
OpenBSD? On a laptop?zenlunatic wrote:First let me say that my only current system is a laptop. And just before you mention that I should install openbsd, understand that I have no need for industrial strength security, at least not yet, but I do like to think ahead.

Yeah but in the long run I would rather like to learn the bottom line of a packet fileter. I hope the energy that I put into learning iptables will pay off, opposed to learning ipf, pf, or ipfw. I know those aren't generally linux packet filters, but I wan't to develop some marketable skillsjondkent wrote:Talking about configuration, doing it from the command line could be problematic is you haven't done so before, so you might want to look at fwbuilder, which is gui front end to building iptables rules.
was that not microsofts advice to all people who wanted a secure server... though I think it was more along the lines ofguero61 wrote:1. Unplug it from the mains
2. Unplug it from your NIC
3. Remove/plug all media insertion points
4. Rip off keyboard/touchpad
5. Power off
6. Perfectly secure!!!
![]()
I think you are right in learning the command line fully and not going for the gooey. I started into linux about 3-4 weeks ago now and just dived into the command line and now I'm comfortable with it and have set up a good bit only with command line.... better for performance for a server as well.zenlunatic wrote: Yeah but in the long run I would rather like to learn the bottom line of a packet fileter. I hope the energy that I put into learning iptables will pay off, opposed to learning ipf, pf, or ipfw. I know those aren't generally linux packet filters, but I wan't to develop some marketable skills
Glad to hear it. Lots on information on line but be careful as some advise is just plain wrong. Might be best to buy a book (Red Hat Linux Firewalls is a good one and doesn't just cover RH)Yeah but in the long run I would rather like to learn the bottom line of a packet fileter. I hope the energy that I put into learning iptables will pay off, opposed to learning ipf, pf, or ipfw

You forgot:guero61 wrote:1. Unplug it from the mains
2. Unplug it from your NIC
3. Remove/plug all media insertion points
4. Rip off keyboard/touchpad
5. Power off
6. Perfectly secure!!!
![]()

Code: Select all
#
# Networking options
#
CONFIG_PACKET=y
# CONFIG_PACKET_MMAP is not set
# CONFIG_NETLINK_DEV is not set
CONFIG_NETFILTER=y
# CONFIG_NETFILTER_DEBUG is not set
# CONFIG_FILTER is not set
CONFIG_UNIX=y
CONFIG_INET=y
# CONFIG_IP_MULTICAST is not set
CONFIG_IP_ADVANCED_ROUTER=y
CONFIG_IP_MULTIPLE_TABLES=y
CONFIG_IP_ROUTE_FWMARK=y
# CONFIG_IP_ROUTE_NAT is not set
# CONFIG_IP_ROUTE_MULTIPATH is not set
CONFIG_IP_ROUTE_TOS=y
# CONFIG_IP_ROUTE_VERBOSE is not set
# CONFIG_IP_ROUTE_LARGE_TABLES is not set
# CONFIG_IP_PNP is not set
# CONFIG_NET_IPIP is not set
# CONFIG_NET_IPGRE is not set
# CONFIG_ARPD is not set
# CONFIG_INET_ECN is not set
# CONFIG_SYN_COOKIES is not set
#
# IP: Netfilter Configuration
#
CONFIG_IP_NF_CONNTRACK=m
CONFIG_IP_NF_FTP=m
CONFIG_IP_NF_IRC=m
CONFIG_IP_NF_QUEUE=m
CONFIG_IP_NF_IPTABLES=m
CONFIG_IP_NF_MATCH_LIMIT=m
CONFIG_IP_NF_MATCH_MAC=m
CONFIG_IP_NF_MATCH_PKTTYPE=m
CONFIG_IP_NF_MATCH_MARK=m
CONFIG_IP_NF_MATCH_MULTIPORT=m
CONFIG_IP_NF_MATCH_TOS=m
CONFIG_IP_NF_MATCH_ECN=m
CONFIG_IP_NF_MATCH_DSCP=m
CONFIG_IP_NF_MATCH_AH_ESP=m
CONFIG_IP_NF_MATCH_LENGTH=m
CONFIG_IP_NF_MATCH_TTL=m
CONFIG_IP_NF_MATCH_TCPMSS=m
CONFIG_IP_NF_MATCH_HELPER=m
CONFIG_IP_NF_MATCH_STATE=m
CONFIG_IP_NF_MATCH_CONNTRACK=m
CONFIG_IP_NF_MATCH_UNCLEAN=m
CONFIG_IP_NF_MATCH_OWNER=m
CONFIG_IP_NF_FILTER=m
CONFIG_IP_NF_TARGET_REJECT=m
CONFIG_IP_NF_TARGET_MIRROR=m
CONFIG_IP_NF_NAT=m
CONFIG_IP_NF_NAT_NEEDED=y
CONFIG_IP_NF_TARGET_MASQUERADE=m
CONFIG_IP_NF_TARGET_REDIRECT=m
# CONFIG_IP_NF_NAT_LOCAL is not set
CONFIG_IP_NF_NAT_SNMP_BASIC=m
CONFIG_IP_NF_NAT_IRC=m
CONFIG_IP_NF_NAT_FTP=m
CONFIG_IP_NF_MANGLE=m
CONFIG_IP_NF_TARGET_TOS=m
CONFIG_IP_NF_TARGET_ECN=m
CONFIG_IP_NF_TARGET_DSCP=m
CONFIG_IP_NF_TARGET_MARK=m
CONFIG_IP_NF_TARGET_LOG=m
CONFIG_IP_NF_TARGET_ULOG=m
CONFIG_IP_NF_TARGET_TCPMSS=m
CONFIG_IP_NF_ARPTABLES=m
CONFIG_IP_NF_ARPFILTER=m
# CONFIG_IP_NF_COMPAT_IPCHAINS is not set
# CONFIG_IP_NF_COMPAT_IPFWADM is not set
# CONFIG_IPV6 is not set
# CONFIG_KHTTPD is not set
# CONFIG_ATM is not set
# CONFIG_VLAN_8021Q is not set
# CONFIG_IPX is not set
# CONFIG_ATALK is not set
Okay, fair enough. I sort of already had a vague notion that I should be running some sort of packet filter/firewall (any difference between those terms?). I do apprectiate your thoughtfull response, but what I was really trying to figure out is what the difference is between the few defacto packet filters that exist on Free Operating systems. The filters/firewalls that I am concerned with are:rajl wrote:First and most obvious is to use a firewall.
This does sound like something I would like to implement, I am just confused as to which one to use. There seems to be a virtually unanomous consensus within the community which settles on encrypted loopback/crypto-API (are these the same thing) as the de facto method of encrypting an entire harddisk. Although I have heard others mentioned, and I am a naturally sceptical/curious person so I was just wondering how they all compare. Basically these are the systems which I have found to be offered to me for disk encryption (all links in first post):rajl wrote:My first reccommendation is to use the encrypted root filesystem as mentioned above.
rajl wrote:Second, I'd suggest storing as many of your logs as you can in some place other than the traditional /var/log/* because that is the first place attackers will look when they try to delete your logs to cover their tracks.
I use a laptop and I have a usb floppy, usb usb-to-serial adaptar, and usb sound card (griffin imic used for line-in occasionally under ALSA) that I sometimes use. When I'm not using the external modem/soundcard I use the internals instead. Would I still be able to do this? Also, without modules would I be able to plug in my usb mouse on demand and remove it when needed, re-pluggin later if I need it? That's what I do now.rajl wrote:Third, if you are able to, i'd recompile your kernel and take out kernel support for modules and turn your kernel from a modular one into a monolithic one.
Well I run a ppc laptop, so most of the conventional approaches won't work, such as generic boot disks. This machine is openfirmware based BTW.rajl wrote:Hope those ideas help or give you some thought on what else you can do to secure your system. Also, if you're using a laptop, setting a boot passwd in the bios is useful. It won't stop someone determined enough to take your laptop apart to reset the bios, but the casual punk who doesn't know that much about computers will look at it in dazed confusion and give up.
Of you mean like shred?rajl wrote:The MIT program also includes some extra frills such as secure file deletion and harddisk free-space wiping.


Seems to be a lot of angry folks over at bsd forumsStay away from Linux-based firewalls. They are all crap. Not to mention, the firewall code changes with each new release of the kernel (ipfwadm --> ipchains --> iptables --> ???). The stateful checking in Linux firewall code is either non-existent or crap, and NAT support has only recently been added so it is very untested. The only thing going for Linux-based firewalls is the marketing hype behind the Linux "brand".
Stick to BSD for a firewall box. Use whichever BSD you know best. IPFilter runs on them all, so if you decide to change from Net --> Open --> Free --> BSD/OS, your rulesets will migrate with you. Or, you can use the firewall code that comes with the BSD you choose (PF on Open, IPFW on Free).
The firewall code on BSD is years ahead of where Linux is (or will be in the next few years). The syntax is clear, yet concise (without a dozen switches cluttering everything up). The stateful checking is truly stateful (IPF and PF can even to statefu lpacket inspection on non-stateful protocols such as UDP or ICMP). You can choose whether to use last-match or first-match wins rulesets. You can do filtering bridges (and can even remove the IP address from your bridge completely in OpenBSD). And a lot more.
So, to put together your own firewall box, definitely pick a BSD. This is just one more reason to avoid Linux.
iptables bashingThe problem with IPTables is that it is all new. The state engine is new. The NAT engine is new. The whole kit and kaboodle is new. It's all relatively untested. And it will all change again next year when kernel 2.6 comes out, just as it did with kernel 2.4 and kernel 2.2 and kernel 2.0 (see a pattern here). IPF and IPFW have gone through changes as well, but over the course of several years. They've been tested, improved, and hammered on. Doesn't get much better than that.
Code: Select all
/sbin/iptables -P INPUT DROP
/sbin/iptables -A INPUT -i eth0 -m --state RELATED,ESTABLISHED -j ACCEPT
/sbin/iptables -A INPUT -i lo -j ACCEPT

No offense. Sorry at my lack of help in that earlier post. I was busy watching a movie with my wife (her first viewing of The Matrix in prep for Reloaded).zenlunatic wrote:Not that I don't appreciate the *cough* (overused) jokes, but I am really not amused by the comments that say, "remove the box from the net." I am looking for some serious response here guys that would at least point me in the right direction regarding the issues i brought up. This is my first post to the security forums. I know that my question was vague, broad, and not easy to respond to, but I am very ashamed of the /. quality of some of these replies. Hopefull I didn't offend anyone.

No problem. Priorities first. It's just that I hear those jokes all the time in CS class, etc...kermitjunior wrote:No offense. Sorry at my lack of help in that earlier post.
I had a desktop box which was a AMD 1600+ with 40GB HD, 256 RAM, 16MB Video, which is a lot more powerfull than my laptop (ibook). I sold that machine because all I used it for was playing CS, and that got a little out of handkermitjunior wrote:You say that you don't think another box is necessary since you're on a laptop. You might still want to consider that, though. Assuming you only connect your laptop to the net at home, you could have a cheap kludger at home that does dial-on-demand and runs firewall/dhcpd.

