Joachim Schipper wrote:
I also posted this to the snort users list, [EMAIL PROTECTED], but
(sigh) my postings are not making it to the list. Have they changed
their list mailing address? I suppose I shouldn't ask that in this
forum, but if anyone knows the snort mailing list address, and
Bryan Irvine wrote:
I'll top-post because there's a lot of info there that I just don't
know the answers to.
I think you have to use regular snort + snortsam.
What is snortsam? Never mind... Google found it, am reading up on it
now. never heard of it until you mentioned it... this m
Joachim Schipper wrote:
On Tue, Oct 24, 2006 at 03:17:05PM -0700, John Draper wrote:
Hi,
I'm posting this to both OpenBSD and Snort mailing lists.
In reading through the snort documentation, in section 1.5
(Inline mode), they state the following...
"In order for Snort Inli
Hi,
I'm posting this to both OpenBSD and Snort mailing lists.
In reading through the snort documentation, in section 1.5
(Inline mode), they state the following...
"In order for Snort Inline to work properly, Download and compile
the iptables code to include "make install-devel". (http://www,ipt
Will Maier wrote:
On Fri, Sep 22, 2006 at 01:29:56PM -0700, John Draper wrote:
Here is what I did...
htpasswd -c /var/www/conf/auth/passwd edp
< I set the password here >
chown root.nogroup /var/www/conf/auth/passwd
chmod 640 /var/www/conf/auth/passwd
What user/group a
Hi again.
Issue NOT resolved yet... (sigh)
Well - I thought it works, but (sigh) it don't work.
I can get to the site via the URL, and indeed apache asks for the username
and password, but it rejects it, and won't let me on the site
Here is what I did...
htpasswd -c /var/www/conf/auth/p
Jack J. Woehr wrote:
On Sep 21, 2006, at 12:37 PM, John Draper wrote:
usr/local/apache/passwd
I checked - I don't have a "usr" directory in my "www" directory...
Am I supposed
to create one?
Yes, if you use a chroot'ed directory scheme, you just r
Hi,
This finally works... So ignore that last message I first went to
"conf" directory,
created an "auth" directory, and I'm putting it in there.
htpasswd -c /var/www/conf/auth/passwd edp
# Here is where I set the permissions..
chown root.nogroup /var/www/conf/auth/passwd
chmod 640
Jack J. Woehr wrote:
On Sep 20, 2006, at 3:11 PM, John Draper wrote:
According to the Apache docs (I couldn't find anything in the OpenBSD
Site), they
recommend I setup the path to the passwd file in
/usr/local/apache/passwd
Since we're chrooted, how about: /var/www
Spruell, Darren-Perot wrote:
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
I looked in the OpenBSD FAQ and documentation area, and
cannot seem to find out the best place to keep my apache
password files.
According to the Apache docs (I couldn't find anything in
the OpenBSD Site), t
Jack J. Woehr wrote:
On Sep 20, 2006, at 3:11 PM, John Draper wrote:
According to the Apache docs (I couldn't find anything in the OpenBSD
Site), they
recommend I setup the path to the passwd file in
/usr/local/apache/passwd
Since we're chrooted, how about: /var/www
HI,
I looked in the OpenBSD FAQ and documentation area, and cannot seem to
find out
the best place to keep my apache password files.
According to the Apache docs (I couldn't find anything in the OpenBSD
Site), they
recommend I setup the path to the passwd file in
/usr/local/apache/
Mike Spenard wrote:
What are some thoughts on purposely getting a spam trap email
address acquired by spammers and the best way to do so.
It is hard to do initially, unless you want to spend a lot of time
signing up for things over the web... In my case, I have a very
good spam trap. But I
You wrote:
The error message you get "Premature end of script headers" means
that the HTTP header generated by your CGI is not correct. You need
at least to tell the webserver what content type your CGI generates
before sending any further data. For example in a sh script:
#!/bin/sh
echo "Co
Mathieu Sauve-Frankel wrote:
On Sun, Jul 03, 2005 at 03:47:36PM +0200, Federico Giannici wrote:
Is there any SIP software phone working with OpenBSD i386?
I have found none into the ports...
not currently. I've heard of a few people working on some.
I'm currently doing research
Bob Beck wrote:
Changes have been commited to the example syslog.conf in -current
to address this, mainly, stop spewing useless crap to root and the
console.
Normally, I would want it on. But there are times when the output is
annoying, and
I want to shut it off quickly so I can ex
Stuart Henderson wrote:
On 2005/06/18 14:41:10, John Draper wrote:
Quickest way is probably 'pkill syslogd' (or 'kill `cat
/var/run/syslogd.pid`'
if you don't have pkill).
...or just login as a user other than root, and use "sudo" to execute the
comman
Moritz Grimm wrote:
I cannot do that - the box is over 500KM away from me.
Well, okay, but calling the ISP for help in case of DoS is still
something you should do - if the source(s) of the attack come from a
reasonably small portion of the 'net, they can null-route those
networks, giving
Moritz Grimm wrote:
John Draper wrote:
We are getting attacked, but our "root" console is outputting log data
so fast we can't ussue any "root" commands.
What can I do to temporarily stop the console output so I can ussue
a few "root" commands to cha
Hi,
We are getting attacked, but our "root" console is outputting log data
so fast we can't ussue any "root" commands.
What can I do to temporarily stop the console output so I can ussue
a few "root" commands to change our FW settings?
JD
20 matches
Mail list logo