Rich Freeman on 4 Feb 2012 04:04:11 -0800


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] Quick& dirty IP blocking


On Fri, Feb 3, 2012 at 4:22 PM,  <bergman@merctech.com> wrote:
> Right, like the ping-of-death[1] (despite the name, it has nothing to do with
> ICMP).
>

It should probably be noted that none of the stuff in this thread can
completely protect you from something like the ping-of-death.  That
was a kernel-level vulnerability, and even with blocking at an INPUT
route the packet is still being processed by the kernel.

Now, dropping a malicious packet like a hot potato as early in the
process as possible obviously reduces the vulnerability footprint of
your system compared to delivering it all the way through the kernel
and into an application.  Still, if the kernel contains a network
stack bug somewhere before the packet actually gets dropped it would
be vulnerable.

A hardware firewall can help since it runs a less-complex OS which is
likely to be better audited.  However, even hardware firewalls can in
theory contain vulnerabilities, and perhaps those vulnerabilities
could be used to traverse the firewall.

As we learned with Stuxnet even an airgap and sneakernet doesn't
provide perfect security.

Rich
___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug