I'm feeling paranoid - with good reason.
Nigel Henry
cave.dnb at tiscali.fr
Thu Feb 2 18:26:18 GMT 2006
On Thursday 02 February 2006 16:28, Basil Fowler wrote:
> If this can help.
>
> I use a Speedtouch 510 router, and previously a 530 (this blew up after a
> thunderstorm!)
>
> I am highly suspicious of any commercial firewalls - one never knows if
> they are leaky by intent or design. So I set up a simple secondary
> firewall using iptables. Put this file in /etc/sysconfig/iptables. The
> rules stop anything coming in:
Hi Basil. I use a Smoothwall Express2 on dial-up as a dedicated firewall, and
have Guarddog the GUI frontend to IPtables on the client machines, this setup
works ok (IPtables under the hood always looked very complex). You obviously
have had plenty of practice with IPtables, but the question is this.
The secondary firewall is just fine for protecting the client machines if the
firewall on the ADSL router/modem is naff. But hypothetically. Port 80 is
open for incoming traffic on the router/modem, and I presume that the
webserver on the router/modem, for setting it up, is theoretically accessable
to a password cracker, much in the same way as you, as a user would access
it, with user-name and password, to set up the firewall and modem in the
first place from a client machine. I say this, because when I first got my
Smoothwall up and running, I allowed my son to access it's web interface from
his location on the Internet, on a very short timeframe, and just to see what
it looked like (he's a Windoze user). Allright. I had to port forward port80
to the gateway address, and give him my current local dynamic IPaddress.
Sounds pretty stupid now, allowing him to access my firewall. But you live
and learn.
>
> *nat
> [0:0] -A POSTROUTING -o ppp0 -j MASQUERADE
> [0:0] -A POSTROUTING -o eth0 -j MASQUERADE
> COMMIT
>
> *mangle
> COMMIT
>
> *filter
>
> :OUTPUT ACCEPT [0:0]
> :INPUT ACCEPT [0:0]
> :FORWARD ACCEPT [0:0]
>
> [0:0] -A INPUT -j DROP -m state --state NEW,INVALID -i ppp0
> [0:0] -A INPUT -j LOG -m state --state NEW,INVALID -i eth0
> [0:0] -A INPUT -j DROP -m state --state NEW,INVALID -i eth0
> # *[0:0] -A INPUT -p icmp -j DROP
>
> [0:0] -A FORWARD -j DROP -m state --state NEW,INVALID -i ppp0
> [0:0] -A FORWARD -j LOG -m state --state NEW,INVALID -i eth0
> [0:0] -A FORWARD -j DROP -m state --state NEW,INVALID -i eth0
> # *[0:0] -A FORWARD -p icmp -j DROP
>
> COMMIT
>
> Note: You will notice that all connection attempts that have got through
> the firewall are logged. You do not have to separate out legitimate
> traffic.
>
> The section "Masquerade" is used because the computer is also the gateway
> to the home network.
>
> ppp0 is a dial-up link for use why my ADSL line is down for any reason.
>
> To identify the sources of connection attempts, I use this script - it is
> too much like hard work to program a graphical interface - and much too
> much like Windows - inflexible.
>
> #!/bin/bash
>
> # lists domain names of hosts trying to make contact with bluebottle
>
> # allow other files than default /var/log/messages
> if [ "x$1" = "x" ]
> then
> MESSAGES="messages"
> COMMAND="cat"
> else
> MESSAGES="$1"
> echo "${MESSAGES}" | grep 'gz' > /dev/null
> if [ $? -eq 0 ]
> then
> COMMAND="zcat"
> else
> COMMAND="cat"
> fi
> fi
>
> # define functions
>
> # Collect ip nos of attackers from log file
> ip_nos(){ ${COMMAND} /var/log/${MESSAGES} | grep ' SRC=' | awk '{print $9}'
> \
>
> | sed 's/SRC=//' | sort | uniq ; }
>
> # Tidy up output from nslookup
> tidy_up(){ sed '-e /^$/d' -e '/SpeedTouch/d' -e '/10.0.0.138/d' ; }
>
> # do the work
> for ip_no in $(ip_nos)
> do
> nslookup -silent $ip_no | tidy_up
> echo
> done
>
> Using this I have discovered that the BBC's RealPlay servers try to create
> a back channel - naughty.
I'm interested in this, as I have to use RealPlayer to get audio streams from
BBC.co.uk, and do from time to time experience mysterious problems. I'd read
that the BBC were developing open source codecs, but havn't heard much in
recent months. I'd be happy to hear your experiences, offlist, as this is a
bit OT. Nigel.
>
> Perhaps other users of the list would like to suggest improvements.
>
> I hope that you do not connect to the internet as root!
>
> Basil Fowler
>
> On Wednesday 01 Feb 2006 22:48, John wrote:
> > Hi
> > That zoom adsl router I mentioned a while ago seems to have been
> > reprogrammed by some one over the net. It behaved oddly even after a
> > firmware update so I've just fitted another type. Seems that lot's of
> > these units have a simple route into port 254 and maybe 255 too.
> > I need to see if there is anything resident on my machine. Anyway is
> > there anything available that will show and maybe log traffic through my
> > eth0 connection. A graphical interface would be much preferred ideally
> > identifying the transmission source, ascii data translations etc.
> >
> > Regards
> > John
>
> ___________________________________________________
> This message is from the kde mailing list.
> Account management: https://mail.kde.org/mailman/listinfo/kde.
> Archives: http://lists.kde.org/.
> More info: http://www.kde.org/faq.html.
___________________________________________________
This message is from the kde mailing list.
Account management: https://mail.kde.org/mailman/listinfo/kde.
Archives: http://lists.kde.org/.
More info: http://www.kde.org/faq.html.
More information about the kde
mailing list