Hi! I've recently begun experimenting with IPCHAINS in order to more fully 
lock down a couple Redhat 6.2 servers I have. Up until this point I've been 
running PortSentry, combined with TCP wrappers, and that seems to have 
worked just fine. However, I wanted some more control over the fine 
details. As a start, I set the input chain to allow access to some services 
such as SSH, WWW, and whatnot, by setting ACCEPT rules on those specific 
ports. Then I ended the chain with a rule to DENY everything that wasn't to 
one of those ports.

This, of course, led to all kinds of problems. FTP no longer working, and 
so on. I'm not masquerading this box. It's stand-alone, so I don't think 
the ftp-masq module will help me. I guess the root of my question is, is it 
safe to leave all those ports above 1024, excluding the X ports, open? Do I 
have to for normal programs to work? I've had no problems locking down the 
ports below 1024, but that still leaves about 64,000 of them open, which 
makes me uneasy. Should I continue to run Sentry, sort of as a 
second-string protection? The firewall would let people in on port 31337 
say, but Sentry would nab it.

Any thoughts would be appreciated. I've read the HOW-TOs, and while I now 
have a good idea of how IPCHAINS works, I'm still a bit fuzzy on it's 
correct and most secure implementation.

Thanks!

Andy



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to