Suspending services

2001-01-29 Thread Piotr Tarnowski
Hi, I have a Potato workstation with several services installed on it. Thanks to links in /etc/rc?.d they start and stop automatically at system startup/shutdown :-) The problem is that I do not need all of them all the time - when I work on certain subject I would like to switch other services o

Re: Suspending services

2001-01-29 Thread IC&S - Eelco van Beek
Hi Piotr, Just use one of the free runlevels (4,5 even 2). Go to /etc/rc and remove the links that you don't need and add the ones you do. After that you can switch to that runlevel bij doing telinit . All your services will be started and stopped for that runlevel. Good luck, Eelco van Beek O

Re: Suspending services

2001-01-29 Thread Fabrizio Roccato
On Mon, Jan 29, 2001 at 11:16:13AM +0100, IC&S - Eelco van Beek wrote: > Hi Piotr, > Just use one of the free runlevels (4,5 even 2). Go to > /etc/rc and remove the links that you don't need and add the > ones you do. After that you can switch to that runlevel bij doing telinit > . All your service

portsentry dangerous? hardly; RTFM. (was Re: checking security logs)

2001-01-29 Thread thomas lakofski
On Wed, 24 Jan 2001, Mark Suter wrote: > The only way under IPv4 be safe from spoofing is for everyone to > implement proper Network Ingress Filtering [RFC2827, BCP0038] on > their networks. Please, read this RFC. > > http://www.faqs.org/rfc/rfc2827.txt bah. all this talk about portsentry b

Re: portsentry dangerous? hardly; RTFM. (was Re: checking security logs)

2001-01-29 Thread Tim Haynes
On Mon, Jan 29, 2001 at 12:33:03PM +, thomas lakofski wrote: [] > bah. all this talk about portsentry being dangerous forgets that you can > also run it so it only triggers after a full TCP connect. while not > un-spoofable, it's very hard for an attacker to spoof as they have to be > in-lin

Re: portsentry dangerous? hardly; RTFM. (was Re: checking security logs)

2001-01-29 Thread thomas lakofski
On Mon, 29 Jan 2001, Tim Haynes wrote: > On Mon, Jan 29, 2001 at 12:33:03PM +, thomas lakofski wrote: > > > bah. all this talk about portsentry being dangerous forgets that you can > > also run it so it only triggers after a full TCP connect. while not > > un-spoofable, it's very hard for an

Re: Suspending services

2001-01-29 Thread Jürgen Dollinger
Piotr Tarnowski wrote: > What I did looks very tricky - I would prefer something similar to > putting '#' in front of line in /etc/inittab. Install file-rc. This will replace all those links with one configfile (/etc/runlevel.conf). Put a '#' in front of lines in /etc/runlevel.conf. -- /"\

Re: Suspending services

2001-01-29 Thread David Wright
Quoting Jürgen Dollinger ([EMAIL PROTECTED]): > Piotr Tarnowski wrote: > > What I did looks very tricky - I would prefer something similar to > > putting '#' in front of line in /etc/inittab. > > Install file-rc. This will replace all those links with one configfile > (/etc/runlevel.conf). Put a '

Re: Suspending services

2001-01-29 Thread Pollywog
On Mon, 29 Jan 2001 15:59:39 +, David Wright said: > Quoting Jürgen Dollinger ([EMAIL PROTECTED]): > > Piotr Tarnowski wrote: > > > What I did looks very tricky - I would prefer something similar to > > > putting '#' in front of line in /etc/inittab. > > > > Install file-rc. This will r

Re: portsentry dangerous? hardly; RTFM. (was Re: checking security logs)

2001-01-29 Thread Peter Cordes
On Mon, Jan 29, 2001 at 12:33:03PM +, thomas lakofski wrote: > On Wed, 24 Jan 2001, Mark Suter wrote: > > > The only way under IPv4 be safe from spoofing is for everyone to > > implement proper Network Ingress Filtering [RFC2827, BCP0038] on > > their networks. Please, read this RFC. > > > >

Re: portsentry dangerous? hardly; RTFM. (was Re: checking security logs)

2001-01-29 Thread Rainer Weikusat
thomas lakofski <[EMAIL PROTECTED]> writes: > Tim Haynes wrote: > Script kiddies generally don't know what's happened to them when > portsentry triggers, and go looking for easier fodder Random garbage traveling across the 'net is exactly this: Random garbage. > > Who says someone's going to go t

Re: portsentry dangerous? hardly; RTFM. (was Re: checking security logs)

2001-01-29 Thread thomas lakofski
On Mon, 29 Jan 2001, Peter Cordes wrote: > > bah. all this talk about portsentry being dangerous forgets that you can > > also > > run it so it only triggers after a full TCP connect. while not > > un-spoofable, > > it's very hard for an attacker to spoof as they have to be in-line between >

Re: portsentry dangerous? hardly; RTFM. (was Re: checking security logs)

2001-01-29 Thread thomas lakofski
On 29 Jan 2001, Rainer Weikusat wrote: > thomas lakofski <[EMAIL PROTECTED]> writes: > > Tim Haynes wrote: > > Script kiddies generally don't know what's happened to them when > > portsentry triggers, and go looking for easier fodder > > Random garbage traveling across the 'net is exactly this: Ra

Re: Clear screan question

2001-01-29 Thread Sune Kirkeby
[ Sune Kirkeby ] > I don't know how or why, but it does _not_ clear the scroll-back > buffer on my console, "chvt 63 ; reset -Q ; chvt 1" does though. [ Ethan Benson ] > you don't need the reset -Q there. the simple act of changing VCs > clears the scrollback history. [ Sune Kirkeby ] > Sorry, m

Re: portsentry dangerous? hardly

2001-01-29 Thread Peter Cordes
On Mon, Jan 29, 2001 at 07:06:56PM +, thomas lakofski wrote: > My bad. But the point seems moot, since if you're already able to squash > traffic between the hosts you might as well do that instead of trying to > induce > a blocking response from portsentry. It's decidedly less trivial than

Re: portsentry dangerous? hardly

2001-01-29 Thread IC&S - Eelco van Beek
On Mon, 29 Jan 2001, Peter Cordes wrote: > On Mon, Jan 29, 2001 at 07:06:56PM +, thomas lakofski wrote: > > My bad. But the point seems moot, since if you're already able to squash > > traffic between the hosts you might as well do that instead of trying to > > induce > > a blocking respon

Re: Ext2 - постоянное разрушение

2001-01-29 Thread Tom Breza
Can u write in English pls? or don't write at all thanks > e2fsck ?? ??. > ?? ?? ?? > ?? ... ?? > ?? ?? ??

Firewall and IPv6

2001-01-29 Thread NDSoftware
Hi, I have ipchains under Debian 2.2. This firewall is compatible IPv6 ? Thanks Nicolas DEFFAYET, NDSoftware http://www.ndsoftware.net - [EMAIL PROTECTED] France: Tel +33 671887502 - Fax N/A UK: Tel +44 8453348750 - Fax +44 8453348751 USA: Tel N/A - Fax N/A

Re: Ext2 - ?????????? ??????????

2001-01-29 Thread Andy Bastien
Of all the days, it was on Mon, Jan 29, 2001 at 08:35:57PM + that Tom Breza quoth: > Can u write in English pls? or don't write at all Oh, the irony. > > thanks > > > e2fsck помогает только на несколько миÐÂ

Suspending services

2001-01-29 Thread Piotr Tarnowski
Hi, I have a Potato workstation with several services installed on it. Thanks to links in /etc/rc?.d they start and stop automatically at system startup/shutdown :-) The problem is that I do not need all of them all the time - when I work on certain subject I would like to switch other services

Re: Suspending services

2001-01-29 Thread IC&S - Eelco van Beek
Hi Piotr, Just use one of the free runlevels (4,5 even 2). Go to /etc/rc and remove the links that you don't need and add the ones you do. After that you can switch to that runlevel bij doing telinit . All your services will be started and stopped for that runlevel. Good luck, Eelco van Beek

Re: Suspending services

2001-01-29 Thread Fabrizio Roccato
On Mon, Jan 29, 2001 at 11:16:13AM +0100, IC&S - Eelco van Beek wrote: > Hi Piotr, > Just use one of the free runlevels (4,5 even 2). Go to > /etc/rc and remove the links that you don't need and add the > ones you do. After that you can switch to that runlevel bij doing telinit > . All your servic

portsentry dangerous? hardly; RTFM. (was Re: checking securitylogs)

2001-01-29 Thread thomas lakofski
On Wed, 24 Jan 2001, Mark Suter wrote: > The only way under IPv4 be safe from spoofing is for everyone to > implement proper Network Ingress Filtering [RFC2827, BCP0038] on > their networks. Please, read this RFC. > > http://www.faqs.org/rfc/rfc2827.txt bah. all this talk about portsentry

Re: portsentry dangerous? hardly; RTFM. (was Re: checking security logs)

2001-01-29 Thread Tim Haynes
On Mon, Jan 29, 2001 at 12:33:03PM +, thomas lakofski wrote: [] > bah. all this talk about portsentry being dangerous forgets that you can > also run it so it only triggers after a full TCP connect. while not > un-spoofable, it's very hard for an attacker to spoof as they have to be > in-li

Re: portsentry dangerous? hardly; RTFM. (was Re: checking securitylogs)

2001-01-29 Thread thomas lakofski
On Mon, 29 Jan 2001, Tim Haynes wrote: > On Mon, Jan 29, 2001 at 12:33:03PM +, thomas lakofski wrote: > > > bah. all this talk about portsentry being dangerous forgets that you can > > also run it so it only triggers after a full TCP connect. while not > > un-spoofable, it's very hard for a

Re: Suspending services

2001-01-29 Thread Jürgen Dollinger
Piotr Tarnowski wrote: > What I did looks very tricky - I would prefer something similar to > putting '#' in front of line in /etc/inittab. Install file-rc. This will replace all those links with one configfile (/etc/runlevel.conf). Put a '#' in front of lines in /etc/runlevel.conf. -- /"\

Re: Suspending services

2001-01-29 Thread David Wright
Quoting Jürgen Dollinger ([EMAIL PROTECTED]): > Piotr Tarnowski wrote: > > What I did looks very tricky - I would prefer something similar to > > putting '#' in front of line in /etc/inittab. > > Install file-rc. This will replace all those links with one configfile > (/etc/runlevel.conf). Put a

Re: Suspending services

2001-01-29 Thread Pollywog
On Mon, 29 Jan 2001 15:59:39 +, David Wright said: > Quoting Jürgen Dollinger ([EMAIL PROTECTED]): > > Piotr Tarnowski wrote: > > > What I did looks very tricky - I would prefer something similar to > > > putting '#' in front of line in /etc/inittab. > > > > Install file-rc. This will

Re: portsentry dangerous? hardly; RTFM. (was Re: checking security logs)

2001-01-29 Thread Peter Cordes
On Mon, Jan 29, 2001 at 12:33:03PM +, thomas lakofski wrote: > On Wed, 24 Jan 2001, Mark Suter wrote: > > > The only way under IPv4 be safe from spoofing is for everyone to > > implement proper Network Ingress Filtering [RFC2827, BCP0038] on > > their networks. Please, read this RFC. > > > >

Re: portsentry dangerous? hardly; RTFM. (was Re: checking security logs)

2001-01-29 Thread Rainer Weikusat
thomas lakofski <[EMAIL PROTECTED]> writes: > Tim Haynes wrote: > Script kiddies generally don't know what's happened to them when > portsentry triggers, and go looking for easier fodder Random garbage traveling across the 'net is exactly this: Random garbage. > > Who says someone's going to go

Re: portsentry dangerous? hardly; RTFM. (was Re: checking securitylogs)

2001-01-29 Thread thomas lakofski
On Mon, 29 Jan 2001, Peter Cordes wrote: > > bah. all this talk about portsentry being dangerous forgets that you can also > > run it so it only triggers after a full TCP connect. while not un-spoofable, > > it's very hard for an attacker to spoof as they have to be in-line between your > > hos

Re: portsentry dangerous? hardly; RTFM. (was Re: checking securitylogs)

2001-01-29 Thread thomas lakofski
On 29 Jan 2001, Rainer Weikusat wrote: > thomas lakofski <[EMAIL PROTECTED]> writes: > > Tim Haynes wrote: > > Script kiddies generally don't know what's happened to them when > > portsentry triggers, and go looking for easier fodder > > Random garbage traveling across the 'net is exactly this: R

Re: Clear screan question

2001-01-29 Thread Sune Kirkeby
[ Sune Kirkeby ] > I don't know how or why, but it does _not_ clear the scroll-back > buffer on my console, "chvt 63 ; reset -Q ; chvt 1" does though. [ Ethan Benson ] > you don't need the reset -Q there. the simple act of changing VCs > clears the scrollback history. [ Sune Kirkeby ] > Sorry,

Re: portsentry dangerous? hardly

2001-01-29 Thread Peter Cordes
On Mon, Jan 29, 2001 at 07:06:56PM +, thomas lakofski wrote: > My bad. But the point seems moot, since if you're already able to squash > traffic between the hosts you might as well do that instead of trying to induce > a blocking response from portsentry. It's decidedly less trivial than se

Re: portsentry dangerous? hardly

2001-01-29 Thread IC&S - Eelco van Beek
On Mon, 29 Jan 2001, Peter Cordes wrote: > On Mon, Jan 29, 2001 at 07:06:56PM +, thomas lakofski wrote: > > My bad. But the point seems moot, since if you're already able to squash > > traffic between the hosts you might as well do that instead of trying to induce > > a blocking response f

Re: Ext2 - постоянное разрушение

2001-01-29 Thread Tom Breza
Can u write in English pls? or don't write at all thanks > e2fsck помогает только на несколько минут. > Конешно с такими скудными данными трудно >получить ответ ... но всетаки > надеюсь у кого то было нечто подобное. > -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubsc

Firewall and IPv6

2001-01-29 Thread NDSoftware
Hi, I have ipchains under Debian 2.2. This firewall is compatible IPv6 ? Thanks Nicolas DEFFAYET, NDSoftware http://www.ndsoftware.net - [EMAIL PROTECTED] France: Tel +33 671887502 - Fax N/A UK: Tel +44 8453348750 - Fax +44 8453348751 USA: Tel N/A - Fax N/A -- To UNSUBSCRIBE, email to [EMAIL

Re: Ext2 - ?????????? ??????????

2001-01-29 Thread Andy Bastien
Of all the days, it was on Mon, Jan 29, 2001 at 08:35:57PM + that Tom Breza quoth: > Can u write in English pls? or don't write at all Oh, the irony. > > thanks > > > e2fsck помогает только на несколько минут. > > Конешно с такими скудным

Re: Firewall and IPv6

2001-01-29 Thread Bastian Blank
On Mon, Jan 29, 2001 at 10:10:34PM +0100, NDSoftware wrote: > I have ipchains under Debian 2.2. > This firewall is compatible IPv6 ? no, you must use netfilter bastian -- Each kiss is as the first. -- Miramanee, Kirk's wife, "The Paradise Syndrome", stardate