I can see there being a potential for issues, though there always was
when it came to something like bogon filtering especially if using a
list from an outdated source or failing to update it with any
frequency.  I personally think with this list at least one should be
fairly safe I ran it for a good 6 months up until a gap starting like 2
weeks ago before and I know at least with every entry I saw in the
shorewall log blocked by this filter I could temp disable it and attempt
send a ping or any other icmp, tcp or udp packet towards the source
address and get back an ICMP network unreachable.

It does depend on having a good quality list with the updates though,
these are produced every 30-120 minutes (Always by the 2 hour point but
if changes go over about a dozen they seem to push it early), and the
source is from snapshotting the BGP tables which when it comes down to
it if there is no route advertised in BGP for a range unless that
address is on the same AS as your default route then there is no way
there will be a two way communication with that host filtering or
otherwise.  It will get as far as your default gateway, maybe even to
your ISP's edge routers but there you will get ICMP net unreach.

Other thing that occurs to me is that the system administrators at most
AS'es that have a clue know that it can sometimes take a day or two for
a newly advertised route on BGP to actually reach all the tiny branches
of the network so in much the same way as can be the case with DNS
updates generally an AS will publish a route on BGP a good 24-48 hours
before they actually try allocating the addresses to end users to do it
any sooner is begging for unhappy customers, or plain incompetent
capacity planning.

Of course I'm not recommending anyone go ahead and set it up, for many
it is likely unnecessary anyway, in my case I have it set up because it
seems the VPN service I use has erm less than perfect filtering running,
wouldn't surprise me if the spoofed packets are from other users on
their network actually, certainly see enough windows netbios packets
from other hosts in the VPN's virtual subnet.  As for why I havn't just
gone and complained to them about it and pushed them to get their act in
gear basically the main reason is that I don't actually consider it my
providers job to secure my hosts for me.  That and if I set up filters
or firewalls and screw it up then it's on me and I go fix it, a third
party starts doing it and it's just a damned hastle.

For most people I don't suggest setting up bogon filtering however I
will still publish the script to help those who may find it of value
whether simply to study it, using it as is or using it for some other
purpose, it was written t be as generic as I could make it without
knowing beforehand the exact format of any other lists, thus setting it
up to be able to cope with standard # comments including end of lines
which the current list doesn't use.  Figure it might have some more
mainstream use to others for example I've seen malware blacklists around
in CIDR form that should work with it, advertising/tracking host lists
also both of which also require a continuous regular update because
malware gets fixed and new machine compromised all the time, ad hosts
tend to move about or at least generally spread on a pretty regular basis.

I also consider the IPv6 list in this case to be a different scenario,
not only is there currently trillions of bogon IP's in IPv6 but there
also seems to me to be more potential for such suspect packets to reach
end user networks through various tunnels, especially such a toredo or
unmanaged 6to4, combine that with the many home and business ISP's whos
support for IPv6 ranges from little to none and I can see it being quite
likely that there is a potential to end up with an end user who's tunnel
connects directly to a toredo/6to4 relay and has a sum total of 0
filtering of any kind beyond what is set up by the user themselves on
their end.  I've seen numerous suspect packets when I've had an
unmanaged 6to4 tunnel running myself, don't get any with the HE tunnel
but HE is a large transit service provider which dual stacked their
entire system feels like forever ago so they are a bit more on the ball
than many.  *Wishes his ISP were in the same boat there and decides to
at least remain grateful that they are at least direct peers with HE and
as a result the HE tunnel server is only 2 sub milisecond hops away from
his ISP's edge gateway, almost as close to a direct native routing as
you can get with a tunnel I suspect.*

On 27/02/13 21:57, Paul Gear wrote:
> On 02/24/2013 04:38 AM, Spain, Dr. Jeffry A. wrote:
>> What experience have users had using ShoreWall as a bogon filter
>> using the Team Cymru full bogon lists
>> (http://www.team-cymru.org/Services/Bogons/http.html)? The IPv4 full
>> bogon list contains over 4,600 separate networks that need to be
>> denied, and the IPv6 list over 68,300. Having not tried this myself,
>> I would be concerned a priori about ShoreWall server meltdown.
> With IPv4 moving towards 100% allocation, bogon filters are more likely 
> to cause problems than block illegitimate traffic.  See
>    http://tools.ietf.org/html/rfc6441
> the list of networks to filter
>    http://tools.ietf.org/html/rfc5735
> and the discussions at
>    http://lists.ausnog.net/pipermail/ausnog/2012-February/012133.html
> and
>    http://lists.ausnog.net/pipermail/ausnog/2011-October/011439.html
>
> Paul
>
>
> ------------------------------------------------------------------------------
> Everyone hates slow websites. So do we.
> Make your web apps faster with AppDynamics
> Download AppDynamics Lite for free today:
> http://p.sf.net/sfu/appdyn_d2d_feb
> _______________________________________________
> Shorewall-users mailing list
> Shorewall-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/shorewall-users

Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Everyone hates slow websites. So do we.
Make your web apps faster with AppDynamics
Download AppDynamics Lite for free today:
http://p.sf.net/sfu/appdyn_d2d_feb
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to