[OpenWrt-Devel] [PATCH] firewall3: make reject types selectable by user

Philip Prindeville philipp_subx at redfish-solutions.com
Tue Jul 3 12:39:43 EDT 2018


Aren’t all inbound SYNs unsolicited by definition? Is there a danger of reflection attacks?



Sent from my iPhone
> On Jul 2, 2018, at 9:29 AM, Alin Nastac <alin.nastac at gmail.com> wrote:
> 
> From: Alin Nastac <alin.nastac at gmail.com>
> 
> RFC 6092 recommends in section 3.3.1 that an IPv6 CPE must respond to
> unsolicited inbound SYNs with an ICMPv6 Destination Unreachable error
> code 1 (Communication with destination administratively prohibited).
> 
> Signed-off-by: Alin Nastac <alin.nastac at gmail.com>
> ---
> defaults.c | 21 ++++++++++++++++-----
> options.h  |  2 ++
> 2 files changed, 18 insertions(+), 5 deletions(-)
> 
> diff --git a/defaults.c b/defaults.c
> index 11fbf0d..6565ca2 100644
> --- a/defaults.c
> +++ b/defaults.c
> @@ -41,6 +41,8 @@ const struct fw3_option fw3_flag_opts[] = {
>    FW3_OPT("output",              target,   defaults, policy_output),
> 
>    FW3_OPT("drop_invalid",        bool,     defaults, drop_invalid),
> +    FW3_OPT("tcp_reset_rejects",   bool,     defaults, tcp_reset_rejects),
> +    FW3_OPT("admin_prohib_rejects",bool,     defaults, admin_prohib_rejects),
> 
>    FW3_OPT("syn_flood",           bool,     defaults, syn_flood),
>    FW3_OPT("synflood_protect",    bool,     defaults, syn_flood),
> @@ -113,6 +115,7 @@ fw3_load_defaults(struct fw3_state *state, struct uci_package *p)
> 
>    defs->syn_flood_rate.rate  = 25;
>    defs->syn_flood_rate.burst = 50;
> +    defs->tcp_reset_rejects    = true;
>    defs->tcp_syncookies       = true;
>    defs->tcp_window_scaling   = true;
>    defs->custom_chains        = true;
> @@ -276,14 +279,22 @@ fw3_print_default_head_rules(struct fw3_ipt_handle *handle,
>            fw3_ipt_rule_append(r, "INPUT");
>        }
> 
> -        r = fw3_ipt_rule_create(handle, &tcp, NULL, NULL, NULL, NULL);
> -        fw3_ipt_rule_target(r, "REJECT");
> -        fw3_ipt_rule_addarg(r, false, "--reject-with", "tcp-reset");
> -        fw3_ipt_rule_append(r, "reject");
> +        if (defs->tcp_reset_rejects)
> +        {
> +            r = fw3_ipt_rule_create(handle, &tcp, NULL, NULL, NULL, NULL);
> +            fw3_ipt_rule_target(r, "REJECT");
> +            fw3_ipt_rule_addarg(r, false, "--reject-with", "tcp-reset");
> +            fw3_ipt_rule_append(r, "reject");
> +        }
> 
>        r = fw3_ipt_rule_new(handle);
>        fw3_ipt_rule_target(r, "REJECT");
> -        fw3_ipt_rule_addarg(r, false, "--reject-with", "port-unreach");
> +        fw3_ipt_rule_addarg(r, false, "--reject-with",
> +            defs->admin_prohib_rejects ?
> +                (handle->family == FW3_FAMILY_V6 ?
> +                    "adm-prohibited" :
> +                    "admin-prohib") :
> +                "port-unreach");
>        fw3_ipt_rule_append(r, "reject");
> 
>        break;
> diff --git a/options.h b/options.h
> index 08fecf6..e3ba99c 100644
> --- a/options.h
> +++ b/options.h
> @@ -276,6 +276,8 @@ struct fw3_defaults
>    enum fw3_flag policy_forward;
> 
>    bool drop_invalid;
> +    bool tcp_reset_rejects;
> +    bool admin_prohib_rejects;
> 
>    bool syn_flood;
>    struct fw3_limit syn_flood_rate;
> -- 
> 2.7.4
> 
> 
> _______________________________________________
> openwrt-devel mailing list
> openwrt-devel at lists.openwrt.org
> https://lists.openwrt.org/mailman/listinfo/openwrt-devel


_______________________________________________
openwrt-devel mailing list
openwrt-devel at lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel


More information about the openwrt-devel mailing list