Your message dated Tue, 27 Jun 2006 08:42:06 +0200
with message-id <[EMAIL PROTECTED]>
has caused the Debian Bug report #351196,
regarding psad: IPTABLES_AUTO_RULENUM hazard
to be marked as having been forwarded to the upstream software
author(s) Michael Rash <[EMAIL PROTECTED]>.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Hello Mike
Forgot to forward this bug to you, can you help?
Daniel
On Fri, 2006-02-03 at 12:49 +0700, Jeroen Vermeulen wrote:
> Package: psad
> Version: 1.4.5-1
> Severity: normal
>
>
> The IPTABLES_AUTO_RULENUM is documented as follows in the default
> configuration file:
>
> ### Specify the position or rule number within the iptables
> ### policy where auto block rules get added.
>
> There then follows a configurable list of chains IPT_AUTO_CHAIN{n} that
> can be created automatically to hold the per-host blocking rules created
> by psad. Each "auto-chain" line has a field to specify which existing
> chain should jump to that auto-chain, but no field to say where in the
> calling chain the jump should be inserted.
>
> My impression was that this was what IPTABLES_AUTO_RULENUM did. I was
> wrong. It turns out that IPTABLES_AUTO_RULENUM determines where a new
> blocking rule for an offensive host should be inserted into the
> applicable auto-chain itself.
>
> The real gotcha is this: IPTABLES_AUTO_RULENUM becomes a boobytrap when
> auto-chains are used. If an auto-chain is empty initially, the *only*
> setting for IPTABLES_AUTO_RULENUM that makes any sense at all is 1.
> Anything else and rule insertion will simply not work, because the given
> index will be out of range. (A log message will say that it isn't
> working, but fail to give any indication of what goes wrong--that's in a
> separate bug report).
>
> Some things that I imagine could be done:
>
> * Add a warning to the IPTABLES_AUTO_RULENUM documentation about the
> dangers in combination with IPT_AUTO_CHAIN.
>
> * Fail to start when auto-chains are used and IPTABLES_AUTO_RULENUM is
> not set to 1.
>
> * Add an optional insertion index to IPT_AUTO_CHAIN entries to take
> away any confusion about what IPTABLES_AUTO_RULENUM means.
>
> -- System Information:
> Debian Release: 3.1
> APT prefers unstable
> APT policy: (50, 'unstable')
> Architecture: i386 (i686)
> Shell: /bin/sh linked to /bin/bash
> Kernel: Linux 2.6.11
> Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
>
> Versions of packages psad depends on:
> ii ipchains 1.3.10-15 Network firewalling for Linux
> 2.2.
> ii iptables 1.3.1-2 Linux kernel 2.4+ iptables
> adminis
> ii libc6 2.3.2.ds1-22 GNU C Library: Shared libraries
> an
> ii libcarp-clan-perl 5.3-3 Perl enhancement to Carp error
> log
> ii libdate-calc-perl 5.4-3 Perl library for accessing dates
> ii libnetwork-ipv4addr-perl 0.10-1.1 The Net::IPv4Addr perl module
> API
> ii libunix-syslog-perl 0.100-4 Perl interface to the UNIX
> syslog(
> ii perl 5.8.4-8sarge3 Larry Wall's Practical
> Extraction
> ii psmisc 21.6-1 Utilities that use the proc
> filesy
> ii sysklogd [syslogd] 1.4.1-17 System Logging Daemon
> ii whois 4.7.5 the GNU whois client
>
> -- no debconf information
--- End Message ---