On 15 Jan 99, at 20:20, Bill Schoolcraft wrote about
    "[masq] IP Spoofing help ?":

| Hello Everyone,
|...
| I tried to add the IP Spoofing rules I read in "Linux Network
| Toolkit" which is:
| 
| /sbin/ipfwadm -I -a deny -V 192.168.7.1 -S 192.168.7.0/24 -D
| 0.0.0.0/0

Your -V option identifies your local network interface, not the 
remote interface.  So this rule denies all incoming packets from your 
local network.  That will surely impact your performance!

Since your external interface is assigned a dynamic IP, you can't use 
"-V ip_addr" to identify it.  You should use "-W device" instead.  
For example, if your external interface is ppp0, the anti-spoofing 
rule would be:

/sbin/ipfwadm -I -a deny -W ppp0 -S 192.168.7.0/24 -D 0.0.0.0/0

IOW, deny packets coming *in* the remote interface claiming to be 
from a local address.

| /sbin/ipfwadm -I -a deny -V 192.168.7.1 -S 192.168.7.1 -D 0.0.0.0/0

This rule has the same problem, but does nothing because it is a 
subset of the prior rule.

| My MASQ machine being 192.168.7./1
|... 

HTH...

- Fred Viles <mailto:[EMAIL PROTECTED]>


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
For daily digest info, email [EMAIL PROTECTED]

Reply via email to