Re: Firewall Configuration in Redhat 9.0

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> > >>> jessem@xxxxxxxxxxxxxxxx 10/20/03 04:00PM >>>
> >
> > I've been having some trouble opening and closing ports. Basically, I
> > want to close of all ports except 22 for ssh and 3 other ports to do
> > some testing with openmosix. No matter what I do though, the ports
> > that
> > I want open stay closed and the ports that I want closed are open.
> > (Mostly)
> >
> > Port       State       Service
> > 22/tcp     open        ssh
> > 25/tcp     open        smtp
> > 111/tcp    open        sunrpc
> > 139/tcp    open        netbios-ssn
> > 505/tcp    open        mailbox-lm
> > 631/tcp    open        ipp
> > 885/tcp    open        unknown
> > 4660/tcp   open        unknown
> > 6000/tcp   open        X11
> > 9158/tcp   open        unknown
> > 10000/tcp  open        snet-sensor-mgmt
> > 32768/tcp  open        unknown
> > 32769/tcp  open        unknown
> > 32770/tcp  open        sometimes-rpc3
> >
> > Looks like I don't even have a firewall activated.
> > redhat-config-securitylevel is set to medium. If I change it to hight
> > the same ports are open. Trusted device is set to my network card
> > (eth0)
> > nothing is checked except ssh and dhcp. Like I said above, I want a
> > couple other ports for open openmosix but, I have not "other ports"
> > section using redhat-config-securitylevel.
> >
> > Other notes, I have iptables service enabled. It starts at boot. Also,
> > I
> > have tried to use iptables directly i.e iptables -A INPUT -p tcp ...
> > etc. Still nothing.

I may be way off base, but in case it helps, here is what pops into my head
upon reading this thread:

How did you generate that list of open ports?  It occurs to me that you
might actually have iptables working just fine...
A service or program can be listening on a port, even while a firewall is
blocking access to that port.  It is like having an earplug in your ear...
The ear is still listening, but the sounds are prevented from reaching it.
There may be a default firewall rule that will allow all loopback traffic
through, while blocking remote hosts.  So unless you are generating the list
of open ports using a remote scan, you might not know what's really open or
closed to the outside world.

A complementary approach to using a firewall is to disable unneeded
services.  So for instance, you could do something like "service sendmail
stop" and "chkconfig --level 2345 sendmail off" to close the smtp port.
"lsof -i" and "netstat -lp" (and others) might help determine what service
daemon or application is using each port; with that you can usually disable
or reconfigure them to be less open.

As someone else said, setting an interface as "trusted" effectively turns
off the firewall for that interface, not usually the desired result unless
you have a multi-homed system where one interface is on a local trusted
network and the other is to the big bad world.  You probably want eth0 to be
untrusted, else you wouldn't bother creating firewall rules for it...

Or maybe I missed some piece(s) of the puzzle... :-)

Hope that helps.


-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux