[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Anyone studying for Cisco certs?



What does the for f do?

On Fri, 2003-05-16 at 11:05, Richard Fifarek wrote:
> On Fri, 16 May 2003 fiaid@quasi-sane.com wrote:
> 
> > That was a massively simplified explaination of the need for IP Spoof
> > checking.
> 
> 	So that leads to the obvious question, how does one do this with 
> Linux/IPTables/IPChains?
> 
> Direct quote from IPChains Howto (applies to IPTables as well):
> 
> "The best way to protect from IP spoofing is called Source Address
> Verification, and it is done by the routing code, and not firewalling at
> all. Look for a file called /proc/sys/net/ipv4/conf/all/rp_filter. If this
> exists, then turning on Source Address Verification at every boot is the
> right solution for you. To do that, insert the following lines somewhere
> in your init scripts, before any network interfaces are initialized:
> 
> 
> 
> # This is the best method: turn on Source Address Verification and get 
> # spoof protection on all current and future interfaces. 
> 
> if [ -e /proc/sys/net/ipv4/conf/all/rp_filter ]; then
>   echo -n "Setting up IP spoofing protection..."
>   for f in /proc/sys/net/ipv4/conf/*/rp_filter; do
>       echo 1 > $f
>   done
>   echo "done."
> else
>   echo PROBLEMS SETTING UP IP SPOOFING PROTECTION.  BE WORRIED.
>   echo "CONTROL-D will exit from this shell and continue system startup."
>   echo
>   # Start a single user shell on the console
>   /sbin/sulogin $CONSOLE
> fi
> 
> 
> 
> If you cannot do this, you can manually insert rules to protect every 
> interface. This requires knowledge of each interface. The 2.1 kernels 
> automatically reject packets claiming to come from the 127.* addresses 
> (reserved for the local loopback interface, lo).
> 
> For example, say we have three interfaces, eth0, eth1 and ppp0. We can use 
> ifconfig to tell us the address and netmask of the interfaces. Say eth0 
> was attached to a network 192.168.1.0 with netmask 255.255.255.0, eth1 was 
> attached to a network 10.0.0.0 with netmask 255.0.0.0, and ppp0 connected 
> to the Internet (where any address except the reserved private IP 
> addresses are allowed), we would insert the following rules:
> 
> 
> 
> # ipchains -A input -i eth0 -s ! 192.168.1.0/255.255.255.0 -j DENY
> # ipchains -A input -i ! eth0 -s 192.168.1.0/255.255.255.0 -j DENY
> # ipchains -A input -i eth1 -s ! 10.0.0.0/255.0.0.0 -j DENY
> # ipchains -A input -i ! eth1 -s 10.0.0.0/255.0.0.0 -j DENY
> # 
> 
> This approach is not as good as the Source Address Verification approach, 
> because if your network changes, you have to change your firewalling rules 
> to keep up.
> 
> If you are running a 2.0 series kernel, you might want to protect the 
> loopback interface as well, using a rule like this:
> 
> 
> 
> # ipchains -A input -i ! lo -s 127.0.0.0/255.0.0.0 -j DENY
> #
> "
> 
> 
> -- 
> Richard H. Fifarek
> rfifarek@silug.org
> 
> 
> 
> -
> To unsubscribe, send email to majordomo@silug.org with
> "unsubscribe silug-discuss" in the body.



-
To unsubscribe, send email to majordomo@silug.org with
"unsubscribe silug-discuss" in the body.