monitor file activity
+ Reply to Thread
Results 1 to 4 of 4

Thread: what is ipchains in linux

  1. #1
    Join Date
    Jan 2002
    Posts
    2

    what is ipchains in linux

    hi

    what is ipchaining in linux.

  2. #2
    Join Date
    Jun 2001
    Posts
    398
    hi,

    ipchains is the command to enable firewall/packet filter/packet masquerading capability in linux.

    regards Data.

  3. #3
    Join Date
    Jun 2001
    Posts
    398

    A GOOD LINK

    HI SUNDEEP,


    here is a good link for ur understanding

    [url]http://www.askjeeves.com/main/metaAnswer.asp?t=m&s=a&en=directhit&o=0&frames=True&url=http%*A%2F%2Fask%2Edirecthit%2Ecom%2Ffcgi%2D bin%2FRedirURL%2Efcg%*Furl%*Dhttp%*A%2F%2Fwww%2Esans%2Eorg%2FinfosecFAQ%2Ffirewall%2Fblocking%5Fipch ains%2Ehtm%26qry%*DDeny%2BReject%2BIpchains%26rnk%*D*%26cz%*D7e0a4d0d**8dcdd4%26src%*DDH%5FASK%5FSRC H%26u%*D&ac=-*&pt=Top+Ten+Blocking+Recommendations+Using+ipchains&dm=http%*A%2F%2Fwww%2Esans%2Eorg%2FinfosecFAQ%2 Ffirewall%2Fblocking%5Fipchains%2Ehtm&io=2&qid=6E86A*D62F56884080*A**CF5F*E088A&back=meta%*D*%26site %5Fname%*D%26origin%*D0%26ask%*DDeny%2BReject%2BIpchains%26qsource%*D56%26rspick%*Drs&ask=Deny+Rejec t+Ipchains&dt=0202*6072746[/url]


    that was * hyperlink!
    regards Data.

  4. #4
    Join Date
    Jun 2001
    Posts
    398

    gr!!

    hyper link is not working...


    it does not say its copy righted .so i am gonna paste it here.

    this is just a part of it.

    i hope ur search for same shows on google.

    Top Ten Blocking Recommendations Using ipchains
    Paul Tiedemann
    August 8, 2000

    The following ** sections for this assignment will be demonstrated using a Redhat Linux 6.* operating system using IPChains as the packet-filtering device. I have made the assumption that eth0 is the external interface. For each section I will begin with a brief explanation why the particular services should be blocked followed by how the services work and how I can block these services using the IPChains rules. I will also try to include some helpful hints I have picked up along the way.

    Exercise I – Blocking spoofed or private (RFC***8) addresses.

    There are a few packets we should never see on the firewall. These packets do not occur naturally in the wild. These consist of spoofed packets claiming to be coming from an internal address, unroutable packets destined for your internal network that that should have never made it past the prior router, and various other packets that exist only to cause pain and suffering for the firewall administrator.

    You should always block packets from entering your network if the source or destination appears to be a private (RFC***8) address. They never should have been routed to you in the first place. Their very existence means that some other network administrator hasn’t done a very good job at egress filtering. However, only the destination address seems to be filtered for private addresses in the real world. What this means is that it is quite likely you will see some packets that seem to be originating from a private address and are addressed to your internal network. These packets only have two origins, the first being malicious spoofing and the second, being a very confused network administrator who doesn’t understand network address translation. Both are unacceptable and should be filtered at your perimeter. Here is the rules list for adding the rules to the IPChains rule set. Note: I am using the –b flag indicating that these are bi-directional, which means the rule will match packets either to or from the IP address range specified.



    # rules for standard unroutables

    ipchains –A input –i eth0 –s 255.255.255.255/*2 –b –j DENY

    ipchains –A input –i eth0 –s *27.0.0.0/8 –b –j DENY



    # rules for private (RFC***8) addresses

    ipchains –A input –i eth0 –s *0.0.0.0/8 –b –j DENY

    ipchains –A input –i eth0 –s *72.*6.0.0/*2 –b –j DENY

    ipchains –A input –i eth0 –s **2.*68.0.0/*6 –b –j DENY



    #rule for reserved addresses

    ipchains –A input –i eth0 –s 240.0.0.0/5 –b –j DENY



    # rule for protecting internal network from spoofing

    ipchains –A input –i eth0 –s (insert internal network here) –j –l DENY
    Now here is a short explanation of what these rules mean:

    ipchains – this is the command to interact with the firewall

    -A input– this option means to append a rule to the end of the named chain in this case the input chain

    -i eth0 – this the interface to apply the rule against (in this case my external ethernet interface)

    -s – this option indicates the source address used for filtering

    -b – this option indicates the rule is bi-directional meaning it applies to packets from or to the address specified

    -l – this option means to log the packet to the syslog facility

    -j DENY – this option indicates the target for the packet in this case it says to silently drop the packet

+ Reply to Thread

Similar Threads

  1. installation Linux
    By moonlight429 in forum Programming
    Replies: 0
    Last Post: 10-09-2007, 07:26 AM
  2. Distro of Linux
    By Alucard in forum Internet Privacy
    Replies: 1
    Last Post: 04-08-2006, 12:33 PM
  3. installing linux
    By half_steper in forum Internet Privacy
    Replies: 0
    Last Post: 01-30-2006, 05:35 PM
  4. Linux Help
    By N/A in forum Internet Privacy
    Replies: 3
    Last Post: 06-28-2005, 05:52 PM
  5. linux Firewall
    By Unregistered in forum Proxies and Firewalls
    Replies: 1
    Last Post: 02-26-2003, 04:06 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts