On Wed, Mar 30, 2011 at 02:08:22PM -0400, Derek J. Balling spake thusly:
> Unroutable addresses like RFC1918-space don't suddenly manage to be
> routable across the world to my servers. It takes a MUCH more heinous
> misconfiguration (static NATs, port-forwarding, etc.) for a
> misconfigured NAT to open a server up to attack.

Isn't this just about making your default forward policy be to drop the
packet? We'll all learn that this is THE thing to check. Then it will be
done. Every firewall software that I have seen sets it up this way by
default. And we can throw away years of baggage and convoluted NAT
workarounds which could arguably hurt our security even more due to
added complexity and firewall hole punching techniques.

[root@fw1 ~]# /sbin/iptables -L -n|grep FORWARD
Chain FORWARD (policy DROP)

I'm good to go. 

Never, not once in my 17 year career managing firewalls, have I found
that a misconfigured firewall was accidentally forwarding. Have you? The
fact that you had RFC1918 address space behind it shouldn't matter in
answering the question: WOULD it have ever forwarded if you had routable
IPs behind it? Did RFC1918 ever really save you? And if not, why hold
onto it?

-- 
Tracy Reed

Attachment: pgpHkcbDxjph1.pgp
Description: PGP signature

_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to