On Wed, Jul 28, 2010 at 2:55 PM, Spenst, Aleksej
<aleksej.spe...@harman.com> wrote:
> Hi All,
>
> I have to provide for my system better security and I guess it would be 
> better to start pf.conf with the "block all" rule opening afterwards only 
> those incoming and outcoming ports that are supposed to be used by the system 
> on external interfaces. However, it would be easier for me to write all pf 
> rules if I start pf.conf with "block in all", i.e. if I block only traffic 
> coming in from the outside and open all ports for outgoing traffic.
>
> - Incoming ports: only udp/68 (for dhcp client) and http/80 (for http server) 
> always open;
> - Outgoing ports: all ports always opened. All traffic going outside from the 
> system has "keep state";
>
> What disadvantages does it have in term of security in comparison with "block 
> all"? In other words, how bad it is to have all outgoing ports always opened 
> and whether someone can use this to hack the sysem?
>
> Thanks a lot for any tips!!
> Aleksej.
>

Outgoing ports aren't really used as an attack on that system, but as
a jump-point to other systems. Say server A allows all outbound
traffic. Server B, with sensitive data on it, blocks all inbound
access from the Internet but does allow connections from the network
where server A is located. Someone hacks server A, and now they have a
route to attack server B they didn't have before.

Ideally, limiting outgoing traffic to only intended hosts and/or ports
is preferred from a security perspective, but you also have to frame
it in the context of what the system will be doing. If you  have a
good knowledge of what the system needs for both inbound and outbound
connectivity, it would probably be a good idea to restrict access both
ways. I say probably because if the system's outbound traffic profile
is intended to change, requiring changes to the firewall ruleset on a
regular basis, it wouldn't make much sense.

If you know there's outbound traffic you definitely don't need,
blocking it isn't a bad idea. For a system with only public IP
addresses, denying traffic to RFC1918 space is a good example.



-Proto
_______________________________________________
freebsd-pf@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-pf
To unsubscribe, send any mail to "freebsd-pf-unsubscr...@freebsd.org"

Reply via email to