| To: | Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> |
|---|---|
| Subject: | Re: [Ipsec-tools-devel] ipv4/ipv6 forwarding check |
| From: | Aidas Kasparas <a.kasparas@xxxxxx> |
| Date: | Fri, 29 Oct 2004 11:09:25 +0300 |
| Cc: | latten@xxxxxxxxxxxxxx, ipsec-tools-devel@xxxxxxxxxxxxxxxxxxxxx, netdev@xxxxxxxxxxx |
| In-reply-to: | <E1CNR73-0007X6-00@gondolin.me.apana.org.au> |
| References: | <E1CNR73-0007X6-00@gondolin.me.apana.org.au> |
| Sender: | netdev-bounce@xxxxxxxxxxx |
| User-agent: | Mozilla Thunderbird 0.8 (X11/20040918) |
|
Herbert Xu wrote: Aidas Kasparas <a.kasparas@xxxxxx> wrote:
If you upgrade, your system will not work. If you do not upgrade, and on host c.c.c.c you have policy a.a.a.a b.b.b.b any -P in esp/.../ where b.b.b.b is address different from any interface address of host with address c.c.c.c and 1) some party h.h.h.h will be able to spoof packet to look from a.a.a.a to b.b.b.b; 2) transport that packet to c.c.c.c 3) that packet will not be filtered out by rp_filter on c.c.c.c then kernel will pass that packet through to b.b.b.b, even if that packet is not protected by esp. It is possible to prevent that from happening by marking esp packets and later accepting for forwarding only marked packets from a.a.a.a to b.b.b.b using iptables. Yes, I have insisted in the past this is not necessary. I was wrong. I'm sorry. I did not knew about this kernel's feature. [Have I missed any other case?] Which way to choose for the short term -- decission is after you.
|
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Re: Fw: [Bugme-new] [Bug 3657] New: downed interfaces acting as aliases, Andi Kleen |
|---|---|
| Next by Date: | Re: [PATCH] 802.1Q VLAN, Tommy Christensen |
| Previous by Thread: | Re: [Ipsec-tools-devel] ipv4/ipv6 forwarding check, Herbert Xu |
| Next by Thread: | Re: [Ipsec-tools-devel] ipv4/ipv6 forwarding check, Michal Ludvig |
| Indexes: | [Date] [Thread] [Top] [All Lists] |