Re: Best Practices for iptables

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 2003-12-05 at 13:09, Antony Stone wrote:
> On Friday 05 December 2003 5:40 pm, Daniel Chemko wrote:
> 
> > Best practices:
> >
> > WE ARE ALL HUMAN (I hope)
> >
> > If you are looking for the best case, you'd want to cover your own
> > incompetence. Honestly, I work from this rule.
> > I policy block everything that I haven't allowed explicitly, simply
> > becausd if you try to build it in reverse, you're almost guaranteed to
> > miss a lot of important blocks / etc..
> 
> I agree.
> 
> Think of it like this:
> 
> If you block everything, allow what you want, and forget something, then 
> either you or someone you're providing services for will say "this isn't 
> working - can you fix it please?" and you can correct the ruleset to allow 
> the missing service.
> 
> On the other hand, if you allow everything, and block the things you don't 
> want, then anything you forget about is more likely to be discovered by 
> somebody else on the Internet scanning and probing their way round your IP 
> address/es, and if they find something you forgot to block, chances are they 
> won't tell you :)
> 
> Therefore correcting mistakes is a whole lot easier if you start from the 
> "deny everything except these..." approach.
> 
> Antony.
Any good firewall implementation should implicitly deny everything on
the INPUT and FORWARD chains. If anyone tells you different they must
work for Microsoft.

Ted



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux