Looking for any comments from the community on this issue. After discovering this back in 2012 I reported to a few major Linux distributions but was told there was nothing they could do about it due to the Weak Host Model that is the default for most Linux/BSD based systems and that their only solution was to set up very specific firewall rules (which isn't always done now). I decided to reach out to this community now.
TITLE: Multi-homed (Multi-networked) BSD and Linux Systems Expose Private Interface Networked Services using Network Interface Traversing Without the use of Forwarding due to Weak Host Model
DISCUSSION:
Multi-homed systems that have private services listening on private network interfaces are vulnerable to a network interface traversing vulnerability. This affects all modern BSD and Linux distributions and hardware devices that use the Weak Host Model by default. The issue comes from the way that the stack provides networked services and routes traffic destined for those services once it is already on the host. Attackers that have WAN network segment access can force victim servers to provide access to protected and segmented services (Any type of service, TCP, UDP - Examples: HTTP, SSH, TFTP). This type of attack will allow attackers to gain access to private services running only on back-end private network interfaces. This vulnerability would leave many Internet facing customers/administrators wide open to attacks on services that were believed to be protected by the separation of networks on different network interfaces. Even if forwarding is disabled on the host and firewall rule sets, the victim host still forwards to other network interfaces on the same device. It must be noted that if forwarding is disabled on the host, the traffic will not traverse to the back-end private networks, just to the private services running on the private interfaces. The basic example victim server configuration is as follows:
SAMPLE VICTIM CONFIGURATION:
Victim Linux/BSD Firewall on Internet: DMZ Host/Firewall with with 3 network interfaces.
Network Interfaces:
eth0: Internet (10.0.1.200 on the 10.0.1.0/24 WAN) 10.0.1.200 is not listening on any TCP/UDP ports.
eth1: DMZ (172.16.0.1 on the 172.16.0.0/24 LAN) 172.16.0.1 is not listening on any TCP/UDP ports.
eth2: Internal Network (192.168.1.1 on the 192.168.1.0/24 LAN) 192.168.1.1 is listening on TCP port 443 for the Firewall's administration page and TCP port 80 for the unprotected Wiki.
Firewall:
INPUT Chain has only allow 80 and 443 (If you block inbound 80/443 at the WAN, the traffic will obviously not traverse from the outside. This is what the Linux distributions recommended as their only fix to this issue. Problem is, what if you need 80/443 on the external interface as well?)
INPUT Chain can have block all traffic on Network Interface Cards eth1 and eth2 and this attack will still work
FORWARD Chain is DROP
Proc IPv4 Settings:
IP Forward is Off
Please let me know what you all think and if this is the right forum for this post. This isn't a theoretical issue as I have a fully working POC.
-StenoPlasma
TITLE: Multi-homed (Multi-networked) BSD and Linux Systems Expose Private Interface Networked Services using Network Interface Traversing Without the use of Forwarding due to Weak Host Model
DISCUSSION:
Multi-homed systems that have private services listening on private network interfaces are vulnerable to a network interface traversing vulnerability. This affects all modern BSD and Linux distributions and hardware devices that use the Weak Host Model by default. The issue comes from the way that the stack provides networked services and routes traffic destined for those services once it is already on the host. Attackers that have WAN network segment access can force victim servers to provide access to protected and segmented services (Any type of service, TCP, UDP - Examples: HTTP, SSH, TFTP). This type of attack will allow attackers to gain access to private services running only on back-end private network interfaces. This vulnerability would leave many Internet facing customers/administrators wide open to attacks on services that were believed to be protected by the separation of networks on different network interfaces. Even if forwarding is disabled on the host and firewall rule sets, the victim host still forwards to other network interfaces on the same device. It must be noted that if forwarding is disabled on the host, the traffic will not traverse to the back-end private networks, just to the private services running on the private interfaces. The basic example victim server configuration is as follows:
SAMPLE VICTIM CONFIGURATION:
Victim Linux/BSD Firewall on Internet: DMZ Host/Firewall with with 3 network interfaces.
Network Interfaces:
eth0: Internet (10.0.1.200 on the 10.0.1.0/24 WAN) 10.0.1.200 is not listening on any TCP/UDP ports.
eth1: DMZ (172.16.0.1 on the 172.16.0.0/24 LAN) 172.16.0.1 is not listening on any TCP/UDP ports.
eth2: Internal Network (192.168.1.1 on the 192.168.1.0/24 LAN) 192.168.1.1 is listening on TCP port 443 for the Firewall's administration page and TCP port 80 for the unprotected Wiki.
Firewall:
INPUT Chain has only allow 80 and 443 (If you block inbound 80/443 at the WAN, the traffic will obviously not traverse from the outside. This is what the Linux distributions recommended as their only fix to this issue. Problem is, what if you need 80/443 on the external interface as well?)
INPUT Chain can have block all traffic on Network Interface Cards eth1 and eth2 and this attack will still work
FORWARD Chain is DROP
Proc IPv4 Settings:
IP Forward is Off
Please let me know what you all think and if this is the right forum for this post. This isn't a theoretical issue as I have a fully working POC.
-StenoPlasma