Feature #16700
openFeature Request: Auto-Block Spoofed Source IPv6 Prefix for GIF Tunnels
0%
Description
Summary
Automatically add the assigned IPv6 prefix of a GIF tunnel interface (e.g., Hurricane Electric Tunnel Broker) to the default ingress block list to prevent source address spoofing, consistent with existing IPv4 static address behavior.
Current Behavior
When an IPv4 interface is configured with a static address, pfSense automatically adds an anti-spoofing rule to the pf ruleset that blocks inbound traffic claiming to originate from the locally assigned IP. This protects against spoofed source addresses on that interface.
This automatic anti-spoofing behavior is not implemented for GIF tunnel interfaces. When a GIF tunnel is configured (for example, using Hurricane Electric Tunnel Broker or a similar IPv6-in-IPv4 tunnel), the assigned IPv6 prefix is not automatically added to the ingress block list.
Expected Behavior
When a GIF tunnel interface is configured with an assigned IPv6 prefix, pfSense should automatically generate a pf access control rule that blocks inbound traffic on that interface with a source address matching the tunnel's own assigned IPv6 prefix block. This is the same anti-spoofing protection that is already applied automatically for static IPv4 interfaces.
Steps to Reproduce
- Configure a GIF tunnel interface in pfSense (e.g., Hurricane Electric Tunnel Broker).
- Assign the delegated IPv6 prefix to the tunnel interface.
- Review the auto-generated pf rules.
- Observe that no anti-spoofing block rule exists for the assigned IPv6 prefix on the GIF tunnel interface, unlike the equivalent IPv4 static interface behavior.
Extend the existing automatic anti-spoofing rule generation logic to include GIF tunnel interfaces. Specifically:
- Detect when a GIF tunnel interface has an assigned IPv6 prefix.
- Automatically insert a pf block rule for inbound traffic on that interface where the source address falls within the tunnel's own assigned IPv6 prefix.
- This should mirror the existing behavior for static IPv4 interfaces and require no manual user configuration.
Impact
Without this rule, traffic entering the WAN via a GIF tunnel could spoof a source address belonging to the tunnel's own IPv6 prefix, bypassing ingress filtering. This is a well-known attack vector addressed in RFC 2827 (Network Ingress Filtering). The fix brings GIF tunnel behavior into parity with existing IPv4 anti-spoofing protections.
- pfSense Plus / pfSense CE
- GIF tunnel interface (e.g., Hurricane Electric Tunnel Broker)
- IPv6 prefix assigned via tunnel broker
- RFC 2827 – Network Ingress Filtering: Defeating Denial of Service Attacks
- Existing pfSense IPv4 static interface anti-spoofing behavior
No data to display