From owner-freebsd-security Thu Apr 20 13:34:29 2000 Delivered-To: freebsd-security@freebsd.org Received: from lily.ezo.net (lily.ezo.net [206.102.130.13]) by hub.freebsd.org (Postfix) with ESMTP id 858FB37BE9F for ; Thu, 20 Apr 2000 13:34:22 -0700 (PDT) (envelope-from jflowers@ezo.net) Received: from lily.ezo.net (jflowers@localhost.ezo.net [127.0.0.1]) by lily.ezo.net (8.8.7/8.8.7) with SMTP id QAA00802; Thu, 20 Apr 2000 16:33:50 -0400 (EDT) Date: Thu, 20 Apr 2000 16:33:50 -0400 (EDT) From: Jim Flowers To: Nick Loman Cc: freebsd-security@FreeBSD.ORG Subject: Re: 10 days In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Setup ipfw, deny-everything then allow only-what-you-want. Specify as tightly as you can. man ipfw. Jim Flowers #4 ISP on C|NET, #1 in Ohio On Thu, 20 Apr 2000, Nick Loman wrote: > > I've moved my mail server from RedHat 6.0/Linux over to FreeBSD > 4.0-STABLE/qmail for security (lots of relay hacking and Linux newbie > hackers). > > Anyway, pleased to see only 10 days into running a FreeBSD installation > the spam kiddies are trying to hack in again :-) > > hosts.allow: > > ALL : PARANOID : RFC931 20 : deny > ftpd : a few select hosts : allow > telnetd : a few select hosts : allow > popa3d : ALL : allow > ALL : ALL : deny > > qmail running off tcpserver. > > Hack attempts are standard trying to get in through ftp and telnet. Also a > request from a root@ to the DNS port. > > Given that I'm a FreeBSD newbie, and notwithstanding general security > tips, what should I be looking out for in these early days? > > Regards, > > Nick. > > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message