PacketFence - BTS - PacketFence 1.7
View Issue Details
0000314PacketFence 1.7public2008-04-21 14:192008-07-21 16:56
aflannery 
user4 
normalmajoralways
closedfixed 
 
monotone 
0000314: iptables.pm adding FORWARD ACCEPT MARK 0x1 rule to ipchains when operating in passive mode.
iptables.pm on ln 686 adds multiple rules to the FORWARD chain, giving certain marked packets the ability to traverse interfaces.

this presents a security problem when a machine has a privileged admin interface sitting on a network or VLAN where you DO NOT want user traffic to end up.

Also, enabling routing makes little sense when operating in passive (arp) mode.
as a workaround I enclosed these internal_append_entry calls:
if(isenabled($Config{'network'}{'nat'})){
  ...
  internal_append_entry(...);
  ...
}

Patch included.
No tags attached.
patch iptables_nonat.patch (1,567) 2008-04-21 14:19
https://www.packetfence.org/bugs/file_download.php?file_id=34&type=bug
Issue History
2008-04-21 14:19aflanneryNew Issue
2008-04-21 14:19aflanneryFile Added: iptables_nonat.patch
2008-06-12 20:55user4ProjectPacketFence 1.6.2 => PacketFence 1.7
2008-06-12 20:55user4Statusnew => assigned
2008-06-12 20:55user4Assigned To => user4
2008-07-21 16:56user4Statusassigned => closed
2008-07-21 16:56user4Note Added: 0000767
2008-07-21 16:56user4Resolutionopen => fixed
2008-07-21 16:56user4Fixed in Version => monotone

Notes
(0000767)
user4   
2008-07-21 16:56   
revision 2bec65bd586a6ae3997316190870e09bcaecb506