Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Owing to circumstances beyond my control, I am obliged to set up my standalone linux box to be as secure possible. I am running Fedora Core 3 test 3 and connnected to the net via ADSL. I am not running any servers.
Using Firestarter, I have disabled ALL ports for incoming traffic. Can I now be confident that my system is fully secure against intruders? Are there any other additional steps I can take short of unplugging the RJ45 cable?
Thanks for the pointer. I haven't been able to run this test yet (costs $) but I did run the online diagnostics Shield's UP at https://www.grc.com/x/ne.dll?bh0bkyd2
According to this test, ports 21, 23, and 80 are open on my system and ICMP Echo is enabled. However, I have explicitly closed all ports on my box and disabled ICMP Echo using Firestarter. I am networked via a wireless router connected to my ADSL connection; is it possible that these ports and ICMP Echo are open on the router ? Also, as I run the test, I would have expected to see the hits in the Firestarter Hists window, but nothing at all was displayed. Firestart is active and indicates that the firewall is enabled.
Ok, how vulnerable are p2p programs, like Limewire and aMule? If I leave a couple of ports open for them is this a signficant security risk?
these are servers.
if you close off the ports then you will be secure, but you will not be able to download as material as fast.
just like any server, IF there is a venuerability in the software, then you are not secure.
normally i hate limewire (aplollon is much better !)
but as far as security is concerned, limewire is a good choice.
most attacks on servers use some kind of buffer overflow exploit.
limewire is written in java, and java is an excellent at protecting itself from these kind of attacks.
if you want to be totally secure, you cannot use a p2p program with port forwarding anabled.
anyways.. to sum it up...
aMule is secure unless an exploit is discovered.
Limewire is very secure, BUT limewire installs spyware and adware on your system.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.