On Friday, 23 February 2007 3:15, Michael Sullivan wrote:
> I have logsentry installed on my system which sends me hourly reports
> about possible hack attempts on my three boxes.  I use ipkungfu for my
> firewall.  I've stuck with the default configuration for ipkungfu,
> except for listing each of my machines in my LAN in the
> accepted_hosts.conf file.  I also set ipkungfu to drop all offensive
> packets (not sure if that's the default or not.)  Whenever I see someone
> trying the break in in the logsentry reports, I add their IP to the
> deny_hosts.conf file and restart ipkungfu so that the changes will take
> effect.  I'm wondering why if these offending IPs in deny_hosts.conf are
> being stopped at the firewall I'm still seeing them fail to authenticate
> to my FTP and ssh servers?

If you think you've setup your firewall to block these IPs and yet they are 
still able to access your machines, then it sounds like your firewall is 
misconfigured and isn't blocking the IPs.

> Also, I've always heard that you shouldn't 
> have any ports open on your machine unless you have some server bound to
> that port because hackers can get in through unbound open ports.  Is
> this true? 

I've never heard of this. All ports that you don't want accessible from the 
internet should be completely blocked by your firewall if you have it 
correctly configured.

> If so, how does it work?  What do they connect to if 
> nothing's running on the port they're trying?  I know the concept of a
> backdoor in a running program, but if no program is running on said port
> for them to connect to, how do they get in???

They connect to nothing, they shouldn't be able to establish a connection.

> -Michael Sullivan-



-- 
Raymond Lewis Rebbeck
-- 
gentoo-user@gentoo.org mailing list

Reply via email to