<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Planning linux ipchains in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/planning-linux-ipchains/m-p/2661201#M79670</link>
    <description>Hello Rafael,&lt;BR /&gt;&lt;BR /&gt;As far as I understand, you have an HP-UX box on the same subnet as user machines, and you just want to secure the HP-UX against the rest of the subnet.&lt;BR /&gt;&lt;BR /&gt;There are several ways to achieve this :&lt;BR /&gt;&lt;BR /&gt;   -&amp;gt; Using a Linux box with ipchains is a good solution, but it is better with masquerading. In 2 words, you have a separate private subnet for your HP-UX server, and the Linux translate IP addresses between that private network and the public one.&lt;BR /&gt;From my point of view, this is the most secure, because your ipchains rules would be as simple as :&lt;BR /&gt;   * everything is forbidden, unless explicitly authorized&lt;BR /&gt;   * from private to public on this type of packet or protocol or service authorize under these conditions...&lt;BR /&gt;&lt;BR /&gt;In my opinion, using a Linux router with ipchains to route on the same subnet makes no sense, because below are better solutions if your HP-UX box is to be on the same subnet as the end users.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;   -&amp;gt; Using service-level protection. You can use /var/adm/inetd.sec, /etc/ftpusers, /etc/securetty, etc... to prevent unauthorized access to your HP-UX box on a service by service basis.&lt;BR /&gt;&lt;BR /&gt;In my opinion, this is a good method, BUT you need to have the exact knowledge of all TCP/IP services running on your server, and all these must rely on a security mechanism (authentication, list of authorized/denied IP addresses...).&lt;BR /&gt;&lt;BR /&gt;This may be a little difficult to implement if you have more that the standard services usually started by /etc/inetd.conf (ftp, telnet, http...).&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;   -&amp;gt; Using IPFilter : starting from HP-UX 11.x, IPFilter aims to implement packet filtering on HP-UX, just as ipchains does on Linux.&lt;BR /&gt;I have not yet tried it, but I guess you can have rules that help you detect the service or connection port, and do selective allow or deny based on the IP address, etc...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;To summarize : I would prefer, in the following order :&lt;BR /&gt;&lt;BR /&gt;1. Ipchains with masquerading (separate private and public subnets)&lt;BR /&gt;&lt;BR /&gt;2. IPFilter if it gives the same functionality as ipchains, without the need of a second machine to do routing.&lt;BR /&gt;&lt;BR /&gt;3. Service-by-service filtering, if you know exactly what runs on your machine.&lt;BR /&gt;&lt;BR /&gt;Good luck.&lt;BR /&gt;&lt;BR /&gt;Kodjo&lt;BR /&gt;</description>
    <pubDate>Fri, 08 Feb 2002 21:35:16 GMT</pubDate>
    <dc:creator>Kodjo Agbenu</dc:creator>
    <dc:date>2002-02-08T21:35:16Z</dc:date>
    <item>
      <title>Planning linux ipchains</title>
      <link>https://community.hpe.com/t5/operating-system-linux/planning-linux-ipchains/m-p/2661200#M79669</link>
      <description>I??m planning to securize an HP-UX box whith a linux running ipchains.&lt;BR /&gt;&lt;BR /&gt;I??ve done the first step.&lt;BR /&gt;&lt;BR /&gt;Connect HP-UX and linux to a hub and the other linux interface to the rest of the net.&lt;BR /&gt;&lt;BR /&gt;Changing the HP-UX and linux IPs to another subnet, I can ping from net to HP-UX (adding a static route) and I can ping from the HP-UX box to the net. (works fine)&lt;BR /&gt;&lt;BR /&gt;But ...&lt;BR /&gt;&lt;BR /&gt;I don??t want to chain any IP, in other words, I want HP-UX to stay in the same net than the rest of boxes and users (like now). And it doesn??t work.&lt;BR /&gt;&lt;BR /&gt;It??s possible?&lt;BR /&gt;What??s wrong?&lt;BR /&gt;&lt;BR /&gt;Thank??s</description>
      <pubDate>Fri, 08 Feb 2002 09:44:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/planning-linux-ipchains/m-p/2661200#M79669</guid>
      <dc:creator>Lukas Grijander</dc:creator>
      <dc:date>2002-02-08T09:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: Planning linux ipchains</title>
      <link>https://community.hpe.com/t5/operating-system-linux/planning-linux-ipchains/m-p/2661201#M79670</link>
      <description>Hello Rafael,&lt;BR /&gt;&lt;BR /&gt;As far as I understand, you have an HP-UX box on the same subnet as user machines, and you just want to secure the HP-UX against the rest of the subnet.&lt;BR /&gt;&lt;BR /&gt;There are several ways to achieve this :&lt;BR /&gt;&lt;BR /&gt;   -&amp;gt; Using a Linux box with ipchains is a good solution, but it is better with masquerading. In 2 words, you have a separate private subnet for your HP-UX server, and the Linux translate IP addresses between that private network and the public one.&lt;BR /&gt;From my point of view, this is the most secure, because your ipchains rules would be as simple as :&lt;BR /&gt;   * everything is forbidden, unless explicitly authorized&lt;BR /&gt;   * from private to public on this type of packet or protocol or service authorize under these conditions...&lt;BR /&gt;&lt;BR /&gt;In my opinion, using a Linux router with ipchains to route on the same subnet makes no sense, because below are better solutions if your HP-UX box is to be on the same subnet as the end users.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;   -&amp;gt; Using service-level protection. You can use /var/adm/inetd.sec, /etc/ftpusers, /etc/securetty, etc... to prevent unauthorized access to your HP-UX box on a service by service basis.&lt;BR /&gt;&lt;BR /&gt;In my opinion, this is a good method, BUT you need to have the exact knowledge of all TCP/IP services running on your server, and all these must rely on a security mechanism (authentication, list of authorized/denied IP addresses...).&lt;BR /&gt;&lt;BR /&gt;This may be a little difficult to implement if you have more that the standard services usually started by /etc/inetd.conf (ftp, telnet, http...).&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;   -&amp;gt; Using IPFilter : starting from HP-UX 11.x, IPFilter aims to implement packet filtering on HP-UX, just as ipchains does on Linux.&lt;BR /&gt;I have not yet tried it, but I guess you can have rules that help you detect the service or connection port, and do selective allow or deny based on the IP address, etc...&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;To summarize : I would prefer, in the following order :&lt;BR /&gt;&lt;BR /&gt;1. Ipchains with masquerading (separate private and public subnets)&lt;BR /&gt;&lt;BR /&gt;2. IPFilter if it gives the same functionality as ipchains, without the need of a second machine to do routing.&lt;BR /&gt;&lt;BR /&gt;3. Service-by-service filtering, if you know exactly what runs on your machine.&lt;BR /&gt;&lt;BR /&gt;Good luck.&lt;BR /&gt;&lt;BR /&gt;Kodjo&lt;BR /&gt;</description>
      <pubDate>Fri, 08 Feb 2002 21:35:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/planning-linux-ipchains/m-p/2661201#M79670</guid>
      <dc:creator>Kodjo Agbenu</dc:creator>
      <dc:date>2002-02-08T21:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: Planning linux ipchains</title>
      <link>https://community.hpe.com/t5/operating-system-linux/planning-linux-ipchains/m-p/2661202#M79671</link>
      <description>Thank??s Kodjo.&lt;BR /&gt;&lt;BR /&gt;Really I think that a mixture of 3 solutions is the best solution, but ...&lt;BR /&gt;&lt;BR /&gt;IPFilter/9000 doesn??t run when MC/Service Guard runs ... what a pity.&lt;BR /&gt;&lt;BR /&gt;And changing the HP-UX boxes IP is too difficult ...&lt;BR /&gt;&lt;BR /&gt;Best regards&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 11 Feb 2002 07:43:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/planning-linux-ipchains/m-p/2661202#M79671</guid>
      <dc:creator>Lukas Grijander</dc:creator>
      <dc:date>2002-02-11T07:43:17Z</dc:date>
    </item>
  </channel>
</rss>

