On Fri, 31 Mar 2000
sinck@corp.quepasa.com wrote:
>
>
> \_ thinking that this discussion might be of interest to others and not wanting
> \_ to abuse Mike Sheldon or Jean Francois...but I am feeling like by installing
> \_ linux systems on the internet, I am lobbing up softballs for weak hitters to
> \_ hit out of the park.
> \_
> \_ 1 - if I create a chain ruleset
> \_
> \_ default policy deny
> \_ accept TCP/UDP port 25, 110, 80
Port 25 should be accept tcp from port 25 and port >1024. Actually, are
reserved ports 0-1023 or 1-1024? Greater to than the upper end of whatever
the correct range is :).
Pop uses udp? In any case, I believe only unpriviledged port clients will
be connecting to it, e.g. only coming from >1024.
For http there should only be tcp requests from >1024.
> \_ reject TCP/UDP ports 1:1024
> \_
> \_ does this adequately protect all but mail & www from things
> \_ like BIND & FTP exploitation attacks?
>
> I'm pretty sure you're gonna want 53 in there... otherwise it'll be
> harder to resolve hostnames.
For dns requests from outside world:
allow udp/tcp from 53 and >1024
allow to udp/tcp 53
Replace 1024 with 1023 as appropriate if the range turns out to be 0-1023
:).
ciao,
der.hans
--
# +++++++++++=================================+++++++++++ #
# der.hans@LuftHans.com www.excelco.com #
# http://home.pages.de/~lufthans/ #
# Science is magic explained. - der.hans #
# ===========+++++++++++++++++++++++++++++++++=========== #