Tom Eastep wrote:
> Robert Moskowitz wrote:
>> I have set my default rule to log info.  I am seeing lots of probes 
>> on TCP port 22 and UDP port 1434.  Does it make sense to put in 
>> specific rules to just drop these on the floor?  I have mapped my SSH 
>> to a different port number.
>
> Configuring port-specific DROP rules is an option. I personally use 
> another option for reducing log pollution:
>
> /etc/shorewall/shorewall.conf:
>
>    BLACKLIST_LOGLEVEL=''
>
> /etc/shorewall/blacklist:
>
>    -          udp             1024:1033,1434
>    -          tcp             57,1433,1434,2401,2745,3127,3306,3410,48
Makes sense. there are a number of ports here that I do not recognize 
and are not in /etc/services like 57.  Is there somewhere to get a mapping?
>
> /etc/shorewall/interfaces:
>
>    net     ${EXT_IF}       detect  logmartians=1,blacklist
Is ${EXT_IF} a system variable in place of the actual external interface 
names?
>
>
> Rather than configuring a non-standard port for SSH, I prefer to use 
> the Limit action (see 
> http://www1.shorewall.net/PortKnocking.html#Limit) to control SSH 
> noise; consequently, I don't blacklist TCP port 22. I also enforce the 
> use of shared keys for SSH authentication. 
Each to their own.


-------------------------------------------------------------------------
Check out the new SourceForge.net Marketplace.
It's the best place to buy or sell services for
just about anything Open Source.
http://ad.doubleclick.net/clk;164216239;13503038;w?http://sf.net/marketplace
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to