PacketFence
Bug Tracking System

View Issue Details Jump to Notes ] Issue History ] Print ]
IDProjectCategoryView StatusDate SubmittedLast Update
0000314PacketFence 1.7public2008-04-21 14:192008-07-21 16:56
Reporteraflannery 
Assigned Touser4 
PrioritynormalSeveritymajorReproducibilityalways
StatusclosedResolutionfixed 
PlatformOSOS Version
Product Version 
Target VersionFixed in Versionmonotone 
Summary0000314: iptables.pm adding FORWARD ACCEPT MARK 0x1 rule to ipchains when operating in passive mode.
Descriptioniptables.pm on ln 686 adds multiple rules to the FORWARD chain, giving certain marked packets the ability to traverse interfaces.

this presents a security problem when a machine has a privileged admin interface sitting on a network or VLAN where you DO NOT want user traffic to end up.

Also, enabling routing makes little sense when operating in passive (arp) mode.
Additional Informationas a workaround I enclosed these internal_append_entry calls:
if(isenabled($Config{'network'}{'nat'})){
  ...
  internal_append_entry(...);
  ...
}

Patch included.
TagsNo tags attached.
fixed in mtn revision
Attached Filespatch file icon iptables_nonat.patch (Attachment missing)

- Relationships

-  Notes
(0000767)
user4
2008-07-21 16:56

revision 2bec65bd586a6ae3997316190870e09bcaecb506

- Issue History
Date Modified Username Field Change
2008-04-21 14:19 aflannery New Issue
2008-04-21 14:19 aflannery File Added: iptables_nonat.patch
2008-06-12 20:55 user4 Project PacketFence 1.6.2 => PacketFence 1.7
2008-06-12 20:55 user4 Status new => assigned
2008-06-12 20:55 user4 Assigned To => user4
2008-07-21 16:56 user4 Status assigned => closed
2008-07-21 16:56 user4 Note Added: 0000767
2008-07-21 16:56 user4 Resolution open => fixed
2008-07-21 16:56 user4 Fixed in Version => monotone


Copyright © 2000 - 2012 MantisBT Group
Powered by Mantis Bugtracker