tightening up would have to be done at two places: the firewall; and my
Linux boxes. I handle the LInux boxes, so leet's talk about that.

- If I don't have IPX support compiled into the kernel, then there's no
issue, is there. There's no way someone could issue slist commands through
my box.

- If I do have IPX support compiled in, and need to keep it for whatever
reason (not allowed to recompile the kernel or whatever), then all I do is
remove ipx from /etc/services, right. That should take care of it.

I don't need to mess with ipchains.... or do I?

Michael Martinez
System Administrator (Contractor)
Information Systems and Technology Management
CSREES - United States Department of Agriculture
(202) 720-6223


-----Original Message-----
From: Steven J. Yellin [mailto:[EMAIL PROTECTED]]
Sent: Monday, July 08, 2002 7:19 PM
To: [EMAIL PROTECTED]
Subject: Re: SLIST under linux?


On Mon, 8 Jul 2002 [EMAIL PROTECTED] wrote:

> "Martinez, Michael - CSREES/ISTM" <[EMAIL PROTECTED]> wrote
..
> > I recently had a network audit, which had the following to say about my
> > LInux machines. Wanted to get some feedback from the list. It seems
rather
> > bogus. I never heard of this. Can somebody provide details. Is this
> > legimitate or no:
> > 
> > "The linux system accepts the SLIST command from outside the agency to
> > display internal routing tables. This poses a serious security risk..."
> 
> 
> "slist" is I believe just an implementation of Novell's SLIST command
> for listing NetWare servers.  Question, are you running a NetWare
> emulator on Linux or just doing slist on Linux to see NetWare servers
> you have in house? The slist on Linux is a part of the ncpfs-2.2.0.18-6
> package. You could just remove the slist command from most Linux boxes,
> or you could rename slist and make a script wrapper for the slist
> command so not everyone can use it, or you could change the execute
> permissions to root only, or contact its developer for other options.
> 
> Peter
> 
    Ask the folks who did the network audit what ports SLIST uses on your
machine to access it.  If, for example, they are 3200-3600, you can use
your firewall to block access to ports 3200-3600 from "outside the
agency". If your firewall is ipchains, for example, it might need
something like (I may well be making a mistake in syntax)

ipchains -A input -p tcp -y -s ! <your agency's IP range> --dport 3200:3600
-j DENY

or for iptables

iptables -A INPUT -p tcp --syn -s ! <your agency's IP range> --dport
3200:3600 -j DROP

   If your "agency" has its own firewall, maybe they should be blocking
whatever are the risky ports themselves.

-- 
Steven Yellin



_______________________________________________
Seawolf-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/seawolf-list



_______________________________________________
Seawolf-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/seawolf-list

Reply via email to