Re: help needed with firewall logging ..please

2004-02-10 Thread Michael Wood
which dir .. > > The logging done as shown above goes to syslog. I use syslog-ng and > filter the firewall log messages into a separate file. Look in /var/log/messages. -- Michael Wood <[EMAIL PROTECTED]>

Re: help needed with firewall logging ..please

2004-02-10 Thread Michael Wood
which dir .. > > The logging done as shown above goes to syslog. I use syslog-ng and > filter the firewall log messages into a separate file. Look in /var/log/messages. -- Michael Wood <[EMAIL PROTECTED]> -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of &q

Re: Sniffing SSH and HTTPS

2001-08-29 Thread Michael Wood
then make sure your client is configured not to work if it doesn't have the server's key already. This doesn't work when you want to connect to some arbitrary "secure" web site, though. -- Michael Wood <[EMAIL PROTECTED]> -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: none

2001-09-18 Thread Michael Wood
Unless you are actually using NFS, uninstall all NFS related stuff. If you are using NFS, make sure your machine is up to date. -- Michael Wood <[EMAIL PROTECTED]> -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Mutt & tmp files

2001-11-15 Thread Michael Wood
a4a5e399a19eb1439e8eb01d7 Description: TTY Snoop - allows you to spy on telnet+serial connections TTYSnoop allows you to snoop on login tty's through another tty-device or pseudo-tty. The snoop-tty becomes a 'clone' of the original tty, redirecting both input and output from/

Re: Can a daemon listen only on some interfaces?

2001-12-08 Thread Michael Wood
t possible without modifying the source, you should use ipchains/iptables to restrict access to the port it uses. I hope this helps. -- Michael Wood <[EMAIL PROTECTED]> -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Can a daemon listen only on some interfaces?

2001-12-08 Thread Michael Wood
On Sat, Dec 08, 2001 at 08:09:50PM +0100, Guido Hennecke wrote: > At 08.12.2001, Michael Wood wrote: > > On Sat, Dec 08, 2001 at 07:40:06PM +1000, [EMAIL PROTECTED] wrote: > [...] > > > So my question is: > > > Is there some way to make certain daemons, (say post

Re: Exim mail

2001-12-18 Thread Michael Wood
ly one interface?" where this was discussed. Someone (can't remember his name) pointed out that the above is insufficient. -- Michael Wood <[EMAIL PROTECTED]> -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Secure 2.4.x kernel

2002-01-02 Thread Michael Wood
iggling the locks and trying all the windows to > find a weakness or a kink in the armour so that they could get > inside to either do "bad things" like use the house or allow others to > come by and party... Her response: "Thats illegal, how come if > someone try's

Re: Funky Arp Stuff

2002-01-07 Thread Michael Wood
ccording to your packet capture. Is your machine connected to the 'net via DSL or cable or something? -- Michael Wood <[EMAIL PROTECTED]> -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: default security

2002-01-15 Thread Michael Wood
our zone files or config file (except for the secondary zones.) Of course, they may still be able to make the DNS server serve incorrect information, but at least it's another hurdle for them to jump over. -- Michael Wood <[EMAIL PROTECTED]> -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: how to create MD5 passwords

2002-01-24 Thread Michael Wood
; import crypt >>> saltchars = string.uppercase + string.lowercase + string.digits + "./" >>> s = [] >>> for i in range(8): ... s.append(random.choice(saltchars)) ... >>> salt = "$1$" + string.join(s, "") >>> passwd =

Re: Problems with chrooting bind 9.2.0

2002-02-14 Thread Michael Wood
x27;s chrooted. > 2) copying it to /chroot/named/etc/bind i.e. /chroot/named/etc/bind is a directory containing the file rndc.key? This should work. What do the logs look like now? > 3) using symbolic links from the chroot jail to /etc/bind This won't work for the same reason as 1.

Re: Sniffing SSH and HTTPS

2001-08-29 Thread Michael Wood
then make sure your client is configured not to work if it doesn't have the server's key already. This doesn't work when you want to connect to some arbitrary "secure" web site, though. -- Michael Wood <[EMAIL PROTECTED]>

Re: none

2001-09-18 Thread Michael Wood
Unless you are actually using NFS, uninstall all NFS related stuff. If you are using NFS, make sure your machine is up to date. -- Michael Wood <[EMAIL PROTECTED]>

Re: Mutt & tmp files

2001-11-16 Thread Michael Wood
a4a5e399a19eb1439e8eb01d7 Description: TTY Snoop - allows you to spy on telnet+serial connections TTYSnoop allows you to snoop on login tty's through another tty-device or pseudo-tty. The snoop-tty becomes a 'clone' of the original tty, redirecting both input and output from/to it. :) -- Michael Wood <[EMAIL PROTECTED]>

Re: Can a daemon listen only on some interfaces?

2001-12-08 Thread Michael Wood
t possible without modifying the source, you should use ipchains/iptables to restrict access to the port it uses. I hope this helps. -- Michael Wood <[EMAIL PROTECTED]>

Re: Can a daemon listen only on some interfaces?

2001-12-08 Thread Michael Wood
On Sat, Dec 08, 2001 at 08:09:50PM +0100, Guido Hennecke wrote: > At 08.12.2001, Michael Wood wrote: > > On Sat, Dec 08, 2001 at 07:40:06PM +1000, [EMAIL PROTECTED] wrote: > [...] > > > So my question is: > > > Is there some way to make certain daemons, (say post

Re: Exim mail

2001-12-18 Thread Michael Wood
ly one interface?" where this was discussed. Someone (can't remember his name) pointed out that the above is insufficient. -- Michael Wood <[EMAIL PROTECTED]>

Re: Secure 2.4.x kernel

2002-01-02 Thread Michael Wood
iggling the locks and trying all the windows to > find a weakness or a kink in the armour so that they could get > inside to either do "bad things" like use the house or allow others to > come by and party... Her response: "Thats illegal, how come if > someone try's to get into your computer, they aren't arrested.". > Hmmm... Mom has a good point. > > I think the bottom line is that we'll never have 100% security until > there are laws that protect the break-in's and hacking that occurs. > Still laws... not crappy little wrist slapping type laws. > > > > > -- > > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > > with a subject of "unsubscribe". Trouble? Contact > [EMAIL PROTECTED] > > > > > > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] -- Michael Wood <[EMAIL PROTECTED]>

Re: Funky Arp Stuff

2002-01-07 Thread Michael Wood
ccording to your packet capture. Is your machine connected to the 'net via DSL or cable or something? -- Michael Wood <[EMAIL PROTECTED]>

Re: default security

2002-01-16 Thread Michael Wood
zone files or config file (except for the secondary zones.) Of course, they may still be able to make the DNS server serve incorrect information, but at least it's another hurdle for them to jump over. -- Michael Wood <[EMAIL PROTECTED]>

Re: how to create MD5 passwords

2002-01-24 Thread Michael Wood
; import crypt >>> saltchars = string.uppercase + string.lowercase + string.digits + "./" >>> s = [] >>> for i in range(8): ... s.append(random.choice(saltchars)) ... >>> salt = "$1$" + string.join(s, "") >>> passwd = "Password" >>> print crypt.crypt(passwd, salt) $1$e6TSyRDd$OcJO4kuY0I/mLED6n.tNi1 -- Michael Wood <[EMAIL PROTECTED]>

Re: Problems with chrooting bind 9.2.0

2002-02-14 Thread Michael Wood
x27;s chrooted. > 2) copying it to /chroot/named/etc/bind i.e. /chroot/named/etc/bind is a directory containing the file rndc.key? This should work. What do the logs look like now? > 3) using symbolic links from the chroot jail to /etc/bind This won't work for the same reason as 1. -- Michael Wood <[EMAIL PROTECTED]>