>> Well, now the system accepts any connection besides mysql for ip,ip,ip
>> It is a solution for mysql, but your server is now more at risk from
>> [ip,ip,ip]
> Yes but those ips belong to computers I can reach without getting up.
I read an article a few days ago. 80% are internal cracks from
disgruntled employees.
Noticed you are posting from windows. With /known/ malware signature count
past the half a million mark, I would have to treat any doze box on
the lan like it was an external connection.
Quote:> I _tried_ to test this server to be secure from any kinds of attacks
> from outside.
Security is designed in up front, not added later by testing.
The first line of defense is the firewall and it only lets the
required ips access for /only/ the services they require. Not the wild
card service access you granted.
Servers are being cracked through applications running behind the
firewall via poor programming practices.
The first, it seems, are programmers are no longer validating input
before using it.
As an "Oh by the way", webmin is a nice remote access gui tool for
managing shorewall.
I assume you did set the routestopped values.