Package: harden-doc
Version: 3.5
Severity: normal

Although correct when viewed strictly from the security point of view,
default policy of DROP on the INPUT chain is very dangerous when
flushing the chain remotely, as I once found out myself, as a newbie :(

My suggestion would be:
a) either to append "iptables -A INPUT -j DROP" at the end and setting
the policy to ACCEPT , or
b) include a note about this pitfall and methods to avoid it, like
keeping an "on" and "off" state of the firewall and applying them with
iptables-restore, for example.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (800, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-1-686
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to