|
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
|
[tcptra-dev] tracing through stateless firewalls
|
Two quick examples of using tcptraceroute-1.3beta1 to trace through
stateless firewalls, with the new -S and -A flags. The targets are
both hosts which are sitting behind firewalls that permit outgoing
TCP connections, but are not permitting inbound connections.
The first example is a Linux 2.2 ipchains firewall:
# ./tcptraceroute -q1 argo.starforce.com
Selected device eth0, address 207.8.132.210, port 3738 for outgoing packets
Tracing the path to argo.starforce.com (216.158.56.82) on TCP port 80 (www), 30 hops max
[..]
7 voicenet-gw.core-1-hssi-6-0-0-50.oldcity.dca.net (207.103.28.30) 69.252 ms
8 node-150-eth3-0-local.oldcity.dca.net (207.245.82.150) 16.216 ms
9 *
10 *
11 *
# ./tcptraceroute -q1 -A argo.starforce.com
Selected device eth0, address 207.8.132.210, port 3747 for outgoing packets
Tracing the path to argo.starforce.com (216.158.56.82) on TCP port 80 (www), 30 hops max
[..]
7 voicenet-gw.core-1-hssi-6-0-0-50.oldcity.dca.net (207.103.28.30) 11.030 ms
8 node-150-eth3-0-local.oldcity.dca.net (207.245.82.150) 24.488 ms
9 argo.starforce.com (216.158.56.82) [closed] 1514.142 ms
The second example consists of the following Cisco access-list:
access-list 100 permit tcp any any established
access-list 100 deny ip any any
applied to outbound packets on the interface used to reach the host falkland:
# ./tcptraceroute -q1 falkland
Selected device eth0, address 207.8.132.210, port 3771 for outgoing packets
Tracing the path to falkland (207.106.130.86) on TCP port 80 (www), 30 hops max
1 jumpgate.townhouse.blue-bell.pa.us (207.106.130.81) 2.111 ms
2 *
3 *
4 *
# ./tcptraceroute -q1 -A falkland
Selected device eth0, address 207.8.132.210, port 3773 for outgoing packets
Tracing the path to falkland (207.106.130.86) on TCP port 80 (www), 30 hops max
1 jumpgate.townhouse.blue-bell.pa.us (207.106.130.81) 2.044 ms
2 falkland.townhouse.blue-bell.pa.us (207.106.130.86) [closed] 4.635 ms
By setting the TCP ACK flag, stateless firewalls assume that the probe packet
is part of an established TCP stream, and let it pass right through. :-)
-mct
_______________________________________________
tcptraceroute-dev mailing list
tcptraceroute-dev@lists.netisland.net
http://lists.netisland.net/mailman/listinfo/tcptraceroute-dev
|
|