/srv/irclogs.ubuntu.com/2012/10/15/#ubuntu-qc.txt

edveQuel est le meilleur firewall pour linux ? J'ai lu de iptable .. mais je trouve cette idée un peu archaïque ... 18:04
cyphermoxedve: dsl, j'avais pas vu ton message18:17
cyphermoxsur Ubuntu on a ufw qui est une interface simple pour iptables18:17
cyphermoxiptables reste tjrs la méthode au niveau kernel utilisée18:17
Ankmanon ne besoin pas un firewall a linux. autre que on a des servers pour protecter19:06
edvejustement il s'agit d'un serveur pour faire du VoIP19:11
Ankmanquelle serveur?19:14
edveUbuntu server 12.04.1 LTS ayant Asterisk comme PBX19:16
edvemais je veucx le sécuriser 19:16
edveAlors iptables est la meilleure solution ? 19:17
cyphermoxAnkman: that's so wrong. why would Linux not need security?19:20
cyphermoxif you have a machine that has port 22 open for whatever reason, you'll quickly see how fast people try to go access it and try to guess passwords19:21
cyphermoxedve: oui. iptables est pas mal "LA" solution ;)19:21
Ankmancyphermox: what would you want to protect?19:23
Ankmanwindows is f****ed up by design with tons of open ports by default. because MS has no idea how to make a good basic setup they introducted the firewall. after the code red disaster19:24
Ankmanlinux does not have any open ports when you installed it. there is nothing you would need to protect19:24
cyphermoxdoesn't mean it's not a good idea to have a firewall and a virus scanner19:25
cyphermoxor you should just give me your IP address :)19:25
Ankman70.24.188.18219:26
Ankmanno firewall. all what is open there is because i run servers19:26
Ankmancomputer there is online 24/7 and that since years. not being hacked so far. although probes run from china and elsewhere on every open port all the time19:30
Ankmanwhile a "normal" linux user does not have servers, has different IPs every day. there's really nothing to protect19:30
edveiptable est assez fort , tellement qu'il m'a tout bloquer hahaha 20:14
cyphermoxedve: c'est pourquoi utiliser ufw, il te permet de faire les règles facilement et a un baseline correctement monté pour permettre ce que tu risque d'avoir besoin, comme le dhcp20:22
YoBoY+1 pour ufw il est très simple à prendre en main20:25
Ankmanhttp://ubuntuforums.org/showthread.php?t=1871177 to understand why you don't really need a firewall in linux (in windows you need though!). or why it's even worse if you have one than not having one20:30
Ankmanthe missconception is that people think you need a a firewall on linux because you need one on windows. that's just not true as there are no open ports.  worse: a firewall brings an additional code base. which can have bugs and then be exploited20:46
Ankmanand a "stealth" user is telling a potential attacker that he is there! because the computer will not respond to probes, no return. but that "natural" behaviour is the send a reply that the port is closed. for exmaple if you go offline and some one probes your IP the gateway of your ISP will return "no open port". so it sends an answer20:48
Ankmanthen there are proof of concepts. a C program with source code that you can read and then compile yourself. all it will do when started is bypass any firewall. that includes iptables and the windows firewall. the program is harmless, just goes online without being stopped by a firewall and proofs it to you20:59
cyphermoxAnkman: we'll just have to agree to disagree, no matter what ports you may think are closed, it's still good practice to keep a firewall up, no matter if it's linux or windows. 21:58
cyphermoxquoting ubuntuforums isn't exactly making a compelling case either21:59
Ankmancyphermox: sorry was offline. yes, ubuntuforums might not have been a good idea to quote22:57
Ankmanstill, no open ports -> nothing to protect. if you have a linux or unix admin at work or somewhere, ask him. he should confirm this22:58
cyphermoxno23:02
cyphermoxI'm a linux admin23:02
cyphermoxI worked with Solaris for 3 years before that23:02
cyphermoxI was a network admin23:02
cyphermoxand the forum post proves you *should* keep a firewall nonetheless23:02
cyphermoxthe fact is, it doesn't give you a magic bullet to protect you from everything23:03
cyphermoxbut it helps a lot23:03
cyphermoxyou can never know what might come in23:03
cyphermoxwith a firewall, for example, you could block redifinitions of IPs via ARP23:03
cyphermoxwhich is a great thing for laptops if you're moving around a lot and going to cafes, whatever, where the network is untrusted23:04
cyphermoxfurthermore, stateful engines in firewalls help protecting you from return traffic, etc.23:05
cyphermoxconntrack is one of the kernel interfaces that does this kind of thing, provided a properly configured firewall23:05
Ankmanyes, you can selectrivly block "bad ips". that i do when i notice they probe for php exploits on my web server. but just having a firewall doesn't help if you don't know what you do23:10
cyphermoxright23:10
cyphermoxwe *do* have reasonable defaults in ubuntu with ufw which make things work pretty nicely23:11
cyphermoxsee /etc/ufw/before.rules23:11
Ankmanhmm23:11
cyphermoxwhich is the precise reason why I won't recommend to just use iptables, and instead recommend ufw, because it makes it easier to not block yourself out of everything, etc.23:12
Ankmanwell my server runs 24/7 since years, no firewall. i just block a few asian IP ranges notorious for probes. that's all23:12
Ankmannever had problems23:12
cyphermoxif that suits your need for security, that's fine23:12
cyphermoxbut what this means is that you're still vulnerable to more targetted attacks from people who know what they are doing23:12
cyphermoxand it's a server, not a laptop, the environment is very different23:13
cyphermoxfwiw, I seriously recommend putting a firewall on your laptop before going to UDS (or any other conference for that matter) ;)23:13
Ankmani'm often in open wlans with my netbook (debian testing) and there are no firewall rules at all23:14
cyphermoxas with all things in computer security, it's a matter of managing risk23:14
cyphermoxrisk in a cafe is pretty low, it's a small network, few people usually, and you can see what they do ;)23:14
cyphermoxat a conference, it's a whole other story, and there has been cases of targetted attacks in the past23:15
cyphermoxit's pretty much the same idea as password complexity23:15
cyphermoxif having a short, relatively simple password gives you the sufficient assurance that your data is safe, then it's all good23:15
cyphermoxif however you carry more important things, trade secrets, whatnot, then you might want to invest the brain cycles in remembering more complex passwords, multiple different passwords, using full disk encryption, etc.23:16
cyphermoxand even that is not a magic bullet, but I'm not too concerned with cold-boot attacks for the kind of stuff that I do23:16
cyphermoxespecially given that it's all totally public stuff in Ubuntu, I very rarely deal with secret things (and actively avoid doing so)23:17
Ankmanif you are an intersting target (industry), then yes, you might want some extra security especially when having server running23:18
cyphermoxthere is that too23:19
cyphermoxbut that's still managing risk23:19
cyphermoxlow risk = low need for security23:19
Ankmanbut a normal user... i say you can install ubuntu or any other linux on a computer and expose it -as is - to the internet for years. nothing will happen to it23:19
cyphermoxno23:19
cyphermoxbut then again, something could happen23:19
cyphermoxyou can't know23:19
Ankmanas long as the tcp/ip stack is "healthy" linux itself should not be exploitable23:20
cyphermoxthere will always be bugs23:20
Ankmanapplications are. that's a different thing23:20
cyphermoxbut even simpler than that23:20
cyphermoxpeople tend to enable things without thinking of the consequences23:21
cyphermoxe.g. if I enable remote desktop23:21
Ankmanno open ports: there is only the stack between linux and the internet. if this is okay, it shold be fine23:21
Ankmanyes, that's a different thing23:21
cyphermoxthen I suddently have port 9100 open ;)23:21
cyphermoxon a desktop/laptop, it's bound to happen23:21
cyphermoxon a server, much less, but if it's not a company system there is also a high probability that people will install something to try it out and forget about it, leaving a hole23:22
cyphermoxyou can't just think of open ports when thinking about network security23:23
cyphermoxthere's also how the kernel handles icmp packets, any specially crafted protocol packets that it might want to listen to, multicast, etc.23:24
cyphermoxit's very very true that those are much less often used as attack vectors because let's face it -- people on the internet don't usually look for something to attack knowing what they're doing -- they're trying to find easily exploitable systems, mostly windows boxes with udp 139 or whatever open23:25
Ankmanif a "naked" linux is vulnerable to a "bad" packet then linux is broken23:25
cyphermoxbut they are still there and explotable23:25
cyphermoxare you surprised?23:25
cyphermoxthere will always be bugs23:25
Ankmanand they need to get fixed23:25
cyphermoxyes23:26
cyphermoxthey will get fixed23:27
cyphermoxfor instance; this is an old one: https://isc.sans.edu/diary.html?storyid=682023:27
cyphermoxor, way more recent: http://www.ubuntu.com/usn/usn-1529-1/23:27
Ankmanlatter seems to be a local user exploit23:30
cyphermoxit serves to indicate that exploits in the network stack exist23:32
Ankmanok23:32
cyphermoxof course at that point you might ask the usefulness of the firewall to protect against an exploit on the kernel it's being run on23:33
cyphermoxthen I'd answer, it depends, I don't know exactly in what order things are being done to process packets in the firewall, I suspect the answer is "it depends on the type of packet/exploit"23:33
Ankmanprobably23:34
* cyphermox is not a kernel dev23:35
Ankmanam no dev at all23:36
Ankmanbooting haiku on VM :-)23:40

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!