Pieter Donche wrote:

>  > Depends on how you set it up. If you set MACLIST_DISPOSITION=ACCEPT then
>>  you might only add entries in /etc/shorewall/maclist for those that are
>>  manually set -- specify both MAC and IP ADDRESS.
>
>But if I would use MACLIST_DISPOSITION=ACCEPT and only record entries for
>those that are manually set (2.), wouldn't this leave the possibility open
>that a user manually sets in his PC an IPaddress which is already
>reserved in our DHCP server (case 1.) for someone elses PC, causing the
>trouble that the DHCP server will not hand out that IP to the rightfull
>'owner' when that IP is in use ... (as I mentionned in my initial mail)

Personally I would suggest that rather than trying to do this in the 
firewall, you set up some form of monitoring to compare ARP tables 
against a predefined list. This can be done (in some cases) by 
querying switches, or by checking the ARP table on some host in the 
network (which can be your firewall - or any other host that the 
device would need to communicate with before getting internet access).

I think it might be easier doing it that way - so you can write your 
own scripts to work as you want, rather than trying to force a 
general purpose tool to do what you want. It shouldn't be hard to 
query the ARP table, compare each entry to a predefined list 
(generated from the same source data that you generate your DHCP 
config from), and flag up any bad entries. Once you've flagged up a 
rogue entry, then you still have to do something - you could block it 
by blacklisting the MAC address in Shorewall, or send an email to an 
administrator, or both, or something else. Whatever you do, human 
intervention is going to be required to track down and "fix" the 
problem - typically by "educating" the user on the error of his ways.

Until you have fixed the problem, then the other user who's IP 
address has been hijacked will still not be able to work on the 
network - unless you run a fully managed network and are able to 
isolate the rogue device at it's local network switch (again 
something you won't achieve from a Shorewall config).

>But I want to avoid that a visitor for only a few days, would need to ask
>me to record his Mac address.

Have a separate pool for visitors, and exclude those addresses from 
your checking scripts.



At work we had a related issue. Someone setup a new device for the 
outside network (we offer hosting services amongst other things) and 
chose an address that was already in use*. It took some time before I 
was able to work out what had happened and correct the situation, and 
meanwhile a customer was "a tad upset" that his IP phone system was 
down.

I've since added monitoring in our Nagios system to check the ARP of 
every IP address (including all the empty addresses) on our outside 
network and raise alerts whenever a MAC address 
changes/appears/disappears. It takes a little effort to keep 
everything up to date, but a lot less than trying to track down 
problems after they've happened ! It also means that we now have a 
complete inventory of devices on the network which we didn't have 
before.

* He pinged it first, but of course, many devices these days don't 
respond to pings in some futile attempt to avoid being "seen" and 
attacked.

-- 
Simon Hobson

Visit http://www.magpiesnestpublishing.co.uk/ for books by acclaimed
author Gladys Hobson. Novels - poetry - short stories - ideal as
Christmas stocking fillers. Some available as e-books.

------------------------------------------------------------------------------
OpenSolaris 2009.06 is a cutting edge operating system for enterprises 
looking to deploy the next generation of Solaris that includes the latest 
innovations from Sun and the OpenSource community. Download a copy and 
enjoy capabilities such as Networking, Storage and Virtualization. 
Go to: http://p.sf.net/sfu/opensolaris-get
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to