ICMP_Scanning_36
ICMP Usage in Scanning
36
Copyright Ó Ofir Arkin, 2000
http://www.sys-security.com
7.3 Other Considerations
If you want to maintain strong ICMP filtering rules with your Firewall/Filtering-Device I suggest
you block all incoming ICMP traffic except for Type 3 Code 4, which is used by the Path MTU
Discovery process27.
If you will block incoming ICMP Fragmentation Needed and Dont Fragment Bit was Set your
network performance will suffer from degradation. You should understand the security risks
involving in opening this kind of traffic to your protected network. The possibility of a DOS,
Inverse Mapping, Host Detection, and a one-way Covert communication channel (which was not
been seen in the wild yet).
Another consideration could be the usage of network troubleshooting tools such as traceroute
and ping. In the case of traceroute if the filtering device you are using does not support Stateful
inspection with ICMP than allowing ICMP TTL Exceeded In Transit (Type 11, code 0) error
messages inside the protected network could lead to various security hazards. The same goes
with ping, where ICMP ECHO reply is even more dangerous when allowed inside the protected
network (Inverse Mapping, Covert Channel and more security risks).
You can limit the number of systems that really need to use the network troubleshooting tools
with ACL, but bear in mind that those systems could be mapped from the Internet and this is
only the tip of the iceberg.
27
See Appendix B: Fragmentation Needed but the Dont Fragment Bit was set and the Path MTU Discovery Process.
Incoming ICMP Traffic
Type 3 Code 4 for Path MTU
Discovery process.
DMZ
Internal Network
Outgoing ICMP Traffic
NONE
Figure 9: Firewall ICMP Filtering Rules
The Internet