LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 10-09-2007, 06:33 AM   #1
samwise17
Member
 
Registered: Jul 2007
Location: Sydney
Distribution: Arch,Slackware,Puppy
Posts: 87

Rep: Reputation: 15
ping and security


I went to ShieldsUp at www.grc.com and ran the tests to check the security on my laptop. I'm using guarddog to configure my firewall until the time I learn to use iptables probably. I failed the common ports probe, apparently because my computer returns ping requests. But I can't figure out what is returning them.
nmap localhost gives
Code:
Starting Nmap 4.20 ( http://insecure.org ) at 2007-10-09 21:32 EST
Interesting ports on Hex.samwise.hex.org (127.0.0.1):
Not shown: 1694 closed ports
PORT     STATE SERVICE
22/tcp   open  ssh
113/tcp  open  auth
6000/tcp open  X11

Nmap finished: 1 IP address (1 host up) scanned in 0.100 seconds
I commented out auth in /etc/inetd.conf and restarted but it's still there.
I use ping and find it useful. Is it much of a security risk? What process returns the ping?
 
Old 10-09-2007, 06:59 AM   #2
ledow
Member
 
Registered: Apr 2005
Location: UK
Distribution: Slackware 13.0
Posts: 241

Rep: Reputation: 34
Ping won't show up on nmap (well, not where you're looking).

Nmap looks at TCP and UDP ports. Ping is what's known as an ICMP message. If you don't want to respond to ping (which, by the way, is an incredibly useful thing to be able to do if you want to remote-access the PC... so much easier to ping it to see if it's working than to spend an hour figuring out that you can't even route to the machine itself) you can block ICMP with iptables, just the same way as any other type of packet:

http://www.cyberciti.biz/tips/linux-...icmp-ping.html

will help you here.

How to do it in GuardDog? No idea, but there'll probably be a nice simple "respond to ping" option somewhere.
 
Old 10-09-2007, 07:09 AM   #3
ledow
Member
 
Registered: Apr 2005
Location: UK
Distribution: Slackware 13.0
Posts: 241

Rep: Reputation: 34
Oh and in reply to your last questions:

Ping is not really any sort of security risk at all. It's basically the IP equivalent of "Are you there, yes or no?". There's nothing to compromise with ping. Other ICMP messages can do stuff but you'll find that they only really work for you and most of them are overridden by your ISP anyway.

I leave ping alone on my machine. The fact that my machine responds to ping is very useful to me and others (e.g. when I'm fixing someone's systems, I know that MY ip will always be up, so it's useful to ping it to check connectivity) and zero-risk. There are people that say that it "lets hackers know your machine is on", but they are generally paranoid idiots. Anyone who wants to attack your machine won't be put off by a hidden or faked ping response, the botnets tend to just brute-force try every IP and every port that they know they can attack on.

Some places won't even accept connections unless they can ping you back at your IP (some IRC networks spring to mind).

There is no "process" that returns a ping... it's part of the way Ethernet and networks operate - it's a fundamental part of the protocols involved. ICMP messagess such as ping are part of the way messages are routed over the Internet - in a very simplified explanation they basically say things like "Whoa, you're talking too fast", "Nope, that computer isn't talking to me", "The computer on the other end said that that port is closed" or "I have no CLUE about how to find that machine". Most ICMP messages are useful. Ping is one of those. It *can* be blocked (I know of a few places that block them routinely) but it's a bit pointless.

The places I know that do block them do so for traffic reasons because they are very high volume machines and, e.g. getting pings from a million client PC's when a DNS server goes down actually adds to the problem. To be honest, there's not even much point in that anyway, because by the time your machine has worked out that it's a ping message and decides whether or not to respond, you've ALREADY spent time and bandwidth to recieve it in the first place.
 
Old 10-09-2007, 07:30 AM   #4
simcox1
Member
 
Registered: Mar 2005
Location: UK
Distribution: Slackware
Posts: 794
Blog Entries: 2

Rep: Reputation: 30
If your using a router, then that is probably the first port of call for shieldsup, so you might need to check the firewall there if there is one.
 
Old 10-09-2007, 08:54 AM   #5
evilDagmar
Member
 
Registered: Mar 2005
Location: Right behind you.
Distribution: NBG, then randomed.
Posts: 480

Rep: Reputation: 31
Quote:
Originally Posted by samwise17 View Post
I went to ShieldsUp at www.grc.com
Well, there's your first problem. Steve Gibson is a moron who can't be counted on to tell the difference between a threat and a delusion.

Quote:
Originally Posted by samwise17 View Post
and ran the tests to check the security on my laptop. I'm using guarddog to configure my firewall until the time I learn to use iptables probably. I failed the common ports probe, apparently because my computer returns ping requests.
...and that right there would be one of the (many) reasons Mr. Gibson is a moron. There used to be a whole site devoted to why he's a moron--but there's only so long it makes sense to keep such a site up.

Quote:
Originally Posted by samwise17 View Post
But I can't figure out what is returning them.
nmap localhost gives
Code:
Starting Nmap 4.20 ( http://insecure.org ) at 2007-10-09 21:32 EST
Interesting ports on Hex.samwise.hex.org (127.0.0.1):
Not shown: 1694 closed ports
PORT     STATE SERVICE
22/tcp   open  ssh
113/tcp  open  auth
6000/tcp open  X11

Nmap finished: 1 IP address (1 host up) scanned in 0.100 seconds
I commented out auth in /etc/inetd.conf and restarted but it's still there.
I use ping and find it useful. Is it much of a security risk? What process returns the ping?
Ping is nothing to worry about.

Using nmap to scan localhost on the other hand, is pointless. (Even Fyodor will tell you it's the wrong tool for the job.)

Use `netstat -tunap`.
 
Old 10-09-2007, 08:09 PM   #6
samwise17
Member
 
Registered: Jul 2007
Location: Sydney
Distribution: Arch,Slackware,Puppy
Posts: 87

Original Poster
Rep: Reputation: 15
ledow thats exactly the answer I was looking for. I do have a router so I'll check that. As for Steve Gibson, well I had no idea who he was, I just heard the shieldsup site was good. Looking at wikipedia he does appear to be paranoid.

edit: yes the router allows ping. I only got it so I could access the net with my laptop around the house wirelessly, set it up so I could get on the net and left it. Looking at the config page, I had no idea it could do all this stuff.

Last edited by samwise17; 10-09-2007 at 08:20 PM.
 
Old 10-10-2007, 01:27 AM   #7
Alien_Hominid
Senior Member
 
Registered: Oct 2005
Location: Lithuania
Distribution: Hybrid
Posts: 2,247

Rep: Reputation: 53
http://attrition.org/errata/charlatan.html
 
Old 10-10-2007, 07:47 AM   #8
onebuck
Moderator
 
Registered: Jan 2005
Location: Central Florida 20 minutes from Disney World
Distribution: SlackwareŽ
Posts: 13,925
Blog Entries: 44

Rep: Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159
Quote:
Originally Posted by Alien_Hominid View Post
Hi,

The point of posting the link to 'Charlatans'?
 
Old 10-10-2007, 09:12 AM   #9
anomie
Senior Member
 
Registered: Nov 2004
Location: Texas
Distribution: RHEL, Scientific Linux, Debian, Fedora
Posts: 3,935
Blog Entries: 5

Rep: Reputation: Disabled
Quote:
Originally Posted by samwise17
nmap localhost gives...
Running nmap against localhost tells you little of value. If you want to see which tcp/udp services are listening on which interfaces, use netstat -ltnu

You can run nmap from another box on your network, or you can use grc.com as you did.

Quote:
Originally Posted by samwise17
I use ping and find it useful. Is it much of a security risk?
Whether or not you use the ping program has nothing to do with your box responding to icmp echo requests. This can be disabled via a sysctl variable (or using a packet filtering firewall), but I'll basically concur with previous posts that state it's not a particular security risk in of itself.

You should be more focused on the results of that netstat command I provided and whether or not port scans from external machines show that you have services listening.

By the way, it's a tad harsh to call Gibson a moron, eh? He provides a free portscan service that is widely used. You just need to have enough knowledge to understand the results and draw your own conclusions.
 
Old 10-11-2007, 06:18 AM   #10
samwise17
Member
 
Registered: Jul 2007
Location: Sydney
Distribution: Arch,Slackware,Puppy
Posts: 87

Original Poster
Rep: Reputation: 15
I see I have hit a sensitive topic with steve gibson. Let's forget him for a moment. What's the difference between nmap and netstat?
 
Old 10-11-2007, 06:55 AM   #11
onebuck
Moderator
 
Registered: Jan 2005
Location: Central Florida 20 minutes from Disney World
Distribution: SlackwareŽ
Posts: 13,925
Blog Entries: 44

Rep: Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159
Quote:
Originally Posted by samwise17 View Post
I see I have hit a sensitive topic with steve gibson. Let's forget him for a moment. What's the difference between nmap and netstat?
Hi

Just do a 'man netstat' and 'man nmap' to see! You should be able to understand the operations of each.

BTW, the Steve Gibson issue has been on going for quite sometime. I use his site as a quick test of sites. You need to discern the information. Yes, he is paranoid about certain things but a good asm coder. He is very persistent and can be classed as an alarmist. Which some people take as self promoting. I just say 'judge as you be judged'!
 
Old 10-12-2007, 03:07 PM   #12
Alien_Hominid
Senior Member
 
Registered: Oct 2005
Location: Lithuania
Distribution: Hybrid
Posts: 2,247

Rep: Reputation: 53
Quote:
Originally Posted by onebuck View Post
Hi,

The point of posting the link to 'Charlatans'?
If you search, you'll find S. Gibson there.


S. Gibson represents security field in similar way as Eric. S. Raymond - OSS or Steve Ballmer - Microsoft (radicalism and lots of unverified claims).
 
Old 10-13-2007, 02:25 AM   #13
evilDagmar
Member
 
Registered: Mar 2005
Location: Right behind you.
Distribution: NBG, then randomed.
Posts: 480

Rep: Reputation: 31
Quote:
Originally Posted by anomie View Post
By the way, it's a tad harsh to call Gibson a moron, eh? He provides a free portscan service that is widely used. You just need to have enough knowledge to understand the results and draw your own conclusions.
No, calling him a moron is giving him the benefit of the doubt. This is the man who "invented" SYN cookies, badly, about a year too late. This is the man who decided that having a set ceiling on the number of TCP connections for a given service results in a "vulnerability" and called CERT and several other institutions to report this, and then wondered aloud why they basically ignored him. This is the man who made claims that certain flaws in WMF were planned backdoors. This is the man who has a website that puts most televangelists to shame with the level of fear and brimstone it preaches about every little freaking thing (and let's face it, identd is nowhere near as serious as all that). This is the man that also makes SpinRite, the promotional materials for which are about half nonsense and half bad advice (what utter lunatic restores a failing drive back to itself?). Some guys pounded the crap out of his website for a couple of days some years back, and the dude acted like the world as we know it was coming to an end. I mean, seriously, the dude claimed that raw socket access in XP were basically going to allow hax0rs to bring down the interwebs. Raw sockets--nevermind the near absence of security in the operating system as shipped.

Oh, and here's some links...

http://www.radsoft.net/news/roundups...60121,00.shtml
http://www.ciao.co.uk/grc_com_Gibson...Review_5610888
http://www.theregister.co.uk/2001/07...n_water_youre/
Google for "Steve Gibson is a moron" and you'll find many, many more.

About the only thing the man has going for him is his long-windedness. He's living proof that if you talk nonsense long enough, enough fringe idiots will accumulate to almost make you look like you're not completely out of your head.

Last edited by evilDagmar; 10-13-2007 at 02:41 AM.
 
Old 10-13-2007, 02:52 AM   #14
Alien_Hominid
Senior Member
 
Registered: Oct 2005
Location: Lithuania
Distribution: Hybrid
Posts: 2,247

Rep: Reputation: 53
Raw sockets was the worst thing, cause Microsoft was influenced by this nonsense and actually implemented this in SP2 for XP -> no raw sockets in Windows now. It was so stupid, cause Microsoft didn't or didn't want to understand that "hax0rs" or how they call them do not use windows due to it's lack of shell availability, lame remote control and other tools. In addition, limitting access to hardware even for super-users (Administrators) is a totally wrong way to go.
 
Old 10-13-2007, 09:09 AM   #15
anomie
Senior Member
 
Registered: Nov 2004
Location: Texas
Distribution: RHEL, Scientific Linux, Debian, Fedora
Posts: 3,935
Blog Entries: 5

Rep: Reputation: Disabled
Quote:
Originally Posted by evilDagmar
He's living proof that if you talk nonsense long enough, enough fringe idiots will accumulate to almost make you look like you're not completely out of your head.
Ok, thanks for the Gibson story-hour.

To reiterate my point more clearly (and hopefully keep it relevant to the topic of this thread), the shields up service has value so long as you can understand the results. Hopefully by now OP has a grasp on the use/interpretation of netstat locally and port scans from external machines.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Strange Ping Issue - Can't ping localhost but can ping others on LAN code_slinger Linux - Networking 15 03-30-2015 02:39 PM
LAN/ADSL Router ping working but DNS ping fails R N Ghosh Linux - Networking 1 01-13-2006 07:44 AM
PPP establish can ping the gateway router but unable to ping the host deepalalla Linux - Networking 0 11-18-2004 09:10 AM
windows 98 m/c ping to ip address of red hat server but fails to ping hostname ravilohot Linux - Networking 2 09-07-2004 04:57 AM
Ping Security question. (short) Stingreen Linux - Security 22 08-19-2002 04:13 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 11:36 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration