<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://wiki.webos-internals.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Khawk13</id>
	<title>WebOS Internals - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="http://wiki.webos-internals.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Khawk13"/>
	<link rel="alternate" type="text/html" href="http://wiki.webos-internals.org/wiki/Special:Contributions/Khawk13"/>
	<updated>2026-04-10T12:39:54Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>http://wiki.webos-internals.org/index.php?title=Research_iptables_configuration_recommendations&amp;diff=11051</id>
		<title>Research iptables configuration recommendations</title>
		<link rel="alternate" type="text/html" href="http://wiki.webos-internals.org/index.php?title=Research_iptables_configuration_recommendations&amp;diff=11051"/>
		<updated>2010-08-28T20:03:32Z</updated>

		<summary type="html">&lt;p&gt;Khawk13: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Introduction==&lt;br /&gt;
&lt;br /&gt;
For a much slimmer foot print out there, I'd recommend the following modifications (still testing). There have been a number of changes to the way processes are listening and how they are limited across the various versions of WebOS. The latest is closed down somewhat tighter than the initial releases. However, it you're like me, and believe that your phone shouldn't be offering up any services at all to the Internet, the below modifications to the stock iptables config will help make a much less accessible phone.&lt;br /&gt;
&lt;br /&gt;
It should be noted that this config works with MyTether, but I can't guarantee that it will work with all other configs (like OpenSSH or Dropbear SSH), so some minor tweaking may be in order to get those services to work.&lt;br /&gt;
&lt;br /&gt;
==/etc/pmnetconfig/iptables-common.config==&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.4.2 on Mon Jun 29 14:11:31 2009&lt;br /&gt;
*nat&lt;br /&gt;
:PREROUTING ACCEPT [2:696]&lt;br /&gt;
:POSTROUTING ACCEPT [44:2752]&lt;br /&gt;
:OUTPUT ACCEPT [44:2752]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Mon Jun 29 14:11:31 2009&lt;br /&gt;
# Generated by iptables-save v1.4.2 on Mon Jun 29 14:11:31 2009&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [922:161037]&lt;br /&gt;
:INPUT ACCEPT [920:160341]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [964:158847]&lt;br /&gt;
:POSTROUTING ACCEPT [964:158847]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Mon Jun 29 14:11:31 2009&lt;br /&gt;
# Generated by iptables-save v1.4.2 on Mon Jun 29 14:11:31 2009&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [964:158847]&lt;br /&gt;
:ALLOWED_PACKETS - [0:0]&lt;br /&gt;
:ICMPFLOOD - [0:0]&lt;br /&gt;
:INVALID_PACKETS - [0:0]&lt;br /&gt;
-A FORWARD -m state --state INVALID -j INVALID_PACKETS&lt;br /&gt;
-A INPUT -i lo -j ALLOWED_PACKETS&lt;br /&gt;
-A INPUT -s 127.0.0.0/8 -i ! lo -j INVALID_PACKETS&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 113 --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j REJECT --reject-with tcp-reset&lt;br /&gt;
-A INPUT -i bridge0 -p tcp -m tcp --dport 4444:4445 -j DROP&lt;br /&gt;
-A INPUT -m state --state RELATED,ESTABLISHED -j ALLOWED_PACKETS&lt;br /&gt;
-A INPUT -i bridge0 -j ALLOWED_PACKETS&lt;br /&gt;
-A INPUT -i usb0 -j ALLOWED_PACKETS&lt;br /&gt;
-A INPUT -m limit --limit 3/sec -j LOG --log-prefix &amp;quot;IPT_PACKET_DROPPED_NO_MATCH: &amp;quot; --log-level 7&lt;br /&gt;
-A INPUT -j QUEUE&lt;br /&gt;
-A ALLOWED_PACKETS -j ACCEPT&lt;br /&gt;
-A ICMPFLOOD -m recent --set --name ICMP --rsource&lt;br /&gt;
-A ICMPFLOOD -m recent --update --seconds 1 --hitcount 6 --rttl --name ICMP --rsource -m limit --limit 1/sec --limit-burst 1 -j LOG --log-prefix &amp;quot;IPT_ICMPFLOOD: &amp;quot;&lt;br /&gt;
-A ICMPFLOOD -m recent --update --seconds 1 --hitcount 6 --rttl --name ICMP --rsource -j DROP&lt;br /&gt;
-A ICMPFLOOD -j ALLOWED_PACKETS&lt;br /&gt;
-A INVALID_PACKETS -m limit --limit 1/sec --limit-burst 100 -j LOG --log-prefix &amp;quot;IPT_INVALID_PACKETS_DROPPED: &amp;quot;&lt;br /&gt;
-A INVALID_PACKETS -j DROP&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Mon Jun 29 14:11:31 2009&amp;lt;/pre&amp;gt;&lt;br /&gt;
==/etc/pmnetconfig/iptables-default.config==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables -I INPUT 24 -m limit --limit 3/sec -j LOG --log-prefix &amp;quot;IPT_PACKET_DROPPED_NO_MATCH: &amp;quot; --log-level 7&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
==/etc/pmnetconfig/iptables-usbnetmode.config==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#This file left blank.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Khawk13</name></author>
	</entry>
	<entry>
		<id>http://wiki.webos-internals.org/index.php?title=Research_iptables_configuration_recommendations&amp;diff=11050</id>
		<title>Research iptables configuration recommendations</title>
		<link rel="alternate" type="text/html" href="http://wiki.webos-internals.org/index.php?title=Research_iptables_configuration_recommendations&amp;diff=11050"/>
		<updated>2010-08-28T20:01:45Z</updated>

		<summary type="html">&lt;p&gt;Khawk13: New page: ==Introduction==  For a much slimmer foot print out there, I'd recommend the following modifications (still testing). There have been a number of changes to the way processes are listening...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Introduction==&lt;br /&gt;
&lt;br /&gt;
For a much slimmer foot print out there, I'd recommend the following modifications (still testing). There have been a number of changes to the way processes are listening and how they are limited across the various versions of WebOS. The latest is closed down somewhat tighter than the initial releases. However, it you're like me, and believe that your phone shouldn't be offering up any services at all to the Internet, the below modifications to the stock iptables config will help make a much less accessible phone. &lt;br /&gt;
&lt;br /&gt;
==/etc/pmnetconfig/iptables-common.config==&lt;br /&gt;
&amp;lt;pre&amp;gt;# Generated by iptables-save v1.4.2 on Mon Jun 29 14:11:31 2009&lt;br /&gt;
*nat&lt;br /&gt;
:PREROUTING ACCEPT [2:696]&lt;br /&gt;
:POSTROUTING ACCEPT [44:2752]&lt;br /&gt;
:OUTPUT ACCEPT [44:2752]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Mon Jun 29 14:11:31 2009&lt;br /&gt;
# Generated by iptables-save v1.4.2 on Mon Jun 29 14:11:31 2009&lt;br /&gt;
*mangle&lt;br /&gt;
:PREROUTING ACCEPT [922:161037]&lt;br /&gt;
:INPUT ACCEPT [920:160341]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [964:158847]&lt;br /&gt;
:POSTROUTING ACCEPT [964:158847]&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Mon Jun 29 14:11:31 2009&lt;br /&gt;
# Generated by iptables-save v1.4.2 on Mon Jun 29 14:11:31 2009&lt;br /&gt;
*filter&lt;br /&gt;
:INPUT DROP [0:0]&lt;br /&gt;
:FORWARD ACCEPT [0:0]&lt;br /&gt;
:OUTPUT ACCEPT [964:158847]&lt;br /&gt;
:ALLOWED_PACKETS - [0:0]&lt;br /&gt;
:ICMPFLOOD - [0:0]&lt;br /&gt;
:INVALID_PACKETS - [0:0]&lt;br /&gt;
-A FORWARD -m state --state INVALID -j INVALID_PACKETS&lt;br /&gt;
-A INPUT -i lo -j ALLOWED_PACKETS&lt;br /&gt;
-A INPUT -s 127.0.0.0/8 -i ! lo -j INVALID_PACKETS&lt;br /&gt;
-A INPUT -p tcp -m tcp --dport 113 --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j REJECT --reject-with tcp-reset&lt;br /&gt;
-A INPUT -i bridge0 -p tcp -m tcp --dport 4444:4445 -j DROP&lt;br /&gt;
-A INPUT -m state --state RELATED,ESTABLISHED -j ALLOWED_PACKETS&lt;br /&gt;
-A INPUT -i bridge0 -j ALLOWED_PACKETS&lt;br /&gt;
-A INPUT -i usb0 -j ALLOWED_PACKETS&lt;br /&gt;
-A INPUT -m limit --limit 3/sec -j LOG --log-prefix &amp;quot;IPT_PACKET_DROPPED_NO_MATCH: &amp;quot; --log-level 7&lt;br /&gt;
-A INPUT -j QUEUE&lt;br /&gt;
-A ALLOWED_PACKETS -j ACCEPT&lt;br /&gt;
-A ICMPFLOOD -m recent --set --name ICMP --rsource&lt;br /&gt;
-A ICMPFLOOD -m recent --update --seconds 1 --hitcount 6 --rttl --name ICMP --rsource -m limit --limit 1/sec --limit-burst 1 -j LOG --log-prefix &amp;quot;IPT_ICMPFLOOD: &amp;quot;&lt;br /&gt;
-A ICMPFLOOD -m recent --update --seconds 1 --hitcount 6 --rttl --name ICMP --rsource -j DROP&lt;br /&gt;
-A ICMPFLOOD -j ALLOWED_PACKETS&lt;br /&gt;
-A INVALID_PACKETS -m limit --limit 1/sec --limit-burst 100 -j LOG --log-prefix &amp;quot;IPT_INVALID_PACKETS_DROPPED: &amp;quot;&lt;br /&gt;
-A INVALID_PACKETS -j DROP&lt;br /&gt;
COMMIT&lt;br /&gt;
# Completed on Mon Jun 29 14:11:31 2009&amp;lt;/pre&amp;gt;&lt;br /&gt;
==/etc/pmnetconfig/iptables-default.config==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
iptables -I INPUT 24 -m limit --limit 3/sec -j LOG --log-prefix &amp;quot;IPT_PACKET_DROPPED_NO_MATCH: &amp;quot; --log-level 7&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
==/etc/pmnetconfig/iptables-usbnetmode.config==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#This file left blank.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Khawk13</name></author>
	</entry>
	<entry>
		<id>http://wiki.webos-internals.org/index.php?title=Research_Securing_Pre&amp;diff=11049</id>
		<title>Research Securing Pre</title>
		<link rel="alternate" type="text/html" href="http://wiki.webos-internals.org/index.php?title=Research_Securing_Pre&amp;diff=11049"/>
		<updated>2010-08-28T18:58:31Z</updated>

		<summary type="html">&lt;p&gt;Khawk13: /* Networking Configurations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Intro==&lt;br /&gt;
A rooted box with broadband capabilities running a web engine and [http://www.palm.com/us/company/privacy.html|Palm's Privacy Policy] clipped to your belt? Anyone else nervous about this? &lt;br /&gt;
&lt;br /&gt;
So here we'll explore some of the general best practices that sysadmins using Linux normally employ when securing their systems and how such practices can be used on the Palm Pre to provide a higher level of privacy and security on your device. &lt;br /&gt;
&lt;br /&gt;
==System Logging mechanisms==&lt;br /&gt;
* [[Research_RDXD| RDXD Logging facility]]&lt;br /&gt;
* [[Research_Uploadd_| Uploadd facility]]&lt;br /&gt;
* [[Research_PmLog_| PmLog (syslog alternative)]]&lt;br /&gt;
* [[Research_Secure_Logging_Recommendations|Alternative Logging configuration for security and privacy]]&lt;br /&gt;
&lt;br /&gt;
==Networking Configurations==&lt;br /&gt;
Protocols listening for any inbound connection&lt;br /&gt;
* [[Research_tcp_14400|TCP Port 14400]]&lt;br /&gt;
* [[Research_tcp_53|TCP Port 53]]&lt;br /&gt;
* [[Research_tcp_16888|TCP Port 16888]]&lt;br /&gt;
* [[Research_tcp_16889|TCP Port 16889]]&lt;br /&gt;
* [[Research_tcp_4444|TCP Port 4444]]&lt;br /&gt;
* [[Research_tcp_4445|TCP Port 4445]]&lt;br /&gt;
&lt;br /&gt;
The Palm Pre does have iptables installed, so lets look at the [[Research_iptables_configuration_1.4.5|Current Iptables configuration]] with that in mind, lets look at an [[Research_iptables_configuration_recommendations|alternative Iptables configuration for security and privacy]].&lt;/div&gt;</summary>
		<author><name>Khawk13</name></author>
	</entry>
</feed>