Re: SV: Ports opened without request

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



OK, but when I drop everything by default I block access to the server. Not a good idea.

Sasa

Sven-Åke Larsson pravi:


I (but that's only me) always get nervous when there are lines like "input accept". So yes, drop everything that it's not necessary.

Best regards,
S



-----Original Message-----
From: Sasa Stupar
To: Netfilter-List
Sent: 2004-02-26 14:48
Subject: Re: SV: Ports opened without request

So I should change default policy to DROP on FORWARD chain for filter only or also for mangle?

Ray Leach pravi:



Your default policy on the FORWARD chain is accept.

On Thu, 2004-02-26 at 14:24, Sasa Stupar wrote:




I have scanned from another machine. Yes, I allow ICMP packets. I have
droped them and rescanned the machine but still the same issue.
My current ruleset is:
---------------------
# Generated by webmin
*filter
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:INPUT DROP [0:0]
# Loopback
-A OUTPUT -o lo -j ACCEPT
# Allow self access by loopback interface
-A INPUT -i lo -j ACCEPT
# Accept established connections
-A INPUT -m state -i eth0 --state ESTABLISHED,RELATED -j ACCEPT
-A INPUT -p tcp -m tcp ! --tcp-option 2 -j REJECT --reject-with


tcp-reset


# FTP
-A INPUT -p tcp -m tcp --dport 21 -j ACCEPT
# Telnet
-A INPUT -p tcp -m tcp --dport 23 -j ACCEPT
# SMTP
-A INPUT -p tcp -m tcp --dport 25 -j ACCEPT
# NTP
-A INPUT -p tcp -m tcp --dport 37 -j ACCEPT
# DNS
-A INPUT -p udp -m udp -s 192.168.10.111 -d 0/0 --sport 53 -j ACCEPT
# HTTP
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT  --syn
# POP3
-A INPUT -p tcp -m tcp --dport 110 -j ACCEPT
# Samba
-A INPUT -p udp -m udp --dport 137 -j ACCEPT
# Samba
-A INPUT -p udp -m udp --dport 138 -j ACCEPT
# Samba
-A INPUT -p tcp -m tcp --dport 139 -j ACCEPT  --syn
# HTTPS
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
# SMTP-SSL
-A INPUT -p tcp -m tcp --dport 465 -j ACCEPT
# POP3-SSL
-A INPUT -p tcp -m tcp --dport 995 -j ACCEPT
# Squid Proxy
-A INPUT -p tcp -m tcp --dport 3128 -j ACCEPT
# Xmail CtrlClnt
-A INPUT -p tcp -m tcp --dport 6017 -j ACCEPT
# XQM agent
-A INPUT -p tcp -m tcp --dport 8888 -j ACCEPT
# Webmin
-A INPUT -p tcp -m tcp --dport 10000 -j ACCEPT
# Drop all other connection attempts
-A INPUT -j DROP
COMMIT
# Generated by webmin
*mangle
:POSTROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:PREROUTING ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:INPUT ACCEPT [0:0]
COMMIT
# Completed
# Generated by webmin
*nat
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
:PREROUTING ACCEPT [0:0]
COMMIT
# Completed
------------------------

As you can see I have made this rules with webmin.
Any hints what is wrong here? BTW I am very very new at firewall.

Sasa


Sven-Ake Larsson pravi:






How did you make scan, from the machine itself or from another


machine on


the outside? Some rulesets doesn't really work when you are at the


same


machine.
Do you allow any ICMP packets? If so, try to drop them too and scan


the


machine again.
What is your current ruleset? It helps a lot if you can add it to the


list.


I believe you'll have the masters answers soon... ;-)

Regards,
S

-----Ursprungligt meddelande-----
Fran: netfilter-admin@xxxxxxxxxxxxxxxxxxx
[mailto:netfilter-admin@xxxxxxxxxxxxxxxxxxx]För Sasa Stupar
Skickat: den 25 februari 2004 18:01
Till: netfilter@xxxxxxxxxxxxxxxxxxx
Ämne: Ports opened without request


Hi!


I have linux RH8 with kernel 2.4.20-28.8, iptables v1.2.8. I have


setup


a firewall with some tcp ports opened (21,25,80,110,443) for servers.
Then I have ran a port scan and scanned all 65535 tcp and udp ports.


I


was suprised that 3 ports were opened even if I didn't opened them in
the configuration. These ports are tcp 389,1002 and 1720.
I have tried to block them manually by entering a drop command for


these


three ports but no success-they are still open.
What am I missing here? Is this some problem with iptables?

Sasa






















[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux