[Home] [Credit Search] [Category Browser] [Staff Roll Call] | The LINUX.COM Article Archive |
Originally Published: Thursday, 4 October 2001 | Author: Shashank Pandey |
Published to: enchance_articles_security/Advanced Security Articles | Page: 4/5 - [Printable] |
Installing and Configuring Portsentry: Intrusion Detection Systems for the Uninitiated.
Linux.com enjoys providing information we suspect you, dear reader, will particulary value. In this Linux.com security article correspondent Shashank Pandey shows us how to set up and configure the Intrusion Detection Software (IDS) PortSentry. We hope you find this useful.
|
<< Page 4 of 5 >> | |
Now, we move further. I hope you are not feeling sleepy!
If you are, go take a
dose of extra caffeine and come back.
Configuration FilesHere you can specify the paths to the files where Portsentry logs 'misbehaving' requests (leave the path of the log files to the default, doesn't hurt... so just let it be.)
Ignore OptionsAs the comments in this section say, you can set Portsentry to respond in a particular manner in case it detects a tcp/udp portscan.
As we can see, like always, there are options for both TCP and UDP choose '0' : to just know when a scan occurred. no scan blocking.
This option is more like a retaliatory action and not recommended as you might end up damaging a spoofed host used by the cracker or just piss him off, so that he returns, more determined and prepared! Also, if you select this option, then you wont be able to drop routes of the packets, as we will find below. Also you will find an option to specify this command(KILL_RUN_CMD) as you go down reading this article. So dont worry. Rogue HostsWe will filter 'further' connection attempts by a rogue host. portsentry gives us two options:
both the methods are discussed here. Make sure you choose ONLY ONE OPTION. The variable
OK, there are only a couple of choices we need to consider here. They are: or If you have Ipchains installed (do: whereis ipchains ), then the second option is the best. Use the first option in case you have any problems with the ipchains option, like you don't have any idea about configuring ipchains and have decided to postpone learning about ipchains till I decide to write an article on it! Anyways, if you suddenly realise that you have a old kernel then chuck the two above mentioned options and go for this: In case you wondering what a dead host, is, and what has it got to do with Ips :127.0.0.1 , 333.444.555.666, let me tell you that a dead host is a host to which there is no route. In other words, if you send a packet to a dead host it will not reach anywhere, instead it will die when it's life is over! With that, lets move forward.
| |
<< Page 4 of 5 >> |