> -----Original Message----- > From: plug-discuss-admin@lists.plug.phoenix.az.us > [mailto:plug-discuss-admin@lists.plug.phoenix.az.us]On Behalf Of > sinck@corp.quepasa.com > Sent: Friday, March 31, 2000 10:42 AM > To: plug-discuss@lists.plug.phoenix.az.us > Subject: ipchains - sorry to flog this horse > > > > > \_ thinking that this discussion might be of interest to others > and not wanting > \_ to abuse Mike Sheldon or Jean Francois...but I am feeling like > by installing > \_ linux systems on the internet, I am lobbing up softballs for > weak hitters to > \_ hit out of the park. > \_ > \_ 1 - if I create a chain ruleset > \_ > \_ default policy deny > \_ accept TCP/UDP port 25, 110, 80 > \_ reject TCP/UDP ports 1:1024 > \_ > \_ does this adequately protect all but mail & www from things > \_ like BIND & FTP exploitation attacks? > > I'm pretty sure you're gonna want 53 in there... otherwise it'll be > harder to resolve hostnames. > > If you're using mysql, add tcp 3306 -y -j REJECT to keep it happy. > > If you're using X, add 6000:6009 -y -j REJECT and 7100 -y -j REJECT to > keep the Xsessions highly protected as well as the font server. > > I like reject better because I think that makes attempts "go away" > faster. But I'd be more than willing to change my opinion if someone > *knows*. :-) > > David --- thanks David I am only supplying DNS to the internal network so I can block port 53 on the external interface without issue I think. I should have specified that the rules that I was discussing were for the external interface. and the little bit I have learned about the difference between DENY & REJECT is that REJECT will end the discussion because it sends a message back but DENY makes it look dumb and disguises the nature of services running. As I wrote to Mike, the amount that I have learned thus far has taught me that I know far too little so I am guilty of using this message board to further my understanding. Thanks Craig