-04-25 Thread J.C. Roberts
On Wednesday 25 April 2007 17:48, Jason Dixon wrote: Tobias Weingartner wrote: Telling people to worry about the door to the barn after the horse has left is not FUD? It's not misdirection? Tell them to solve the root of their problems instead. Don't poo-poo his effort to mitigate

Re: Prevent circumventing dansguardian with pf

2007-04-25 Thread Andreas Kaeser
Tobias Weingartner wrote: Chad M Stewart wrote: On Apr 25, 2007, at 11:05 AM, Allen Theobald wrote: pass in inet proto icmp all icmp-type $icmp_types keep state This can be used as a covert communication channel. Allowing internal IPs to send/receive ping is bad. Bull. Not allowing