James G. Sack (jim) wrote:
At the risk of pushing the cycleRalph Shumaker wrote:

Interesting.

James G. Sack (jim) wrote:
http://www.mozy.com/Ralph Shumaker wrote:

Still leaking???

..


..
If the only way that I am vulnerable is open ports with running
services, then reducing those to the essential few should be sufficient,
right?

The only super-paranoid solution is not to put your computer on any
network, and build a faraday cage around your house, and ... <heh>.

But, most of us compromise and accept some risk, eh? I think you have a
basic understanding of services and how to check, and with that said, I
would confirm your statement above.

Yes, but my statement was not to focus so much on reducing the number of services running (altho it is to be included) so much as reducing the number of ports that answer back, namely, make it such that the only ports that answer back are the ones in use by a running service.



..


Admittedly, I know little on the subject, but since only a few services
are running (like ntp), wouldn't it be better to DROP everything and
then just ACCEPT the few that are welcome?

That's what the firewall in the DSL modem _should_ allow you  to do --
taking care not to disable a couple of ICMP protocol messages (details
of which I can't remember) that are inadvisable to ignore.

..
# service iptables status
[ugly-formatted info snipped]
# service iptables status (with proposed changes[1])
(changes proposed from my own ideas -- *please* advise)
Table: filter
Chain INPUT (policy ACCEPT)
num target     prot opt source    destination
1   RH-Firewall-1-INPUT all -- 0.0.0.0/0 0.0.0.0/0

Chain FORWARD (policy ACCEPT)
num target     prot opt source    destination
#1 REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
1   DROP       all  --  0.0.0.0/0 0.0.0.0/0 drop

Chain OUTPUT (policy ACCEPT)
num target     prot opt source    destination

Chain RH-Firewall-1-INPUT (1 references)
num target     prot opt source    destination
1   ACCEPT     all  --  0.0.0.0/0 0.0.0.0/0
2   ACCEPT     icmp --  0.0.0.0/0 0.0.0.0/0 icmp type 255
3   ACCEPT     esp  --  0.0.0.0/0 0.0.0.0/0
4   ACCEPT     ah   --  0.0.0.0/0 0.0.0.0/0
5   ACCEPT     udp  --  0.0.0.0/0 224.0.0.251 udp dpt:5353
6   ACCEPT     udp  --  0.0.0.0/0 0.0.0.0/0 udp dpt:631
7   ACCEPT     tcp  --  0.0.0.0/0 0.0.0.0/0 tcp dpt:631
8   ACCEPT     all  --  0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
9   ACCEPT     tcp  --  0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22
#10 REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
10  DROP       all  --  0.0.0.0/0 0.0.0.0/0 drop

[1] treating this as a file with lines commented out with "#"


==> We (you) need advice here from a bonafide firewall guru.

It looks to me  like the default policy is ACCEPT just so a last-resort
policy of REJECT with a (reject with imp-host-prohibited) message cvan
be emitted. This may be good strategy for pcs on a (relatively) trusted
LAN, but it seems to me that it might not be the best setup for your
bridged connection to the I'net and with your DSL modem allowing some
unwanted packets entry -- ports 1026,1027,1028, [something else(MSoft)].

Thanks for all your help jim. I think maybe I ought to start a new thread for iptables help.



--
The four greatest threats to Americans today:
1) Executive orders giving President carte blanche dictatorial power
2) Our current foreign policy (foreign occupation by our military)
3) The federal income tax and all other unconstitutional taxes
4) Unconstitutional spending by congress, exceeding revenues, year after year, after year, after year, after year, leading ultimately to our utter enslavement by the owners of the world bank


--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to