[App_rpt-users] Security was Re: What is the "debian" user in the DIAL distro?

Steve Zingman szingman at msgstor.com
Thu Jun 8 13:29:33 UTC 2017


Updated images will use Shorewall to "frontend" iptables

On 6/8/2017 9:27 AM, Bryan D. Boyle wrote:
> you beat me to it.
>
> thanks!
> -- 
> Bryan
> Sent from my iPhone 6S...No electrons were harmed in the sending of 
> this message.
>
>
>
> On Jun 8, 2017, at 08:26, Jeremy Utley <jerutley at gmail.com 
> <mailto:jerutley at gmail.com>> wrote:
>
>> UFW is really just a front-end for iptables.  You give instructions 
>> to UFW, it does the correct IPTables lines to make it happen.  
>> Firewalld on CentOS 7 is the same way.  Any network firewalling tool 
>> on Linux is going to be IPTables under the hood.
>>
>> Jeremy, NQ0M
>>
>> *From:* App_rpt-users 
>> [mailto:app_rpt-users-bounces at lists.allstarlink.org] *On Behalf Of 
>> *Loren Tedford
>> *Sent:* Thursday, June 8, 2017 3:13 AM
>> *To:* Users of Asterisk app_rpt <app_rpt-users at lists.allstarlink.org 
>> <mailto:app_rpt-users at lists.allstarlink.org>>
>> *Subject:* Re: [App_rpt-users] Security was Re: What is the "debian" 
>> user in the DIAL distro?
>>
>> Bryan What about the use of UFW?? I have been using ufw in place of 
>> iptables started that about 4 years ago.. Is their a known risk from 
>> ufw rather iptables?? I thought they had similar characteristics..
>>
>>
>> Loren Tedford (KC9ZHV)
>>
>> Phone:618-553-0806
>>
>> Fax: 1-618-551-2755
>> Email: lorentedford at gmail.com <mailto:lorentedford at gmail.com>
>>
>> Email: KC9ZHV at KC9ZHV.com <mailto:KC9ZHV at KC9ZHV.com>
>>
>> http://www.lorentedford.com <http://www.lorentedford.com/>
>>
>> http://www.kc9zhv.com <http://www.kc9zhv.com/>
>>
>> http://forum.kc9zhv.com <http://forum.kc9zhv.com/>
>>
>> http://hub.kc9zhv.com <http://hub.kc9zhv.com/>
>>
>> http://Ltcraft.net <http://ltcraft.net/>
>>
>> http://voipham.com
>>
>> On Wed, Jun 7, 2017 at 8:55 PM, Bryan D. Boyle <bdboyle at bdboyle.com 
>> <mailto:bdboyle at bdboyle.com>> wrote:
>>
>>     Based on tests that the security research arm of my company has
>>     run (well-known IT company that's been around for over a
>>     century...), the elapsed time that a system exposed to the
>>     network is discovered, probed, and if well-known vulnerable ports
>>     are detailed (and the scum or nation states who do this keep
>>     records), then attempted to be pwned is somewhere between a
>>     minute to a half hour.
>>
>>     Just for giggles, i spun up a pi with a sip server enabled
>>     connected to a second port on my router  and started a tail -f on
>>     the messages file and grepped for the sip daemon.  routed the sip
>>     port on my external router to the pi, a sat back. (there was no
>>     route from the pi to my internal network)
>>
>>     3 minutes till the first probe.  15 till the attempted pwning. 
>>     SIP was the only inbound port opened.  I just watched...and went
>>     on for an hour (no, they didn't take over the system, only ate up
>>     bandwidth, of which I am pretty ok with being on FTTH).  It's all
>>     automated.  don't even need human intervention for the probe,
>>     just to select the attack vectors when the automated system pops
>>     a live port selection.
>>
>>     Default SSH is NO guarantee. Allowing root access from an
>>     interactive login from the net port deserves to be punished.
>>     Bogus user passwords that are guessable should be cause for your
>>     isp to turn off your connection.   Moving to a different port is
>>     just attempted security through obscurity.   Open ports from the
>>     outside inbound that allow anyone on the network to connect will
>>     be probed and attempts (DoS, null sled, buffer overruns, etc) to
>>     subvert your system as a c&c node, bitcoin miner, email spam
>>     relay, porn repository, or whathaveyou is the goal.
>>
>>     After doing this since 1988 or so,  it's only the frequency that
>>     it happens that's changing, not that it's happening.
>>
>>     fail2ban is a good stopgap measure for ports that you positively
>>     HAVE to have exposed.  router firewall enabled and locked down?
>>      good.  iptables set up properly?  passwords NOT based on
>>     dictionary words or used for your other online activities? yeah,
>>     it's a pain. the alternative is your system being taken over and
>>     used for other purposes while you sleep.
>>
>>     Lots more you can do.  the basic mantra you should have is: "That
>>     which is not expressly permitted is prohibited".
>>     --
>>
>>     Bryan CISSP/CEH/CISM
>>
>>     Sent from my iPhone 6S...No electrons were harmed in the sending
>>     of this message.
>>
>>
>>     _______________________________________________
>>     App_rpt-users mailing list
>>     App_rpt-users at lists.allstarlink.org
>>     <mailto:App_rpt-users at lists.allstarlink.org>
>>     http://lists.allstarlink.org/cgi-bin/mailman/listinfo/app_rpt-users
>>
>>     To unsubscribe from this list please visit
>>     http://lists.allstarlink.org/cgi-bin/mailman/listinfo/app_rpt-users
>>     and scroll down to the bottom of the page. Enter your email
>>     address and press the "Unsubscribe or edit options button"
>>     You do not need a password to unsubscribe, you can do it via
>>     email confirmation. If you have trouble unsubscribing, please
>>     send a message to the list detailing the problem.
>>
>> _______________________________________________
>> App_rpt-users mailing list
>> App_rpt-users at lists.allstarlink.org 
>> <mailto:App_rpt-users at lists.allstarlink.org>
>> http://lists.allstarlink.org/cgi-bin/mailman/listinfo/app_rpt-users
>>
>> To unsubscribe from this list please visit 
>> http://lists.allstarlink.org/cgi-bin/mailman/listinfo/app_rpt-users 
>> and scroll down to the bottom of the page. Enter your email address 
>> and press the "Unsubscribe or edit options button"
>> You do not need a password to unsubscribe, you can do it via email 
>> confirmation. If you have trouble unsubscribing, please send a 
>> message to the list detailing the problem.
>
>
> _______________________________________________
> App_rpt-users mailing list
> App_rpt-users at lists.allstarlink.org
> http://lists.allstarlink.org/cgi-bin/mailman/listinfo/app_rpt-users
>
> To unsubscribe from this list please visit http://lists.allstarlink.org/cgi-bin/mailman/listinfo/app_rpt-users and scroll down to the bottom of the page. Enter your email address and press the "Unsubscribe or edit options button"
> You do not need a password to unsubscribe, you can do it via email confirmation. If you have trouble unsubscribing, please send a message to the list detailing the problem.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.keekles.org/pipermail/app_rpt-users/attachments/20170608/5a4e9d40/attachment.html>


More information about the App_rpt-users mailing list