On Saturday 14 February 2004 10:26 am, JJB wrote: > This port map is only showing you what ports are open to accept > start requests from the public internet. Looks like you are using > IPFW with stateless rules which just provides an very basic level > of security. Use stateful rules with 'out' and 'via' keywords to > separate your firewall into out bound control where you allow all > these ports listed below out to the public internet. Then for the > inbound side use stateful rules with 'in' and 'via' keywords > allowing in only the ports that you have servers running on. That > will close all those listed ports to inbound availability. If you > have LAN behind your gateway and using ipfw with divert rule legacy > sub-routine call to userland Natd then stateful rules do not work > because of legacy bug in basic concept design of this process. Use > IPFILTER, it's stateful rules work in Nated environment and as such > provides an much highter level of security than IPFW can provide in > an Nated environment. I have IPFILTER sample rule set if you are > interested.
Thanks for the reply. This is not a nated environment. For the time being, I've got DSL with a /29 network. I'm running DNS, Mail, etc right from my own box. I guess my question was, what are those two services I listed? Submission and hp-alrm-mgr? Are there any ipfw rules that I SHOULD set? Here's my current ruleset: 00100 1622 256612 allow ip from any to any via lo0 00200 0 0 deny ip from any to 127.0.0.0/8 00300 0 0 deny ip from 127.0.0.0/8 to any 00600 3931 501305 allow ip from any to any 65535 0 0 deny ip from any to any This is obviously an very wide-open server right now. I'm guessing I should add some rules like the following? change 0600 to allow ip from any to any established add allow ip from any to <server ip address> port <mail> add allow ip from any to <server ip address> port <ftp> add allow ip from any to <server ip address> port <irc1> add allow ip from any to <server ip address> port <irc2> add allow ip from any to <server ip address> port <irc3> add allow ip from any to <server ip address> port <ssh> add allow ip from any to <server ip address> port <dns> add allow ip from any to <server ip address> port <110> add allow ip from any to <server ip address> port <443> add deny ip from any to <server ip address> via dc0 port <mysql> add deny ip from any to <server ip address> The mysql, I assume, since the only thing accessing it should be my local web server, I don't need it to have public (inet) access? -- Eric F Crist AdTech Integrated Systems, Inc (612) 998-3588
pgp00000.pgp
Description: signature
