Tom Eastep wrote:
> Robert Moskowitz wrote:
>> I have set my default rule to log info. I am seeing lots of probes
>> on TCP port 22 and UDP port 1434. Does it make sense to put in
>> specific rules to just drop these on the floor? I have mapped my SSH
>> to a different port number.
>
> Configuring port-specific DROP rules is an option. I personally use
> another option for reducing log pollution:
>
> /etc/shorewall/shorewall.conf:
>
> BLACKLIST_LOGLEVEL=''
>
> /etc/shorewall/blacklist:
>
> - udp 1024:1033,1434
> - tcp 57,1433,1434,2401,2745,3127,3306,3410,48
Makes sense. there are a number of ports here that I do not recognize
and are not in /etc/services like 57. Is there somewhere to get a mapping?
>
> /etc/shorewall/interfaces:
>
> net ${EXT_IF} detect logmartians=1,blacklist
Is ${EXT_IF} a system variable in place of the actual external interface
names?
>
>
> Rather than configuring a non-standard port for SSH, I prefer to use
> the Limit action (see
> http://www1.shorewall.net/PortKnocking.html#Limit) to control SSH
> noise; consequently, I don't blacklist TCP port 22. I also enforce the
> use of shared keys for SSH authentication.
Each to their own.
-------------------------------------------------------------------------
Check out the new SourceForge.net Marketplace.
It's the best place to buy or sell services for
just about anything Open Source.
http://ad.doubleclick.net/clk;164216239;13503038;w?http://sf.net/marketplace
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users