ipchains - sorry to flog this horse
der.hans
PLUGd@LuftHans.com
Sat, 1 Apr 2000 01:01:47 -0700 (MST)
On Fri, 31 Mar 2000, Craig White wrote:
> thinking that this discussion might be of interest to others and not wanting
> to abuse Mike Sheldon or Jean Francois...but I am feeling like by installing
> linux systems on the internet, I am lobbing up softballs for weak hitters to
> hit out of the park.
>
> 1 - if I create a chain ruleset
>
> default policy deny
> accept TCP/UDP port 25, 110, 80
> reject TCP/UDP ports 1:1024
You could specifically block incoming TCP connections above 1024 as well.
Also, the ipchains HOWTO suggests blocking one of the icmp types. Type 5,
I believe...
> does this adequately protect all but mail & www from things
> like BIND & FTP exploitation attacks?
>
> 2 - does it then make sense to use tcpd to protect the exposed services?
I think so. If your chains get screwed up you still have other mechanisms
to keep you safe. I don't like trusting only one mechanism, especially on
a firewall. I also comment out all services in /etc/inetd.conf as well as
disabling inetd just in case it gets turned on again.
ciao,
der.hans
--
# +++++++++++=================================+++++++++++ #
# der.hans@LuftHans.com www.excelco.com #
# http://home.pages.de/~lufthans/ #
# I've got a photographic memory, #
# but I'm lousy photographer. - der.hans #
# ===========+++++++++++++++++++++++++++++++++=========== #