My suggestions are: 1) use SuSEfirewall and be prepared to make changes. It is unlikely you will get everything perfect on the first try. Then get someone you trust to run nessus, satan, saint, or nmap on your system from outside the firewall and tell you what it finds. 2) use Portsentry as an inner defense and watchdog. It monitors the unused privileged ports and yells when someone tries to connect to them and routes their bits to the bitbucket. This is good for protecting you against holes in the firewall and the firewall being down for one reason or another. 3) Xlogmaster. It will display your logs and can execute user defined actions on detecting patterns in the logs. It can play sound files, execute scripts to e-mail your cellphone, etc. 4) Look at your logs, subscribe to suse-security and other security e-mail lists, and do daily backups. HTH, Jeffrey Quoting Curtis Rey <crrey@home.com>:
This is why, as a year old penguin myself, I desparately need an interface that will help me understand how to make a secure firewall without A) leaving blatant holes waiting to be exploited, and/or B) impliment rules that lock my network interface down so much I might as well unplug my RJ-45. Another thing this newbie would really appreciate is a realtime monitor that would give me information/alerts when something tries to send or receive when it wasn't initiated by me. Just a thought or two.
Cheers. Curtis
On Tuesday 05 June 2001 04:20 am, Oliver Maunder wrote:
Flaws in WinXP create a perfect environment for DoS attacks, according to article, which is also a fascinating look into the world of the hacker attacker.
Monday, June 04, 2001, 10:55:32 PM, S. Bulterman wrote:
SB> Read the article and thought it was a compliance issue with the Unix Socket SB> standaard. SB> Windows Me and lower were not 100% compliant with this standards, so no flooding SB> with SB> TCP SYN and TCP ACK. Windows 2000 and XP are now 100% compliant and are capable SB> of sending TCP SYN and TCP ACK attacks..........
Exactly - the quote was:
"When those insecure and maliciously potent Windows XP machines are mated to high-bandwidth Internet connections, we are going to experience an escalation of Internet terrorism the likes of which has never been seen before."
<flamebait> Surely positioning Linux as a consumer OS is going to cause exactly the same problem? Already, the worst DoS attacks come from unsecured Linux boxes with broadband connections. Surely this problem will get worse as consumer Linux usage increases. </flamebait>
Discuss ;-)
Olly
-- I don't do Windows and I don't come to work before nine. -- Johnny Paycheck