LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 06-02-2003, 05:30 PM   #1
cmisip
Member
 
Registered: Aug 2002
Posts: 189

Rep: Reputation: 30
All PCs behind router with one eth0 each. Shorewall ACCEPTetho:192.168.1.0/24 - bad ?


I have a d link router connected to a cable modem. Behind the router are several computers each with a single ethernet interface eth0. Therefore my internal (LAN) and external (internet) interface is the same. I want to protect the machines from the internet but not from each other so I thought adding rules to accept connections from their respective fw from eth0:192.168.1.0/24 should be adequate. Come to think of it, all traffic from the internet comes through the router first and then to the PC. Does this mean that they are tagged with the address of the router (192.168.1.1) and hence will be part of eth0:192.168.1.0/24. If so, then I did not protect the PC from connections from the internet. Or is my configuration correct? Thanks.
 
Old 09-15-2003, 07:39 AM   #2
/bin/bash
Senior Member
 
Registered: Jul 2003
Location: Indiana
Distribution: Mandrake Slackware-current QNX4.25
Posts: 1,802

Rep: Reputation: 47
The router is doing NAT for the PC's so you should be OK. The internet will not relay any traffic to 192.168 address because they are reserved for private lans.

Also check the router as it probably has a builtin firewall you can further use to protect yourself.
 
Old 09-15-2003, 03:55 PM   #3
/bin/bash
Senior Member
 
Registered: Jul 2003
Location: Indiana
Distribution: Mandrake Slackware-current QNX4.25
Posts: 1,802

Rep: Reputation: 47
Sorry I didn't really explain that very well, I was in a hurry.

The router gets the IP from your ISP. It also knows which port each PC is on and what that PC's internal IP is. The PC's should have their default gateway set to the routers internal IP. If PC-1 wants to talk to PC-2 then the router sends the packets to the correct PC. If PC-1 wants to visit yahoo.com then the router will send the request via the ISP. When yahoo.com returns the request the router will know which PC made the request and will send the reply to it. yahoo.com will not reply to the 192.168.X.X IP, it will reply to the IP of the router and the router will change it to the correct 192.168.X.X IP.

I hope this helps, but I feel like I'm just blabbering now.
 
Old 09-19-2003, 09:08 PM   #4
cmisip
Member
 
Registered: Aug 2002
Posts: 189

Original Poster
Rep: Reputation: 30
Thanks for your reply. Essentially, an ACCEPT policy then is ok since the router excludes any inbound connection not requested by any machines in the internal lan. Any unrequested inbound connection is dropped at the router.
 
Old 09-20-2003, 02:13 AM   #5
LGMike
LQ Newbie
 
Registered: Sep 2003
Location: USA
Distribution: Mandrake
Posts: 22

Rep: Reputation: 15
I agree, your router's firewall should be sufficient in most cases.
Just know that if someone is really determined, they're gonna get in. That's why it's very important to make sure each computer is properly configured with good passwords, permissions and minimal services running in a priviledged mode (running as root). Most major distros of Linux have a way of setting your security settings to some level, anywhere from just standard security (equivalent to decent NT-based security, not too hard to hack, but at least it causes a little frustration for the hacker because his first attempt doesnt work, so he needs two or three possible exploits) up through paranoia levels of security for those of us who don't want the NSA to be able to hack our machines. Where you place your security needs depends on what is on your systems and how much you are willing to be inconvenienced.
For example, my NT systems have medium security, but the Linux authorization server that holds their profiles, user data and other important files, is set to the highest security levels possible w/o denying those NT systems access to it.
Don't ever become complacent about security, though. Just because the NAT is sufficient in most cases, doesn't mean some script kiddie won't find a way to get a trojan horse onto your Linux system and hack you from the inside out (which most NATs provide no protection whatsoever against). That's what IP Chains, IP Tables and personal firewalls are for.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Is someone on my network?! ::ffff:192.168.0.10:ssh ::ffff:192.168.0.:38201 ESTABLISHE ming0 Linux - Security 4 04-12-2005 01:04 AM
router log: **Smurt** from 192.168.1.2 qwijibow Linux - Security 8 02-03-2005 10:01 AM
wine uses lo instead of eth0 (127.0.0.1 instead of 192.168.x.x) lostlyre Linux - Networking 1 04-02-2004 03:46 AM
Debian bound to IP address 192.168.0.101 when connected to D-link wireless router henrylcr Linux - Wireless Networking 4 01-28-2004 05:35 PM
?? Is assigning 192.168.0.1 to eth1 a bad thing? cpender Linux - Networking 5 02-22-2002 11:41 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 08:54 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration