Linux Employment Opp

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: CraigWhiteCraigWhite@AzApple.com
Date:  
Subject: Linux Employment Opp
Having been violated...I am visiting with some thought...ipchains rules

I am currently blocking the following ports on my external network card...

23 (telnet)
53 (dns)
67 (bootp)
68 (bootp)
137 (netbios)
138 (netbios)

I also noticed that you have to be careful what you log when you are
connecting to @home's shared bandwidth because if you ignore all the jerks
doing endless port scanning, your logs will still multiply like flies in a
Chicago neighborhood if you log activity at ports 67, 68 & 2301.

obviously, if I want to give internet access to mail, ftp & www, I would
allow ports 25, 110, 21 & 80 (possibly 443) but I'm wondering if I'm missing
some obvious ports that are known to be exploited. Any suggestions?

one other question...if I don't install ssh, is there any benefit to create
a rule for ipchains to DENY/REJECT port 22 or is it meaningless if neither
inetd nor any other daemon monitors it?

thanks

Craig

----:----|----:----|----:----|----:----|----:----|----:----|
- Craig White - PO Box 8634 - Scottsdale, Arizona - 85252
- e-mail address ................ -
- world wide web address ........ - http://www.AzApple.com
- e-mail my pager address ....... -
- cellular phone ................ - (602) 377-9752
- voice/facsimile ............... - (480) 945-8445
----:----|----:----|----:----|----:----|----:----|----:----|