On Mon, 8 Jul 2002 [EMAIL PROTECTED] wrote:
> "Martinez, Michael - CSREES/ISTM" <[EMAIL PROTECTED]> wrote ..
> > I recently had a network audit, which had the following to say about my
> > LInux machines. Wanted to get some feedback from the list. It seems rather
> > bogus. I never heard of this. Can somebody provide details. Is this
> > legimitate or no:
> >
> > "The linux system accepts the SLIST command from outside the agency to
> > display internal routing tables. This poses a serious security risk..."
>
>
> "slist" is I believe just an implementation of Novell's SLIST command
> for listing NetWare servers. Question, are you running a NetWare
> emulator on Linux or just doing slist on Linux to see NetWare servers
> you have in house? The slist on Linux is a part of the ncpfs-2.2.0.18-6
> package. You could just remove the slist command from most Linux boxes,
> or you could rename slist and make a script wrapper for the slist
> command so not everyone can use it, or you could change the execute
> permissions to root only, or contact its developer for other options.
>
> Peter
>
Ask the folks who did the network audit what ports SLIST uses on your
machine to access it. If, for example, they are 3200-3600, you can use
your firewall to block access to ports 3200-3600 from "outside the
agency". If your firewall is ipchains, for example, it might need
something like (I may well be making a mistake in syntax)
ipchains -A input -p tcp -y -s ! <your agency's IP range> --dport 3200:3600 -j DENY
or for iptables
iptables -A INPUT -p tcp --syn -s ! <your agency's IP range> --dport 3200:3600 -j DROP
If your "agency" has its own firewall, maybe they should be blocking
whatever are the risky ports themselves.
--
Steven Yellin
_______________________________________________
Seawolf-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/seawolf-list