I have been thinking about a setup for my basic ADSL network at home that 
would be somewhat more secure then the usual setup I have seen around for 
other users who simply think NAT/Firewalls are the answer.  I have yet to 
impliment it, but I wonder if someone could critique the abstract idea 
before I go through motions of setting up the network.

The reason why I go into so much details is that I am testing my own 
knowledge against yours to become a better security minded user.  I don't 
want my box trying to break into your box. ;)

I have a cisco 678 router (Which I have disabled the telnet as well as web 
interface and set the ports to different ports then the default.) Since it 
it only interfacable through the management cable, I don't fear a breach for 
the router software itself.  I do know that if someone where to find the 
telnet port, a DoS is possible.  And it is using NAT.

I am running a web server (apache) on port 80.  The nat addresses this 
machine for all port 80 requests.  Every machine on the network is running a 
form of firewall software, on windows zone alarm, on linux either ipchains 
or iptables.

I am thinking of putting a dual-homed host to make the basic network look 
like thus:


+----------+
| Cisco 678|
+----------+
     |
+--------------+
|Dual-Home Host|
+==============+
      |
+---------------+
|USR Totalswitch|
+===============+
       |
Other boxs including web server.

I know the USR Totalswitch is completely insecure.  On my firware, I cannot 
turn off the telnet managment port and I cannot protect against the debug 
attack found in the securityfocus archives. Is there a firmware verison that 
allows for more security?  I have yet to find it.  Anyway...

I was thinking of running iptables on the dual homed host, and snort.  I am 
researching snort heavily at the moment to make sure I understand it's 
capibilites.  I am more of an ipchains kinda guy, and have just delved into 
iptables.

What I want to do is make it so only legit GET requests get to my web server 
machine.  I.e. GET / HTTP/1.x etc etc and to drop all other kinda of 
requests.  My feeling on the subject is if I can filter out all other 
malformed requests or unrealistic requests, apache will be "saved" from the 
majority of attacks.

Should I use snort or iptables to accomplish this?  Is it possible with 
either?  I know I should RTFM...and believe me, I am.  But I was wondering 
what kind of input I could get from the list as a whole as how to proceed.  
I have also been toying with the idea of using LIDS on the server machine to 
throw even more modification into the mix...

I guess this is just a call for comments.  Thank you for considering this 
issue...as it will determine some of my future turns in study for security 
as a whole.

"Buffer Overflow in /dev/stomach due to vodka.o!"


_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp

Reply via email to