Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
|
06-03-2010, 12:59 AM
|
#1
|
Senior Member
Registered: Aug 2005
Location: Brazil
Distribution: Debian
Posts: 1,462
Rep:
|
Public Wifi concerns
I am planning a trip for a few days and I will be staying at an inn with Wifi access. All the guests are allowed to use it. A friend of mine has been there, he told me there are several other private spots around the house, i.e. lots of other people using Wifi. My friend told me the inn uses WEP, so who knows how many times their access point has been hacked and accessed without permission...
My concern is that I will be there for a few days with my notebook, I will have to work once in a while, connected to the Internet. Is there some precaution I should take to protect my notebook from intruders? Is it advisable to install a firewall in my notebook (iptables?) or am I just overreacting? Is it possible for one of the guests or neighbors to break into my notebook?
|
|
|
Click here to see the post LQ members have rated as the most helpful post in this thread.
|
06-03-2010, 01:18 AM
|
#2
|
Senior Member
Registered: Dec 2009
Posts: 1,387
Rep:
|
It's highly unlikely.
Enabled Filesharing offen allow others to access your files on networks.
I beleave most wifi attackers would use wifi for free net, anonimity and in worst case spying on other people activitys.
|
|
2 members found this post helpful.
|
06-03-2010, 01:23 AM
|
#3
|
Senior Member
Registered: Aug 2009
Posts: 3,790
|
Personally, I always have iptables on, no matter what network I'm connected to, no matter how unlikely the chances of being targeted. Worms and malware don't care where you are or whether you're only connecting for 10 minutes - if its not on, its not on
Also.. try not to do any internet banking if you're on a public connection, it's pretty easy to provide fake dns responses ...
Last edited by kbp; 06-03-2010 at 01:25 AM.
|
|
2 members found this post helpful.
|
06-03-2010, 02:00 AM
|
#4
|
Member
Registered: Nov 2007
Location: Seattle
Distribution: Debian Wheezy & Jessie; Ubuntu
Posts: 334
Rep:
|
Or just leave an ssh server running on your home computer and use ssh tunneling to browse over an encrypted connection ie:
-> set up the browser to use sock proxy server on port 8080 at local host (127.0.0.1)
For extra security with Firefox tunnel dns requests over the secure tunnel. Open the about:config page. Change network.proxy.socks_remote_dns to true.
Other ssh options:
-f move the ssh to background
-N do not execute remote command
-q be quiet
-T do not allocate a pseudo tty
-n redirect standard input to /dev/null
-C enable compression
Regards,
Stefan
Last edited by propofol; 06-03-2010 at 02:08 AM.
|
|
2 members found this post helpful.
|
06-03-2010, 02:30 AM
|
#5
|
LQ Guru
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870
|
I too would highly recommend not only that you use a firewall, but also that you set up a secure tunnel to a less-risky location, such as your home perhaps (you need to worry about your traffic as well, not just your computer).
Last edited by win32sux; 06-03-2010 at 02:33 AM.
|
|
2 members found this post helpful.
|
06-03-2010, 06:04 PM
|
#6
|
Senior Member
Registered: Aug 2005
Location: Brazil
Distribution: Debian
Posts: 1,462
Original Poster
Rep:
|
Quote:
Originally Posted by propofol
Or just leave an ssh server running on your home computer and use ssh tunneling to browse over an encrypted connection ie:
-> set up the browser to use sock proxy server on port 8080 at local host (127.0.0.1)
For extra security with Firefox tunnel dns requests over the secure tunnel. Open the about:config page. Change network.proxy.socks_remote_dns to true.
|
That didn't work for me. Firefox can no longer load any pages at all with that configuration. I used 127.0.1 and the same port as the -D parameter for SSH. I used the remote server that hosts my website and has SSHD running all the time. What did I do wrong?
Also, is it possible to make Kmail send and receive mail through an SSH tunnel? I couldn't find anything that seemed remotely relevant in the many Kmail configuration options, but maybe there is some clever trick I don't know...
|
|
|
06-03-2010, 06:45 PM
|
#7
|
Senior Member
Registered: Jul 2007
Distribution: Gentoo
Posts: 2,125
|
See the attached screen shot for an example of a working setup. You may need to change 127.0.0.1 to localhost in the socks proxy section.
I also assume you issued the SSH connection first. Try ssh -CND 8080 user@domain. You shouldn't see any response from the SSH server in your terminal.
|
|
2 members found this post helpful.
|
06-03-2010, 09:01 PM
|
#8
|
Senior Member
Registered: Aug 2005
Location: Brazil
Distribution: Debian
Posts: 1,462
Original Poster
Rep:
|
It works!
Your screenshot really helped. I had filled in HTTP Proxy instead of SOCKS Host. Doh!
Force of habit, for I used HTTP Proxy for Privoxy for several years. I just went ahead and typed stuff into the first empty field I came across.
Now if only I could check and answer my mail through that tunnel, that would be copacetic.
Last edited by lucmove; 06-03-2010 at 09:02 PM.
|
|
|
06-03-2010, 09:53 PM
|
#9
|
Senior Member
Registered: Aug 2005
Location: Brazil
Distribution: Debian
Posts: 1,462
Original Poster
Rep:
|
OK, tunneling is easier than I thought. All my public Wifi woes are gone. Many thanks, everyone!
|
|
|
All times are GMT -5. The time now is 06:29 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|