April HackFest: Firewall ISO's or Debunking Cable/DSL Modem/Router Marketing
Myths
Join us at UAT.edu 2625 W. BASELINE RD., TEMPE, AZ 85283-1056
|
Noon until 3PM (or whenever we all wander off) for a lab session centered
around cable/DSL security and Linux box firewall engineering.
While we all totally love our WRT54's running http://openwrt.org/ and other
teensy distro's, not everyone can configure an industry stable firewall
solution from the command line, that provides real protection from all the
various high level security issues we, as Linux users and implementers, must be
cognizant of, while working professionally, or interacting in security and IRC
community endeavors. DynamicDNS works wonderfully with a linux ISO firewall
solution.
So we will build a Linux firewall from an ISO, onto a box with multiple network
interfaces, configure it, then setup for various uses.
At the end of the day, we will have an enterprise ready firewall solution to
"plug" to DSL or cable that can provide VPN, secure shell (using source and
destination controls), various physically unique subnets, comprehensive
logging, including SNORT/Squid (and more). Can you say "HoneyPot"?
Are you dying for a nice 1000GB solution for your home network, but don't want
to pay for a Cisco Business Solution (aka LinkSys)? GigE Cards are cheap
starting at about $24.00!
You can have as many cards (and even separate NAT networks) as your PCI bus
allows! Check for driver version in your distro before purchase.
This is a solution that cannot be easily fuzzed, buffer overflowed, or hijacked
(unlike OpenWRT, Linksys and Netgear firmware), <caveat> when properly
configured and maintained. Script kiddies and bots will not be lurking out
there waiting to pounce as soon as you reset the configuration or update the
firmware; netcat/nmap scanners pretending to originate from China will be
seriously disappointed when they meet with a three zone solution, comparable to
Cisco 4500 (without all the known exploits inherent in the cisco IOS).
Easy peasy configuration wizards are all a part of such a multi-zone FOSS Linux
firewall.
Bring your old towers, extra network cards, and if you like, choose any
security ISO to burn for installation on your box (be careful to note CD/DVD
match to source) or just watch and work along with us as we build and demo
various solutions:
1) LiveCD
http://www.wifi.com.ar/english/cdrouter/
This is a sweet solution, since it's variously source static (they can't
rootkit - you just reboot); configurations can be saved to Jumpdrive USB. It's
small and fast and runs a version of Shorewall. Not sure of the robustness of
the installation, or the driver list for your hardware - see the site for more
information. Plug members can always assist to get your Xorg.conf setup.
Bring your jumpdrive for persistent data you don't want to have to recreate all
the time?
http://www.wifi.com.ar/download/livecdrouter/
This is not the state of the art solution SmoothWall is, but it does have it's
s-hexy applications. Many professionals carry one of these Firewall LiveCD's
along with Knoppix, and BT4 in their tool kits, especially where they don't
have DVD's in favor of CD's on old servers.
2) Ignalum
http://www.ignalum.com/downloads/index.php
3) SmoothWall
http://www.smoothwall.org http://smoothwall.org/get/index.php
http://www.daniweb.com/tutorials/tutorial14094.html
http://downloads.sourceforge.net/smoothwall/smoothwall-express-3.0-install-guide.pdf
Solid well supported solution, hyped to be comparable to a CoyotePoint or
Juniper/Cisco ACL; Smoothwall is certainly an OSI bottom up, industry standard
tool that includes installation wizards for even the novice user! A RFC
compliant internal/external, no rev-arp, no-arp spoof, no
multicast/Zeroconf/UPNP, URL injection controls, safe PPOE, no IGMP, GRE
Tunnels, ptpp passthrough control, VOIP stun server setups, XSS stunnel
outbound blocking; a firewall solution that can be deployed to provide more
than blinky blinky blueness.
Smoothwall also supports Wireless cards.
4) IPCop
Surprise guest presenter might be available to show us IpCop from his equipment.
http://www.ipcop.org/
5) Extra Credit
Extra credit discussion will include the very avante guard (go figure) concepts
of "how to bypass the 'cable modem'" or how to create a single networked
solution, requesting DHCP from cable and dsl providers while providing NAT
directly (without the pass-through) to our internal network zone.
No OVERLY EXPENSIVE, UNDER FUNCTIONAL, proprietary daisy chained
"modems/routers"?
6) Live Cast
We plan to live cast the event for the shut ins, gas hoarders, and plug-sters
living the good life in Po-Dunk Arizona.
7) Testing
If we have time, we might get it on via a BT3 mass hack to see what we can get
into, while sharing the same network internally and externally.
References:
General Hardware Requirements (from Ignalum)
The following information represents the minimum hardware requirements
necessary to successfully install (http://www.ignalum.com/downloads/index.php)
Ignalum:
CPU:
NOTE:
The following CPU specifications are stated in terms of Intel
processors. Other processors (notably, offerings from AMD, Cyrix, and
VIA) that are compatible with and equivalent to the following Intel
processors may also be used with Ignalum Linux.
Minimum: P6-class x86 CPU
NOTE: Distro optimized for P6-class x86 CPUs (Pentium Pro/II,
Celeron 266-533MHz, original Athlon), and does not support older
processors.Recommended for text-mode: 200 MHz Pentium PRO or betterRecommended
for graphical: 400 MHz Pentium II or better
Hard Disk Space (NOTE: Additional space will be required for user data):
Custom Installation (Minimal): 620MBServer: 1.1GBPersonal Desktop:
2.3GBWorkstation: 3.0GBCustom Installation (Everything): 6.9GB
Memory:
Minimum for text-mode: 64MBMinimum for graphical: 192MBRecommended for
graphical: 256MB
A good used Dell with sufficient PCI card bus should be sufficient. Remember
not to be miserly when it comes to choosing hardware for your firewall, and
remote access machine.
Exploit References:
http://www.gnucitizen.org/blog/flash-upnp-attack-faq/
http://www.gnucitizen.org/blog/hacking-with-upnp-universal-plug-and-play/
https://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=8676
http://www.asininemonkey.com/netgear-dg834gt-hacking.html
http://openwrt.org/
http://www.dd-wrt.com/
http://radar.oreilly.com/2008/06/hacking-tcpip-to-support-locat.html
http://www.linuxfocus.org/English/January2001/article144.shtml
http://www.google.com/search?hl=en&client=firefox-a&rls=org.mozilla%3Aen-US%3Aofficial&q=hacking+netgear+router&btnG=Searc
http://mcse.mvps.org/legacy/howto.html
http://homepage.ntlworld.com/robin.d.h.walker/cmtips/basicset.html
http://www.linuxsecurity.com/resource_files/firewalls/firewall-seen.html
http://www.derkeiler.com/Mailing-Lists/Securiteam/2002-06/0074.html
http://wareseeker.com/free-bypass-any-firewall/
Obnosis | (503)754-4452
PLUG Linux Security Labs 2nd Saturday Each mo...@noon - 3PM
_________________________________________________________________
Rediscover HotmailĀ®: Get e-mail storage that grows with you.
http://windowslive.com/RediscoverHotmail?ocid=TXT_TAGLM_WL_HM_Rediscover_Storage1_042009
---------------------------------------------------
PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss