Use IPTables to block access to internal network resources #194

Closed
opened 6 months ago by aryak · 3 comments
aryak commented 6 months ago
Collaborator

Currently, a malicious user can access things in the internal network of @a.
Using a rule like this could prevent this.
iptables -A OUTPUT -d 192.168.1.0/24 -j REJECT --reject-with icmp-net-unreachable
With the limited testing i did, going to dsldevice.attlocal.net gave me the MAC address of the devices connected too..
I am not sure if this would mess with port forwarding tho..

Currently, a malicious user can access things in the internal network of @a. Using a rule like this could prevent this. `iptables -A OUTPUT -d 192.168.1.0/24 -j REJECT --reject-with icmp-net-unreachable` With the limited testing i did, going to dsldevice.attlocal.net gave me the MAC address of the devices connected too.. I am not sure if this would mess with port forwarding tho..
a commented 6 months ago
Owner

I added the ufw rule ufw deny out to 192.168.1.254 port 80. I think this should be enough to prevent exposure of the MAC addresses, but let me know if more needs to be done.

I added the `ufw` rule `ufw deny out to 192.168.1.254 port 80`. I think this should be enough to prevent exposure of the MAC addresses, but let me know if more needs to be done.
a closed this issue 6 months ago
a added the
bug
security
labels 6 months ago
a added this to the (deleted) project 6 months ago
aryak commented 6 months ago
Poster
Collaborator

https is still open @a

https is still open @a
a commented 6 months ago
Owner

https is still open @a

Fixed, thanks!

> https is still open @a Fixed, thanks!
Sign in to join this conversation.
No Milestone
No project
No Assignees
2 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: exozyme/exozyme#194
Loading…
There is no content yet.