1 |
> > > > > Anyway, a closed port remains closed whether a firewall is |
2 |
> > > > > running, or not. |
3 |
> > > > |
4 |
> > > > I thought the firewall specified which ports to open/close. |
5 |
> > > |
6 |
> > > Not quite, but we might be running into terminology here. |
7 |
> > > |
8 |
> > > The app that is listening a port opens the port. This has nothing |
9 |
> > > to do with the firewall. The firewall is simply an extra level of |
10 |
> > > checks applied before the packet is allowed thorugh the firewall to |
11 |
> > > be received by the kernel, in the same way that a bouncer allows or |
12 |
> > > disallows the public to enter a club. If the bouncer is off sick, |
13 |
> > > the public gets to walk through the door up to reception, assuming |
14 |
> > > the club is open for business. |
15 |
> > > |
16 |
> > > What Mick was referring to is that if a service is running, it's |
17 |
> > > still going to listen on it's port whether iptables is running or |
18 |
> > > not. So, in the absense of iptables (i.e. your bouncer is off |
19 |
> > > sick), you hopefully have a decent password strategy in use by |
20 |
> > > whatever is actually listening on the box. |
21 |
> > |
22 |
> > So as far as incoming connections are concerned, if there are no |
23 |
> > listening applications, there is no need for a firewall? |
24 |
> |
25 |
> Technically yes. In the real world, it depends. The theory will work if |
26 |
> and only if you can absolutely guarantee that no listening service will |
27 |
> ever be running behind that firewall, and that this will always be true |
28 |
> from here on out till the end of time regardless of who has access to |
29 |
> the machine. |
30 |
> |
31 |
> That's a tall order, and leaves human nature out of it. You might |
32 |
> install a listening app and leave it running in error without realising |
33 |
> the impact of not having a firewall. Someone else might do the same. |
34 |
> |
35 |
> Ubuntu takes the approach you just asked about and it mostly works well, |
36 |
> especially for notebooks on a LAN behind a NATing gateway. If you are |
37 |
> running a network with valuable private information on it, you might |
38 |
> well prefer a belts and braces approach of having a mostly-closed |
39 |
> firewall as well. |
40 |
> |
41 |
> As always, the best solution will vary according to what *you* need |
42 |
|
43 |
On more question, is default the right runlevel in which to run |
44 |
shorewall? It looks like it's one of the last services to start that |
45 |
way. |
46 |
|
47 |
- Grant |
48 |
-- |
49 |
gentoo-user@g.o mailing list |