Nahual Guerrero <[EMAIL PROTECTED]> writes on 
Wed, 02 Apr 2003 22:55:55 +0200 (METDST):


>>>

my $iptfh = 'iptables -F';
my $iptin = 'iptables -A INPUT -j DROP -p tcp -s ! 127.0.0.0/255.255.255.0 
--destination-port';
my $iptil = 'iptables -A INPUT -j LOG -p tcp -s ! 127.0.0.0/255.255.255.0 
--destination-port';
my $iptol = 'iptables -A OUTPUT -j LOG';
my $iptfl = 'iptables -A FORWARD -j LOG';

system ("clear");
print "Tirando de la Cadena....\n";

>>>


Hm... well first off, it's always better to change the default
rule of the table to REJECT and only after that allow the ports you actually use. I 
know... it's a lot of work, but far more secure, and
you learn an awful lot (like not to forget to allow nameserver connects ;-), or if 
you're doing it remotely, how to charm a malevolent sysadmin into resetting those darn 
rulesets *g*)

Second... -j LOG on everything must produce incredibly large logfiles!?
And thirdly, what does "Tirando de la Cadena" mean? :-)

c 

-------------------------------------------------------------------
SurfControl E-mail Filter puts the brakes on spam,
viruses and malicious code. Safeguard your business
critical communications. Download a free 30-day trial:
http://www.securityfocus.com/SurfControl-security-basics

Reply via email to