Hide Forgot
It was reported [1] that iptables can allow protocols that do not have a protocol handler kernel module loaded. Given following iptables ruleset: -P FORWARD DROP -A FORWARD -m sctp --dport 9 -j ACCEPT -A FORWARD -p tcp --dport 80 -j ACCEPT -A FORWARD -p tcp -m conntrack -m state ESTABLISHED,RELATED -j ACCEPT One would assume that this allows SCTP on port 9 and TCP on port 80. Unfortunately, if the SCTP conntrack module is not loaded, this allows *all* SCTP communication to pass through, i.e. -p sctp -j ACCEPT [1]: http://www.spinics.net/lists/netfilter-devel/msg33430.html
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1182063]
Upstream patch: git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=db29a9508a9246e77087c5531e45b2c88ec6988b
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.5 EUS - Server and Compute Node Only Via RHSA-2015:0284 https://rhn.redhat.com/errata/RHSA-2015-0284.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:0290 https://rhn.redhat.com/errata/RHSA-2015-0290.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2015:0674 https://rhn.redhat.com/errata/RHSA-2015-0674.html
What's the status of this bug WRT RHEL5?