Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Would someone please let me know how to set-up Samba, so I can share files with WinXP clients, but not to allow the network shares to be seen on the internet. What I mean is that when I go to grc.com, and let it run scans on my computer, Samba is letting grc.com see my WORKGROUP NAME, COMPUTER NAME, and USER NAME. This could also be my fault as I did try some tinkering around with the SuSE firewall 2 settings.I am a newbie so anything someone could suggest I will certainly try.
I am running SuSE 8.0 Pro as a gateway to share the PPP
connection I have. And yes I will read all the documentaion that came with Samba, it's just a lot to read, and I have not yet completed all of it.
Thanks,
You need to block Samba ports using your firewall. Could you send your current settings? You need to clock ports 137-139 )or maybe more, I don' remember correctly, can anyone correct me if I'm wrong?)
The ports to block are as you said 137 thru 139, and they need to be blocked for both TCP and IP access.
An additional point is that you should NOT enable guest access in smb.conf. I misread the documentation, enabled that option, and in less than an hour one of my Windows boxes had fallen victim to a script kiddie's attack and in addition was infected by the Chernobyl virus, one of the worst in existence since it can destroy flash BIOS chips rendering the motherboard useless.
Fortunately I was running Tiny Personal Firewall on all the Windows boxes, configured for maximum security. That didn't stop the invader from coming in via Samba since I had enabled Samba's access on the firewall rules -- but it did trip the alarm when the zombie program he had planted attempted to call home. This let me isolate the affected machine, save the undamaged data from it, and stop the infection short. It also taught me the danger of allowing guest access other than to extremely limited areas of a network!
If you don't want outsiders being able to prowl your systems via Samba, use the "allowable IP addresses" access options in the global area of smb.conf to specify that only 127.0.0.1 and your LAN IP addresses (mine are 192.168.0/24) are allowed access.
Thanks Mara, and JimKyle
Sorry I did not write sooner, but I reinstalled SuSE, and I did find the solution to the problem. The SuSE Firewall2 init scrip had some lines of code for Samba support i.e. for Samba to connect to remote networks, and also for remote admin of Samba. Since I didn't need this feature, I just (#) commented out the lines of code that call this feature up, and YEAH! no more netbios stuff being seen by scans at GRC.
Thanks John McKenna
p.s. the firewall init script is found in /sbin, and the auther of the firewall makes a funny comment about these rules, "baah these rules look evil".
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.