Router and Software
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
Router and Software
do you need a software firewall if you are running behind a router? i have a linksys etherfast cable router.
can you be hacked if someone has your internal IP address...could they get past the router?
thanks
can you be hacked if someone has your internal IP address...could they get past the router?
thanks
Yes. Yes. And, Yes.
The only safe computer is one not connected to the Internet at anytime. I have been running my NetGear RT314 for about 2 months now and I still use ZAPro. I use some pretty tight filters, but not too awful strict and I still get a hit squeak through from time to time that gets caught by ZA. If nothing else, it helps keep track of any spyware trying to call home.
The only safe computer is one not connected to the Internet at anytime. I have been running my NetGear RT314 for about 2 months now and I still use ZAPro. I use some pretty tight filters, but not too awful strict and I still get a hit squeak through from time to time that gets caught by ZA. If nothing else, it helps keep track of any spyware trying to call home.
We Remember...
9|11
40 miles SW of Mt. St. Helens
9|11
40 miles SW of Mt. St. Helens
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
You can configure your router to drop unsolicited connection attempts. If you have your 'internet' zone in ZA set to High security, it will do the same. But if you do not drop connections at the router, your ip will still be visible (hence closed, not stealth). Technically, your router is the only device connected to the net...
You should definitely keep a sw fw with the router. The router is not REALLY a fw in the truest sense. It performs NAT which has security benefits as a side effect, but that was not the original intent of NAT. ZA will pick up on trojan type communication (from the inside-out), while the router assumes that since traffic is coming from the 'inside' that it should be allowed to pass.
Jetta is correct in that nothing connected is totally secure. The idea is to make it such a pain to crackers that they will pick someone else. If your security is nearly that of a corporation or website, why would (s)he waste time cracking a personal computer that probably doesn't have much of value (no offense;>) -- even to use your box for distributed attack -- especially when there are so many easier targets.
Have fun,
Skye
You should definitely keep a sw fw with the router. The router is not REALLY a fw in the truest sense. It performs NAT which has security benefits as a side effect, but that was not the original intent of NAT. ZA will pick up on trojan type communication (from the inside-out), while the router assumes that since traffic is coming from the 'inside' that it should be allowed to pass.
Jetta is correct in that nothing connected is totally secure. The idea is to make it such a pain to crackers that they will pick someone else. If your security is nearly that of a corporation or website, why would (s)he waste time cracking a personal computer that probably doesn't have much of value (no offense;>) -- even to use your box for distributed attack -- especially when there are so many easier targets.
Have fun,
Skye
anything is possible - nothing is free

Blisster wrote:It *would* be brokeback bay if I in fact went and hung out with Skye and co (did I mention he is teh hotness?)
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
thanks for the info in english
if it's not too much trouble, another question please.
my link logger says the destination ip address for incoming is my internal one, shouldn't it be the router address that i see as destination?
also, in ZA which address do i put in for the other computers on the lan? internal or router?
when i click on network neighborhood i get an alarm that says 192.168.1.xx has been blocked, which is the ip address of the router....
sorry that was 3 questions...just paranoid about security even though there's nothing of interest for anyone, unless someone can make my Diablo character a level 10:D
if it's not too much trouble, another question please.
my link logger says the destination ip address for incoming is my internal one, shouldn't it be the router address that i see as destination?
also, in ZA which address do i put in for the other computers on the lan? internal or router?
when i click on network neighborhood i get an alarm that says 192.168.1.xx has been blocked, which is the ip address of the router....
sorry that was 3 questions...just paranoid about security even though there's nothing of interest for anyone, unless someone can make my Diablo character a level 10:D
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
-
LinkLogger
- Member
- Posts: 41
- Joined: Tue Apr 17, 2001 12:00 am
When watching Link Logger you are correct to pay attention to the destination IP address for Incoming traffic. In some cases you will see an internal IP address as the destination address. This case can arise if you have port forwarding set to pass inbound traffic on some port to some system on your network. In this case the destination IP address reflects the IP address of the system the Linksys forwards the traffic to. Most of the time the destination address for inbound traffic will be the router, in which case it is blocked, unless you have placed a machine in the DMZ in which case the destination address will be that system. I would suspect that triggers would also have this behavior. If your not using port forwarding or DMZ then I would suggest enabling SPI. Please let me know if your still seeing internal IP addresses and you don't have forwarding, DMZ, or triggering enabled as these would be the most common reasons for seeing an internal IP address in the destination IP address for inbound traffic.
I trust Link Logger is doing its job for you.
Blake
I trust Link Logger is doing its job for you.
Blake
Originally posted by pewterdawg
if it's not too much trouble, another question please.
my link logger says the destination ip address for incoming is my internal one, shouldn't it be the router address that i see as destination?
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
DMZ host is 192.168.1.0
triggering is all 0's
forwarding is all 0's after 192.168.1.
dynamic routing disabled
on outbound traffic source ip is 192.168.1.100
in setup under status:
LAN: 192.168.1.1
Wan: 24.92.xxx.xxx
Wan ip to obtain automatically
DHCP server is enabled
does the IP for router need to be changed from default?
triggering is all 0's
forwarding is all 0's after 192.168.1.
dynamic routing disabled
on outbound traffic source ip is 192.168.1.100
in setup under status:
LAN: 192.168.1.1
Wan: 24.92.xxx.xxx
Wan ip to obtain automatically
DHCP server is enabled
does the IP for router need to be changed from default?
-
LinkLogger
- Member
- Posts: 41
- Joined: Tue Apr 17, 2001 12:00 am
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
-
LinkLogger
- Member
- Posts: 41
- Joined: Tue Apr 17, 2001 12:00 am
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
i read the setup pages @ speeguide. it said to put in the ip address, subnet mask, gateway and DNS address. i didn't do any of that. i just plugged it in had computers obtain ip address automatically and started them up and they all work fine. it has my correct ip address of one of the computers in the WAN section, should that be the ip address of the router?
-
LinkLogger
- Member
- Posts: 41
- Joined: Tue Apr 17, 2001 12:00 am
Cheap rule of thumb, if its inbound traffic with a non internal IP address as the destination IP, then its blocked. The nature of NAT is like a door with a handle only on the inside. Unless something from the inside opens the door, nothing from the outside can get in (simplified description of a NAT).
Originally posted by pewterdawg
i like the link logger program, just wish it gave the outcome of what happened to the traffic. i.e "blocked"
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
Stealth is best. A closed port tells the so-called hacker that the port is there, but is not accepting any requests. Stealth means that as far as a hacker/prober is concerned, the port does not even exist.
The best case scenario is that your computer behind your router should show 100% Stealth, without any firewalls running at all. The firewall then just becomes a safety net of sorts and a way to keep track of any software trying to get out to the Net, for whatever reason, good or bad. Software can only call out if you allow the request.
The best case scenario is that your computer behind your router should show 100% Stealth, without any firewalls running at all. The firewall then just becomes a safety net of sorts and a way to keep track of any software trying to get out to the Net, for whatever reason, good or bad. Software can only call out if you allow the request.
We Remember...
9|11
40 miles SW of Mt. St. Helens
9|11
40 miles SW of Mt. St. Helens
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
-
LinkLogger
- Member
- Posts: 41
- Joined: Tue Apr 17, 2001 12:00 am
No, but they might try probing other ports since they know your there in order to find a chink in the amour. This isn't to say that stealth is any better, as they still might try probing other ports and see if one is available, but its more unlikely.
Originally posted by pewterdawg
even if a "so-called" hacker knows your ip address can he/she connect if the ports are closed?
Yes. And not to mention that a hacker really wanting to hack something is not going to waste their time on someone's little home system that's locked pretty tight. There's much bigger fish to fry.
But, if they would happen to find the right ports, they'd toss you a trojan that they could call up later for a DDOS attack. With you behind your router and running a personal firewall, the chances of this happening are pretty extreme, especially if you're a 'normal' user.
And what I mean by normal is that you're not out there scarfing warez and making enemies on IRC or some such nonsense.
Everyone is vulnerable to some degree, but you can control that very easily and there's no need for you to be paranoid about being attacked with what you are doing and the setup you're running. You're pretty darn safe.
But, if they would happen to find the right ports, they'd toss you a trojan that they could call up later for a DDOS attack. With you behind your router and running a personal firewall, the chances of this happening are pretty extreme, especially if you're a 'normal' user.
And what I mean by normal is that you're not out there scarfing warez and making enemies on IRC or some such nonsense.
Everyone is vulnerable to some degree, but you can control that very easily and there's no need for you to be paranoid about being attacked with what you are doing and the setup you're running. You're pretty darn safe.
We Remember...
9|11
40 miles SW of Mt. St. Helens
9|11
40 miles SW of Mt. St. Helens
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
-
LinkLogger
- Member
- Posts: 41
- Joined: Tue Apr 17, 2001 12:00 am
Having run a honey pot project similar to Lance Spitzner's (http://project.honeynet.org very good site to learn about advanced security, attack methods, detection, and plus Lance is just a dam good guy, etc). I can tell you that an unprotect Windows box with an open c:\ share will last no more then 24 hours on the internet before being compromised. Unpatched Linux boxes probably even less time given the leading hacker probe I see is RPC scans (port 111) which is a probe to look for unpatched Linux boxes to hack and root. Your Linksys Router is very good protection for people trying to hack you and by default all 65,535 ports are protected. About the only way someone can hack you is to social engineer you, ie get you to install their evil software.
We built Link Logger such that people can see what is happening at their Linksys. How much traffic there is, where that traffic is going, what traffic is arriving and from where, and what bad traffic there is, and something about the evil traffic (what it is, etc). Add on top of that a traffic analysis tool, reports and graphs and we hope that Link Logger helps you to understand your internet traffic.
We built Link Logger such that people can see what is happening at their Linksys. How much traffic there is, where that traffic is going, what traffic is arriving and from where, and what bad traffic there is, and something about the evil traffic (what it is, etc). Add on top of that a traffic analysis tool, reports and graphs and we hope that Link Logger helps you to understand your internet traffic.
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
-
LinkLogger
- Member
- Posts: 41
- Joined: Tue Apr 17, 2001 12:00 am
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
-
LinkLogger
- Member
- Posts: 41
- Joined: Tue Apr 17, 2001 12:00 am
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
- W_I_Z_K_I_D
- Regular Member
- Posts: 363
- Joined: Sun Jun 10, 2001 9:33 am
- Location: !!!Your Computer-You Just Dont Know It YeT!!!
hi GuYs:rotf
While we are on the topic of ROUTERS i was wondering (and HOPING)to see if there were any freeware ones that you knew of.>?
i think that it would be AwSoMe if there was...
is there.>?
While we are on the topic of ROUTERS i was wondering (and HOPING)to see if there were any freeware ones that you knew of.>?
i think that it would be AwSoMe if there was...
is there.>?
!!!What Man Can Make
Man Can Brake!!!
Windows XP ( Service Pack 2 )
Pentium 4 (3) GHz
2.00 GB of RAM
** Zone Allarm Pro
** AVG Anti Virus
** Cookie Wall
** Pop Up Stopper
** Spy Bot
** Spy Ware Blasster
** Add Aware se Pro
** Ccleaner
** Clean Up
** Port Bloacker
** Tweek UI WIn XP
** Port Scanner
Dialup 56k
DialUp-Syd.IPrimus....56k(Motorola internal Modem)
Man Can Brake!!!
Windows XP ( Service Pack 2 )
Pentium 4 (3) GHz
2.00 GB of RAM
** Zone Allarm Pro
** AVG Anti Virus
** Cookie Wall
** Pop Up Stopper
** Spy Bot
** Spy Ware Blasster
** Add Aware se Pro
** Ccleaner
** Clean Up
** Port Bloacker
** Tweek UI WIn XP
** Port Scanner
Dialup 56k
DialUp-Syd.IPrimus....56k(Motorola internal Modem)
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
- pewterdawg
- Member
- Posts: 50
- Joined: Sat Jun 02, 2001 5:09 pm
- Location: Tampa Bay
ok i'll give it a try...thanks
i noticed that the firmware update for linksys has a new item.
SPI: i should enable Stateful packet inspection: correct
man i've been reading everything i can find on the net, lots of different opinions. can you reccomend a book or two? is there "Networking and Security for Dummies?
i noticed that the firmware update for linksys has a new item.
SPI: i should enable Stateful packet inspection: correct
man i've been reading everything i can find on the net, lots of different opinions. can you reccomend a book or two? is there "Networking and Security for Dummies?
-
LinkLogger
- Member
- Posts: 41
- Joined: Tue Apr 17, 2001 12:00 am