I listed them in order below:
1.[/b] I have a dmz server behind Astaro, which receives packets (with the appropriate DNAT set up on Astaro as well), but while 'normal' packets are redirected and happily received at that server Astaro is blocking IP packets with 'ack'+'fin' (as well as the occasional combination of ack+fin+psh) flags! Why? What's wrong with these?
Is there anyway for me to prevent logging these as it clogs my log file (it accounts for about 80% of all blocked traffic!)? I cannot set a rule to silently drop these as I have no access (through the Astaro GUI) to the TCP flags.
2.[/b] Attack patterns - why even though I have selected all possible attack patterns (as shown on the Network Security » Intrusion Protection » Attack Patterns) it shows me 'Intrusion Protection is active with 5173 of 7658 patterns'? Why the difference in numbers?
3.[/b] ICMP options contradiction - Network Security » Packet Filter » ICMP states that 'Allowing any ICMP traffic on this tab will override ICMP settings being made in the packet filter. If you only want to allow ICMP for certain hosts or networks, you should use the Packet filter >> Rules tab instead.', but if I create a filter, which allows ping and traceroute to be used from the firewall (I do not want to enable the Network Security » Packet Filter » ICMP options as I wish to control which hosts on my network are allowed to send/use ping/traceroute), I still can't use the ping and traceroute tools in Support » Tools » Ping Check and Support » Tools » Traceroute as I am still greeted with a message saying 'To use this tool you need to enable 'Ping from Firewall' under Network Security >> Packet Filter >> ICMP'.
So, how am I supposed to use these tools?
4.[/b] SSH login issues - is it possible to change the login process of sshd to accept user certificates, instead of user name/passwords? This is normally done via /etc/ssh/sshd_config, but I am unable to change it persistently as the next time I reboot it 'restores' itself.
Using a certificate is much more secure and less prone to 'tampering' compared to using user id/password as user id/password can be typed from anywhere and by anyone, with using user certificates, on the other hand this cannot happen!
Still on the subject of ssh, why is it that I cannot specify ports lower than 1024 for ssh login? What is the problem if I want port 212 for example? Again, this can normally be changed with sshd_config.
Also, why is it necessary for sshd to listen to 0.0.0.0 (accessible from ANYWHERE - very insecure!) as opposed to the local network firewall ip address, which is not accessible from outside?
This is not limited to sshd though - I found the following as well:
Mail:
0.0.0.0:587
0.0.0.0:465
0.0.0.0:25
DNS
:53
:53 (udp)
Why on earth does Astaro need to listen to DNS on my public address?!
0.0.0.0:123 (ntp)
0.0.0.0:5432 (postgres) - why?
0.0.0.0:4444 (web admin console)
This thread was automatically locked due to age.