LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 05-12-2003, 03:27 PM   #1
vexer
Member
 
Registered: Jan 2003
Location: Sudbury Ontario, Canada
Distribution: Slackware
Posts: 388

Rep: Reputation: 30
ICMP types used in attacks


What are the most common ICMP packet types used in attacks?

(I'm looking to block them off with the REJECT flag)
 
Old 05-14-2003, 07:12 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
AFAIK the main ICMP usage in DoS attacks are (spoofed source address) echo requests to a (remote subnet) broadcast addr to build up amplification (smurfing). I think it's best to try to see restricting ICMP usage as a small part in the larger security framework which consists of (not having those ancient services running in the first place) sysctl values, address filtering, rate limiting and blocking or restricting some ICMP type usage (traceroute (TTL), redirection). Please also note ICMP is an error reporting protocol so blocking everything definately isn't a Good Thing to do.

For more, please see the 1st thread in this forum, post #2 under DoS and DDoS and also look at Robert Graham's Firewall FAQ as it has a good piece of information on ICMP.

HTH.
 
Old 05-20-2003, 12:03 AM   #3
markus1982
Senior Member
 
Registered: Aug 2002
Location: Stuttgart (Germany)
Distribution: Debian/GNU Linux
Posts: 1,467

Rep: Reputation: 46
Well Nessus just lists following when doing a scan:
Quote:
The remote host answers to an ICMP timestamp
request. This allows an attacker to know the
date which is set on your machine.

This may help him to defeat all your
time based authentication protocols.

Solution : filter out the ICMP timestamp
requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor : Low
CVE : CAN-1999-0524
Nessus ID : 10114
And if your Kernel is < 2.4.21 then it will also point out (if doing a scan on the same subnet):
Quote:
The remote host is vulnerable to an 'Etherleak' -
the remote ethernet driver seems to leak bits of the
content of the memory of the remote operating system.

Note that an attacker may take advantage of this flaw
only when its target is on the same physical subnet.

See also : http://www.atstake.com/research/advi.../a010603-1.txt
Solution : Contact your vendor for a fix
Risk factor : Serious
CVE : CAN-2003-0001
Nessus ID : 11197
Warning general/icmp
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Security Attacks LinuxRam Linux - Security 2 08-24-2004 03:14 AM
ICMP traffic archives/writing ICMP traffic in a file maia_1 Programming 0 07-20-2004 03:43 AM
What types of attacks do you get? Please post. iainr Linux - Security 21 04-14-2004 01:39 AM
Nat problems, and ICMP attacks changwoo Linux - Security 3 08-31-2003 08:42 PM
IP attacks sundarrnathan Linux - Security 1 06-04-2003 05:33 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:49 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration