On Mon, 8 Jul 2002 [EMAIL PROTECTED] wrote:

> "Martinez, Michael - CSREES/ISTM" <[EMAIL PROTECTED]> wrote ..
> > I recently had a network audit, which had the following to say about my
> > LInux machines. Wanted to get some feedback from the list. It seems rather
> > bogus. I never heard of this. Can somebody provide details. Is this
> > legimitate or no:
> > 
> > "The linux system accepts the SLIST command from outside the agency to
> > display internal routing tables. This poses a serious security risk..."
> 
> 
> "slist" is I believe just an implementation of Novell's SLIST command
> for listing NetWare servers.  Question, are you running a NetWare
> emulator on Linux or just doing slist on Linux to see NetWare servers
> you have in house? The slist on Linux is a part of the ncpfs-2.2.0.18-6
> package. You could just remove the slist command from most Linux boxes,
> or you could rename slist and make a script wrapper for the slist
> command so not everyone can use it, or you could change the execute
> permissions to root only, or contact its developer for other options.
> 
> Peter
> 
    Ask the folks who did the network audit what ports SLIST uses on your
machine to access it.  If, for example, they are 3200-3600, you can use
your firewall to block access to ports 3200-3600 from "outside the
agency". If your firewall is ipchains, for example, it might need
something like (I may well be making a mistake in syntax)

ipchains -A input -p tcp -y -s ! <your agency's IP range> --dport 3200:3600 -j DENY

or for iptables

iptables -A INPUT -p tcp --syn -s ! <your agency's IP range> --dport 3200:3600 -j DROP

   If your "agency" has its own firewall, maybe they should be blocking
whatever are the risky ports themselves.

-- 
Steven Yellin



_______________________________________________
Seawolf-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/seawolf-list

Reply via email to