Hi folks,

Suppose I trust ultimately in my 192.168.1.x users.
To the outside world the only service 'nmap' shows opened is tcp port 22 -> ssh.

So, if 'ssh' has some security bug, people can use this bug to explore my system. That 
I know is true.

Now, what I'd like to know...

Is there any way of getting some exploit in a CLOSED port? Some kernel, ipchains or 
other bug that allows someone explore closed ports?
What about ports that are opened to 192.168.1.x but are REJECTed by ipchains to  the 
internet. Are they explorable by internet?
If the port is CLOSED, than it's safe?

   Thanks in advance,
   Pedro

---

My ipchains rules are:
Chain input (policy REJECT):
target  prot opt     source          destination  ports
ACCEPT  all  ------  127.0.0.1       0.0.0.0/0    n/a
ACCEPT  icmp ------  0.0.0.0/0       0.0.0.0/0    * ->   *
ACCEPT  tcp  ------  192.168.1.0/24  0.0.0.0/0    * ->   *
ACCEPT  udp  ------  192.168.1.0/24  0.0.0.0/0    * ->   *
ACCEPT  tcp  -y--l-  0.0.0.0/0       0.0.0.0/0    * ->   22
ACCEPT  udp  ----l-  0.0.0.0/0       0.0.0.0/0    * ->   1024:65535
ACCEPT  tcp  !y----  0.0.0.0/0       0.0.0.0/0    * ->   1024:65535
REJECT  all  ----l-  0.0.0.0/0       0.0.0.0/0    n/a
Chain forward (policy MASQ):
Chain output (policy ACCEPT):

PGP signature

Reply via email to