> # TELNET server (23)
> /sbin/ipchains -A input -i $EXTERNAL_INTERFACE -p tcp ! -y \
> -s $IPADDR 23 \
> --destination-port $UNPRIVPORTS -j ACCEPT
client initiates a telnet session I believe the first packet has to have
the SYN bit set to open the session. If in doubt do a "tail -f
/var/log/messages" while you try to start a telnet session from the
outside. You'll see whatever is being rejected. (assuming your rules log
denied packets)
In answer to question #2 my vote is *REALLY* bad, no offense intended.Quote:> Questions:
> 1) What's wrong with the above rules?
> 2) Is this a _really_ bad idea or just not a good one?
Even if you restrict it to a *very* few addresses, the clients will be
transmitting their passwords to the entire world in clear text. Any
half-brain with a sniffer will have valid logins and passwords to your
boxes in no time. If you *really must* do this, look into SSH. At least
it encrypts the sessions.
just one guys $.02 worth
bryan
--
================================================================
Before you criticize someone, walk a mile in his shoes.
That way, if he gets angry, he'll be a mile away and barefoot.
================================================================