ed for the "best". IMHO best means good security for the
amount of effort it takes to set up, plus stable, reliable, well documented,
etc. Some of the other options probably meet those criteria, but I wouldn't
know, not having looked at them. All I can do is say that I'm happy
7;t belong
on deb-sec. Further discussion about politics, rather than specifically
about selinux, should probably happen on a newgroup like alt.impeach.bush,
for example.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , s.ca)
"The gods confound the man who first found o
ep on trying to merge the two patches
> together.
Luckily, that's a solved problem. Con Kolivas's -ck3 patch for 2.4.21
includes grsecurity and XFS. (I didn't mention it before because I didn't
realize it was significant. (I'm not using ACLs).) Con's webpage is
http://me
0.0 0.0 00 ?RW Jul02 0:08 [kswapd]
(I don't use my machine constantly, so it probably doesn't swap as much as
a desktop used all day.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , s.ca)
"The gods confound the man who first found out how to di
.222.*. (It
listens on ipv6, so v4 connections are seen as coming from v4-mapped
addresses.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , s.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a
the real world, to back up the extreme
paranoia in the virtual world.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , s.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and
(I'm replying to the list, hope you don't mind.)
On Thu, Jul 10, 2003 at 01:52:13PM +0200, Christian Kurz wrote:
> On [09/07/03 16:12], Peter Cordes wrote:
> > On Mon, Jul 07, 2003 at 07:38:17PM +0200, Fran?ois TOURDE wrote:
> > > Le 12240i?me jour apr?s Epoch,
&
http://www.muppetlabs.com/~breadbox/software/tiny/teensy.html
http://developers.slashdot.org/article.pl?sid=02/10/19/1233250
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , s.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound h
hich entails some complications that a noexec /tmp
wouldn't) for clues:
http://lists.debian.org/debian-devel/2001/debian-devel-200111/msg00212.html
Happy hacking,
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , s.ca)
"The gods confound the man who first found out
On Sun, Jul 13, 2003 at 01:33:52AM -0400, Noah L. Meyerhans wrote:
> On Sat, Jul 12, 2003 at 11:43:02PM -0300, Peter Cordes wrote:
> > This is at least the third time this has come up that I remember. However,
> > absolute statements like *can not* get me thinking: Is there any
mount flag, or integrating with
TPE would make it easier to get started with. Otherwise, you'd have to make
sure all libraries on the system were chmod +x, and check every new software
package you installed.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , s.ca)
&
ce files that
don't contain machine code wouldn't need to be mapped with PROT_EXEC. In
fact, I straced perl, and it uses read(2) instead of mmap(2) to load the
code. Unless grsec is really clever, perl programs would still work, by
running /usr/bin/perl /tmp/foo.pl, as long as you can re
If you really don't care about security, you can
just install rlogin. I always use ssh even on my trusted LAN at home
(except for big file transfers) because one tool for everything is easier.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , des.ca)
"The gods confound
the IP address for those did
not receive id connections inside your site, or does it belong to an ISP
somewhere, or what? If it's a local address, and not a computer lab, that
might give you some clues about whose door to knock on...
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL
made, so it
didn't even get to the point of trying to authenticate with xauth.
BTW, ssh -X sets up xauth correctly.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , des.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, t
com
kjlasjlasdf.com A 64.94.110.11
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , des.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly
indicate the quality of the package, like not-working, alpha, beta, or
stable.
Err, I'm probably not the first person to have said the above, probably
just the first to clutter up deb-sec with it, so I suppose I should really
go search the deb-devel archives to see if anyone has any plans ab
t; init.d/dhttpd file name.
>
> What is so difficult? No web server is installed by default. If you don't
> want one, don't install one.
Dependencies. I've had the same annoying experience as Dale.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , des.ca)
http://security.debian.org woody/updates/main Packages
> 1:3.4p1-1 0
> 500 http://http.us.debian.org woody/main Packages
>
> We can see the differences. But how to change it ?
Try apt-get install ssh/stable. That should force a downgrade to the
stable version.
--
.hrz.uni-bielefeld.de A 129.70.4.66
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , des.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly in
g like this? (I never use dselect)
Is that what dpkg --forget-old-unavail is for? Maybe --clear-avail?
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , des.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this p
dmins do. If a
particular system would really benefit from it, the admin probably just
needs to see the idea mentioned, not see a big list of effects on systems in
general.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , des.ca)
"The gods confound the man who first found ou
ked ttys. (Maybe you could stty raw < /dev/pts/x,
from another session, type your password, and then stty cooked < /dev/pts/x.)
> but there shouldn't be any limits on the input to the hash
> function whose output is stored in the shadow file.[0]
--
#define X(x,y) x##y
Peter Cor
Anyway, it seems to work, and packages only get downloaded once. I know
that apt does enough locking that NFS sharing /var/cache/apt is safe.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , des.ca)
"The gods confound the man who first found out how to distinguish the hours
.old, if
any. There won't be one if you only have one kernel-image package
installed (and you haven't manually changed the symlinks). lilo skips
entries that are marked as optional when the kernel file isn't there.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTE
vice.
However, if the underlying filesystem preserves data ordering, it can
satisfy the requirements of the journaling filesystem that's on top of it.
I'm not sure if you need data=journal on the underlying filesystem for
data=journal on the loopback filesystem to make sense, but I don
on.
(ext3 is fine, but you need to patch reiserfs for ordered data.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , des.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and
ou
wouldn't have to worry about crap like that. :)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , des.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so
at's correct, you can't just use chpasswd.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , des.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day
ngs won't help. (Debian's package scripts
usually leave the /boot symlinks broken when I remove a kernel package, even
if it was totally obsolete and the links weren't pointing to any files from
that package...) Your best bet is to look at the symlinks yourself, and get
them pointing to
gging in entirely, I might see if I can get something to use
iptables to block that IP for 15minutes after seeing that sequence, since
it's a perfect signal that it's a bogus attack, and that it will try a bunch
of logins right away, then never come back.
Has anyone logged the passwords these
to be a
limit, but as you point out, busybox might have one.
> In any case, using the while loop will pipeline the operations so you get
> full benefit from multitasking.
Yeah, that's an elegant idiom. I'll have to remember to use it in the
future. :)
--
#define X(x,y) x##y
Peter
; My knowledge of the function of this router is rudimentary.
Better leave the firewall up, then.
--
#define X(x,y) x##y
DUPS Secretary ; http://is2.dal.ca/~dups/
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , dal.ca)
"The gods confound the man who first found out how to distinguish
script.)
[ $make-x = yes ] && mkdir --mode=1777 .X11-unix
[ $make-esd = yes ] && mkdir --mode=1777 .esd
--
#define X(x,y) x##y
DUPS Secretary ; http://is2.dal.ca/~dups/
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , dal.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
On Wed, Feb 16, 2000 at 09:33:57AM +1100, Brian May wrote:
> >>>>> "Peter" == Peter Cordes <[EMAIL PROTECTED]> writes:
>
> Peter> Oh... even better idea: bootmisc.sh could check for the
> Peter> existence of /tmp/.X11-unix before cleaning
ense when you are protecting a bunch of machines,
especially ones which you don't run directly, but for a machine filtering
traffic for only itself, it seems like a waste.
Thanks,
--
#define X(x,y) x##y
DUPS Secretary ; http://is2.dal.ca/~dups/
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , d
en one tries to ident the other one,
you've got a packet storm brewing.
--
#define X(x,y) x##y
DUPS Secretary ; http://is2.dal.ca/~dups/
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , dal.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, w
On Thu, Mar 16, 2000 at 02:19:53PM -0800, Brian Kimball wrote:
> Peter Cordes wrote:
>
> > This isn't specific to identd, but I'm wondering why you would bother
> > filtering the port instead of just not running identd? (I assume you would
> > have/do turn off
t to know why the root password is getting accidentally changed
every now and then! That sounds _really_ bad!! Shouldn't you be finding
out why it's changing? Or do your cat sometimes fall across your keyboard
in such a way that it sets a new password for you?
--
#define X(x,y) x##y
DUPS
ngs :( )
--
#define X(x,y) x##y
DUPS Secretary ; http://is2.dal.ca/~dups/
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , dal.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
u to run a server
within a server; this is occasionally useful for testing new window managers
and other X clients.
.
Xnest relies upon its parent X server for font services.
--
#define X(x,y) x##y
DUPS Secretary ; http://is2.dal.ca/~dups/
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , dal.c
X(x,y) x##y
DUPS Secretary ; http://is2.dal.ca/~dups/
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , dal.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
that on every box you want to use
might make you a bit unpopular!) Using one-time passwords in combination
with ssh would make a crackers job a lot harder, though.
--
#define X(x,y) x##y
DUPS Secretary ; http://is2.dal.ca/~dups/
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , dal.ca)
"The gods
indicating that it was the process trying to make
an
ident request. (you can turn off this behaviour). I didn't think
closed ports normally generated ICMP traffic, but I don't know. Go look it
up in an RFC if it bugs you.
--
#define X(x,y) x##y
DUPS Secretary ; http://is2.dal.ca/~dup
ions, please?
look up --syn in ipchains(8). TCP connections are initiated with a SYN
packet, so allowing any ! --syn packet allows any established connections
through.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first fou
ou wouldn't find any changed, which would mean a _very_
sophisticated cracker, or you would find every file she changed. (the
chance of one changed file randomly staying unchanged is 1/(2^128))
Happy hacking :)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
the way to address collection.
>
I think the idea is that the general public might want to see what the
intelligent people on the mailing list have to say. There is a lot of good
info on solving specific problems that can be found in mailing list
archives.
--
#define X(x,y) x##y
Pete
ng a little overboard here... ;)
Heck no, wire the MGs to CTRL+ALT+Delete, and to the reset button. The
level of security gained far outweighs the tiny number of casualties from
Linux actually hanging and needing a reboot :)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.c
f the disk
reserved, so you could fill it to that point (or as far as your quota
allowed) and wait for normal log activity to fill the rest of the disk.
> --
> Ethan Benson
> http://www.alaska.net/~erbenson/
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
&q
MP is a protocol on the level of UDP or TCP. It is sent inside IP.
Thus, a source routed ICMP packet _is_ a source routed IP packet.
Obviously, the answer to your question is that it will apply.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confou
files (sockets in this case) that have a port number of 1026.
It also tells you what PID and command own the file. This is what you
really want to know. Let us know what program is actually listening here.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The g
On Sat, Oct 21, 2000 at 03:09:20AM -0300, Peter Cordes wrote:
> On Thu, Oct 19, 2000 at 05:32:47PM +, Jim Breton wrote:
> > On Thu, Oct 19, 2000 at 11:55:55AM +0100, Sergio Brandano wrote:
> > > -- Description of Bug
> > > GNOME-SESSION makes available the "nt
s
for holes.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
It is supposedly documented in an RFC about
NMB. Microsoft doesn't adhere to that standard, so the challenge is that
the protocol is really convoluted and hard to deal with, not that there are
any legal obstacles.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
, and just want to protect them from themselves, more or less,
restricted shell is the way to go.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up
#x27;t any security critical things
(except for local-user stuff, which I don't bust my butt about since the
only people who have accounts are my family, and they have physical access
anyway. (err, also there's the fact that I trust them:) )
Happy hacking.
--
#define X(x,y) x##y
Peter
sr/bin/xpdf
I notice that this list includes dpkg! Somebody should have a look...
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, t
On Thu, Nov 23, 2000 at 05:50:06PM -0500, Daniel Burrows wrote:
> On Thu, Nov 23, 2000 at 06:35:54PM -0400, Peter Cordes <[EMAIL PROTECTED]>
> was heard to say:
> > > ghostscript uses temporary files to do some of its work. Unfortunately
> > > the method used to cr
on ls are to make it not do anything more than verify
existence. (it uses lstat). I use \ls so bash doesn't alias expand it.
(I think my system was trying to tell me something, since one of the missing
files is /sbin/hdparm itself :)
Happy hacking,
--
#define X(x,y) x##y
Peter Cordes ; e-m
x27;s a good idea. It wouldn't eliminate the work, but
would make lessen it.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
t log message formats,
which is probably a good thing.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so
n in
October 1995. MD5 isn't looking as secure as it used to.
I think a signed database of stuff that's supposed to be in Debian, and a
decent way to make a bootable CD that downloads what it needs, and checks
what's on your drive, is a good start. If the MD5 sum lists are sign
why you run the checker from a known-good floppy or CD. The bogus
kernel can't protect itself if it isn't running :)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
On Fri, Dec 22, 2000 at 11:05:32PM -0900, Ethan Benson wrote:
> On Fri, Dec 22, 2000 at 05:54:55PM -0400, Peter Cordes wrote:
> >
> > That's why you run the checker from a known-good floppy or CD. The bogus
> > kernel can't protect itself if it isn't runn
nk this was due to an an honest mistake on your part,
since most people spend their time getting other stuff done, instead of
learning about crypto.
(If I screwed up any facts in the above, somebody please correct me. If I
didn't, then I don't think there is anything more to flame anyo
ble
> for the resulting DoS.
>
> But I should not be responsible if I scan someone who's system is so flaky
> that it can't take the scan.
I think the only time you can ever be in the wrong when port scanning
is when you are actively trying to cause damage, by DoS or otherwis
On Sun, Jan 14, 2001 at 04:22:48AM -0400, Peter Cordes wrote:
> On Sat, Jan 13, 2001 at 08:25:00PM -0600, Jordan Bettis wrote:
> > [snippage]
> > > revisions of MacOS 9. The moral of the story? Be careful who you scan,
> > > they
> > > may care, and be
mba listen on 0.0.0.0, instead of just the
internal IPs.) I'm not too concerned about attacks, since I'm not running
anything very complicated. I check on my log messages every now and then,
though :)
BTW, I did think twice before admitting the above on a public list, but
I'll ta
-
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
d to do it by hand. Also, the default config files for almost
all packages have been set up so that they work well with the rest of the
Debian system, instead of just leaving them as they were in the source
tarball (which usually means you need to change them to get them to work, or
to get them
from ever reaching the
spoofed host. However, another way to accomplish the blocking is to DoS the
spoofed host.
I don't remember where I read this, either in an RFC, or in the book
"Practical Unix and Internet Security".
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROT
r email address?)
The best practice is to notify a human of the situation, so they can do
something intelligent :)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too,
A news
story that said, "... your email is insecure ... run this to make it better
http://debian.org/ :)", might get some people using non-outlook, esp if the
URI was for a decent windoze email client instead of a whole new OS :) (I've
never checked email from 'doze in my lif
separate packages, e.g. xntp ->
ntpdate, ntp or the netkit split. dist-upgrade will do everything it can to
upgrade as much as possible, but it does make sure nothing has broken
dependencies once it's all done.)
BTW, before the upgrade would be a good time to backup the whole system :
27;t have to do anything. If you
build it into the kernel proper, you still don't have to do anything :)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in th
ut
investing some of your time to learn the system and keep up with security
announcements. (choosing a system which has good security announcements is
obviously important, or you might not hear about problems until it's too late.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PR
oody machine?
I installed ssh 2.3.0p1-1.11 from unstable on my woody machines at home.
It works great.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in th
allow execution of arbitrary CGI programs, the CGI program
could do anything, including start a shell listening on a TCP port, or even
sshd, for someone to connect to. Allowing arbitrary CGI is equivalent to
giving public shell access.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PRO
ntly installed CGI scripts.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
get everything.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
s while you
aren't doing anything with the network. See if your card is generating
interrupts when there is network traffic that isn't to or from you (and
isn't broadcast.) If it is, then the hardware is in promiscuous mode.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PRO
ldn't be punished unless it causes a DoS or something.
If you feel otherwise, you might want to show the logs you have to the
scanner's ISP, with timestamp, so they can figure out who had that IP at
that time. I think that would be going to more trouble than it's worth,
thoug
s/proc.txt, in the kernel source tree.) Read
/etc/init.d/networking to see what gets set up when you config networking.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, w
symmetric
routing setups, where packets do come in on a different interface from the
one replies will be sent on, so you have to do it manually with ipchains for
that case. Otherwise, you don't even need to compile ipchains into the
kernel for rp_filter to work.)
--
#define X(x,y) x##y
n the code. You would have to write and tweak
some code to work around TCP's retransmission algorithm, since retransmitted
packets are useless to you because of the unknown extra delay.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who fir
On Mon, Mar 12, 2001 at 06:36:25PM +, Jim Breton wrote:
> On Mon, Mar 12, 2001 at 02:31:57PM -0400, Peter Cordes wrote:
> > Doesn't rp_filter do this, or am I missing something? It should make the
> > kernel drop packets coming in on interfaces they shouldn't be,
27;t start a connection. exim is
listening on *:25, (i.e. INADDR_ANY, not the interface addresses).
nc 10.0.0.1 25 connects to exim normally.
It's not so easy to check what happens if you send a packet with a
destination in 127.0.0.0/8, but I'd be surprised if it was accepted.
--
#d
oot and arp -s it
> to point to llama?
Here's why:
bigfoot:~# ifconfig lo down
bigfoot:~# arp
Address HWtype HWaddress Flags Mask Iface
llamaether 00:00:92:96:51:C0 C eth0
bigfoot:~# arp -s 127.0.0.1 00:00:92:96:51:C0
SIOCSARP: I
On Wed, Mar 14, 2001 at 12:14:07AM +0100, Carel Fellinger wrote:
> On Mon, Mar 12, 2001 at 10:14:17PM -0400, Peter Cordes wrote:
> > I decided to check this out,
>
> For now I guess you wanted to check that Linux *does* filter on packet
> *destinations* , but I can't fo
;t be. (ssh
won't let people talk to FTP or SMTP servers, though, unlike telnet. This
is a good thing.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
s obsolete.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
t;
> I'd say the malformed packet _is_ the wicked event.
Right. See http://www.scyld.com/network/ethercard.html.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too
-apt is pretty good. Also, aptitude is even more powerful than
dselect (most of the time).
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a su
ling list, and I get
updates from it. Is it not working or something?
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut an
tching to make sure it was
doing a "real" check.
You can't use a possibly-cracked machine to check itself, unless you are
checking for breakins on non-root accounts. (e.g. web page defacement if
they got in through httpd.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PR
orlds computers and a
lot of time.)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
always funny when people leave their
opinions in their software.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and ha
as you said, you need to use the equiv. of -P. I
fired up putty on my machine, and there doesn't look like an option to do
that. I guess you'll have to download the source and recompile. All hail
Free software :-)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED]
in and put klogd back where it belongs :-)
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wr
101 - 200 of 403 matches
Mail list logo