HP3000-L Archives

March 2012, Week 2

HP3000-L@RAVEN.UTC.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
"James B. Byrne" <[log in to unmask]>
Reply To:
James B. Byrne
Date:
Tue, 13 Mar 2012 09:08:15 -0400
Content-Type:
text/plain
Parts/Attachments:
text/plain (89 lines)
On:    Mon, 12 Mar 2012 15:45:32 +0000, "Johnson, Tracy"
<[log in to unmask]> wrote:
>
> I take a rather simpler approach.  Whenever these pop-up
> on the EMPIRE game machine.  I add the first three IP
> octets into the INETDSEC telnet and ftp deny portion of
> the file (nnn.nnn.nnn.* \).  I understand this may exclude
> entire small (and rather innocent) internet providers, but
> I think  that's a small price to be paid for hosting a
> hacker.
>
> If attempts on the first three octets grouped together
> start to get closely related to the first two.  I'll even
> start blocking the first two octets (nnn.nnn.*.* \).  I
> haven't had to block an entire first octet yet.
>
> I understand this is just an old fashioned block list.
> But in the interest of keeping the Empire game open to as
> many as I can, this is  probably the best I can do.
>

For information on how to hack into an HP3000 see :

http://bak.spc.org/dms/archive/hp3000.html

or

http://www.textfiles.com/hacking/hp3000.txt

Both dated and yet still applicable. There are many more
similar sources of information.

The approach that I have taken with respect to our HP3000s
and the internet is to place a dual homed Linux box in
front of the HP3000 and use that to provide firewall, ssh,
and proxy services.  The setup is fairly primitive:

Internet->> GW/FW <<--->> Eth0:Linux:Eth1 <<--->> HP3000

The network connection to the gateway/firewall provides
the public routable access.  The link between the Linux
front-end host and the HP3000 is a x-over cable using a
192.168.0.0 block address.  Direct network connections to
the HP3000 nic are physically impossible.  This insures
physical network security over the non-encrypted portion
of the network (for SSH access).

There are a wide assortment of Linux based firewall
appliance distributions which may simplify set up somewhat
for novice users. Alternatively, one can simply use a main
stream distribution or derivative like RHEL/CentOS or
Debian/Ubuntu and add and configure the packages desired.

We use a CentOS-5 based host running IPTables, Squid,
OpenSSH, VSftpd, and Denyhosts as the front-end to the
HP3000.  IPTables is configured to log and drop for 7 days
all addresses performing obvious port scans. IPTables
similarly counts, logs and blocks IP having excessive
failed connection attempts on visible ports.

Denyhosts scans the logs for other issues and really does
not add much to our setup.  However, Denyhosts can be used
to do itself everything I have chosen to do in IPTables.
Therefore one may concentrate on learning the
configuration of just Denyhosts and leave IPTables
configuration to the minimum necessary to allow access.

The proxy server handles ftp but we do not allow ftp
access to the HP3000 at all so I could not tell you if we
have that set up correctly or not.  We have it there in
case the need ever arises.

The intellectual load of dealing with these things is non
trivial.  However, the price of freedom is eternal
vigilance.  Once the front-end is setup we run logwatch to
send daily reports on connections and consider whether
further configuration changes are necessary.

-- 
***          E-Mail is NOT a SECURE channel          ***
James B. Byrne                mailto:[log in to unmask]
Harte & Lyne Limited          http://www.harte-lyne.ca
9 Brockley Drive              vox: +1 905 561 1241
Hamilton, Ontario             fax: +1 905 561 0757
Canada  L8E 3C3

* To join/leave the list, search archives, change list settings, *
* etc., please visit http://raven.utc.edu/archives/hp3000-l.html *

ATOM RSS1 RSS2