|
Bugzilla – Full Text Bug Listing |
| Summary: | Yast - Security-Firewall - Add 'Disallowed Services AND Quantify Directional Permission/no-Permission as either Outbound or Inbound direction. | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE 11.0 | Reporter: | Scott Couston <scott> |
| Component: | YaST2 | Assignee: | Ludwig Nussel <lnussel> |
| Status: | RESOLVED INVALID | QA Contact: | Jiri Srain <jsrain> |
| Severity: | Enhancement | ||
| Priority: | P5 - None | CC: | locilka, scott |
| Version: | Final | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | openSUSE 11.0 | ||
| Whiteboard: | |||
| Found By: | Customer | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Scott Couston
2008-09-11 10:14:22 UTC
Please use the opensuse-security mailinglist for discussions. SuSEfirewall2 blocks everyhting by default so explicity blocking individual services doesn't make sense. For advanced users SuSEfirewall2 has options to specifically REJECT certain ports or networks (global policy is to DROP packets). There is no gui on purpose though. You need to read the config file to use that. SuSEfirewall2 is a frontend for iptables which sets up kernel packet filters,
nothing more and nothing less.
This means that you are NOT automatically
protected from all security hazards by using SuSEfirewall2. To minimize
security risks on a networked system obey the following rules:
● Run only those services you actually need. Think twice before opening them
to the internet.
● Use only software which has been designed with security in mind (like
postfix, vsftpd, OpenSSH).
● Do not expose services that are designed for use in a LAN to the internet
(like e.g. samba, NFS, cups).
● Do not run untrusted software. (philosophical question, can you trust SUSE
or any other software distributor?)
● Run YaST Online Update on a regular basis or enable it's automatic mode to
get the latest security fixes.
|