am 13.01.2005, um 18:04:06 +0100 mailte RatÓn folgendes:
> Hello.
>
> I´m new to packet-filtering. As you can imaging starting to use
> iptables. Well once I´ve reached my first configuration I want to test
> it by asking iptables if a certain type of traffic is going to be
> ACCEPTED or not. To
IMO, hping2 is the best for doing this as it will create some custom
crafted packets that you can send towards your system to see its response.
Thanks,
Ryan Yagatich
,__,
/ Ryan Yagatich Pantek Incorporated |
\ http://www.pantek.
On Thu, 2005-01-13 at 20:37 +0100, Javier Pardo wrote:
> Hello.
>
> I´m looking after a way to simulate traffic in order to probe my
> iptables' rules.
>
> In other words. Is there any way, any command or any iptables parameter
> to ask iptables what is going to do (according with the active rule
* "Javier Pardo" <[EMAIL PROTECTED]> wrote:
> Hello.
>
> I´m looking after a way to simulate traffic in order to probe my
> iptables' rules.
You can look at ${KERNEL_DIR}/Documentation/networking/pktgen.txt
--
::)^|^(:: Michal Jeczalik Jr, [EMAIL PROTECTED], http://www.salvador.eu.org
:(:\:/:
Hello.
I´m looking after a way to simulate traffic in order to probe my
iptables' rules.
In other words. Is there any way, any command or any iptables parameter
to ask iptables what is going to do (according with the active rules)
when some traffic arrives?
Thanks in advanced. RatÓn.
--
Incoming from RatÓn:
> So it is not ment for iptables testing. How can I test my config then??
Here's how I do it:
iptables -A INPUT -s ! 127.0.0.1/32 -m state --state NEW -j LOG
iptables -A INPUT -s ! 127.0.0.1/32 -m state --state NEW -j DROP
Then I just watch Xconsole. Modify those to LOG & D
Incoming from RatÓn:
>
> I´m new to packet-filtering. As you can imaging starting to use
> iptables. Well once I´ve reached my first configuration I want to test
> it by asking iptables if a certain type of traffic is going to be
> ACCEPTED or not. To do this I make use of the -c option as follows
Hello.
I´m new to packet-filtering. As you can imaging starting to use
iptables. Well once I´ve reached my first configuration I want to test
it by asking iptables if a certain type of traffic is going to be
ACCEPTED or not. To do this I make use of the -c option as follows:
> iptables -c forward
Hi,
"Thu, 13 Jan 2005 08:27:57 +0100 (CET)", "Martin Schulze"
"[SECURITY] [DSA 637-1] New exim-tls packages fix arbitrary code execution"
>Package: exim-tls
>Philip Hazel announced a buffer overflow in the host_aton function in
>exim-tls, the SSL-enabled version of the default mail-tr
Jan Lühr a écrit :
Will kernel-source-2.4.27 be available in days or weeks?
I guess days, since security fixes often means 'priority=high'.
There are people working on it, ex Simon Horman. More infos:
activity on kernel-source-2.4.27-2.4.27 (svn, Debian subversion)
http://svn.debian.org/wsvn/kerne
Hi,
In context of latest problems with kernel, php ...
Lets assume that I am average user who was told that debian is stable, secure,
etc. I read some information and decided to install stable version.Subscribed
myself to debian-security-anounce added proper line to apt.sources and I feel
Greetings,
Am Donnerstag, 13. Januar 2005 10:06 schrieb Christophe Chisogne:
> Jan Lühr a écrit :
> > Do you recommend to use kernel-source-2.4.27 from sid (sarge) instead of
> > 2.4.18 from woody?
>
> On a production server, I would run 2.4, not 2.6.
m2
> And as Debian security
> support seem
Jan Lühr a écrit :
Do you recommend to use kernel-source-2.4.27 from sid (sarge) instead of
2.4.18 from woody?
On a production server, I would run 2.4, not 2.6. And as Debian security
support seems better now for the 2.4.27 kernel, I would choose it.
It include fixes backported from kernel.org 2.4
13 matches
Mail list logo