RE: A simple question

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



this should be a basic rule of netsec 101 ...

one should have to 'turn' on any allowed traffic out of the box.

i.e......the firewall should not allow ANY traffic by default until
specifically
		TOLD TO DO SO BY THE ADMIN.

this is a good thing.



####################################
# delbert.hudson@xxxxxxxxxxxxxxxxx #
#        61cs/scbn, 3-0182         #
####################################


-----Original Message-----
From: netfilter-admin@xxxxxxxxxxxxxxxxxxx
[mailto:netfilter-admin@xxxxxxxxxxxxxxxxxxx]On Behalf Of Mark E.
Donaldson
Sent: Wednesday, August 18, 2004 9:19 PM
To: 'Sudheer Divakaran'; 'Netfilter mailing list'
Subject: RE: A simple question


 
In almost all IP Tables articles I've found that the default policy of all
tables (INPUT,OUTPUT,FORWARD) set to DROP.  I can understand it as far as
INPUT and FORWARD tables are concerned, but I do not understand why should
we set the default policy of OUTPUT chain to DROP.  OUTPUT chain is
responsible for packets originating from the firewall itself.  
Whay should we DROP it?

Thanks,
Sudheer

What you say is indeed correct. Most of the articles on the subject do
recommend a default DROP on all three tables. However, I personally do set
my OUTPUT default to ACCEPT, while my FORWARD and INPUT are definitely set
to DROP. As you might expect, it is quite easy to DOS the firewall itself
when OUTPUT is set to DROP. And that is not a real good idea. However,
having said that, close scrutiny must be paid to what you allow out of the
firewall and the necessary rules must be in place.




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux