mirror of
https://github.com/vincentmli/bpfire.git
synced 2026-04-11 11:35:54 +02:00
firewall: Prevent spoofing our own RED IP address
There is no legitimate reason why traffic from our own IP address on RED should ever appear incoming on that interface. This prevents attackers from impersonating IPFire itself, and is only cleared/reset if the RED interface is brought up. Therefore, an attacker cannot bypass this by foring a dial-up or DHCP connection to break down. Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
This commit is contained in:
@@ -374,6 +374,17 @@ iptables_red_up() {
|
||||
iptables -F REDFORWARD
|
||||
iptables -t nat -F REDNAT
|
||||
|
||||
# Prohibit spoofing our own IP address on RED
|
||||
if [ -f /var/ipfire/red/active ]; then
|
||||
REDIP="$( cat /var/ipfire/red/local-ipaddress )";
|
||||
|
||||
if [ "$IFACE" != "" ]; then
|
||||
iptables -A REDINPUT -s $REDIP -i $IFACE -j SPOOFED_MARTIAN
|
||||
elif [ "$DEVICE" != "" ]; then
|
||||
iptables -A REDINPUT -s $REDIP -i $DEVICE -j SPOOFED_MARTIAN
|
||||
fi
|
||||
fi
|
||||
|
||||
# PPPoE / PPTP Device
|
||||
if [ "$IFACE" != "" ]; then
|
||||
# PPPoE / PPTP
|
||||
|
||||
Reference in New Issue
Block a user