-Original Message-
From: "Ramon Acedo" <[EMAIL PROTECTED]>
Date: Sun, 10 Feb 2002 23:39:20 +0100
Subject: Emulate real ip's to access intranet hosts from outside
---snip-
> I just want that when someone try to access to host1.mydomain.net
> from the
> internet my firewall (and dns server)
hello!
I have done my best to make my firewall/router secure according to
several security howtos (in this place, many thanks to the authors of
the debian security howto). I think I am really getting into this
"security stuff" :)
I am running a not very busy website and ftp-server, so I can af
hi ya klaus
i am assumig you made a copy of all the binaries and lib and config files
for safe keeping as a reference against the "hacked" machine ...
esp programs like: should be saved
find, ps, netstat, ls, diff, login, crypt, sum, top, rm, mv, cp
mail, elm, pine, sendmail/exi
On Mon, Feb 11, 2002 at 11:26:57AM +0100, Klaus Koch wrote:
[SNiP]
> My question now is, what can I really do in realtime against an ongoing
> attack? Are there any interesting reads, I wasn't able to find?
assuming the attack is coming from ip address "x1.x2.x3.x4", the
following command shou
Below is a list of 422 Genealogy Databases with over 1.5
billion names.
I am offering to search these databases for only $1(US)
per search.
Just send a minimum of $10(US) to:
Angie Giles
P.O.Box 873
Rowlett, TX, USA 75030-0873
Because of technical reasons beyond my control, I might
not be a
Greetings!
On Mon, Feb 11, 2002 at 10:10:38PM +0700, [EMAIL PROTECTED] wrote:
> I am new user debian linux,
>
> 1. i try to configure in hosts.deny :
If you want finer access rule granulation, I'd suggest using XINETD
instead of INETD, which is available as alternate .DEB (and supported
by a nu
>I'd like to access to the hosts of my intranet with private ip's from the
>outside.
>I have the following net:
One or few weeks ago the same questions was up and the list
concluded the discussion with the result, that this best way seems to
be to ssh-portforwarding - that means, you'll use putty
-Original Message-
From: "Ramon Acedo" <[EMAIL PROTECTED]>
Date: Sun, 10 Feb 2002 23:39:20 +0100
Subject: Emulate real ip's to access intranet hosts from outside
---snip-
> I just want that when someone try to access to host1.mydomain.net
> from the
> internet my firewall (and dns server)
>
hello!
I have done my best to make my firewall/router secure according to
several security howtos (in this place, many thanks to the authors of
the debian security howto). I think I am really getting into this
"security stuff" :)
I am running a not very busy website and ftp-server, so I can aff
hi ya klaus
i am assumig you made a copy of all the binaries and lib and config files
for safe keeping as a reference against the "hacked" machine ...
esp programs like: should be saved
find, ps, netstat, ls, diff, login, crypt, sum, top, rm, mv, cp
mail, elm, pine, sendmail/exim
On Mon, Feb 11, 2002 at 11:26:57AM +0100, Klaus Koch wrote:
[SNiP]
> My question now is, what can I really do in realtime against an ongoing
> attack? Are there any interesting reads, I wasn't able to find?
assuming the attack is coming from ip address "x1.x2.x3.x4", the
following command shoul
You may wish to investigate IPCHAINS (Kernel 2.2) or IPTABLES (Kernel 2.4) to
solve your problem. I have found IP CHAINS and IPTABLES more effective than
working with the TCP Daemon
Phil
-Original Message-
From: <[EMAIL PROTECTED]>
To: Jakub Jankowski <[EMAIL PROTECTED]>
Date: Mon,
If you are physically present when an attack is happening and doing the
following won't adversly affect any bussiness transactions, simply unplug the
NIC until you can figure out what he did and secure the box. Disabling the
network at layer 1 is the only true way to keep the attacker out of th
Not that I like security-through-obscurity, but if a cracker runs
scanssh on me and sees I am running Debian there is that much less to
figure out. I can understand the maintainer's point of view, but I
would rather audit my network SSH installs manually. So I would be
interested in removing
On Mon, 11 Feb 2002 [EMAIL PROTECTED] wrote:
> 1. i try to configure in hosts.deny :
>
> ALL:[EMAIL PROTECTED]
Hi Aku,
To deny all incoming connections for tcpwrapped ports it is
sufficient to have this line in your /etc/hosts.deny file:
ALL: ALL
The endpoint construct isn't necessary for what
On Mon, 11 Feb 2002 [EMAIL PROTECTED] wrote:
> Of course even if tcp_wrapper gives you access the deamon doesn't
> have to do so too... So, maybe it's not the wrapper that's denying you
> access. If you think your hosts.deny and hosts.allow files are fine,
> then maybe it's good to make sure the d
On Saturday, February 9, 2002, at 01:47 PM, Jeff Bonner wrote:
One of the things I did with my firewall was compile all the needed
modules into the kernel, so that no additional modules can be loaded --
which is one way a hacker can install things.
If you have root, you can just write to kern
On Mon, 11 Feb 2002 at 22:10:38 +0700, [EMAIL PROTECTED] wrote:
> I am new user debian linux,
>
> 1. i try to configure in hosts.deny :
>
> ALL:[EMAIL PROTECTED]
>
> and try in hosts.allow :
>
> ALL : 202.xxx.xxx.xx1, 202.xxx.xxx.xx2
>
> But when i try from 202.xxx.xxx.xx1 and 202.xxx.xxx.xx2
On 11 Feb 2002 12:16 PM, Anthony DeRobertis wrote:
> > One of the things I did with my firewall was compile all the
> > needed modules into the kernel, so that no additional modules
> > can be loaded -- which is one way a hacker can install things.
>
> If you have root, you can just write to kerne
Below is a list of 422 Genealogy Databases with over 1.5
billion names.
I am offering to search these databases for only $1(US)
per search.
Just send a minimum of $10(US) to:
Angie Giles
P.O.Box 873
Rowlett, TX, USA 75030-0873
Because of technical reasons beyond my control, I might
not be ab
Greetings!
On Mon, Feb 11, 2002 at 10:10:38PM +0700, [EMAIL PROTECTED] wrote:
> I am new user debian linux,
>
> 1. i try to configure in hosts.deny :
If you want finer access rule granulation, I'd suggest using XINETD
instead of INETD, which is available as alternate .DEB (and supported
by a num
21 matches
Mail list logo