linux-igd does not honour paranoid=1 variable
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux-igd (Debian) |
Fix Released
|
Unknown
|
|||
linux-igd (Ubuntu) |
Fix Committed
|
Undecided
|
Unassigned |
Bug Description
[Security Vulnerability]
Setting the variable paranoid=1 in configuration file is not honoured.
/etc/upnpd.conf
. . .
# paranoid forwarding option
# 0, allow all forwarding
# 1, only allow internal hosts to forward to themselves.
# default = 0
paranoid = 1
. . .
Request from 10.0.0.100:
Forward port 22/tcp to internal client 10.0.0.90
Chain FORWARD (policy DROP)
target prot opt source destination
ACCEPT tcp -- anywhere 10.0.0.90 tcp dpt:ssh
/var/log/upnpd
0x7f4a93095700 AddPortMap: DevUDN: uuid:75802409-
Request from 10.0.0.100
Forward port 22/tcp to outside ip
Chain FORWARD (policy DROP)
target prot opt source destination
ACCEPT tcp -- anywhere 4.3.2.1 tcp dpt:ssh
/var/log/upnpd
0x7f4a93095700 AddPortMap: DevUDN: uuid:75802409-
Please have a look into the cause of the problem, I have attached log of the above instance with a full verbosity on log.
Changed in linux-igd (Ubuntu): | |
status: | Confirmed → Fix Committed |
Changed in linux-igd (Debian): | |
status: | Unknown → Fix Released |
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res