Re: iptables rule to drop from sources that are -nat postroutingfrom the outside to inside

2003-05-30 Thread Filippi Marco
On Fri, 30 May 2003, Kristof Goossens wrote: > On Thu, May 29, 2003 at 11:19:24PM -0500, Hanasaki JiJi wrote: > > I have a nat postrouting rule that passes traffice from the outside > > world to an internal host to handle port 80 (webserver) > > > > there are also rules to drop certain source addr

Re: iptables rules

2003-05-30 Thread David Hardne
Hanasaki JiJi wrote on May 29, 2003 at 11:19:24 PM: > I have a nat postrouting rule that passes traffice from the outside > world to an internal host to handle port 80 (webserver) > > there are also rules to drop certain source addresses yet these > addresses are still coming through > > how c

Re: iptables rule to drop from sources that are -nat postrouting from the outside to inside

2003-05-30 Thread Kristof Goossens
On Thu, May 29, 2003 at 11:19:24PM -0500, Hanasaki JiJi wrote: > I have a nat postrouting rule that passes traffice from the outside > world to an internal host to handle port 80 (webserver) > > there are also rules to drop certain source addresses yet these > addresses are still coming through

iptables rule to drop from sources that are -nat postrouting fromthe outside to inside

2003-05-30 Thread Hanasaki JiJi
I have a nat postrouting rule that passes traffice from the outside world to an internal host to handle port 80 (webserver) there are also rules to drop certain source addresses yet these addresses are still coming through how can they be dropped? thanks -- To UNSUBSCRIBE, email to [EMAIL PRO

Re: "chroot" + "mount --bind" + "ln" _or_ "chroot" + "cp -a"?

2003-05-30 Thread Manfred Wassmann
On 30 May 2003, Jarno Gassenbauer wrote: > P.S.: It's a pity that the syslogd socket is located > at /dev/log and not in an own directory. A hardlink to > /dev/log would have to be recreated after restarting > syslogd. Mount-binding the whole /dev directory into > the jail isn't fun either. You c

Re: "chroot" + "mount --bind" + "ln" _or_ "chroot" + "cp -a"?

2003-05-30 Thread Mark Ferlatte
Jarno Gassenbauer said on Fri, May 30, 2003 at 07:56:35PM +0200: > I'm setting up a chrooted apache. All howto's I found > _copy_ the required files into the directory that they > later chroot into. > Is it OK (read: safe) to use hardlinks and > "mount --bind" instead? I don't think so. From wh

Re: "chroot" + "mount --bind" + "ln" _or_ "chroot" + "cp -a"?

2003-05-30 Thread Arthur de Jong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > I'm setting up a chrooted apache. All howto's I found _copy_ the > required files into the directory that they later chroot into. > Is it OK (read: safe) to use hardlinks and "mount --bind" instead? [snip] > The files in /usr/chroot/apache/usr coul

"chroot" + "mount --bind" + "ln" _or_ "chroot" + "cp -a"?

2003-05-30 Thread Jarno Gassenbauer
Hi, I'm setting up a chrooted apache. All howto's I found _copy_ the required files into the directory that they later chroot into. Is it OK (read: safe) to use hardlinks and "mount --bind" instead? For example, before doing # chroot /usr/chroot/apache /usr/sbin/apachectl start I'd like to setu

Re: ip allmulti oddity (was: promiscuous mode)

2003-05-30 Thread Javier Fernández-Sanguino Peña
On Sat, May 24, 2003 at 04:07:18PM +0200, Cristian Ionescu-Idbohrn wrote: > Hi, (...) > This is the sid distributed package: > > , > | Package: iproute > | Maintainer: Juan Cespedes <[EMAIL PROTECTED]> > | Version: 20010824-9 > ` (...) > > Does anyone know of any particular reason why the

Re: idea for improving security

2003-05-30 Thread xavier renaut
|On Wed, 7 May 2003 08:53:40 +0200 Michael Bergbauer |<[EMAIL PROTECTED]> writes: |If you |> think SSH (or any other component) is not trustworthy, just look for |> alternatives (or create them yourself). | |what would be a more secure alternative to ssh? | what about ssh over vpn (vtun, openvpn

Re: Advice Needed On Recent Rootings

2003-05-30 Thread Jayson Vantuyl
On Thu, May 29, 2003 at 08:59:15AM -0400, Peter Solodov wrote: > On Thu, 29 May 2003, Jayson Vantuyl wrote: > > On Wed, May 28, 2003 at 02:06:21PM +0200, Olaf Dietsche wrote: > >> Just curious, how do you su to root, if root's password is > >> disabled? Do you have a modified su replacement? > > >

Re: iptables rule to drop from sources that are -nat postrouting from the outside to inside

2003-05-30 Thread Filippi Marco
On Fri, 30 May 2003, Kristof Goossens wrote: > On Thu, May 29, 2003 at 11:19:24PM -0500, Hanasaki JiJi wrote: > > I have a nat postrouting rule that passes traffice from the outside > > world to an internal host to handle port 80 (webserver) > > > > there are also rules to drop certain source addr

Re: iptables rules

2003-05-30 Thread David Hardne
Hanasaki JiJi wrote on May 29, 2003 at 11:19:24 PM: > I have a nat postrouting rule that passes traffice from the outside > world to an internal host to handle port 80 (webserver) > > there are also rules to drop certain source addresses yet these > addresses are still coming through > > how c

Re: iptables rule to drop from sources that are -nat postrouting from the outside to inside

2003-05-30 Thread Kristof Goossens
On Thu, May 29, 2003 at 11:19:24PM -0500, Hanasaki JiJi wrote: > I have a nat postrouting rule that passes traffice from the outside > world to an internal host to handle port 80 (webserver) > > there are also rules to drop certain source addresses yet these > addresses are still coming through

Re: Advice Needed On Recent Rootings

2003-05-30 Thread Marc F. Neininger
Hi Jason, hi all > Server machines, no real desktop users. One of these was a firewall > that pretty much only had SSH listening. *IF* it was hacked directly > (rather than being compromised with a sniff'd password), then we've got > something to target. The timestamps don't support much of any

Re: Advice Needed On Recent Rootings

2003-05-30 Thread Michael Rowe
On 2003-05-29 00:12 -0500, Jayson Vantuyl wrote: > Question: Can one use a key *AND* a password? That would make me > really happy. I just don't like getting ahold of a file or a password > being enough... You can put a passphrase on the key, if that's what you mean: ssh-keygen -p You then ha