<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic let ip option field &amp;quot;security&amp;quot; pass the gateway and do filtering on that field in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/let-ip-option-field-quot-security-quot-pass-the-gateway-and-do/m-p/51576#M12998</link>
    <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;I am struggling with a unusual customer request. They are using the IP option "Security [130]" (RFC1108) in self-written software to tag special tcp-packets in the header. Now they want these packets to pass through the r80.20-gateway and implement filtering based on this IP option field.&lt;/P&gt;&lt;P&gt;Based on&amp;nbsp;&lt;SPAN&gt;sk62082 (How to allow TCP/UDP packets with IP options through Check Point Security Gateway) it should be possible to let packets with these options passing the gateway.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Before implementing sk62082:&lt;BR /&gt;@;6765544;[SIM-206293920];handle_packet_do: stripping IP options failed, conn: &amp;lt;172.30.0.2,1024,10.125.231.130,10000,6&amp;gt;;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Changes based on sk62082 in $FWDIR/lib/table.def: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2019-04-23 08_19_37-admin@gw-2582f3_~.png" style="width: 287px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/929iA462B2EC216C0ACA/image-size/large?v=v2&amp;amp;px=999" role="button" title="2019-04-23 08_19_37-admin@gw-2582f3_~.png" alt="2019-04-23 08_19_37-admin@gw-2582f3_~.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;After implementing sk62082 (changed table.def &amp;amp; policy install):&lt;BR /&gt;@;6768953;[fw4_0];fw_log_drop_ex: Packet proto=6 172.30.0.2:1024 -&amp;gt; 10.125.231.130:10000 dropped by fw_ipopt_restore Reason: fw_ipopt_restore failed;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So even the simple forwarding of this security-field is failing on r80.20 (contrary to the sk). Any idea why the ipopt_restore is failing?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The packet looks like this:&lt;/SPAN&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2019-04-23 11_56_51-Kali-Linux - Konsole – VMware ESXi.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/930i1AAFDFBECD960B15/image-size/large?v=v2&amp;amp;px=999" role="button" title="2019-04-23 11_56_51-Kali-Linux - Konsole – VMware ESXi.png" alt="2019-04-23 11_56_51-Kali-Linux - Konsole – VMware ESXi.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;And wireshark (on sending client) is successfully detection the IP option "Security":&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2019-04-23 11_57_40-Kali-Linux - Konsole – VMware ESXi.png" style="width: 651px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/931i31A59464DA6F16E5/image-size/large?v=v2&amp;amp;px=999" role="button" title="2019-04-23 11_57_40-Kali-Linux - Konsole – VMware ESXi.png" alt="2019-04-23 11_57_40-Kali-Linux - Konsole – VMware ESXi.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For the 2nd part (the filtering) I am thinking about three possible options:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- 1.: special protocol type (maybe INSPECT code)&lt;BR /&gt;- 2.: custom application (based on&amp;nbsp;sk103051)&lt;BR /&gt;- 3.: IPS signature&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Has anyone of you worked with IP options on CheckPoint before? And is it even possible to filter based on a IP option field?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Based on the notes at the end of sk62082 (&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;SecurePlatform OS / Gaia OS kernel does not strip IP options. Therefore, the packet arrives to Check Point kernel with IP options, and is dropped."&lt;/P&gt;&lt;P&gt;) I would think that the IP options are not stripped and therefor should be available for detection/filtering. But the following still shows a chain called "ipopt_strip":&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2019-04-23 12_08_58-ipopt_strip - Google-Suche.png" style="width: 618px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/932i3BD0963CBB1C811F/image-size/large?v=v2&amp;amp;px=999" role="button" title="2019-04-23 12_08_58-ipopt_strip - Google-Suche.png" alt="2019-04-23 12_08_58-ipopt_strip - Google-Suche.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Any help is kindly appreciated!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;BR /&gt;Ben Hartmann&lt;BR /&gt;Security Consultant&lt;BR /&gt;Axians IT Security&lt;BR /&gt;Germany&lt;/P&gt;</description>
    <pubDate>Tue, 23 Apr 2019 10:14:00 GMT</pubDate>
    <dc:creator>Ben_Hartmann</dc:creator>
    <dc:date>2019-04-23T10:14:00Z</dc:date>
    <item>
      <title>let ip option field "security" pass the gateway and do filtering on that field</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/let-ip-option-field-quot-security-quot-pass-the-gateway-and-do/m-p/51576#M12998</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;I am struggling with a unusual customer request. They are using the IP option "Security [130]" (RFC1108) in self-written software to tag special tcp-packets in the header. Now they want these packets to pass through the r80.20-gateway and implement filtering based on this IP option field.&lt;/P&gt;&lt;P&gt;Based on&amp;nbsp;&lt;SPAN&gt;sk62082 (How to allow TCP/UDP packets with IP options through Check Point Security Gateway) it should be possible to let packets with these options passing the gateway.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Before implementing sk62082:&lt;BR /&gt;@;6765544;[SIM-206293920];handle_packet_do: stripping IP options failed, conn: &amp;lt;172.30.0.2,1024,10.125.231.130,10000,6&amp;gt;;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Changes based on sk62082 in $FWDIR/lib/table.def: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2019-04-23 08_19_37-admin@gw-2582f3_~.png" style="width: 287px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/929iA462B2EC216C0ACA/image-size/large?v=v2&amp;amp;px=999" role="button" title="2019-04-23 08_19_37-admin@gw-2582f3_~.png" alt="2019-04-23 08_19_37-admin@gw-2582f3_~.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;After implementing sk62082 (changed table.def &amp;amp; policy install):&lt;BR /&gt;@;6768953;[fw4_0];fw_log_drop_ex: Packet proto=6 172.30.0.2:1024 -&amp;gt; 10.125.231.130:10000 dropped by fw_ipopt_restore Reason: fw_ipopt_restore failed;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So even the simple forwarding of this security-field is failing on r80.20 (contrary to the sk). Any idea why the ipopt_restore is failing?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The packet looks like this:&lt;/SPAN&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2019-04-23 11_56_51-Kali-Linux - Konsole – VMware ESXi.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/930i1AAFDFBECD960B15/image-size/large?v=v2&amp;amp;px=999" role="button" title="2019-04-23 11_56_51-Kali-Linux - Konsole – VMware ESXi.png" alt="2019-04-23 11_56_51-Kali-Linux - Konsole – VMware ESXi.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;And wireshark (on sending client) is successfully detection the IP option "Security":&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2019-04-23 11_57_40-Kali-Linux - Konsole – VMware ESXi.png" style="width: 651px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/931i31A59464DA6F16E5/image-size/large?v=v2&amp;amp;px=999" role="button" title="2019-04-23 11_57_40-Kali-Linux - Konsole – VMware ESXi.png" alt="2019-04-23 11_57_40-Kali-Linux - Konsole – VMware ESXi.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For the 2nd part (the filtering) I am thinking about three possible options:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- 1.: special protocol type (maybe INSPECT code)&lt;BR /&gt;- 2.: custom application (based on&amp;nbsp;sk103051)&lt;BR /&gt;- 3.: IPS signature&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Has anyone of you worked with IP options on CheckPoint before? And is it even possible to filter based on a IP option field?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Based on the notes at the end of sk62082 (&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;SecurePlatform OS / Gaia OS kernel does not strip IP options. Therefore, the packet arrives to Check Point kernel with IP options, and is dropped."&lt;/P&gt;&lt;P&gt;) I would think that the IP options are not stripped and therefor should be available for detection/filtering. But the following still shows a chain called "ipopt_strip":&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2019-04-23 12_08_58-ipopt_strip - Google-Suche.png" style="width: 618px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/932i3BD0963CBB1C811F/image-size/large?v=v2&amp;amp;px=999" role="button" title="2019-04-23 12_08_58-ipopt_strip - Google-Suche.png" alt="2019-04-23 12_08_58-ipopt_strip - Google-Suche.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Any help is kindly appreciated!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;BR /&gt;Ben Hartmann&lt;BR /&gt;Security Consultant&lt;BR /&gt;Axians IT Security&lt;BR /&gt;Germany&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2019 10:14:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/let-ip-option-field-quot-security-quot-pass-the-gateway-and-do/m-p/51576#M12998</guid>
      <dc:creator>Ben_Hartmann</dc:creator>
      <dc:date>2019-04-23T10:14:00Z</dc:date>
    </item>
    <item>
      <title>Re: let ip option field "security" pass the gateway and do filtering on that field</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/let-ip-option-field-quot-security-quot-pass-the-gateway-and-do/m-p/51771#M12999</link>
      <description>When you say “implement filtering” what do you mean specifically?&lt;BR /&gt;Permit/deny packets based on the presence of this IP Option in the packet?&lt;BR /&gt;Note that by default we drop packets with IP Options set.&lt;BR /&gt;We can allow packets with specific IP Options set to be inspected as per the normal policy.&lt;BR /&gt;&lt;BR /&gt;The fact we can’t restore IP Options to the packet suggests a bug that will need to be further investigation by the TAC.</description>
      <pubDate>Wed, 24 Apr 2019 19:28:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/let-ip-option-field-quot-security-quot-pass-the-gateway-and-do/m-p/51771#M12999</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-04-24T19:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: let ip option field "security" pass the gateway and do filtering on that field</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/let-ip-option-field-quot-security-quot-pass-the-gateway-and-do/m-p/51927#M13000</link>
      <description>&lt;P&gt;Yes, I want to permit/deny based on the presence of this IP Option.&lt;/P&gt;&lt;P&gt;Regarding the restore of IP Option: I will open a ticket with TAC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;BR /&gt;Ben&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 06:23:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/let-ip-option-field-quot-security-quot-pass-the-gateway-and-do/m-p/51927#M13000</guid>
      <dc:creator>Ben_Hartmann</dc:creator>
      <dc:date>2019-04-26T06:23:38Z</dc:date>
    </item>
  </channel>
</rss>

