IMHO, putting a box on the interweb has security implications. But
port-forwarding in itself isn't exactly a security problem. I use port
forwarding to forward packets do a dmz, so on the off-chance that I am
r00t'd, all they have access to is the dmz. They still would have to be
real sneaky to get into my internal network, unless they can exploit the
firewall which isn't running any services.

>From my understanding, using port forwarding into a dmz is a very good
idea. Running services on your firewall is a much greater risk than port
forwarding, since if the firewall is r00t'd, then they control the
access point to the interweb and can sniff user/pass at will, and do
whatever else they feel inclined to do. 

Not trying to start a huge thread or a flame, but pointing out that
port-forwarding in itself doesn't have any security implications, it's
the implementation of port-forwarding that can have security
implications.


My .03, adjusted for inflation



Steven 

"exitus acta probat"
"fide, sed cui vide"



-----Original Message-----
From: Phillip Hofmeister [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, February 13, 2002 6:42 AM
To: [EMAIL PROTECTED]
Cc: debian-security@lists.debian.org
Subject: Re: Emulate real ip's to access intranet hosts from outside


I think it is worth pointing out that port-forwarding has security
implications.  If one of your services is compromised (even if it is not
running as root) the attacker now has a good amount of access to your
local/internal network.  I would only forward ports when absolutely
needed and only to a service that I absolutely trusted.

Phil


Reply via email to