Hi again,

so, lately I started looking at the less crucial or obvious parts of my
shorewall configuration that was originally based on the three-
interface example configuration. I haven't touched my stoppedrules for
a while and came to question whether they are still any good for my
current setup.

What struck me in particular were the rules that accepted traffic from
any source to the local interfaces (which are used for the local zone
and dmz zone in the example):
   ACCEPT          eth1            -
-> ACCEPT          -               eth1 <-
   ACCEPT          eth2            -
-> ACCEPT          -               eth2 <-

In the stopped state of my firewall, I would certainly not want to
forward any traffic from my external interface to my local ones. Now,
in case of IPv4, where most people will use masquerading, that won't be
an issue because there are not NAT rules. But with IPv6 and global
addressing that would mean any traffic could reach the internal
networks if there are valid routes for these addresses.

I actually tested that and hooked up a computer to an interface not
listed in the stoppedrules and stopped the firewall. I could reach
other clients connected to the local interfaces mentioned in
stoppedrules. Is that behavior really intended?

If I'm not completely missing something here, I think there should be a
warning about this in the stoppedrules examples for people with a dual-
stack configuration.

Best regards,

Timo 




_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to