Re: A more secure form of .htaccess?

2002-04-27 Thread martin f krafft
also sprach Dan Faerch <[EMAIL PROTECTED]> [2002.04.27.2120 +0200]:
> > you know their algorithm against MAC table overflow?
> No i dont.. I would be very interrested in reading about it, if you know of
> a link.. Im sure that it would be possible to enforce some level of
> security..

it's quite simple. i don't have a link. but these switches clear out
their MAC tables LRU style at a rate indirectly proportional to the
space left. so if you manage to half the space left by MAC flooding,
they'll clean out the tables twice as fast. if you manage to half the
remaining space, they'll clean out four times as fast. there's very
little chance that a you can fill those tables and make it enter hub
mode.

> It is correct that you can get switches that, one way or another, will try
> to enforce the switching mode and thus, not reentering hub-mode.. Also the
> locking mechanism some switches use, that locks the MAC/IP pair to a single
> port is quite good, but rather annoying to work with in most office
> enviroments (because of laptops and so forth)..

aside from the fact that you can still change you MAC address at
will... but yes, these are good for static environments only, but they
aren't a security measure. `ifconfig eth0 hw ether 00:11:22:33:44:55`
is all i have to say...

switches are *not* a security measure, period.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
  
"one should never trust a woman who tells her real age.
 if she tells that, she'll tell anything."
-- oscar wilde


pgpWiS72NUL0V.pgp
Description: PGP signature


Re: A more secure form of .htaccess?

2002-04-27 Thread martin f krafft

also sprach Dan Faerch <[EMAIL PROTECTED]> [2002.04.27.2120 +0200]:
> > you know their algorithm against MAC table overflow?
> No i dont.. I would be very interrested in reading about it, if you know of
> a link.. Im sure that it would be possible to enforce some level of
> security..

it's quite simple. i don't have a link. but these switches clear out
their MAC tables LRU style at a rate indirectly proportional to the
space left. so if you manage to half the space left by MAC flooding,
they'll clean out the tables twice as fast. if you manage to half the
remaining space, they'll clean out four times as fast. there's very
little chance that a you can fill those tables and make it enter hub
mode.

> It is correct that you can get switches that, one way or another, will try
> to enforce the switching mode and thus, not reentering hub-mode.. Also the
> locking mechanism some switches use, that locks the MAC/IP pair to a single
> port is quite good, but rather annoying to work with in most office
> enviroments (because of laptops and so forth)..

aside from the fact that you can still change you MAC address at
will... but yes, these are good for static environments only, but they
aren't a security measure. `ifconfig eth0 hw ether 00:11:22:33:44:55`
is all i have to say...

switches are *not* a security measure, period.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; net@madduck
  
"one should never trust a woman who tells her real age.
 if she tells that, she'll tell anything."
-- oscar wilde



msg06516/pgp0.pgp
Description: PGP signature


Re: A more secure form of .htaccess?

2002-04-27 Thread Dan Faerch

Gareth Bowker wrote:
>If someone's already logged in, and they visit a webpage on the same domain
>which asks for a username and password for the same realm as the one used
to
>log in, the browser will send the username/password pair without asking the
>user for any confirmation.

>At least I assume that's what Dan meant above and I assume that that would
>happen (I haven't tried it myself).

Yep... Thats what i meant... The browser will retransmit the username and
password with every request while youre roaming the same realm.. All you'd
have to do is make a page identify itself with the same realm-name and then
log the username and password.


Martin wrote (on the subject of switches):
> you know their algorithm against MAC table overflow?
No i dont.. I would be very interrested in reading about it, if you know of
a link.. Im sure that it would be possible to enforce some level of
security..
It is correct that you can get switches that, one way or another, will try
to enforce the switching mode and thus, not reentering hub-mode.. Also the
locking mechanism some switches use, that locks the MAC/IP pair to a single
port is quite good, but rather annoying to work with in most office
enviroments (because of laptops and so forth).. And most
systemadministrators doesnt know how theese are enabled or simply never knew
they existed. Theese security measures are therefore often not enabled or
manually disabled for convenience.

And then there is the matter of the price ;)

- Dan



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: A more secure form of .htaccess?

2002-04-27 Thread Dan Faerch


Gareth Bowker wrote:
>If someone's already logged in, and they visit a webpage on the same domain
>which asks for a username and password for the same realm as the one used
to
>log in, the browser will send the username/password pair without asking the
>user for any confirmation.

>At least I assume that's what Dan meant above and I assume that that would
>happen (I haven't tried it myself).

Yep... Thats what i meant... The browser will retransmit the username and
password with every request while youre roaming the same realm.. All you'd
have to do is make a page identify itself with the same realm-name and then
log the username and password.


Martin wrote (on the subject of switches):
> you know their algorithm against MAC table overflow?
No i dont.. I would be very interrested in reading about it, if you know of
a link.. Im sure that it would be possible to enforce some level of
security..
It is correct that you can get switches that, one way or another, will try
to enforce the switching mode and thus, not reentering hub-mode.. Also the
locking mechanism some switches use, that locks the MAC/IP pair to a single
port is quite good, but rather annoying to work with in most office
enviroments (because of laptops and so forth).. And most
systemadministrators doesnt know how theese are enabled or simply never knew
they existed. Theese security measures are therefore often not enabled or
manually disabled for convenience.

And then there is the matter of the price ;)

- Dan



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: IPtables and Connection Tracking

2002-04-27 Thread martin f krafft
also sprach vdongen <[EMAIL PROTECTED]> [2002.04.27.1812 +0200]:
> > Does the connection tracking hold the connections even if the
> > firewall
> > was flushed?
> > 
> > If it is so, is it a bug or a feature?
> did you by chance forget to flush all tables and just flushed by doing 
> iptables -F ???

i have noticed behaviour like this before. on a machine doing PAT
(masquerading), an /etc/init.d/iptables clear would not disrupt
existing connections. that was kind of astonishing to see... can't say
whether it's a bug or a feature, but it doesn't look very harmful...

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
  
scintillation is not always identification for an auric substance.


pgpt4kKdKpRLO.pgp
Description: PGP signature


Re: IPtables and Connection Tracking

2002-04-27 Thread vdongen
> Does the connection tracking hold the connections even if the
> firewall
> was flushed?
> 
> If it is so, is it a bug or a feature?
did you by chance forget to flush all tables and just flushed by doing 
iptables -F ???

Gr,

Ivo



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: IPtables and Connection Tracking

2002-04-27 Thread martin f krafft

also sprach vdongen <[EMAIL PROTECTED]> [2002.04.27.1812 +0200]:
> > Does the connection tracking hold the connections even if the
> > firewall
> > was flushed?
> > 
> > If it is so, is it a bug or a feature?
> did you by chance forget to flush all tables and just flushed by doing 
> iptables -F ???

i have noticed behaviour like this before. on a machine doing PAT
(masquerading), an /etc/init.d/iptables clear would not disrupt
existing connections. that was kind of astonishing to see... can't say
whether it's a bug or a feature, but it doesn't look very harmful...

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^."<*>"|tr "<*> mailto:"; net@madduck
  
scintillation is not always identification for an auric substance.



msg06514/pgp0.pgp
Description: PGP signature


Re: IPtables and Connection Tracking

2002-04-27 Thread vdongen

> Does the connection tracking hold the connections even if the
> firewall
> was flushed?
> 
> If it is so, is it a bug or a feature?
did you by chance forget to flush all tables and just flushed by doing 
iptables -F ???

Gr,

Ivo



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: connection refuse by tcp_wrapper - error message

2002-04-27 Thread Alvin Oga

hi ya

On Thu, 25 Apr 2002, Marcin Bednarz wrote:

> > but when i try to connect from 192.168.1.10 and 11 my server is allways
> > give a message :
> > ssh_exchange_identification: Connection closed by remote host
 
i just ran into that same silly exact message

turns out in our case... that the ip# listed in /etc/hosts.allow
was wrong ... fixing the iP# allowed us to ssh in as usual

c ya
alvin


> I think that it is SSH problem.
> You probably have option
> (If I correctly remember:)
> StrictHostKeyChecking yes
> 
> Then your ssh client want to have public key of host in directory
> ~/.ssh/known_hosts or known_hosts2  (or sth like that)
> 
> But if you haven't it it reply to you :
> ssh_exchange_identification: Connection closed by remote host
> ^^^   ^^^


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: connection refuse by tcp_wrapper - error message

2002-04-27 Thread Alvin Oga


hi ya

On Thu, 25 Apr 2002, Marcin Bednarz wrote:

> > but when i try to connect from 192.168.1.10 and 11 my server is allways
> > give a message :
> > ssh_exchange_identification: Connection closed by remote host
 
i just ran into that same silly exact message

turns out in our case... that the ip# listed in /etc/hosts.allow
was wrong ... fixing the iP# allowed us to ssh in as usual

c ya
alvin


> I think that it is SSH problem.
> You probably have option
> (If I correctly remember:)
> StrictHostKeyChecking yes
> 
> Then your ssh client want to have public key of host in directory
> ~/.ssh/known_hosts or known_hosts2  (or sth like that)
> 
> But if you haven't it it reply to you :
> ssh_exchange_identification: Connection closed by remote host
> ^^^   ^^^


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: A more secure form of .htaccess?

2002-04-27 Thread Schusselig Brane
Steve Mickeler wrote:
> 
> Trust not in switches.
> 
> They too can be easily manipulated unless you have locked them down at a
> mac address and port level.
> 
> 'apt-get install dsniff' ; 'man arpspoof'

Of course, which is one of the things I had in mind when I said:

> > topology. Switches tend not to allow other nodes on a network to see
   
and:

> > sniffed off the network. That is, of course, if the network was designed
> > with that in mind.


Dan Faerch wrote:
> The subject on switches.. It is a general misunderstanding that switches
> provide security.. There are several easy tricks to make a switch spill its
> guts.. They were designed for performance and no one ever promised security
> :)

Cisco, in fact does promise security when using thier switches. Well,
most of thier switches. But I do agree that they are designed with
security as an other-than-primary goal. However, they can provide a
layer of abstraction, to help prevent sniffing.

wheee.
-Will Wesley, CCNA
"Cheer up! Things are getting worse at a slower rate."


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: A more secure form of .htaccess?

2002-04-27 Thread Gareth Bowker
On Sat, Apr 27, 2002 at 03:32:45AM +0200, martin f krafft wrote:
> also sprach Dan Faerch <[EMAIL PROTECTED]> [2002.04.26.1955 +0200]:
> > Second more, if your users are allowed to have pages on the same
> > address as the login system, the browser can, without much effort,
> > be tricked into giving away your systems username and password to
> > a personal user page...
> 
> how?

Take a look at http://www.php.net/manual/ro/features.http-auth.php

If someone's already logged in, and they visit a webpage on the same domain
which asks for a username and password for the same realm as the one used to
log in, the browser will send the username/password pair without asking the
user for any confirmation.

At least I assume that's what Dan meant above and I assume that that would
happen (I haven't tried it myself).

Gareth


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: A more secure form of .htaccess?

2002-04-27 Thread Schusselig Brane

Steve Mickeler wrote:
> 
> Trust not in switches.
> 
> They too can be easily manipulated unless you have locked them down at a
> mac address and port level.
> 
> 'apt-get install dsniff' ; 'man arpspoof'

Of course, which is one of the things I had in mind when I said:

> > topology. Switches tend not to allow other nodes on a network to see
   
and:

> > sniffed off the network. That is, of course, if the network was designed
> > with that in mind.


Dan Faerch wrote:
> The subject on switches.. It is a general misunderstanding that switches
> provide security.. There are several easy tricks to make a switch spill its
> guts.. They were designed for performance and no one ever promised security
> :)

Cisco, in fact does promise security when using thier switches. Well,
most of thier switches. But I do agree that they are designed with
security as an other-than-primary goal. However, they can provide a
layer of abstraction, to help prevent sniffing.

wheee.
-Will Wesley, CCNA
"Cheer up! Things are getting worse at a slower rate."


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: A more secure form of .htaccess?

2002-04-27 Thread Gareth Bowker

On Sat, Apr 27, 2002 at 03:32:45AM +0200, martin f krafft wrote:
> also sprach Dan Faerch <[EMAIL PROTECTED]> [2002.04.26.1955 +0200]:
> > Second more, if your users are allowed to have pages on the same
> > address as the login system, the browser can, without much effort,
> > be tricked into giving away your systems username and password to
> > a personal user page...
> 
> how?

Take a look at http://www.php.net/manual/ro/features.http-auth.php

If someone's already logged in, and they visit a webpage on the same domain
which asks for a username and password for the same realm as the one used to
log in, the browser will send the username/password pair without asking the
user for any confirmation.

At least I assume that's what Dan meant above and I assume that that would
happen (I haven't tried it myself).

Gareth


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]