Hi,
Reading up on many
articles in the mailing list and wikki and on the web I still can't figure out
how to secure dom0 without affecting the domU instances.
How can I only allow
(or even disallow altogether) dom0 traffic while not affecting domU
instances?
I tried creating a
new chain just for dom0
-A FORWARD -m
physdev --physdev-in vif0.0 -j NODE
while it appears the
traffic for dom0 goes on to this rule it appears if I setup the chain as what's
listed below. performing a nmap still shows all ports are
open.
# allow icmp
packets -A NODE -p icmp --icmp-type any -j ACCEPT
# allow existing
traffic through
-A NODE -i vif0.0 -m
state --state ESTABLISHED,RELATED -j ACCEPT
# allow DNS traffic
through
-A NODE -p 50 -j
ACCEPT -A NODE -p 51 -j ACCEPT
-A NODE -m
state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
# reject all other
ports -A NODE -j REJECT --reject-with
icmp-host-prohibited
Anyone have any
ideas how to secure dom0??
Thanks.
-L
--
Larry Ludwig
Empowering Media
1-866-792-0489 x600
Have you visited our customer service
blog?
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users
|