ipchains - sorry to flog this horse

der.hans PLUGd@LuftHans.com
Sat, 1 Apr 2000 01:01:47 -0700 (MST)


On Fri, 31 Mar 2000, Craig White wrote:

> thinking that this discussion might be of interest to others and not wanting
> to abuse Mike Sheldon or Jean Francois...but I am feeling like by installing
> linux systems on the internet, I am lobbing up softballs for weak hitters to
> hit out of the park.
> 
> 1 - if I create a chain ruleset
> 
>     default policy deny
>     accept TCP/UDP port 25, 110, 80
>     reject TCP/UDP ports 1:1024

You could specifically block incoming TCP connections above 1024 as well.

Also, the ipchains HOWTO suggests blocking one of the icmp types. Type 5,
I believe...

>     does this adequately protect all but mail & www from things
>     like BIND & FTP exploitation attacks?
> 
> 2 - does it then make sense to use tcpd to protect the exposed services?

I think so. If your chains get screwed up you still have other mechanisms
to keep you safe. I don't like trusting only one mechanism, especially on
a firewall. I also comment out all services in /etc/inetd.conf as well as
disabling inetd just in case it gets turned on again.

ciao,

der.hans
-- 
# +++++++++++=================================+++++++++++ #
#  der.hans@LuftHans.com                  www.excelco.com #
#            http://home.pages.de/~lufthans/              #
#             I've got a photographic memory,             #
#         but I'm lousy photographer. - der.hans          #
# ===========+++++++++++++++++++++++++++++++++=========== #