Wireshark-bugs: [Wireshark-bugs] [Bug 2482] Some Wireshark Firewall ACL Rules are off-the-mark
http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2482
--- Comment #5 from Priscilla Oppenheimer <po@xxxxxxxxxxxxx> 2008-04-21 12:58:58 GMT ---
Yes, I know you can choose which address to use in the ACL using the "Filter"
pop-down
menu
I have the Inbound checkbox checked. So what does "egress" mean in that case?
The reply back??
Packet:
Internet Protocol, Src: 192.168.1.141
Dst: 192.168.1.123
Version: 4
Header length: 20 bytes
Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)
Differentiated Services Codepoint: Default (0x00)
Total Length: 60
Identification: 0x1da1 (7585)
Flags: 0x04 (Don't Fragment)
Fragment offset: 0
Time to live: 32
Protocol: TCP (0x06)
Header checksum: 0xb8c2 [correct]
Source: 192.168.1.141
Destination: 192.168.1.123
Transmission Control Protocol, Src Port: 48150 (48150), Dst Port: tcpmux (1),
Seq: 0, Len: 0
Source port: 48150 (48150)
Destination port: tcpmux (1)
With Inbound and Deny checked and using the pull-down menu that says
"192.168.1.141 + TCP port 48150," the inbound rule created by Wireshark is:
access-list NUMBER deny tcp host 192.168.1.123 any eq 1
That packet wouldn't occur on ingress or egress or anywhere on the wire (in
relation to the packet above, anyway).
The ingress would be:
access-list NUMBER deny tcp host 192.168.1.141 any eq 1
The packet back (if the target were to reply) would be:
access-list NUMBER deny tcp host 192.168.1.123 any eq 48150
See what I'm getting at??
I can't get wireshark to compose the rule I really want, which is to block
ingress traffic into my Internet-facing interface on my border firewall from
the evil-doer (192.168.1.141) who is sending traffic to port 1. This is what
the rule should be:
access-list NUMBER deny tcp host 192.168.1.141 any eq 1
Unchecking inbound helps a little, but it creates a rule that says any (instead
of my specific sender) and a specific recipient (when I want any).
access-list NUMBER deny tcp any host 192.168.1.123 eq 1
Using the other pull-down menu (192.168.1.123 + TCP port 1) also doesn't create
what I want. In fact, it creates the same rules! Is that a bug?
And this is a problem for general-purpose traffic, not just traffic to port 1.
It's no biggie. I can edit the rules, but I think there might be some bugs
worth investigating.
Thanks.
--
Configure bugmail: http://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.