VTI 4.0 - Close open ports

    Diese Seite verwendet Cookies. Durch die Nutzung unserer Seite erklären Sie sich damit einverstanden, dass wir Cookies setzen. Weitere Informationen

    • VTI 4.0 - Close open ports

      Hello
      After a portscan of my VUSolo + VTI 4.0, i have found open ports...
      Can we close some of them (port 139)?
      Thanks



      Port Scan a démarré…

      Port Scanning host: 192.168.2.xx

      Open TCP Port: 21 ftp
      Open TCP Port: 22 ssh
      Open TCP Port: 23 telnet
      Open TCP Port: 80 http
      Open TCP Port: 139 netbios-ssn
      Open TCP Port: 443 https
      Open TCP Port: 445 microsoft-ds
    • Well, the ones marked in bold are Samba, so you can shut smbd down if not needed (as further below).

      Basically if you feel to be exposed to any sort of security issues, either disable anything what isnt absolutely required (equals disabling everything but ssh ;)). Or disable anything not required and allow other services to bind only to localhost and then tunnel those to the client by ssh (will definitely not work for ftp, use scp instead, all others should work).

      In case of services invoked by inetd disabling can be achieved by commenting out corresponding lines in /etc/inetd.conf.
      Other services you have to unlink out of /etc/rc?.d


      btw. i just figured out netstat in busybox not supporting -p option which will probably leave you a bit of research on your own. Anyways issuing

      Quellcode

      1. netstat -a
      in a terminal will provide you with a more extensive overview on what's really going on (which is quite a bit more, than a simple portscan from the outside shows up).

      If you are completely unfamiliar with all the above blabla , just tell us what you actually want to achieve to get a more in-depth explanation, as i will definitely not start writing a novel about linux and networking basics here

      Dieser Beitrag wurde bereits 2 mal editiert, zuletzt von jRFX ()

    • Thankyou for answers,
      In fact it was the 139 and 445 port who worries me....
      is there any risk if they are open ?

      i ask this because, from last week, i give access to my wifi network to a neighbor wich is working on a pc (i'm on macintosh) and i know on pc the 139 port can cause problems (hack)...

      I have also notified with recent images, Vu solo (harddisk + Configuration) are auto mounted on my mac (look at screenshot) when the they are connected to same network...
      I would like to disable this automount function, or secure it with login/password...
      Actually, everyone can access to the hdd/configuration volume of my vusolo if they are connected to my network...
      Bilder
      • screenshot_mac.jpg

        84,99 kB, 771×438, 282 mal angesehen

      Dieser Beitrag wurde bereits 2 mal editiert, zuletzt von fced ()

    • I have disabled Autofs in -> PLugin -> VTI Panel -> Services...
      and now the vusolo isn't auto mounted on the connected computers...

      Can someone confirm i haven't done a mistake by disabling autofs ?

      thanks

      ced
    • smb sharing (intension to share folders residing on VU+) should got nothing to do with autofs (intension to mount folders shared elsewhere on the network on VU+ on demand).

      To simple stop anything to be allowed to connect to the Box via smb edit /etc/samba/smb.conf as follows:

      comment out (precede by #) the line "guest account = root"
      change the line "security = share" to "security = user"
      change all occurances of "public =" and "guest ok =" from "yes" to "no"

      As there is no smbuser defined on the Box by default, this should result in no access possibe whatsover for now, but leaves you the opportunity to (more or less) easily make the Box accessible (this time in a safer way) at a later stage if desired.

      Just as a side note:
      The default configuration of the image has smb.conf in a condition, where anyone residing in the same network as the Box has full access to the smb shares. Which as of now is your neighbour at least. In case of any security holes in your WIFI Setup (see here) your box is open to the general public. Therefore I highly recommend blocking smb access possibilities immediately after flashing a new image, unless you have a hardwired only environment and are able to provide a satisfactory level of security to your network as a whole by other means.

      It may sound fundamentalistic, but personally I recommend avoiding Wifi in general, wherever possible, and undergo every reasonable effort to do so.
      In your case (sharing your line to your neighbour), one should consider using hardware which is capable of proper network segregation (most commonly: VLANs).
    • Thankyou JRFX,
      I have secured Samba for now...
      It's not a problem if i can't access to filesharing, i don't use it, ... when i need to get or put something from/to the VUsolo, i use FTP, with authentification by Login/Password... i prefer it to filesharing with automount...

      My network config is as it :
      ADSL MODEM + WRT54GL ROUTER with Polarcloud Tomato as firmware (i don't know if it support VLAN) + Airport Extreme 1st generation born...
      Wifi authentification is done by MAC address filtering...

      I don't know if there is any way to have VLAN on Tomato or on another Alternative firmware for WRT54GL... i will have a look on google and forums...

      Thankyou for help
    • Original von fced
      Wifi authentification is done by MAC address filtering...

      That's more than nothing, but only slightly. Which means, you prevent kids from the neighbourhood effortless surfing on your line with their smartphones.
      Malevolent wardrivers with a skill level of anywhere above marginal are not hindered by this.
      Its up to you to decide, whether you want to take that (admittably low) risk, or just set up your Wifi to use WPA2.
      VLAN on top, to separate your neighbours net from yours, depends on how much you trust your neighbour, but it won't harm anyways.

      Sorry, i have no clue about specific alternative firmwares for Wifi routers, as mentioned above, I rather avoid Wifi at all :444:
      Nevertheless i assume alternative firmwares to extend the capabilities of routers, so your chances are good.
      When you're interested in doing fancy things with your router, also have a look at DD-WRT (if you don't know already)
    • jRFX schrieb:


      To simple stop anything to be allowed to connect to the Box via smb edit /etc/samba/smb.conf as follows:

      comment out (precede by #) the line "guest account = root"
      change the line "security = share" to "security = user"
      change all occurances of "public =" and "guest ok =" from "yes" to "no"

      As there is no smbuser defined on the Box by default, this should result in no access possibe whatsover for now, but leaves you the opportunity to (more or less) easily make the Box accessible (this time in a safer way) at a later stage if desired.

      Hi guys,
      how I can change my samba.conf to access by LAN only with the VU user/pass (root/mypassword) ?

      Thanks :)