1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
|
diff -urN Bastille-orig/Bastille/Firewall.pm Bastille/Bastille/Firewall.pm
--- Bastille-orig/Bastille/Firewall.pm 2004-03-22 18:45:36.376652656 -0500
+++ Bastille/Bastille/Firewall.pm 2004-03-22 18:47:57.909136448 -0500
@@ -71,7 +71,7 @@
{
'varname' => "TCP_AUDIT_SERVICES",
- 'default' => "telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh",
+ 'default' => "telnet ftp imap2 pop3 finger sunrpc exec login linuxconf ssh",
'stanza' => "2",
'configname' => 'ip_s_tcpaudit',
},
diff -urN Bastille-orig/Questions.txt Bastille/Questions.txt
--- Bastille-orig/Questions.txt 2004-03-22 18:45:36.367654024 -0500
+++ Bastille/Questions.txt 2004-03-22 18:46:13.815961016 -0500
@@ -1584,7 +1584,7 @@
some standalone services like OpenSSH, and --unless otherwise configured--
services running under Red Hat's xinetd super-server, you can configure
restrictions based on network address in /etc/hosts.allow. The services
-using inetd or xinetd typically include telnet, ftp, pop, imap, finger,
+using inetd or xinetd typically include telnet, ftp, pop, imap2, finger,
and a number of other services.
If you would like, Bastille can configure a default policy for all inetd,
@@ -4119,11 +4119,11 @@
interfaces (only the \"public\" interfaces) to these ports and/or services. This is
useful to spot possible probes or attacks. The default setting records connection
attempts to several services, although you may not have them installed or enabled. "
-QUESTION: "TCP services to audit: [telnet ftp imap pop3 finger sunrpc exec login
+QUESTION: "TCP services to audit: [telnet ftp imap2 pop3 finger sunrpc exec login
linuxconf ssh]"
REQUIRE_DISTRO: LINUX DB SE TB GE
SKIP_CHILD: ip_s_udpaudit
-DEFAULT_ANSWER: telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh
+DEFAULT_ANSWER: telnet ftp imap2 pop3 finger sunrpc exec login linuxconf ssh
CONFIRM_TEXT: " \nY"
YN_TOGGLE: 0
YES_EXP:
@@ -4237,8 +4237,8 @@
For instance, a corporate firewall/mailserver might have \"smtp\" enabled
on the public side to accept outside mail, and for \"internal\" interfaces it might
-allow both \"smtp\" and \"imap\" so local users can both send and get mail; in that
-case you would set this value to \"smtp imap\". This does not affect IP Masquerading's
+allow both \"smtp\" and \"imap2\" so local users can both send and get mail; in that
+case you would set this value to \"smtp imap2\". This does not affect IP Masquerading's
ability to let masq'ed users access any services on outside/Internet hosts. "
QUESTION: "TCP service names or port numbers to allow on private interfaces: [ ]"
REQUIRE_DISTRO: LINUX DB SE TB GE
@@ -4651,11 +4651,11 @@
interfaces (only the \"public\" interfaces) to these ports and/or services. This is
useful to spot possible probes or attacks. The default setting records connection
attempts to several services, although you may not have them installed or enabled. "
-QUESTION: "TCP services to audit: [telnet ftp imap pop3 finger sunrpc exec login
+QUESTION: "TCP services to audit: [telnet ftp imap2 pop3 finger sunrpc exec login
linuxconf ssh]"
REQUIRE_DISTRO: LINUX DB SE TB GE
SKIP_CHILD: ip_b_udpaudit
-DEFAULT_ANSWER: telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh
+DEFAULT_ANSWER: telnet ftp imap2 pop3 finger sunrpc exec login linuxconf ssh
CONFIRM_TEXT: " \nY"
YN_TOGGLE: 0
YES_EXP:
diff -urN Bastille-orig/Server-modify-by-Spong Bastille/Server-modify-by-Spong
--- Bastille-orig/Server-modify-by-Spong 2004-03-22 18:45:36.363654632 -0500
+++ Bastille/Server-modify-by-Spong 2004-03-22 18:46:31.595258152 -0500
@@ -10,8 +10,8 @@
IPChains.ip_b_trustiface="lo"
# Q: Public interfaces: [eth+ ppp+ slip+]
IPChains.ip_b_publiciface="eth+ ppp+ slip+"
-# Q: TCP services to audit: [telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh]
-IPChains.ip_b_tcpaudit="telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh"
+# Q: TCP services to audit: [telnet ftp imap2 pop3 finger sunrpc exec login linuxconf ssh]
+IPChains.ip_b_tcpaudit="telnet ftp imap2 pop3 finger sunrpc exec login linuxconf ssh"
# Q: UDP services to audit: [31337]
IPChains.ip_b_udpaudit="31337"
# Q: TCP service names or port numbers to allow on public interfaces: [ ]
diff -urN Bastille-orig/ServerModerate.config Bastille/ServerModerate.config
--- Bastille-orig/ServerModerate.config 2004-03-22 18:45:36.361654936 -0500
+++ Bastille/ServerModerate.config 2004-03-22 18:46:41.919688600 -0500
@@ -10,8 +10,8 @@
IPChains.ip_b_trustiface="lo"
# Q: Public interfaces: [eth+ ppp+ slip+]
IPChains.ip_b_publiciface="eth+ ppp+ slip+"
-# Q: TCP services to audit: [telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh]
-IPChains.ip_b_tcpaudit="telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh"
+# Q: TCP services to audit: [telnet ftp imap2 pop3 finger sunrpc exec login linuxconf ssh]
+IPChains.ip_b_tcpaudit="telnet ftp imap2 pop3 finger sunrpc exec login linuxconf ssh"
# Q: UDP services to audit: [31337]
IPChains.ip_b_udpaudit="31337"
# Q: TCP service names or port numbers to allow on public interfaces: [ ]
diff -urN Bastille-orig/ServerParanoia.config Bastille/ServerParanoia.config
--- Bastille-orig/ServerParanoia.config 2004-03-22 18:45:36.379652200 -0500
+++ Bastille/ServerParanoia.config 2004-03-22 18:46:50.680356776 -0500
@@ -10,8 +10,8 @@
IPChains.ip_b_trustiface="lo"
# Q: Public interfaces: [eth+ ppp+ slip+]
IPChains.ip_b_publiciface="eth+ ppp+ slip+"
-# Q: TCP services to audit: [telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh]
-IPChains.ip_b_tcpaudit="telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh"
+# Q: TCP services to audit: [telnet ftp imap2 pop3 finger sunrpc exec login linuxconf ssh]
+IPChains.ip_b_tcpaudit="telnet ftp imap2 pop3 finger sunrpc exec login linuxconf ssh"
# Q: UDP services to audit: [31337]
IPChains.ip_b_udpaudit="31337"
# Q: TCP service names or port numbers to allow on public interfaces: [ ]
diff -urN Bastille-orig/WorkstationModerate.config Bastille/WorkstationModerate.config
--- Bastille-orig/WorkstationModerate.config 2004-03-22 18:45:36.359655240 -0500
+++ Bastille/WorkstationModerate.config 2004-03-22 18:46:59.968944696 -0500
@@ -10,8 +10,8 @@
IPChains.ip_b_trustiface="lo"
# Q: Public interfaces: [eth+ ppp+ slip+]
IPChains.ip_b_publiciface="eth+ ppp+ slip+"
-# Q: TCP services to audit: [telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh]
-IPChains.ip_b_tcpaudit="telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh"
+# Q: TCP services to audit: [telnet ftp imap2 pop3 finger sunrpc exec login linuxconf ssh]
+IPChains.ip_b_tcpaudit="telnet ftp imap2 pop3 finger sunrpc exec login linuxconf ssh"
# Q: UDP services to audit: [31337]
IPChains.ip_b_udpaudit="31337"
# Q: TCP service names or port numbers to allow on public interfaces: [ ]
diff -urN Bastille-orig/WorkstationParanoia.config Bastille/WorkstationParanoia.config
--- Bastille-orig/WorkstationParanoia.config 2004-03-22 18:45:36.379652200 -0500
+++ Bastille/WorkstationParanoia.config 2004-03-22 18:47:08.842595696 -0500
@@ -10,8 +10,8 @@
IPChains.ip_b_trustiface="lo"
# Q: Public interfaces: [eth+ ppp+ slip+]
IPChains.ip_b_publiciface="eth+ ppp+ slip+"
-# Q: TCP services to audit: [telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh]
-IPChains.ip_b_tcpaudit="telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh"
+# Q: TCP services to audit: [telnet ftp imap2 pop3 finger sunrpc exec login linuxconf ssh]
+IPChains.ip_b_tcpaudit="telnet ftp imap2 pop3 finger sunrpc exec login linuxconf ssh"
# Q: UDP services to audit: [31337]
IPChains.ip_b_udpaudit="31337"
# Q: TCP service names or port numbers to allow on public interfaces: [ ]
diff -urN Bastille-orig/bastille-firewall.cfg Bastille/bastille-firewall.cfg
--- Bastille-orig/bastille-firewall.cfg 2004-03-22 18:45:36.378652352 -0500
+++ Bastille/bastille-firewall.cfg 2004-03-22 18:47:24.028287120 -0500
@@ -84,7 +84,7 @@
#
# Also see item 12, LOG_FAILURES
#
-#TCP_AUDIT_SERVICES="telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh"
+#TCP_AUDIT_SERVICES="telnet ftp imap2 pop3 finger sunrpc exec login linuxconf ssh"
# anyone probing for BackOrifice?
#UDP_AUDIT_SERVICES="31337"
# how about ICMP?
@@ -102,7 +102,7 @@
# Please make sure variable assignments are on single lines; do NOT
# use the "\" continuation character (so Bastille can change the
# values if it is run more than once)
-TCP_AUDIT_SERVICES="telnet ftp imap pop3 finger sunrpc exec login linuxconf ssh"
+TCP_AUDIT_SERVICES="telnet ftp imap2 pop3 finger sunrpc exec login linuxconf ssh"
UDP_AUDIT_SERVICES="31337"
ICMP_AUDIT_TYPES=""
|