Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Interloper break in the server via the captured client #281

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open

Interloper break in the server via the captured client #281

wants to merge 1 commit into from

Conversation

gitfal13579
Copy link

I have fear about that the knocker and visitor are not the same guy when I open the door to SPA server, and protected private sevice behind the server will be exposed to the knocker from a captured client ,in this case it could be hightly dangerous

I have fear about that the knocker and visitor are not the same guy when I open the door to SPA server, and protected private sevice behind the server will be exposed to the knocker from a captured client ,in this case it could be hightly dangerous
@gitfal13579 gitfal13579 closed this Aug 2, 2018
@gitfal13579 gitfal13579 deleted the patch-1 branch August 2, 2018 09:44
@gitfal13579 gitfal13579 restored the patch-1 branch August 2, 2018 09:45
@gitfal13579 gitfal13579 reopened this Aug 2, 2018
@mrash mrash self-assigned this Aug 9, 2018
@mrash
Copy link
Owner

mrash commented Feb 8, 2024

The primary "source of truth" is what is encoded in the SPA message. This allows fwknop to support use cases such as using the fwknop to open a service for access from a client on a seemingly totally unrelated network. It also allows for a client to spoof the source IP. Or both in combination. Note that the access is granted to the IP that is encrypted within the SPA payload, and this is "known good" since it is authenticated (HMAC should always be used), so in a very real sense it doesn't matter what the source IP is in the SPA packet IP header.

Now, what we could do is add a new optional feature to have fwknopd check to see whether the source iP on the SPA packet IP header is the same as what is encrypted with the packet. This would need a configuration variable added to fwknopd. This is in the spirt of what you have submitted, but just extended to support the above too.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants