Quote:
Originally Posted by packets
will make the web server also a gateway for those two machine
|
Ideally a web server is only a web server and not a gateway.
Quote:
Originally Posted by packets
I'm just wondering if someone try to hack,would it suffice enough?
|
Let's see:
- there's no
bogon filtering,
- there's no limiting (--recent or --limit),
- you use "-j DROP" but as there is no "-j LOG" you will not be able to tell the rate of problems arising,
- using "--policy OUTPUT ACCEPT" is good but the OUTPUT chain is unfiltered, meaning all traffic is allowed including traffic to bogon addresses,
- what happens with any "-p udp" traffic?
- would you detect any attacks against Perl, PHP, Ruby or any other web stack component using these filter rules? (No.)
- since you run a web server, what is going to happen if it gets DOSsed?
- If you're using SSH from the outside it's best to protect that using methods descriped in
the Failed SSH login attempts thread.
- If you've got /etc/sysctl.conf I'd separate sysctls from the shell script. Centrally stored it's easier to manage, more efficient.
- Please always keep the
http://www.frozentux.net/documents/iptables-tutorial/ as reference.
- Do always test your ruleset from the outside using a good packet generator.
- Do use a log watching tool like Logwatch.
- Do deploy defensive measures when running a web server (mod_security etc).
- Do not run unchecked, vulnerable, outdated, unsupported scripts or web applications.