Re: Emulate real ip's to access intranet hosts from outside

2002-02-11 Thread vdongen
-Original Message- From: "Ramon Acedo" <[EMAIL PROTECTED]> Date: Sun, 10 Feb 2002 23:39:20 +0100 Subject: Emulate real ip's to access intranet hosts from outside ---snip- > I just want that when someone try to access to host1.mydomain.net > from the > internet my firewall (and dns server)

preparing for case of emergency

2002-02-11 Thread Klaus Koch
hello! I have done my best to make my firewall/router secure according to several security howtos (in this place, many thanks to the authors of the debian security howto). I think I am really getting into this "security stuff" :) I am running a not very busy website and ftp-server, so I can af

Re: preparing for case of emergency

2002-02-11 Thread Alvin Oga
hi ya klaus i am assumig you made a copy of all the binaries and lib and config files for safe keeping as a reference against the "hacked" machine ... esp programs like: should be saved find, ps, netstat, ls, diff, login, crypt, sum, top, rm, mv, cp mail, elm, pine, sendmail/exi

Re: preparing for case of emergency

2002-02-11 Thread Fredrik Ax
On Mon, Feb 11, 2002 at 11:26:57AM +0100, Klaus Koch wrote: [SNiP] > My question now is, what can I really do in realtime against an ongoing > attack? Are there any interesting reads, I wasn't able to find? assuming the attack is coming from ip address "x1.x2.x3.x4", the following command shou

422 Genealogy Databases [2]

2002-02-11 Thread Angie's Genealogy
Below is a list of 422 Genealogy Databases with over 1.5 billion names. I am offering to search these databases for only $1(US) per search. Just send a minimum of $10(US) to: Angie Giles P.O.Box 873 Rowlett, TX, USA 75030-0873 Because of technical reasons beyond my control, I might not be a

Re: hosts deny, alow

2002-02-11 Thread Volker Tanger
Greetings! On Mon, Feb 11, 2002 at 10:10:38PM +0700, [EMAIL PROTECTED] wrote: > I am new user debian linux, > > 1. i try to configure in hosts.deny : If you want finer access rule granulation, I'd suggest using XINETD instead of INETD, which is available as alternate .DEB (and supported by a nu

Re: [suse-security] Emulate real ip's to access intranet hosts from outside

2002-02-11 Thread Michael Appeldorn
>I'd like to access to the hosts of my intranet with private ip's from the >outside. >I have the following net: One or few weeks ago the same questions was up and the list concluded the discussion with the result, that this best way seems to be to ssh-portforwarding - that means, you'll use putty

Re: Emulate real ip's to access intranet hosts from outside

2002-02-11 Thread vdongen
-Original Message- From: "Ramon Acedo" <[EMAIL PROTECTED]> Date: Sun, 10 Feb 2002 23:39:20 +0100 Subject: Emulate real ip's to access intranet hosts from outside ---snip- > I just want that when someone try to access to host1.mydomain.net > from the > internet my firewall (and dns server) >

preparing for case of emergency

2002-02-11 Thread Klaus Koch
hello! I have done my best to make my firewall/router secure according to several security howtos (in this place, many thanks to the authors of the debian security howto). I think I am really getting into this "security stuff" :) I am running a not very busy website and ftp-server, so I can aff

Re: preparing for case of emergency

2002-02-11 Thread Alvin Oga
hi ya klaus i am assumig you made a copy of all the binaries and lib and config files for safe keeping as a reference against the "hacked" machine ... esp programs like: should be saved find, ps, netstat, ls, diff, login, crypt, sum, top, rm, mv, cp mail, elm, pine, sendmail/exim

Re: preparing for case of emergency

2002-02-11 Thread Fredrik Ax
On Mon, Feb 11, 2002 at 11:26:57AM +0100, Klaus Koch wrote: [SNiP] > My question now is, what can I really do in realtime against an ongoing > attack? Are there any interesting reads, I wasn't able to find? assuming the attack is coming from ip address "x1.x2.x3.x4", the following command shoul

Re: hosts deny, alow

2002-02-11 Thread Phillip Hofmeister
You may wish to investigate IPCHAINS (Kernel 2.2) or IPTABLES (Kernel 2.4) to solve your problem. I have found IP CHAINS and IPTABLES more effective than working with the TCP Daemon Phil -Original Message- From: <[EMAIL PROTECTED]> To: Jakub Jankowski <[EMAIL PROTECTED]> Date: Mon,

Re: preparing for case of emergency

2002-02-11 Thread Phillip Hofmeister
If you are physically present when an attack is happening and doing the following won't adversly affect any bussiness transactions, simply unplug the NIC until you can figure out what he did and secure the box. Disabling the network at layer 1 is the only true way to keep the attacker out of th

Re: How to modify SSH2 prompt message?

2002-02-11 Thread Dave Kline
Not that I like security-through-obscurity, but if a cracker runs scanssh on me and sees I am running Debian there is that much less to figure out. I can understand the maintainer's point of view, but I would rather audit my network SSH installs manually. So I would be interested in removing

Re: hosts deny, alow

2002-02-11 Thread HdV
On Mon, 11 Feb 2002 [EMAIL PROTECTED] wrote: > 1. i try to configure in hosts.deny : > > ALL:[EMAIL PROTECTED] Hi Aku, To deny all incoming connections for tcpwrapped ports it is sufficient to have this line in your /etc/hosts.deny file: ALL: ALL The endpoint construct isn't necessary for what

Re: hosts deny, alow

2002-02-11 Thread HdV
On Mon, 11 Feb 2002 [EMAIL PROTECTED] wrote: > Of course even if tcp_wrapper gives you access the deamon doesn't > have to do so too... So, maybe it's not the wrapper that's denying you > access. If you think your hosts.deny and hosts.allow files are fine, > then maybe it's good to make sure the d

Re: HELP I've been cracked

2002-02-11 Thread Anthony DeRobertis
On Saturday, February 9, 2002, at 01:47 PM, Jeff Bonner wrote: One of the things I did with my firewall was compile all the needed modules into the kernel, so that no additional modules can be loaded -- which is one way a hacker can install things. If you have root, you can just write to kern

Re: hosts deny, alow

2002-02-11 Thread Tomasz Papszun
On Mon, 11 Feb 2002 at 22:10:38 +0700, [EMAIL PROTECTED] wrote: > I am new user debian linux, > > 1. i try to configure in hosts.deny : > > ALL:[EMAIL PROTECTED] > > and try in hosts.allow : > > ALL : 202.xxx.xxx.xx1, 202.xxx.xxx.xx2 > > But when i try from 202.xxx.xxx.xx1 and 202.xxx.xxx.xx2

RE: HELP I've been cracked

2002-02-11 Thread Jeff Bonner
On 11 Feb 2002 12:16 PM, Anthony DeRobertis wrote: > > One of the things I did with my firewall was compile all the > > needed modules into the kernel, so that no additional modules > > can be loaded -- which is one way a hacker can install things. > > If you have root, you can just write to kerne

422 Genealogy Databases [2]

2002-02-11 Thread Angie's Genealogy
Below is a list of 422 Genealogy Databases with over 1.5 billion names. I am offering to search these databases for only $1(US) per search. Just send a minimum of $10(US) to: Angie Giles P.O.Box 873 Rowlett, TX, USA 75030-0873 Because of technical reasons beyond my control, I might not be ab

Re: hosts deny, alow

2002-02-11 Thread Volker Tanger
Greetings! On Mon, Feb 11, 2002 at 10:10:38PM +0700, [EMAIL PROTECTED] wrote: > I am new user debian linux, > > 1. i try to configure in hosts.deny : If you want finer access rule granulation, I'd suggest using XINETD instead of INETD, which is available as alternate .DEB (and supported by a num