which dir ..
>
> The logging done as shown above goes to syslog. I use syslog-ng and
> filter the firewall log messages into a separate file.
Look in /var/log/messages.
--
Michael Wood <[EMAIL PROTECTED]>
which dir ..
>
> The logging done as shown above goes to syslog. I use syslog-ng and
> filter the firewall log messages into a separate file.
Look in /var/log/messages.
--
Michael Wood <[EMAIL PROTECTED]>
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of &q
then make sure your
client is configured not to work if it doesn't have the server's
key already.
This doesn't work when you want to connect to some arbitrary
"secure" web site, though.
--
Michael Wood
<[EMAIL PROTECTED]>
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Unless you are actually using NFS, uninstall all NFS related
stuff.
If you are using NFS, make sure your machine is up to date.
--
Michael Wood
<[EMAIL PROTECTED]>
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
a4a5e399a19eb1439e8eb01d7
Description: TTY Snoop - allows you to spy on telnet+serial connections
TTYSnoop allows you to snoop on login tty's through another tty-device or
pseudo-tty. The snoop-tty becomes a 'clone' of the original tty,
redirecting both input and output from/
t possible without modifying
the source, you should use ipchains/iptables to restrict access
to the port it uses.
I hope this helps.
--
Michael Wood <[EMAIL PROTECTED]>
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Sat, Dec 08, 2001 at 08:09:50PM +0100, Guido Hennecke wrote:
> At 08.12.2001, Michael Wood wrote:
> > On Sat, Dec 08, 2001 at 07:40:06PM +1000, [EMAIL PROTECTED] wrote:
> [...]
> > > So my question is:
> > > Is there some way to make certain daemons, (say post
ly one interface?" where this was discussed.
Someone (can't remember his name) pointed out that the above is
insufficient.
--
Michael Wood <[EMAIL PROTECTED]>
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
iggling the locks and trying all the windows to
> find a weakness or a kink in the armour so that they could get
> inside to either do "bad things" like use the house or allow others to
> come by and party... Her response: "Thats illegal, how come if
> someone try's
ccording to your packet capture.
Is your machine connected to the 'net via DSL or cable or
something?
--
Michael Wood <[EMAIL PROTECTED]>
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
our zone files or config file (except for the secondary zones.)
Of course, they may still be able to make the DNS server serve
incorrect information, but at least it's another hurdle for them
to jump over.
--
Michael Wood <[EMAIL PROTECTED]>
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
; import crypt
>>> saltchars = string.uppercase + string.lowercase + string.digits + "./"
>>> s = []
>>> for i in range(8):
... s.append(random.choice(saltchars))
...
>>> salt = "$1$" + string.join(s, "")
>>> passwd =
x27;s chrooted.
> 2) copying it to /chroot/named/etc/bind
i.e. /chroot/named/etc/bind is a directory containing the file
rndc.key?
This should work. What do the logs look like now?
> 3) using symbolic links from the chroot jail to /etc/bind
This won't work for the same reason as 1.
then make sure your
client is configured not to work if it doesn't have the server's
key already.
This doesn't work when you want to connect to some arbitrary
"secure" web site, though.
--
Michael Wood
<[EMAIL PROTECTED]>
Unless you are actually using NFS, uninstall all NFS related
stuff.
If you are using NFS, make sure your machine is up to date.
--
Michael Wood
<[EMAIL PROTECTED]>
a4a5e399a19eb1439e8eb01d7
Description: TTY Snoop - allows you to spy on telnet+serial connections
TTYSnoop allows you to snoop on login tty's through another tty-device or
pseudo-tty. The snoop-tty becomes a 'clone' of the original tty,
redirecting both input and output from/to it.
:)
--
Michael Wood <[EMAIL PROTECTED]>
t possible without modifying
the source, you should use ipchains/iptables to restrict access
to the port it uses.
I hope this helps.
--
Michael Wood <[EMAIL PROTECTED]>
On Sat, Dec 08, 2001 at 08:09:50PM +0100, Guido Hennecke wrote:
> At 08.12.2001, Michael Wood wrote:
> > On Sat, Dec 08, 2001 at 07:40:06PM +1000, [EMAIL PROTECTED] wrote:
> [...]
> > > So my question is:
> > > Is there some way to make certain daemons, (say post
ly one interface?" where this was discussed.
Someone (can't remember his name) pointed out that the above is
insufficient.
--
Michael Wood <[EMAIL PROTECTED]>
iggling the locks and trying all the windows to
> find a weakness or a kink in the armour so that they could get
> inside to either do "bad things" like use the house or allow others to
> come by and party... Her response: "Thats illegal, how come if
> someone try's to get into your computer, they aren't arrested.".
> Hmmm... Mom has a good point.
>
> I think the bottom line is that we'll never have 100% security until
> there are laws that protect the break-in's and hacking that occurs.
> Still laws... not crappy little wrist slapping type laws.
>
>
>
> > --
> > To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> > with a subject of "unsubscribe". Trouble? Contact
> [EMAIL PROTECTED]
> >
> >
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
--
Michael Wood <[EMAIL PROTECTED]>
ccording to your packet capture.
Is your machine connected to the 'net via DSL or cable or
something?
--
Michael Wood <[EMAIL PROTECTED]>
zone files or config file (except for the secondary zones.)
Of course, they may still be able to make the DNS server serve
incorrect information, but at least it's another hurdle for them
to jump over.
--
Michael Wood <[EMAIL PROTECTED]>
; import crypt
>>> saltchars = string.uppercase + string.lowercase + string.digits + "./"
>>> s = []
>>> for i in range(8):
... s.append(random.choice(saltchars))
...
>>> salt = "$1$" + string.join(s, "")
>>> passwd = "Password"
>>> print crypt.crypt(passwd, salt)
$1$e6TSyRDd$OcJO4kuY0I/mLED6n.tNi1
--
Michael Wood <[EMAIL PROTECTED]>
x27;s chrooted.
> 2) copying it to /chroot/named/etc/bind
i.e. /chroot/named/etc/bind is a directory containing the file
rndc.key?
This should work. What do the logs look like now?
> 3) using symbolic links from the chroot jail to /etc/bind
This won't work for the same reason as 1.
--
Michael Wood <[EMAIL PROTECTED]>
24 matches
Mail list logo