Re: firewall?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Sat, 16 Jul 2011, Ljubomir Ljubojevic wrote:

> To: CentOS mailing list <centos@xxxxxxxxxx>
> From: Ljubomir Ljubojevic <office@xxxxxxxx>
> Subject: Re:  firewall?
> 
> Keith Roberts wrote:
>> On Sat, 16 Jul 2011, Ljubomir Ljubojevic wrote:
>>
>> *snip*
>>
>>> I wrote about "physical presence *outside* of your network", like if you
>>> are on a large WISP that uses bridged network (bad design) and your
>>> Wireless client is bridged, and you have single NIC firewall in place,
>>> entire WISP's network will be able to sniff your traffic and hack into
>>> unprotected workstations/desktops. And there are those scenarios, much
>>> more then you can think.
>>
>> Which is why one poster mentioned that you need to be
>> familiar with IPtables and Networking before trying to make
>> your machine(s) network(s) secure?
>>
>> I read some time ago something about tunneling different
>> protocols through firewalls? which sounded quite scary.
>>
>
> All firewalls (on Linux at least) are by default closed, and you need
> knowledge to punch through the wholes for your public services.
>
> Its something like this:
>
> Deny all (other) connections
>
> then you add few rules and it looks like this:
>
> Allow service listening on port X
> Allow service listening on port Y
> Allow service listening on port Z
> Allow service coming from IP A (and port W)
> Allow service coming to IP B (and port U)
> Deny all (other) connections
>
> Packets are sent through the chain (of the rules like above) and when
> they hit some rule, desired action is performed and that packet (mostly)
> stops going down the chain, so it does not hit bottom rule. If packet
> does not mach any "allow" rule, then it will hit (one of) deny rule and
> that connection will be terminated.
>
> If you want easy to understand Firewall/router PC based on RHEL/CentOS
> try ClearOS, and if you want it *on* the CentOS I suggest to check
> shorewall.
>
> www.shorewall.net is also excellent site to learn about firewalls and
> routers in general with lot's of examples.

Thanks for that Ljubomir.

I have studies the IPtables docs, and actually have my own 
rules setup and running in place of the default IP4 & IP6 
Centos Rules. I did this mainly for logging purposes - all 
packet movements were logged to a file for later analysis.

I have turned off most firewall logging now, and I use 
Wireshark to watch packet movements in real time if I 
suspect there is a network problem. It's interesting to 
watch how packets move into and out of the eth0 interface.

Kind Regards,

Keith Roberts

-----------------------------------------------------------------
Websites:
http://www.karsites.net
http://www.php-debuggers.net
http://www.raised-from-the-dead.org.uk

All email addresses are challenge-response protected with
TMDA [http://tmda.net]
-----------------------------------------------------------------
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos


[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux