[techtalk] Re: ipchains

2000-03-19 Thread Laurel Fan

Excerpts from linuxchix: 18-Mar-100 Re: ipchains by [EMAIL PROTECTED] 
> However, it will only tell you the ports, some information about the
> sequence numbers and guess the OS if you tell it to.  It won't actually
> print out any vulnerabilities or try to break through the firewall.

I've found it interesting to experiment with nmap's different scan
types and figure out what my logs/filters pick up. (it's even got a
decent manpage!)

There's also another scanner which tries to get versions of the
running network daemons, and compares it against its vulnerability
database.  I'll see if I can dig up a name or URL...

There's a series of articles about security at kuro5hin.org, might
be worth a look.  Covers a lot of topics, including firewalls.



[subb3@attglobal.net: kernel log]

2000-03-19 Thread Subba Rao


I have the following entry in my syslog to trap the kern messages:

kern.*  /var/log/kernel-log

Each time my system dials to my ISP, it creates a log file on /.

home/  kernel-log.10.36.6.186   kernel-log.10.37.51.48
kernel-log.10.34.209.13   kernel-log.10.36.6.24kernel-log.10.37.51.60
kernel-log.10.34.209.158  kernel-log.10.36.6.241   kernel-log.10.37.51.74
kernel-log.10.34.209.18   kernel-log.10.36.6.25lib/

These files are logging the ipchains activity. This is in addition to the
main log file, which is /var/log/kernel-log.
Why are these files getting created? I did not find any config file in /etc that
indicates that ipchains will log for each seperate dial instance, to the / directory.

What is causing this redundant message logging?

Thank you in advance for any info.

Subba Rao
[EMAIL PROTECTED]
http://pws.prserv.net/truemax/

 => Time is relative. Here is a new way to look at time. <=
http://www.smcinnovations.com



Moderator stuff

2000-03-19 Thread jenn


Would whomever is subscribed as an egroups.com mailing list please, PLEASE
make the egroups.com list unmoderated? 

It's very bad form (and VERY confusing) for everyone who mails 
linuxchix.org  to get a 'your message is awaiting moderation' message
from an egroups.com address.

Thank you.


Jenn V.
-- 
  Humans are the only species to feed and house entirely separate species 
 for no reason other than the pleasure of their company. Why?

[EMAIL PROTECTED]Jenn Vespermanhttp://www.simegen.com/~jenn/



Re: ipchains

2000-03-19 Thread moebius

Hey Shelly,
  <---Reply below>

> my question is - what is the best way to test that the firewall is secure? i
> configured mine using ipchains (also doing masquerading for my internal lan,
> which is set up as a 192.168.x.x network - my external interface is an isdn
> connection at work). i had been reading about the prog SAINT, but it seems
> that must be run from another linux box, as a remote admin sort of tool. the
> linux firewall box is the only linux box on the network at my job - all others
> are NT servers and win98 workstations. i also tried the port scanner at
> www.hackerwhacker.com, but that only scans 11 ports (5 of which it says i have
> open, though it won't elaborate without $$$). any other programs anyone could
> recommend for firewall testing?

I like using simple programs like nmap (www.insecure.org) for port scans,
tcpdump will allow you to capture and see what is going on. As far as
programs like Nessus and Saint. They are more for dealing with "services"
that might have holes in them. Sendmail, though I love it, is a great
example of one of these types.

> 
> also... with an ipchains packet filter in place, how important is it that
> certain ports are left open? i've turned off everything i don't need from
> inetd.conf, and removed unnecessary services from my rc3.d. what other methods
> are there to close ports - must i put ipchains rules in regarding specific
> ports? (my firewall script is currently very general, referring only to the
> ability of external traffic to traverse past eth0 onto my local lan - no ports
> specified).
You should always shut down ports your not using. Remember, not all come
from inetd. A easy way to see who has ports open is "%netstat -vat" which
will show things as they are happening. Some might disagree here but I
think a default of "deny" in ipchains is a must. Block all internal
transmissions by making them use localhost. That way traffic going out
across the wire is more easily tracked.
 
> 
> all in all it's been a learning experience!  i didn't use any of the firewall
> rule tools, just hand coded everything with the help of many web sites and
> howto's. any highly recommended firewall rule creation tools out there?
Mason's what I learned on. Took my router down off the net for 3 days and
watched it build traffic piece by piece until I figured out what was going
on. Unfortunately that is all changing come 2.4 kernel. Should be
interesting.
Harry



Re: [techtalk] Re: ipchains

2000-03-19 Thread Jeff

On Sun, Mar 19, 2000 at 04:42:46AM -0500, Laurel Fan wrote:
> Excerpts from linuxchix: 18-Mar-100 Re: ipchains by [EMAIL PROTECTED] 
> > However, it will only tell you the ports, some information about the
> > sequence numbers and guess the OS if you tell it to.  It won't actually
> > print out any vulnerabilities or try to break through the firewall.
> 
> I've found it interesting to experiment with nmap's different scan
> types and figure out what my logs/filters pick up. (it's even got a
> decent manpage!)

It does do that.  You can also scan UDP ports, so if you are worried
about BO, UDP scan your win98 boxen on port 31337 (default BO port,
however, it can be changed).

> 
> There's also another scanner which tries to get versions of the
> running network daemons, and compares it against its vulnerability
> database.  I'll see if I can dig up a name or URL...

I believe you are thinking of Nessus at http://www.nessus.org  It looks
promising, but I couldn't get it to compile properly on my box (I also
didn't try very hard... ;)

I forgot to do this properly in my last posting, if you are interested
in computer security -- even if it is just keeping your box locked down
-- bugtraq is a great mailing list.  It is a moderated list for
announcing and discussing security holes, most of the major linux
distros post security warnings to it, and many other independent people
post their findings (it is kind of fun to watch as hole after hole in
NT/9x/IE5 gets posted...).  Anyway, you can find more info on bugtraq at
http://www.securityfocus.com, it is in the forum section (there's a link
in the navigation bar).

-- 
Jeff
-BEGIN GEEK CODE BLOCK-
Version: 3.12
GCS/M/>P d-(pu) s+:- a17>? C++() L+++ UL@>$ P+ E--- W++@ N+ o? K++ w--- O? M 
V- PS+ PE(--)@ Y+@ PGP++ t+ 5 X++@ R++@ !tv@ b++ DI D- G e- h! r% y?
--END GEEK CODE BLOCK--

My Public Key -- http://24.5.73.229/pubkey.txt 

 PGP signature


Re: ipchains

2000-03-19 Thread Ian Hall-Beyer


hackerwhacker will give you a detailed ascan without forking over
cash. You just have to do the basic scan, first. 

-Ian



--
 wow, this is kinda nifty. the win98 protocol stack is 
like a chinese finger puzzle, twist and turn in the right places, 
and it pops right off   --Seen on EFNet IRC



Re: Moderator stuff

2000-03-19 Thread Steve Howes


 
[EMAIL PROTECTED] wrote:
Would whomever is subscribed as an egroups.com mailing
list please, PLEASE
make the egroups.com list unmoderated?
It's very bad form (and VERY confusing) for everyone who mails
linuxchix.org  to get a 'your message is awaiting moderation'
message
from an egroups.com address.
This is also happening on another egroup I am subscribed to.  VERY
infuriating.
Maybe this will go away with the new setup Deb is sorting out.
 
Thank you.
Jenn V.
--
  Humans are the only species to feed and house entirely separate
species
 for no reason other than the pleasure of their
company. Why?
[EMAIL PROTECTED]    Jenn Vesperman 
http://www.simegen.com/~jenn/

-- 
Steve - Cheltenham, UK
-
In love and light we are
In darkness we are no less
 
 
 
 



[techtalk] Re: Moderator stuff

2000-03-19 Thread Gregory Conron

On Sun, 19 Mar 2000, Steve Howes wrote:
> 
> 
>  
> [EMAIL PROTECTED] wrote:
> Would whomever is subscribed as an egroups.com mailing
> list please, PLEASE
> make the egroups.com list unmoderated?
> It's very bad form (and VERY confusing) for everyone who mails
> linuxchix.org  to get a 'your message is awaiting moderation'
> message
> from an egroups.com address.
> This is also happening on another egroup I am subscribed to.  VERY
> infuriating.
> Maybe this will go away with the new setup Deb is sorting out.
>  
> Thank you.
> Jenn V.
> --
>   Humans are the only species to feed and house entirely separate
> species
>  for no reason other than the pleasure of their
> company. Why?
> [EMAIL PROTECTED]    Jenn 
>Vesperman 
> href="http://www.simegen.com/~jenn/">http://www.simegen.com/~jenn/
> 
> -- 
> Steve - Cheltenham, UK


Speaking of bad form - html on a mailing list (esp. a linux
mailing list)? Very bad form - no bonus points for you.

Cheers,
GC
 -- 
Gregory Conron
[EMAIL PROTECTED] - email
(902) 443-4562 - voicemail


___
techtalk mailing list
[EMAIL PROTECTED]
http://www.linux.org.uk/mailman/listinfo/techtalk



Re: [techtalk] Re: Moderator stuff

2000-03-19 Thread Laurel Fan

Excerpts from linuxchix: 19-Mar-100 [techtalk] Re: Moderator
stuffGregory [EMAIL PROTECTED] (1504*) by 
[entire quoted message snipped]
> Speaking of bad form - html on a mailing list (esp. a linux
> mailing list)? Very bad form - no bonus points for you.

Speaking of speaking of bad form, we didn't need to see that twice.

Oh, just to head off any "speaking of speaking of speaking of bad form"
replies, lf25-- for meta-flaming, off-topicness, bad speling, and
grammar, and missing something to -- myself for.



___
techtalk mailing list
[EMAIL PROTECTED]
http://www.linux.org.uk/mailman/listinfo/techtalk