TCLUG Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [TCLUG:5528] security
> I ran nmap on this server from outside the intranet and it says lots of
> things are open:
Well, what I would do is have a default REJECT policy for incoming connections
to the server in the kernel's IP chains or forwarding rules.
With ipchains, you'd do something like
ipchains -P input REJECT
which changes the default policy for incoming connections to 'REJECT' -- people
connecting to your system will get 'connection refused' (hopefully)
At this point, you probably can't connect to any port on the server from a
remote host (maybe not even loopback..) Now, to allow your local network
access, we'll issue the following command
ipchains -A input --source 192.168.1.0/255.255.255.0 -j ACCEPT
Hosts on your local network will hopefully be able to make connections, but
hosts outside that network will be rejected (as per the default policy).
There is a fair amount of documentation on ipchains and ipfwadm out there (you
just have to find it ;-), so any other strange tweaks you want to do can
probably also be made..
--
.------ ----- ---- ---- --- --- -- -- - - - - -
| Mike Hicks | Linux User Since: 1.2.13
: http://umn.edu/~hick0088 | mailto:hick0088@tc.umn.edu
` icq:6883760 | Current Kernel: 2.2.5
- References:
- security
- From: Ben Luey <lueyb@carleton.edu>