On Mar 31, 2008, at 11:53 AM, Steven Alligood wrote:

Kimball Larsen wrote:
Secondly, I realize that tcpwrappers affect more than just sshd - I immediately noticed, for example, that when I added this rule: ALL: ALL to hosts.deny, that I could no longer connect to mysql on the same server. Adding mysqld to the list of permitted hosts did the trick (ie: sshd,mysqld: comma,separated,list,of,hosts) in hosts.allow.
I personally suggest using iptables rather than tcp wrappers for your IP based security.

Basically, iptables works on the ip layer in the kernel, where tcp wrappers works in the specific application (on the application layer of the OSI model). Better to block as low on the OSI as you can to prevent application bugs from being exploited.

IPtables also uses a lot less cpu and processing to stop a packet. And iptables will block in such a way that anyone ascanning will think the port not open, where wrappers will still answer, even to the point of allowing an octopus attack, or even a minor DDoS, to disable your box.

This I can appreciate and understand. However, it does not address either of my original questions, and in the case of this particular server, I already have layers of security at the router to deal with DDos, etc. After I get tcpwrappers doing what I want, I'll likely set up iptables for yet another layer of security.


Thanks.


- Kimball
http://www.kimballlarsen.com


/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug
Don't fear the penguin.
*/

Reply via email to