Summary: | A port forwarding rule pointing to IPFire itself will cause the forwarded port to be exposed as well | ||
---|---|---|---|
Product: | IPFire | Reporter: | Peter Müller <peter.mueller> |
Component: | --- | Assignee: | Michael Tremer <michael.tremer> |
Status: | ASSIGNED --- | QA Contact: | |
Severity: | Security | ||
Priority: | Will only affect a few users | CC: | fkienker, michael.tremer |
Version: | 2 | ||
Hardware: | all | ||
OS: | All | ||
Bug Depends on: | |||
Bug Blocks: | 12278 |
Description
Peter Müller
2022-06-06 11:18:09 UTC
This is kind of how the firewall works here. It does the NAT first, and then evaluates any filter rules. At that point, it does not know whether a packet was NATed before or not. We could only fix this with a marker, but I am not sure if we can change packets at NAT time. Since this is however unexpected behaviour, I would consider this a security-sensitive problem. This seems related to this bug. Core 169 Incoming port forwarding from various external ports on the firewall to port 22 on several internal servers had been working for some time. The location of these ports was set to the US. Suddenly, incoming traffic went to the servers on one particular firewall but no traffic was allowed out. Changing the selection from Location US to Standard Networks fixed the issue. |