At 11:09 AM 6/2/00 , Gordon Messmer wrote:
>Duncan Hill wrote:
> > The PIX on the network does this for me :)  I just need a way to
> > protect my system so it cannot be used as an entrance point.
> > Portsentry is up and running already :>
>
>Once you firewall your machine properly, portsentry will be next to
>useless.  It will only warn you about errant connection attempts from
>inside your own network, because those are the only connections it will
>receive :)  The kernel will drop connections from the outside world
>before portsentry see's them.

I don't know what a PIX is... but if I understood Duncan correctly, his 
internal LAN was using the an IP address space that he doesn't own (Duncan, 
is this correct?  this the crux, yes?).  These machines were being serviced 
by an IP Masq firewall that translated from their IP addresses to one 
legitimate IP address.  His machine is a web server and (whatever port 22 
services) and the firewall is configured to expose his machine.  I'm 
curious about the details of this but I assume that he has a single 
interface that is connected to his LAN.

Anyway, he asked how to use IP chains to block all outside traffic except 
ports 22 and 80 and allow all internal traffic.

Duncan, if this is correct, I don't think you can distinguish internal and 
external traffic on your machine.  This has to be done at the border 
between your LAN and the outside world (I think this is what Gordon is 
saying).

Or, you could just trust all traffic from the IP space of your internal LAN 
and hope no one who really owns that space attacks.  Actually, doubts creep 
in as I write this... how would your routing return packets correctly to 
internal machines?  If the packets are being routed correctly to your LAN 
peers then I guess you have little to worry about the legitimate users of 
this IP space because they'll never see responses to the packets they send?

-Alan


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to