Suspect short first fragment

2001-02-04 Thread Mike Furr
I just got a bunch of these in my firewall logs. The box routes real ip's (no-masq). Does anyone recogize these types packets? Is it just a fragmented portscan or something more dangerous? The x address is from outside and the y is inside... Feb 4 12:54:33 cone kernel: Suspect short first fra

Suspect short first fragment

2001-02-04 Thread Mike Furr
I just got a bunch of these in my firewall logs. The box routes real ip's (no-masq). Does anyone recogize these types packets? Is it just a fragmented portscan or something more dangerous? The x address is from outside and the y is inside... Feb 4 12:54:33 cone kernel: Suspect short first fr

non-root loopback crypto

2000-11-06 Thread Mike Furr
hi all, I've been using the loopback crypto stuff for a while and I'm looking for a secure way of doing this from my user account instead of having to su to call losetup. Does anyone have suggestions / experience with doing this? I see that you can't just run /sbin/losetup from non-root: $ losetu

non-root loopback crypto

2000-11-06 Thread Mike Furr
hi all, I've been using the loopback crypto stuff for a while and I'm looking for a secure way of doing this from my user account instead of having to su to call losetup. Does anyone have suggestions / experience with doing this? I see that you can't just run /sbin/losetup from non-root: $ loset