Re: Configure my firewall

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Le mer 17/03/2004 à 10:37, nicolas boussekeyt a écrit :
> Hi, I want filter my firewall for raleka worm.
> Actually, i have used :
> iptables -A FORWARD -p tcp -i $EXTIF --dport 135 -j DROP
> iptables -A FORWARD -p tcp -i $EXTIF --dport 135 -j LOG
[...]
> But the worm is back.

Do you mean that FORWARD policy is set to ACCEPT and only thoses ports
are blocked ? If so, you have a _major_ misconfiguration, as you should
block _everything_ first and then only accept what is OK for you.

I am not aware of your need of course, but I don't think you need your
LAN stations :

	. being accessible on TCP/135 from the Internet (needed for the
	  worm to infect)
	. being accessible on TCP/32767 from the Internet (needed for
	  the backdoor to be accessible)

Furthermore, if the worm comes back, that means that your stations are
still vulnerable. It may be time to patch...
If the rules you gave are not overriden by another, as we do not have
your complete ruleset to check its consistency, this means you still
have an infected host inside your LAN that on one hand continue to
infect other hosts and on the other hand may has its backdoor
potentially reachable from the Internet as you do not block all upper
32767 ports.

So, things to do :

	. shut the Internet down
	. clean and patch all your boxes (see Antony's post to both
	  Symantec and MS advisory)
	. have a full rewrite of filtering ruleset


-- 
http://www.netexit.com/~sid/
PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EE
>> Hi! I'm your friendly neighbourhood signature virus.
>> Copy me to your signature file and help me spread!



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux