Date: Fri, 31 Jul 1998 11:29:22 +1000 (EST) From: "Daniel O'Callaghan" <danny@hilink.com.au> To: Wietse Venema <wietse@porcupine.org> Cc: efb@cotdazr.org, security@FreeBSD.ORG Subject: Re: PPP.3000.exposure Message-ID: <Pine.BSF.3.96.980731112116.27739F-100000@enya.hilink.com.au> In-Reply-To: <19980731000439.4580B7036A@spike.porcupine.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 30 Jul 1998, Wietse Venema wrote: > efb@cotdazr.org: > > > > Had a random sweep and the question came up .. what and why does my > > port 3000 show to the world outside for .. can I block it .. should I > > sweat it .. the F.Bsd_205 box is the router as well as main server .. > > > > Can I Wrap the 3000 at least so as not to kill iijppp and reduce my > > exposure and how ??? > > This is one feature of the ppp daemon that I didn't like at all. > To block, you'd need a kernel-based packet filter; or hack the > source and rip out the Brian will correct me if I am wrong, but I believe that for quite a while now ppp has not bound to 3000 if there is no password set for the machine. Not perfect protection, of course, but something. It is not too hard to enable ipfw, either in-kernel or as lkm. Just flick the switch in /etc/rc.conf (firewall="YES") and add the appropriate ipfw rules. Danny To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980731112116.27739F-100000>