On Thu, 16 Jan 2014, Dave Taht wrote:

in terms of a stable release, improving security some more has been
weighing on my mind.

One of the things cero does differently than openwrt
is that it uses the xinetd daemon. It rather than having things like dropbear
or rsync listening directly on ports, and specifically only allows access
to certain services (like ssh) from certain ip addresses.

There are also sensors for connection attempts via ftp or telnet that
disable all services when someone accesses them, for 120 minutes by
default.

this seems like something that's unreasonable to do on something exposed to the Internet. There's a very real probability that this will result in you being unable to access your router because it's always in this 'lockdown' mode. I don't object to the capability being there, but I do object to it being on by default, especially for such a long lockout period.

If you make the lockout per-IP then it may be reasonable, but this could result in a lot of IPs in your block list.

David Lang

See the /etc/xinetd.conf and /etc/xinetd.d dir for details

However this layer of defense is incomplete as several processes, notably the
configuration gui, upnp, and so on are separate daemons with their own
access controls.  Worse, many attacks nowadays come from the inside,
and should be dealt with...

Since we've been fiddling with ipsets on the bcp38 front it would be
rather easy to hook up xinetd's mechanism with that to do the same
blocking for *all* services from that specific IP. All it needs is a
fork and exec in the sensor to run a script like this:

#!/bin/sh
# $1 = addr type (ipv4 or ipv6)
# $2 = addr
# $3 = timeout in seconds

ipset add badboys-$1 $1 timeout $3

...

and use the firewall rules to check that ipset for badboy IPs.

the xinetd.org site is dead seemingly, but copies of the last release
are widely available. Would probably be a very small patch if someone
wants to
take it on...

is there anything else out there as tight and secure as xinetd for
spawning network services or doing intrusion monitoring?


_______________________________________________
Cerowrt-devel mailing list
Cerowrt-devel@lists.bufferbloat.net
https://lists.bufferbloat.net/listinfo/cerowrt-devel

Reply via email to