home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky alt.sys.sun:3528 comp.security.misc:2411 comp.sys.sun.admin:9868 comp.unix.admin:6862 comp.unix.questions:15115 comp.unix.wizards:5361
- Newsgroups: alt.sys.sun,comp.security.misc,comp.sys.sun.admin,comp.unix.admin,comp.unix.questions,comp.unix.wizards
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!news.acns.nwu.edu!nucsrl!ddsw1!karl
- From: karl@ddsw1.mcs.com (Karl Denninger)
- Subject: Re: internet firewall: packet selecting/forwarding
- Message-ID: <C08Ko7.I4M@ddsw1.mcs.com>
- Date: Sat, 2 Jan 1993 17:02:31 GMT
- References: <1993Jan2.091216.10624@corp.telecom.co.nz>
- Organization: MCSNet, Chicago, IL
- Keywords: security, internet, firewall, packet, filter
- Lines: 37
-
- In article <1993Jan2.091216.10624@corp.telecom.co.nz> chuck@corp.telecom.co.nz (Chuck Zheng) writes:
- >Hello,
- >
- >I am interested in building a internet firewall to restrict un-authorised
- >(potential) access to my network. The resources I have are sun3 sun4 and pcs.
- >Can anybody tell me how to implement it?
- >
- >I have read Garfinkel & Spafford's "Practical Unix Security" (O'Reilly & Assco).
- >It introduced the concept of internet firewall's choke & gate, and what need to
- >do, but not how, especially, not about how to filter packets on unix. I guess
- >something have to be done about inetd.conf, to shut down some service. But how
- >to forward a telnet packet from choke to gate?
- >
- >I read log_tcp/tcp_wrapper README. It seems to me that it can filter packets
- >based on host infomation. But I do not feel it can offer same level of protec-
- >tion as separate choke & gate. Does it handle unauthorized nfs mounting?
- >
- >I would like to learn from your experience (if any) dealing with internet
- >security. Any comments will be appreciated.
- >
- >Chuck
-
- Somewhere between your systems and the Internet there is a router.
-
- That is one place to implement filtering on a port-by-port basis.
-
- The other option is to leave that open, and have one system which is the
- "gateway" that does not forward packets from/to anyone else. This system
- then is your "choke point" through which all attacks must be made. You then
- secure that as best you can, and watch it closely.
-
- Combinations of both are also possible.
-
- --
- Karl Denninger (karl@ddsw1.MCS.COM, <well-connected>!ddsw1!karl)
- Data Line: [+1 312 248-0900] Anon. arch. (nuucp) 00:00-06:00 C[SD]T
- Request file: /u/public/sources/DIRECTORY/README for instructions
-