On 7/22/2012 11:09 AM, lina wrote:
On Sun, Jul 22, 2012 at 11:53 PM, Brian <a...@cityscape.co.uk> wrote:
On Sun 22 Jul 2012 at 22:01:50 +0800, lina wrote:

On Sun, Jul 22, 2012 at 7:32 PM, Brian <a...@cityscape.co.uk> wrote:
Heaven above knows why you need a firewall. These services are quite
capable of getting on with life without iptables being involved. So are
you.
Just today one website I cared about failed to open, certainly it's
under attack.
I don't know what other people are capable of, I feel they are capable
of doing lots of things.
Frankly speaking I don't have much energy/channel to arm myself some
intense knowledge to meet some potential defense requirement
(sometimes I read something, but mainly to forget later.).
so the only way I can do now is to understand something very
basic.gradually and patiently, perhaps 10 years later,
and I don't have some strong security feelings, if something wrong
with the laptop, I guess I will unavoidably freak out and at that time
definitely some days will waste.
Let's take a look at what you are doing. I'll simplify it a bit but
hopefully not too much as to distort your intentions.

1. You have two tcp services which you offer on the network, ssh and a
    webserver. Other services are available to localhost only. So the
    only way the outside can communicate with your machine is through
    ports 22 and 80.

2. You use iptables to reject all connections. This effectively means
    the services on ports 22 and 80 become unavailable, which does not
    suit you.

3. You now poke two holes in the firewall to reverse what you did in 2.

Now you can consider what you have achieved. Sticking at 1. gives you
what you have at 3. In what way have improved  security on the machine?
so now is okay?! (if I catch correctly, this firewall actually is
making no big differences here?)

Thanks,

In general, it often makes sense to have everything set to be secure. If there are two things you can do, and it makes sense to do both, go ahead (suspenders *and *belt). Sometimes, it doesn't make sense, such as times when there's a fork in the road, and you have to choose one way or the other. It might not make sense if doing multiple things caused a significant performance hit.

But sometimes an exploit is found in one of the things, and if you are doing that thing, and nothing else, then your system is vulnerable. If you are doing two separate things and one is compromised, then hopefully you are still protected by the other.

While you are only running two things that use an open port, you are compromised only if there is a vulnerability in one of them. In this case, iptables adds no extra security.

However, I have noticed a tendency for things to be installed or started that open new ports, and it's easy to overlook them. Aptitude in particular will install extra packages that you don't need or want.

So, keep an eye open at all times, and one thing you can do is every now and then look at log files and config files. If you do run *iptables*, look at all the rules now and then, and see if one has been added that you didn't add yourself, and ask yourself why it's there. Maybe you are running World of Warcraft under WINE, and installing it opens up port 3724. You might leave it, or you might want to close it. (Wow can use port 80.) But if you see something you don't recognize, do what you did, and Google it or ask someone.



--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/500c2e00.1020...@allums.com

Reply via email to