On Fri, 2002-11-01 at 12:53, Bill Beauchemin wrote:
> I went and applied evry single security patch that mandrake had using
> MasndrakeUpdate and remembered I had Snort running. I found a huge
> portscan.log file and tooka look to find that the day before my system
> was hacked it was portscaned by one ip from Roadrunner. I sent them a
> nice email but my questionsis. What if anything can I do about all these
> portscans? Is there somewhere I can email to have these assholes delt
> with? 
> 

First I claim to be no expert on the subject but these are my
experiences trying to make my standalone setup stealth. Using Windows
has made me into a very paranoid user. Do note your mileage may vary.


Mandrake does *not* configure Shorewall for stealth connection nor does
tinyfirewall have an option for standalone stealth mode. (this statement
is justified below). Oh, those options *open* server ports are only
necessary if you actually have the corresponding server running. X
server port 6000 is usually open by default unless you change it in the
security settings. Lower security option leave it open and more annoying
will *open* it again on resets unless told to do otherwise. CUPS usually
has external port access too by default - editing CUPS config file to
only accept local connections will stop that. I reported tinyfirewall's
shortcomings to the cooker but it was ignored. I highly recommend
"easy-to-use" Mandrake should add to a standalone stealth option to
tinyfirewall and ask during installation if it the setup is going to be
a standalone or server.


My advice is *always* run nmap to make sure nothing is open that you
don't want open. Also run it again when you make any changes that may
effect ports. You will be surprised when close port are open again.


Anyway the the magic line to edit or add to /etc/shorewall/rules

DROP    net             fw              all 

It will complain it should be a policy but when I made it a policy it
did not give complete stealth results as explained below. That is, as a
policy it does not give the same results as when it is a rule. I do not
know but the above does work.


I initially did a test using this site.

http://scan.sygate.com/quickscan.html

and ports 80, 113, 135 were open, and most ports were closed not
blocked. Tinyfirewall was no use. Not sure why but this is Shorewall's
default behavior.

After adding the above line all scanned ports are blocked and it does
not affect ftp, pop, web access.

The ICMP port is a security option if I am not mistaken.



I found out about ports being open by default, by using this site

http://www.linux-sec.net/Audit/nmap.test.gwif.html 

which will do an external nmap scan. Or you could use another computer.
This way you will see what an external computer sees.

With open ports nmap does a very good job at reporting the version of
linux you are using.

Now it either reports nothing or the browser times out.


Does anyone know how to get nmap or another scanner to report on
closed/non-existent ports? I would like to find a way to have a
black/white test for stealth setup.


Well those are my experiences, again your mileage may vary.

Gabriel




Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to