Question

Answer these follwong questiong in great detail for a cyber secuirty/computer science class. 1. Consider the...

Answer these follwong questiong in great detail for a cyber secuirty/computer science class.

1. Consider the following firewall rule, and describe what this permits or denies:

sudo /sbin/iptables -A INPUT --dport 23 -j DROP

2.If a service is allowed in one place and denied in another, what is the outcome? (For example, a service is listed in both hosts.allow and hosts.deny) Explain.

3.If a rule for a service does not exist in either one of the files hosts.deny or hosts.allow, what happens? Explain.

4.Is the order of the rules important? If you deny something within the IP network layer (iptables), but permit something within the TCP transport layer (TCP Wrappers) that uses the IP network layer that you just denied, will your TCP traffic be permitted? Why or why not?

5.What are three modes of SELinux? Explain their basic functionality.

6. Suppose the domain hackers.com is denied for all services in the hosts.deny, and the hosts.allow file has the rule

ALL: ALL.

Will TCP Wrappers allow hackers.com access anyway? Why or why not?

7.What iptables command would you use to allow all the traffic from the loopback?
(You may need to search online for the answer to this.)

8. What switch could you use in addition to the L switch to view the network port configuration for the iptables?

9. What mode would you use when first enabling SELinux?

What mode would you use for normal activities and how would you change it to that mode?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. sudo /sbin/iptables -A INPUT --dport 23 -j DROP is a firewall rule on to deny or drop incoming traffic to destination port 23. Port 23 is used for Telnet which is used for communicating using unencrypted text.

2. A service is first checked in hosts.allow. If it is present there, service is allowed. Later, hosts.deny is checked. If the same service appears in hosts.deny, it is ignored. The service remains allowed.

3. If a rule for a service is not present in hosts.allow or hosts.deny then by default the service is allowed.

4. The order of the rules is important. Ip network layer rules are checked first. If something is denied at the ip network layer itself, there is no point in alowing TCP traffic. Hence even if the same is allowed in TCP wrappers, it will continue to be denied as per the ip network layer rule.

5. SELinux has 3 modes :-

a. Permissive - Enforcing mode may deny some actions. These actions are logged in Permissive mode. The Permissive mode itself will not deny these actions. It only logs.

b. Enforcing - The SELinux has policy rules and that will be enforced in Enforcing mode. This means, actions will be denied based on the policy rules.

c. Disabled - The SELinux policy rules will not be applied. For file operations, the Discretionary Acess Control rules which includes file permissions, will be checked.

6. As explained in question 2, hosts.allow is checked first. Since ALL : ALL indicates allow all, even if it is denied in hosts.deny, it will be ignored.

7. Loopback tests connection to itself. For allowing input the command is :

sudo /sbin/iptables -A INPUT -i lo -j ACCEPT

and for allowing output the command is :

sudo /sbin/iptables -A OUTPUT -o lo -j ACCEPT

8. # iptables - L is the command used to see the loaded network port configurations. This gives only a basic overview with limited information. For detailed overview with information like interfaces applying to each of the rules, the matching number of packets and bytes corresponding to each rule, etc. the command

# iptables -L -v

can be used.

9. Enforcing mode can be used if the entire security policy of SELinux is to be applied and can be applied to the system. However, there may be issues when trying to debug or troubleshoot. In that case, the enforcing mode can be changed to permissive, which will log all actions to be denied but will not deny. The command to change the mode to permissive is :-

# setenforce permissive

Alternatively # setenforce 0 can be used where 0 stands for permissive mode ( 1 stands for enforcing mode ).

Add a comment
Know the answer?
Add Answer to:
Answer these follwong questiong in great detail for a cyber secuirty/computer science class. 1. Consider the...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80...

    1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT iptables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT Allow web server traffic Block web server traffic Force port 80 traffic to port 443 Allow traffic from both 80 and 443 using UDP protocols 2. Timestamps are important because can not be changed or deleted by attackers when configured properly, allows you to correlate events across the network can always...

  • You are to create and apply a firewall rule set on your Ubuntu server and each...

    You are to create and apply a firewall rule set on your Ubuntu server and each rule should be commented. Make sure to use variables for the IP addresses in your firewall. It's good practice and if I have to test one or more of your rules, I can replace the address in the variable. For any packets you REJECT or DENY, those should be logged. That means you'll need to modify the rule so that if the rule matches...

  • 1. How many hosts can reside on a single Class C network? 1. 65535 2. 256...

    1. How many hosts can reside on a single Class C network? 1. 65535 2. 256 3. 254 4. 127 2.   Select the invalid IP address 1. 95.31.0.15 2. 143.256.11.2 3. 24.123.33.60 4. 135.10.243.1 3. What layer in the TCP/IP protocol suite would a Web Browser reside? 1. Data Link 2. Application 3. Network 4. Physical 4. If I have developed a new type of network interface device - one that uses a new wireless technology, which layer of the...

  • Six Which of the following options can be used to configure TCP/IP? (Choose all that apply.)...

    Six Which of the following options can be used to configure TCP/IP? (Choose all that apply.) APIPA DHCP DNS Static IP addressing You need to install a new Windows 10 machine into Site A with a subnet mask of 255.255.255.224. Which TCP/IP address can you assign to the new Windows 10 machine as a valid host address? 192.168.2.63 Which subnet mask would you utilize if you had a class C network and you wanted to connect 23 branch offices back...

  • 1. Which of the following commands will locate all of the program files on a computer...

    1. Which of the following commands will locate all of the program files on a computer on which the SUID bit is set? Select one: a. find / -type SUID b. find / -perm +4000 -type f c. find / -perm +SUID -type f d. find / -suid 2. A server/computer combination appears in both hosts.allow and hosts.deny. What's the result of this configuration when TCP wrappers runs? Select one: a. TCP wrappers refuses to run and logs an error...

  • Question 26 (1 point) In Lab 1 (Exploring Encryption), what did you need to configure on...

    Question 26 (1 point) In Lab 1 (Exploring Encryption), what did you need to configure on the server or on the client? Question 26 options: Only (a) and (b) (c) The client's public key (a), (b), and (c) (a) The server's certificate (b) Enable TLS on the server Save Question 27 (1 point) The following question is Lab 2 related (Ports and Firewalls). At what point does the HTTP daemon service actively begin listening for traffic on the network? Question...

  • 1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In Figure...

    1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? (9 points) 1.2: In Figure 1, say True or False to the following statement: “Snort can see both incoming packets from the left firewall and outgoing packets from the right firewall”. (5 points) 1.3: In Figure 1, assume a packet P matches the following Snort rule when the packet is analyzed...

  • I am studying the CCNA 200-125 books written by WENDELL ODOM. Here it talks about the...

    I am studying the CCNA 200-125 books written by WENDELL ODOM. Here it talks about the Link layer in TCP/IP model. Figure 1-11 shows four steps, in the first step Larry encapsulates the IP packet between an Ethernet header and Ethernet trailer, creating an Ethernet frame. Larry encapsulates the IP packet, what does this mean? Is it like compressing a file into a zip and compressing the IP packet into a frame? I've read the previous pages about the upper...

  • computer networks help please !!! could someone help with the following tasks! ANY HELP WILL BE...

    computer networks help please !!! could someone help with the following tasks! ANY HELP WILL BE IMMENSELY APPRECIATED! THANKS. Task 1 In the following scenario, we would like to find out more information about a host that is on out network. Given an IP address we would like to search for additional information, we can start with obtaining the IP address off the default route. When running on a Linux VM, this like most likely to be the internal IP...

  • Project 4-3: In the following steps, you will learn more about the PING (Packet Internet Grouper)...

    Project 4-3: In the following steps, you will learn more about the PING (Packet Internet Grouper) utility, which can be used on a network running IPv4 to verify that TCP/IP is configured correctly and communicating with the network. A ping test is typically the first thing network professionals try when troubleshooting a TCP/IP connection problem. For this project, you can use any type of workstation that's running TCP/IPv4, preferably one connected to the Internet. The output described in the following...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT