>>If we put a prog to check our systems ( servers ) like portsentry,iplogger
>>or whatever and create a script or program to filter this logs,grab the
>>attackers IP, and auto-generate ipchains rules against the intruder???
>
>Portsentry already does something like this.  You can tell it to drop route
>when it detects a scan and it will add a route from the attacker's IP to a
>valid, unused IP address you specify.  To the attacker, your Linux box
>suddenly disappeared because all his packets hit your server and then go to
>this unused IP (rather than back to the bad guy).  In many contexts this is
>a great idea.  Nothing is all gravy, however, and the postsentry docs quite
>clearly describe the potential for an attacker to use this feature and IP
>spoofing to cause your server to lose contact with other (innocent and
>perhaps vitally important) hosts.  So use with caution.  I don't think
>portsentry will modify ipchains but I could be wrong about that.
Hello Allan!!
Where have you been???
You help me out many times here :)
Thanks for the advice :)

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to