I have been thinking about a setup for my basic ADSL network at home that would be somewhat more secure then the usual setup I have seen around for other users who simply think NAT/Firewalls are the answer. I have yet to impliment it, but I wonder if someone could critique the abstract idea before I go through motions of setting up the network.
The reason why I go into so much details is that I am testing my own knowledge against yours to become a better security minded user. I don't want my box trying to break into your box. ;) I have a cisco 678 router (Which I have disabled the telnet as well as web interface and set the ports to different ports then the default.) Since it it only interfacable through the management cable, I don't fear a breach for the router software itself. I do know that if someone where to find the telnet port, a DoS is possible. And it is using NAT. I am running a web server (apache) on port 80. The nat addresses this machine for all port 80 requests. Every machine on the network is running a form of firewall software, on windows zone alarm, on linux either ipchains or iptables. I am thinking of putting a dual-homed host to make the basic network look like thus: +----------+ | Cisco 678| +----------+ | +--------------+ |Dual-Home Host| +==============+ | +---------------+ |USR Totalswitch| +===============+ | Other boxs including web server. I know the USR Totalswitch is completely insecure. On my firware, I cannot turn off the telnet managment port and I cannot protect against the debug attack found in the securityfocus archives. Is there a firmware verison that allows for more security? I have yet to find it. Anyway... I was thinking of running iptables on the dual homed host, and snort. I am researching snort heavily at the moment to make sure I understand it's capibilites. I am more of an ipchains kinda guy, and have just delved into iptables. What I want to do is make it so only legit GET requests get to my web server machine. I.e. GET / HTTP/1.x etc etc and to drop all other kinda of requests. My feeling on the subject is if I can filter out all other malformed requests or unrealistic requests, apache will be "saved" from the majority of attacks. Should I use snort or iptables to accomplish this? Is it possible with either? I know I should RTFM...and believe me, I am. But I was wondering what kind of input I could get from the list as a whole as how to proceed. I have also been toying with the idea of using LIDS on the server machine to throw even more modification into the mix... I guess this is just a call for comments. Thank you for considering this issue...as it will determine some of my future turns in study for security as a whole. "Buffer Overflow in /dev/stomach due to vodka.o!" _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp