network security related question
Ray Parrish
crp at cmc.net
Fri Feb 27 16:33:15 UTC 2009
Vitorio Okio wrote:
> I need an explanation from somebody that knows about networking security
> a bit more than I do. The question below also might be particular to my
> hardware/software set.
>
> I'm behind Linksys WRT54 router with DD-WRT v.24 on it with the router
> SPI firewall enabled.
>
> I also have Firestarter running on my Ubuntu 8.04.
>
> I used to think that being behind a NAT router is quite safe. And I used
> to think that keeping Firestarter running is my tribute to security
> paranoia.
>
> But today I've noticed a huge number of incoming connections reported
> blocked by Firestarter. All of them are of ICMP protocol, and my
> understanding is they are either pings, or simple port scans, or
> something of the kind.
>
> Though almost all of them come from the same 2 sources outside of my
> country and this persistence worries me.
>
> My question is how do they ever reach my Firestarter? How they go through
> my NAT router? I thought they are supposed to be blocked on that level.
>
> Am I missing something in my knowledge or my router firewall is just
> doing a poor job?
>
> Can anybody of networking gurus explain it to me, please?
>
Hello,
There are over 65,000 ports on your computer, and most firewalls only
monitor a basic set of the most used ones. How much configuration have
you done to your router firewall? I know that on mine, there are only a
few selections which can be made, and even if I select a custom
configuration, it only allows me to configure around 60 or 70 ports.
Most software firewalls only monitor a small set of often used ports as
well.
For an idea of how it is possible to get past your firewall have a look
at this link. -
<http://www.packetfactory.net/firewalk/firewalk-final.html>
To learn more about what different attacks look like in your firewall
logs, and how to make yourself more secure, have a look at this article.
<http://www.linuxsecurity.com/resource_files/firewalls/firewall-seen.html>
In addition to reading those, install portsentry, which will allow you
to specify precisely which ports you wish to monitor, up to and
including the entire 65,000 some ports. [although monitoring all of them
is probably overkill] To learn how to configure and use portsentry see
"man portsentry", "man portsentry.conf", and take a look at the files
in /usr/share/doc/portsentry/ as well to get more insight into it's
usage. They are in .gz files but it's easy to open them temporarily with
file roller and view them.
I am using it right along with my external router's firewall and
Firestarter. Another thing to make sure you do is set your
etc/hosts.deny file's contents to ALL: ALL which will deny connections
to all services on your computer to all attempts from the outside world
to access them. If there are those you wish to allow access, use the
/etc/hosts.allow file to selectively white list the users and services
you want to allow access. They both have man pages that explain them
pretty well.
I'm no expert, but I have been doing a lot of reading in the
/usr/share/docs folder after installing quite a few documentation
packages including harden-doc which is the "Securing Debian Manual".
Other useful docs are "Linux 2.4 Packet filtering How To" which is
located here if you have iptables installed.
<file:///usr/share/doc/iptables/html/packet-filtering-HOWTO.html#toc1>
Additionally, install the package sysadmin-guide, and you will find it
located here -
<file:///usr/share/doc/sysadmin-guide/html/index.html>
It contains a brief section on setting up users and access control. The
ubuntu-server-guide may also prove useful as it contains a lot of
information on networking security. It's main file will be here -
<file:///usr/share/ubuntu-serverguide/html/C/index.html>
There are other docs you can install as well like the Rute Book, and the
iproute-doc. If you really want to get safer yet, you might consider
installing user-mode-linux and user-mode-linux-doc and running it as a
secure sandbox or jail within your main Linux system. I hope this helps.
Later, Ray Parrish
--
Human reviewed index of links about the computer
http://www.rayslinks.com
Poetry from the mind of a Schizophrenic
http://www.writingsoftheschizophrenic.com/
More information about the ubuntu-users
mailing list