> Security-HOWTO says something to the effect that if you think you don't have
> to secure your internal machines because you have a firewall, you are making a
> fatal mistake. It does not elaborate, so I am not sure what it means.
> Suppose you have a firewall that denies all external service requests. How can
> you be hacked from outside? (I know, the firewall code can be buggy, but for
> the sake of argument, let's assume it it not.)
> In other words, what risk am I running into if I run the "bad" services like
> ftp/telnet/finger but block all access to them from outside?
1. One of your windows users is foolish enough to activate a Trojan sent
to him via email, and thinks nothin of it. He then deletes the email without
telling anyone.
2. The trojan installs itself on the user's machine, and contacts hacker's
webserver.
3. Hacker then uses the backdoor installed by the trojan to install packet
sniffer on the users system. Hacker's backdoor uses port 80 for all
communications, making your firewall think that the user has simply found
a new favorite website.
4. When you telnet into the firewall machine, packet-sniffer on user's
machine sniffs your password, and after you log off, hacker uses his
new-found password to log into the firewall.
5. Your screwed now - Hacker installs a kernel module that masks his
new username, password, etc. from /etc/password, masks his entire
home directory from anyone else in the system. It also masks several
new routes and ipchains entries that allow him full access to the system
- completely unnoticed. Hell, he could install his own custom kernel at
that point.
Eric