On Sat 29 Aug 2015 at 22:18:00 +0300, Reco wrote:

>  Hi.
> 
> On Sat, 29 Aug 2015 20:01:40 +0100
> Brian <a...@cityscape.co.uk> wrote:
> 
> > On Sat 29 Aug 2015 at 21:39:21 +0300, Reco wrote:
> > 
> > >  Hi.
> > > 
> > > On Sat, 29 Aug 2015 13:25:28 -0500
> > > rlhar...@oplink.net wrote:
> > > 
> > > > On Sat, August 29, 2015 6:53 am, to...@tuxteam.de wrote:
> > > > > Also netstat (issued from your laptop) gives insight. For example
> > > > > 'netstat - -lntu' shows you the TCP or UDP listening sockets. If you 
> > > > > are
> > > > > root (or sudo, of course), the extra option -p tells you which 
> > > > > process is
> > > > > "at the other side" listening.
> > > > >
> > > > > Note that the dhcp client itself (which you need to get an IP address 
> > > > > to
> > > > > take part in your customer's network) puts you already at some risk,
> > > > > depending on how it's configured.
> > > > 
> > > > Here is the output from the laptop:
> > > > 
> > > > # netstat -lntup
> > > > Active Internet connections (only servers)
> > > > Prot Rec Snd Local Address            Foreign   State PID/Program name
> <skip>
> > > > #
> > > > 
> > > > Regrettably, the formatting of the output does not consider the need to
> > > > include the output in the body of an e-mail, so editing was required to
> > > > remove excess spaces so as to prevent every line from being wrapped.
> > > 
> > > 
> > > Something like this should save you from the most troubles provided
> > > that you don't plan to use your laptop as a print server or NFS:
> > > 
> <skip>
> > > 
> > > 
> > > Of course, it's *very* simplistic set of rules (for example, someone
> > > may consider accepting ssh connections from arbitrary hosts a bad idea),
> > > but it should work.
> > 
> > Why does he need any iptables rules? I see nothing at risk there. It
> > seems to me he can be confident his computer is safe.
> 
> You need to look better. As of now, this laptop:
> 
> 1) Has NFS portmapper open for no good reason.
> 
> 2) Has some (possibly badly configured) tcp service port 9999.
> 
> 3) Has possibly misconfigured SSH (i.e. PasswordAuthentication yes - a
> bad idea for untrusted network).

Covering up such problems with iptables doesn't tackle such problems. Why
not fix them at source?

> > > Two things I'm unsure of are:
> > > 
> > > 1) Avahi's udp 5353. I don't see any value in mDNS (especially in office
> > > network), but YMMV.
> > 
> > There is much value in mDNS in an office network with CUPS nowadays.
> 
> Provided that an office network allows multicasts *and* it's not a
> all-Windows shop *and* they did not forget to allow dnssd server-side -
> it's a possibility. Chances for all this are slim IMO.

No mDNS then. No printing.

Reply via email to