On 01/09/2013 02:04 AM, Costantino wrote:
> OK, let me provide more info.
> 
>  
> 
> As I discovered, using a rule like the following:
> 
>  
> 
> DNAT       net  fw:$FW_LAN_side:22      tcp     7805
> 
>  
> 
> did not prevent an attacker from going through my Shorewall firewall by
> issuing a command equivalent to the following:
> 
>  
> 
> wget
> "http://<IP-addr>:7805/?-d%20allow_url_include%3DOn+-d%20auto_prepend_file%3D../../../../../../../../../../../../etc/passwd%00%20-n/?-d%20allow_url_include%3DOn+-d%20auto_prepend_file%3D../../../../../../../../../../../../etc/passwd%00%20-n
> HTTP/1.1" 302 527 "-" "curl/7.19.4 (i386-redhat-linux-gnu)
> libcurl/7.19.4 NSS/3.12.2.0 zlib/1.2.3 libidn/0.6.14 libssh2/0.18"
> 
>  
> 
> as I could discover in the /var/log/access.log log file.
> 
> Hence my question about whether there is a feature that allows to
> associate a port to a specific process running on the firewall.
> 
> In this case, for instance, dedicating port 7805 to process sshd.
> 

No -- A packet filter like Netfilter only deals with packet headers, not
the application payload.

-Tom
-- 
Tom Eastep        \ When I die, I want to go like my Grandfather who
Shoreline,         \ died peacefully in his sleep. Not screaming like
Washington, USA     \ all of the passengers in his car
http://shorewall.net \________________________________________________

Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Master Java SE, Java EE, Eclipse, Spring, Hibernate, JavaScript, jQuery
and much more. Keep your Java skills current with LearnJavaNow -
200+ hours of step-by-step video tutorials by Java experts.
SALE $49.99 this month only -- learn more at:
http://p.sf.net/sfu/learnmore_122612 
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to