Re: init.d startup sequence for shorewall

2002-12-13 Thread Dale Amon
On Fri, Dec 13, 2002 at 05:47:19PM +0100, Javier Fern?ndez-Sanguino Pe?a wrote:
> On Fri, Dec 13, 2002 at 05:17:09PM +0200, Pavel Minev Penev wrote:
> > /etc/network/interfaces
> > 
> > pre-up
> > 
>   I know you can do it there. Unfortunately, firewall packages in
> debian (even ones I have packaged) do not do this properyl (yet).

That's why I always use the rc link building script to roll 
my own at a boot time(s) and place(s) of my choosing ;-)



Re: init.d startup sequence for shorewall

2002-12-13 Thread Dale Amon
On Fri, Dec 13, 2002 at 05:47:19PM +0100, Javier Fern?ndez-Sanguino Pe?a wrote:
> On Fri, Dec 13, 2002 at 05:17:09PM +0200, Pavel Minev Penev wrote:
> > /etc/network/interfaces
> > 
> > pre-up
> > 
>   I know you can do it there. Unfortunately, firewall packages in
> debian (even ones I have packaged) do not do this properyl (yet).

That's why I always use the rc link building script to roll 
my own at a boot time(s) and place(s) of my choosing ;-)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: init.d startup sequence for shorewall

2002-12-13 Thread Javier Fernández-Sanguino Peña
On Fri, Dec 13, 2002 at 05:17:09PM +0200, Pavel Minev Penev wrote:
> /etc/network/interfaces
> 
>   pre-up
> 
I know you can do it there. Unfortunately, firewall packages in
debian (even ones I have packaged) do not do this properyl (yet).

Regards

Javi


pgpv1X9dTJ7IA.pgp
Description: PGP signature


Re: init.d startup sequence for shorewall

2002-12-13 Thread Javier Fernández-Sanguino Peña
On Fri, Dec 13, 2002 at 05:17:09PM +0200, Pavel Minev Penev wrote:
> /etc/network/interfaces
> 
>   pre-up
> 
I know you can do it there. Unfortunately, firewall packages in
debian (even ones I have packaged) do not do this properyl (yet).

Regards

Javi



msg08157/pgp0.pgp
Description: PGP signature


Re: init.d startup sequence for shorewall

2002-12-13 Thread Pavel Minev Penev
On Fri, Dec 13, 2002 at 09:25:02AM +0100, Javier Fern?ndez-Sanguino Pe?a wrote:
> On Thu, Dec 12, 2002 at 04:18:17PM -0500, Raymond Wood wrote:
> > There have been several responses to Yogesh's question, but none
> > of them provide a clear and straightforward answer.  
> 
> Ok. Let me try again: this is a security risk. 
> 
> A gateway firewall _needs_ to be setup the following way:
> 
> 0.- setup a default DROP policy, flush all policies
> 1.- startup network interfaces (but w/o forwarding)
> 2.- setup proper firewall rules
> 3.- enable forwarding

/etc/network/interfaces

pre-up

-- 
Pav
 ,.,
   ,``:'',
That your internet traffic is  {o ! o}  My GPG/PGP key is now available at
vulnarable is NOT only a joke! ] -+- [  x-hkp://search.keyserver.net:11371.
\ ! /
 `-'

`shell$ gpg --keyserver x-hkp://search.keyserver.net:11371 --recv-key 164C028F`


pgppKTwK1OZmW.pgp
Description: PGP signature


Re: init.d startup sequence for shorewall

2002-12-13 Thread Pavel Minev Penev
On Fri, Dec 13, 2002 at 09:25:02AM +0100, Javier Fern?ndez-Sanguino Pe?a wrote:
> On Thu, Dec 12, 2002 at 04:18:17PM -0500, Raymond Wood wrote:
> > There have been several responses to Yogesh's question, but none
> > of them provide a clear and straightforward answer.  
> 
> Ok. Let me try again: this is a security risk. 
> 
> A gateway firewall _needs_ to be setup the following way:
> 
> 0.- setup a default DROP policy, flush all policies
> 1.- startup network interfaces (but w/o forwarding)
> 2.- setup proper firewall rules
> 3.- enable forwarding

/etc/network/interfaces

pre-up

-- 
Pav
 ,.,
   ,``:'',
That your internet traffic is  {o ! o}  My GPG/PGP key is now available at
vulnarable is NOT only a joke! ] -+- [  x-hkp://search.keyserver.net:11371.
\ ! /
 `-'

`shell$ gpg --keyserver x-hkp://search.keyserver.net:11371 --recv-key 164C028F`



msg08156/pgp0.pgp
Description: PGP signature


Re: init.d startup sequence for shorewall

2002-12-13 Thread Phillip Hofmeister
On Thu, 12 Dec 2002 at 01:07:48PM -0800, Jeremy A. Puhlman wrote:
> Actually that seems to be a highly secure firewall...Firewalls with no power 
> cannot
> be compromised via the network:-)

Wake on Lan? :)

-- 
Phil

PGP/GPG Key:
http://www.zionlth.org/~plhofmei/
wget -O - http://www.zionlth.org/~plhofmei/key.txt | gpg --import
--
Excuse #124: Big to little endian conversion error 



Re: init.d startup sequence for shorewall

2002-12-13 Thread Phillip Hofmeister
On Thu, 12 Dec 2002 at 01:07:48PM -0800, Jeremy A. Puhlman wrote:
> Actually that seems to be a highly secure firewall...Firewalls with no power cannot
> be compromised via the network:-)

Wake on Lan? :)

-- 
Phil

PGP/GPG Key:
http://www.zionlth.org/~plhofmei/
wget -O - http://www.zionlth.org/~plhofmei/key.txt | gpg --import
--
Excuse #124: Big to little endian conversion error 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: init.d startup sequence for shorewall

2002-12-13 Thread Javier Fernández-Sanguino Peña
On Thu, Dec 12, 2002 at 04:18:17PM -0500, Raymond Wood wrote:
> There have been several responses to Yogesh's question, but none
> of them provide a clear and straightforward answer.  

Ok. Let me try again: this is a security risk. 

A gateway firewall _needs_ to be setup the following way:

0.- setup a default DROP policy, flush all policies
1.- startup network interfaces (but w/o forwarding)
2.- setup proper firewall rules
3.- enable forwarding

This makes sure that:

a.- the firewall cannot be attacked from the time the network is brought
up and the rules are setup (because of 0)

b.- the systems protected by the firewall cannot be attacked from the time
the network is brough up and forwarding is enabled (because 3 is done
_after_ 1 and _after_ 2)

Clear enough now?
Any firewall that does not startup this way is introducing a
security issue since the network (or the firewall) are _unprotected_ for
some time during startup (or when the firewall is restarted)

Of course: IMHO, YMMV...

Regards

Javi



pgpVHTeHsge3L.pgp
Description: PGP signature


Re: init.d startup sequence for shorewall

2002-12-13 Thread Javier Fernández-Sanguino Peña
On Thu, Dec 12, 2002 at 01:07:48PM -0800, Jeremy A. Puhlman wrote:
> 
> Actually that seems to be a highly secure firewall...Firewalls with no power 
> cannot
> be compromised via the network:-)

Neither can this one:

http://www.ranum.com/pubs/a1fwall/

:)

Javi


pgprCjwQ1Z3Sc.pgp
Description: PGP signature


Re: init.d startup sequence for shorewall

2002-12-13 Thread Javier Fernández-Sanguino Peña
On Thu, Dec 12, 2002 at 04:18:17PM -0500, Raymond Wood wrote:
> There have been several responses to Yogesh's question, but none
> of them provide a clear and straightforward answer.  

Ok. Let me try again: this is a security risk. 

A gateway firewall _needs_ to be setup the following way:

0.- setup a default DROP policy, flush all policies
1.- startup network interfaces (but w/o forwarding)
2.- setup proper firewall rules
3.- enable forwarding

This makes sure that:

a.- the firewall cannot be attacked from the time the network is brought
up and the rules are setup (because of 0)

b.- the systems protected by the firewall cannot be attacked from the time
the network is brough up and forwarding is enabled (because 3 is done
_after_ 1 and _after_ 2)

Clear enough now?
Any firewall that does not startup this way is introducing a
security issue since the network (or the firewall) are _unprotected_ for
some time during startup (or when the firewall is restarted)

Of course: IMHO, YMMV...

Regards

Javi




msg08149/pgp0.pgp
Description: PGP signature


Re: init.d startup sequence for shorewall

2002-12-13 Thread Javier Fernández-Sanguino Peña
On Thu, Dec 12, 2002 at 01:07:48PM -0800, Jeremy A. Puhlman wrote:
> 
> Actually that seems to be a highly secure firewall...Firewalls with no power cannot
> be compromised via the network:-)

Neither can this one:

http://www.ranum.com/pubs/a1fwall/

:)

Javi



msg08148/pgp0.pgp
Description: PGP signature


Re: init.d startup sequence for shorewall

2002-12-12 Thread Mitch Thompson




On Thu, 2002-12-12 at 15:07, Jeremy A. Puhlman wrote:

- Original Message - 
From: "Matt Zimmerman" <[EMAIL PROTECTED]>
To: 
Sent: Thursday, December 12, 2002 12:55 PM
Subject: Re: init.d startup sequence for shorewall


> On Wed, Dec 11, 2002 at 05:39:37PM -0800, Yogesh Sharma wrote:
> 
> > networking comes up at S35 in runlevel 0 so my internet is up and there
> > is no firewall running so far.
> 
> runlevel 0 is system shutdown and halt.  The network is not brought up in
> this runlevel. :-)
> 

Actually that seems to be a highly secure firewall...Firewalls with no power cannot
be compromised via the network:-)

Jeremy

> -- 
>  - mdz
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 
> 


Well, check this article out from the Sysadmin (magazine) website:

http://www.samag.com/documents/s=1824/sam0201d/0201d.htm

It describes a method of using a system with a halted kernel as a firewall.



Mitch Thompson, San Antonio TX Red Hat Certified Engineer (RHCE) http://home.satx.rr.com/mlthompson Key fingerprint = BBDA 3A2A 4483 BD0D 7CED B8A9 D183 C8F6 B0AF 66AE wget -O - http://home.satx.rr.com/mlthompson/pubkey.gpg | gpg --import -- America works less, when you say "Union Yes!"~








signature.asc
Description: This is a digitally signed message part


Re: init.d startup sequence for shorewall

2002-12-12 Thread Mitch Thompson




On Thu, 2002-12-12 at 15:07, Jeremy A. Puhlman wrote:

- Original Message - 
From: "Matt Zimmerman" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, December 12, 2002 12:55 PM
Subject: Re: init.d startup sequence for shorewall


> On Wed, Dec 11, 2002 at 05:39:37PM -0800, Yogesh Sharma wrote:
> 
> > networking comes up at S35 in runlevel 0 so my internet is up and there
> > is no firewall running so far.
> 
> runlevel 0 is system shutdown and halt.  The network is not brought up in
> this runlevel. :-)
> 

Actually that seems to be a highly secure firewall...Firewalls with no power cannot
be compromised via the network:-)

Jeremy

> -- 
>  - mdz
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 
> 


Well, check this article out from the Sysadmin (magazine) website:

http://www.samag.com/documents/s=1824/sam0201d/0201d.htm

It describes a method of using a system with a halted kernel as a firewall.



Mitch Thompson, San Antonio TX Red Hat Certified Engineer (RHCE) http://home.satx.rr.com/mlthompson Key fingerprint = BBDA 3A2A 4483 BD0D 7CED B8A9 D183 C8F6 B0AF 66AE wget -O - http://home.satx.rr.com/mlthompson/pubkey.gpg | gpg --import -- America works less, when you say "Union Yes!"~








signature.asc
Description: This is a digitally signed message part


Re: init.d startup sequence for shorewall

2002-12-12 Thread Daniel Swärd
> > > networking comes up at S35 in runlevel 0 so my internet is up and there
> > > is no firewall running so far.
> > 
> > runlevel 0 is system shutdown and halt.  The network is not brought up in
> > this runlevel. :-)
> > 
> 
> Actually that seems to be a highly secure firewall...Firewalls with no power 
> cannot
> be compromised via the network:-)

http://www.samag.com/documents/s=1824/sam0201d/0201d.htm

Halted firewalls?

/Daniel
 
-- 
File not found. Should I fake it (y/n)?



Re: init.d startup sequence for shorewall

2002-12-12 Thread Yogesh Sharma
On Thu, 2002-12-12 at 12:55, Matt Zimmerman wrote:
> On Wed, Dec 11, 2002 at 05:39:37PM -0800, Yogesh Sharma wrote:
> 
> > networking comes up at S35 in runlevel 0 so my internet is up and there
> > is no firewall running so far.
> 
> runlevel 0 is system shutdown and halt.  The network is not brought up in
> this runlevel. :-)
> 
Sorry I type wrong runlevel, please read runlevel 1
> -- 
>  - mdz
-- 
Yogesh Sharma <[EMAIL PROTECTED]>


signature.asc
Description: This is a digitally signed message part


Re: init.d startup sequence for shorewall

2002-12-12 Thread Raymond Wood
On Thu, Dec 12, 2002 at 03:55:56PM -0500, Matt Zimmerman remarked:

> On Wed, Dec 11, 2002 at 05:39:37PM -0800, Yogesh Sharma wrote:
> > networking comes up at S35 in runlevel 0 so my internet is
> > up and there is no firewall running so far.

> runlevel 0 is system shutdown and halt.  The network is not
> brought up in this runlevel. :-)
> -- 
>  - mdz

There have been several responses to Yogesh's question, but none
of them provide a clear and straightforward answer.  

Does anyone know why Shorewall leaves the system unprotected
between network startup and firewall startup, whether it is a
security risk, and if so what can be done about it besides crude
workarounds?

Cheers,
Raymond


pgpRDYUvDjDmr.pgp
Description: PGP signature


Re: init.d startup sequence for shorewall

2002-12-12 Thread Jeremy A. Puhlman

- Original Message - 
From: "Matt Zimmerman" <[EMAIL PROTECTED]>
To: 
Sent: Thursday, December 12, 2002 12:55 PM
Subject: Re: init.d startup sequence for shorewall


> On Wed, Dec 11, 2002 at 05:39:37PM -0800, Yogesh Sharma wrote:
> 
> > networking comes up at S35 in runlevel 0 so my internet is up and there
> > is no firewall running so far.
> 
> runlevel 0 is system shutdown and halt.  The network is not brought up in
> this runlevel. :-)
> 

Actually that seems to be a highly secure firewall...Firewalls with no power 
cannot
be compromised via the network:-)

Jeremy

> -- 
>  - mdz
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 
> 



Re: init.d startup sequence for shorewall

2002-12-12 Thread Matt Zimmerman
On Wed, Dec 11, 2002 at 05:39:37PM -0800, Yogesh Sharma wrote:

> networking comes up at S35 in runlevel 0 so my internet is up and there
> is no firewall running so far.

runlevel 0 is system shutdown and halt.  The network is not brought up in
this runlevel. :-)

-- 
 - mdz



Re: init.d startup sequence for shorewall

2002-12-12 Thread Daniel Swärd
> > > networking comes up at S35 in runlevel 0 so my internet is up and there
> > > is no firewall running so far.
> > 
> > runlevel 0 is system shutdown and halt.  The network is not brought up in
> > this runlevel. :-)
> > 
> 
> Actually that seems to be a highly secure firewall...Firewalls with no power cannot
> be compromised via the network:-)

http://www.samag.com/documents/s=1824/sam0201d/0201d.htm

Halted firewalls?

/Daniel
 
-- 
File not found. Should I fake it (y/n)?


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: init.d startup sequence for shorewall

2002-12-12 Thread Yogesh Sharma
On Thu, 2002-12-12 at 12:55, Matt Zimmerman wrote:
> On Wed, Dec 11, 2002 at 05:39:37PM -0800, Yogesh Sharma wrote:
> 
> > networking comes up at S35 in runlevel 0 so my internet is up and there
> > is no firewall running so far.
> 
> runlevel 0 is system shutdown and halt.  The network is not brought up in
> this runlevel. :-)
> 
Sorry I type wrong runlevel, please read runlevel 1
> -- 
>  - mdz
-- 
Yogesh Sharma <[EMAIL PROTECTED]>



signature.asc
Description: This is a digitally signed message part


Re: init.d startup sequence for shorewall

2002-12-12 Thread Raymond Wood
On Thu, Dec 12, 2002 at 03:55:56PM -0500, Matt Zimmerman remarked:

> On Wed, Dec 11, 2002 at 05:39:37PM -0800, Yogesh Sharma wrote:
> > networking comes up at S35 in runlevel 0 so my internet is
> > up and there is no firewall running so far.

> runlevel 0 is system shutdown and halt.  The network is not
> brought up in this runlevel. :-)
> -- 
>  - mdz

There have been several responses to Yogesh's question, but none
of them provide a clear and straightforward answer.  

Does anyone know why Shorewall leaves the system unprotected
between network startup and firewall startup, whether it is a
security risk, and if so what can be done about it besides crude
workarounds?

Cheers,
Raymond



msg08141/pgp0.pgp
Description: PGP signature


Re: init.d startup sequence for shorewall

2002-12-12 Thread Jeremy A. Puhlman

- Original Message - 
From: "Matt Zimmerman" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, December 12, 2002 12:55 PM
Subject: Re: init.d startup sequence for shorewall


> On Wed, Dec 11, 2002 at 05:39:37PM -0800, Yogesh Sharma wrote:
> 
> > networking comes up at S35 in runlevel 0 so my internet is up and there
> > is no firewall running so far.
> 
> runlevel 0 is system shutdown and halt.  The network is not brought up in
> this runlevel. :-)
> 

Actually that seems to be a highly secure firewall...Firewalls with no power cannot
be compromised via the network:-)

Jeremy

> -- 
>  - mdz
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 
> 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: init.d startup sequence for shorewall

2002-12-12 Thread Matt Zimmerman
On Wed, Dec 11, 2002 at 05:39:37PM -0800, Yogesh Sharma wrote:

> networking comes up at S35 in runlevel 0 so my internet is up and there
> is no firewall running so far.

runlevel 0 is system shutdown and halt.  The network is not brought up in
this runlevel. :-)

-- 
 - mdz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: init.d startup sequence for shorewall

2002-12-11 Thread Yogesh Sharma
On Tue, 2002-12-10 at 22:05, Gene wrote:
> can you elaborate on your question, since you're using the box as a 
> firewall, this particular service should be up first to ensure that your 
> perimeter is in check..  also, if this is your gateway host, how else 
> would you get your internal network to go outside?
> 
> i really didn't understand your question, so if you could elaborate on 
> what you want to do or your concern, i would be happy to reply back.
> 
> take care,
> /gene

I am running following services on this box
firewall (shorewall)
ssh
mailserver (qmail and courier-imap)
webserver (apache)
dhcp
zope

I have http, ssh, imap and smtp ports open. eth0 internet, eth1 interal
hub (which allows 3 laptops to access internet). 

My concern/question is this:

networking comes up at S35 in runlevel 0 so my internet is up and there
is no firewall running so far. System will switch to runlevel 2 where it
will start other serverices and at S90 it will start the firewall. So
for this short time between S35networking and S90shorewall my system is
not protected at all, this is my concern and question is "isn't this a
security risk ?"

Thanks

Yogesh

-- 
Yogesh Sharma <[EMAIL PROTECTED]>


signature.asc
Description: This is a digitally signed message part


Re: init.d startup sequence for shorewall

2002-12-11 Thread Yogesh Sharma
On Tue, 2002-12-10 at 22:05, Gene wrote:
> can you elaborate on your question, since you're using the box as a 
> firewall, this particular service should be up first to ensure that your 
> perimeter is in check..  also, if this is your gateway host, how else 
> would you get your internal network to go outside?
> 
> i really didn't understand your question, so if you could elaborate on 
> what you want to do or your concern, i would be happy to reply back.
> 
> take care,
> /gene

I am running following services on this box
firewall (shorewall)
ssh
mailserver (qmail and courier-imap)
webserver (apache)
dhcp
zope

I have http, ssh, imap and smtp ports open. eth0 internet, eth1 interal
hub (which allows 3 laptops to access internet). 

My concern/question is this:

networking comes up at S35 in runlevel 0 so my internet is up and there
is no firewall running so far. System will switch to runlevel 2 where it
will start other serverices and at S90 it will start the firewall. So
for this short time between S35networking and S90shorewall my system is
not protected at all, this is my concern and question is "isn't this a
security risk ?"

Thanks

Yogesh

-- 
Yogesh Sharma <[EMAIL PROTECTED]>



signature.asc
Description: This is a digitally signed message part


Re: init.d startup sequence for shorewall

2002-12-11 Thread Yogesh Sharma
On Tue, 2002-12-10 at 16:37, Kuba Jakubik wrote:
> Yogesh Sharma wrote:
> > In my opinion shorewall must be started as soon as network is up.
> can't you just mv S90shorewall S35shorewall ?
Yes, I can move this link but question is for security. In my opinion
this should be fixed in package installation script not at the user end.

> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 



signature.asc
Description: This is a digitally signed message part


Re: init.d startup sequence for shorewall

2002-12-10 Thread Yogesh Sharma
On Tue, 2002-12-10 at 16:37, Kuba Jakubik wrote:
> Yogesh Sharma wrote:
> > In my opinion shorewall must be started as soon as network is up.
> can't you just mv S90shorewall S35shorewall ?
Yes, I can move this link but question is for security. In my opinion
this should be fixed in package installation script not at the user end.

> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 




signature.asc
Description: This is a digitally signed message part


Re: init.d startup sequence for shorewall

2002-12-10 Thread Javier Fernández-Sanguino Peña
On Tue, Dec 10, 2002 at 03:39:35PM -0800, Yogesh Sharma wrote:
> 
> In my opinion shorewall must be started as soon as network is up.
> 
> What does list sugguests ? Is this a security problem ?

Yes this is a security issue, if you take iptables, for example, it is run
in S10. Any firewalling script should run before (or at the same time) as
the network is brought up. 

Otherwise, you have a few moments in which you are forwarding packets (if
the networking script enables it) and you are not filtering them (unless
you have a default DROP policy before configuring the firewall)

Regards

Javi




pgpmKrVThw6ja.pgp
Description: PGP signature


Re: init.d startup sequence for shorewall

2002-12-10 Thread Kuba Jakubik

Yogesh Sharma wrote:

Hello,

I am using shorewall as firewall for my system. It has got 2 ethernet
cards one connected to internet and one for internal network.
init.d/networking script is linked as S35networking and init.d/shorewall
script is linked as S90shorewall.

In my opinion shorewall must be started as soon as network is up.

can't you just mv S90shorewall S35shorewall ?


--
-BEGIN GEEK CODE BLOCK-
Version: 3.12
GIT d--- s: a--- C UL P+ L+++ E--- W+ N o-- K++ w---
O M- V- PS++ PE Y PGP t 5 X R tv-- b+ DI+ D+
G++ e- h! r+ y+
--END GEEK CODE BLOCK--



Re: init.d startup sequence for shorewall

2002-12-10 Thread Javier Fernández-Sanguino Peña
On Tue, Dec 10, 2002 at 03:39:35PM -0800, Yogesh Sharma wrote:
> 
> In my opinion shorewall must be started as soon as network is up.
> 
> What does list sugguests ? Is this a security problem ?

Yes this is a security issue, if you take iptables, for example, it is run
in S10. Any firewalling script should run before (or at the same time) as
the network is brought up. 

Otherwise, you have a few moments in which you are forwarding packets (if
the networking script enables it) and you are not filtering them (unless
you have a default DROP policy before configuring the firewall)

Regards

Javi





msg08110/pgp0.pgp
Description: PGP signature


Re: init.d startup sequence for shorewall

2002-12-10 Thread Kuba Jakubik
Yogesh Sharma wrote:

Hello,

I am using shorewall as firewall for my system. It has got 2 ethernet
cards one connected to internet and one for internal network.
init.d/networking script is linked as S35networking and init.d/shorewall
script is linked as S90shorewall.

In my opinion shorewall must be started as soon as network is up.

can't you just mv S90shorewall S35shorewall ?


--
-BEGIN GEEK CODE BLOCK-
Version: 3.12
GIT d--- s: a--- C UL P+ L+++ E--- W+ N o-- K++ w---
O M- V- PS++ PE Y PGP t 5 X R tv-- b+ DI+ D+
G++ e- h! r+ y+
--END GEEK CODE BLOCK--


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]