Zoom said:
Hi,
We recently had our Windows 2000 Server hacked via VNC.
If you didn't install VNC, then it was hacked via another method. Most
hacking methods are because of not installing Microsoft patches fast enough,
and sometimes due to misconfiguration of security settings or architecture.
Lack of good firewall rules definitely does not help matters.
(2) We were thinking of blocking all ports except 80,8080,443, 3389 (for
remote desktop), 5631 (For PcAnywhere), 21 and 25. Is this a reasonable
approach?
Depends. First, keep in mind that there are outbound ports and inbound
ports, and we can't really comment on the security of this without more
information about this. You do not need to open TCP 80, 21 and 25 inbound to
your server, unless it is acting as a Web, FTP and Internet email server that
is servicing clients from the Internet. It is not ideal security to be
running all those different services all on one server... it is more secure
to install those on separate servers, if you have the money. If your server
is not running those services, then you only need to open those ports
outbound.
As you may know, a TCP session has two ports, one on both sides of the
connection, like so:
[TCP Request] client: source port 5678 --> server: destination port 80
[TCP Reply] server: source port 80 --> client: destination port 5678
Opening TCP port 21 may not be enough to get your FTP working, because there
is a second port used by FTP for transferring data. TCP 21 is just the
control session used to transfer commands. The port used for the data
session varies depending on whether Active or Passive FTP is configured and
negotiated. You also need UDP 53 and TCP 53 open for DNS requests to the
Internet. Remote Desktop and PC Anywhere are not things you generally want
to allow from the Internet, it is better to use a firewall that has VPN
functionality, like
www.netscreen.com, or use your Windows server as a VPN
endpoint, just be sure to configure it securely.
I really think you are asking for trouble if you try to configure your own
firewall without having a good understanding of how these various protocols
work and in what direction the firewall rules need to be written. I
recommend hiring some consulting help for the initial setup. It will pay for
itself if it keeps you from being hacked again.
I saw a few articles on using IPsec to do this but I can't find
any straightforward instructions how to block specific ports. Can anyone
provide any instructions / links to articles that show how to do this?
IPSec is not a firewall, especially not on Windows 2000. It has very
inadequate logging, which is a problem when troubleshooting things not
working because you didn't open up a necessary port, and also when trying to
determine if someone has hacked you. And in Windows 2000, you have to enable
a setting to make it secure [or at least you did, prior to Windows 2000
Service Pack 4]. If you still want to pursue this, see here:
http://www.securityadmin.info/faq.asp?ipsec
There are inexpensive firewalls, such as
www.netscreen.com, starting around
$600 US.
kind regards,
Karl Levinson, CISSP, CCSA, MCSE, MS MVP