Re: [linux-admin] iptables question

2003-04-06 Terurut Topik Oblek
 Date: Mon, 7 Apr 2003 10:28:42 +0700 (WIT)
 From: Cemplung [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: [linux-admin] iptables question
 
 Hi all,
 
 mohon maaf kalo pernah dibahas di milis ini.
 Saya ada pertanyaan nih, saya melakukan blocking port 3001 spt ini :
 
 #iptables -A INPUT -p tcp --dport 3001 -j REJECT
 
 kemudian saya scan server saya :
 
 3001/tcp   filterednessusd
 
 Kenapa pada port 3001 State-nya disebutkan filtered ? bukankah seharusnya
 closed ?
 mohon pencerahannya ..
 
 tksrgds

iptables, -j REJECT tanpa parameter apapun akan mengirimkan icmp-port-unreachable,
ini biasanya mengindikasikan suatu port itu di 'filter', kalau pingin 'stealthy' 
(closed) gunakan tcp-reset, 
eg. iptables -A INPUT -p tcp --dport 3001 -j REJECT --reject-with tcp-reset
lebih lanjutnya silahkan baca manualnya iptables :)


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [linux-admin] tidak bisa login-SAMBA

2003-04-04 Terurut Topik Oblek
 Date: Sat, 29 Mar 2003 06:34:02 -0500
 From: fade2blac [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: Re: [linux-admin] tidak bisa login-SAMBA

 ralat dikit aj, sebetulnya yang terjadi election itu master browser, yakni siapa
 yang memberi daftar nama komputer saat klien windows klik network
 neighborhood. Jadi nanti akan rebutan siapa yang ngasih daftar. Makanya
 ada local master browser (untuk satu domain), domain master browser
 (untuk beberapa domain NT), backup local master (yang jadi backupnya
 local master browser).
 
 Kalau domain controller, dalam satu domain cuman ada satu. Fungsi
 utamanya lebih ke otentikasi, sedangkan master browser itu feature
 pelangkap dari sebuah domain controller. Dan untuk domain controller
 tidak ada election.

Mau menambahkan saja, tabel dibawah ini menggambarkan OS level + OSnya sekalian
kalau anda install SWAT, sudah _pasti_ buku online O'Reilly Using Samba
ada di harddisk anda :)

Operating SystemValue
Windows NT Server 4.0   33
Windows NT Server 3.51  32
Windows NT Workstation 4.0  17
Windows NT Workstation 3.51 16
Windows 98  2
Windows 95  1
Windows 3.1 for Workgroups  1

tabel diatas diambil dari Bab 5.1 Browsing, disana dijelaskan
bagaimana suatu proses election terjadi.


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: [linux-admin] tidak bisa login-SAMBA

2003-04-04 Terurut Topik Oblek
 Date: Sun, 30 Mar 2003 12:01:03 +0700
 From: Rio [EMAIL PROTECTED]
 Reply-To: [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: RE: [linux-admin] tidak bisa login-SAMBA
 
 coba ganti encrypt password dengan encrypt passwords
 trus .. kembalikan settingan registry seperti semula tanpa
 enabletextplainpassword

setahu saya (CMIIW) parameter 'encrypt password' itu harus
digunakan untuk client Win98 dan WinNT4 SP3


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[linux-admin] The Security Flag in the IPv4 Header

2003-04-03 Terurut Topik Oblek

Network Working GroupS. Bellovin
Request for Comments: 3514ATT Labs Research
Category: Informational 1 April 2003


  The Security Flag in the IPv4 Header

Status of this Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2003).  All Rights Reserved.

Abstract

   Firewalls, packet filters, intrusion detection systems, and the like
   often have difficulty distinguishing between packets that have
   malicious intent and those that are merely unusual.  We define a
   security flag in the IPv4 header as a means of distinguishing the two
   cases.

1. Introduction

   Firewalls [CBR03], packet filters, intrusion detection systems, and
   the like often have difficulty distinguishing between packets that
   have malicious intent and those that are merely unusual.  The problem
   is that making such determinations is hard.  To solve this problem,
   we define a security flag, known as the evil bit, in the IPv4
   [RFC791] header.  Benign packets have this bit set to 0; those that
   are used for an attack will have the bit set to 1.

1.1. Terminology

   The keywords MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD,
   SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL, when they appear in this
   document, are to be interpreted as described in [RFC2119].

2. Syntax

   The high-order bit of the IP fragment offset field is the only unused
   bit in the IP header.  Accordingly, the selection of the bit position
   is not left to IANA.





Bellovin Informational  [Page 1]

RFC 3514  The Security Flag in the IPv4 Header  1 April 2003


   The bit field is laid out as follows:

 0
+-+
|E|
+-+

   Currently-assigned values are defined as follows:

   0x0  If the bit is set to 0, the packet has no evil intent.  Hosts,
network elements, etc., SHOULD assume that the packet is
harmless, and SHOULD NOT take any defensive measures.  (We note
that this part of the spec is already implemented by many common
desktop operating systems.)

   0x1  If the bit is set to 1, the packet has evil intent.  Secure
systems SHOULD try to defend themselves against such packets.
Insecure systems MAY chose to crash, be penetrated, etc.

3. Setting the Evil Bit

   There are a number of ways in which the evil bit may be set.  Attack
   applications may use a suitable API to request that it be set.
   Systems that do not have other mechanisms MUST provide such an API;
   attack programs MUST use it.

   Multi-level insecure operating systems may have special levels for
   attack programs; the evil bit MUST be set by default on packets
   emanating from programs running at such levels.  However, the system
   MAY provide an API to allow it to be cleared for non-malicious
   activity by users who normally engage in attack behavior.

   Fragments that by themselves are dangerous MUST have the evil bit
   set.  If a packet with the evil bit set is fragmented by an
   intermediate router and the fragments themselves are not dangerous,
   the evil bit MUST be cleared in the fragments, and MUST be turned
   back on in the reassembled packet.

   Intermediate systems are sometimes used to launder attack
   connections.  Packets to such systems that are intended to be relayed
   to a target SHOULD have the evil bit set.

   Some applications hand-craft their own packets.  If these packets are
   part of an attack, the application MUST set the evil bit by itself.

   In networks protected by firewalls, it is axiomatic that all
   attackers are on the outside of the firewall.  Therefore, hosts
   inside the firewall MUST NOT set the evil bit on any packets.



Bellovin Informational  [Page 2]

RFC 3514  The Security Flag in the IPv4 Header  1 April 2003


   Because NAT [RFC3022] boxes modify packets, they SHOULD set the evil
   bit on such packets.  Transparent http and email proxies SHOULD set
   the evil bit on their reply packets to the innocent client host.

   Some hosts scan other hosts in a fashion that can alert intrusion
   detection systems.  If the scanning is part of a benign research
   project, the evil bit MUST NOT be set.  If the scanning per se is
   innocent, but the ultimate intent is evil and the destination site
   has such an intrusion detection system, the evil bit SHOULD be set.

4. Processing of the Evil Bit

   Devices such as firewalls MUST drop all inbound packets that have the
   evil bit set.  Packets with the evil bit off MUST NOT be dropped.
   Dropped packets SHOULD be noted in the appropriate MIB variable.

   Intrusion detection 

Re: [linux-admin] Transparan Proxy

2003-04-03 Terurut Topik Oblek
 Date: Mon, 31 Mar 2003 08:55:21 +0700
 From: EDP Dept. [Telkom] [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: [linux-admin] Transparan Proxy
 
 Rekan2 Millist maaf kalo perihal ini sudah di bahas, soalnya sampai 
 sekarang masih belum berhasil aku configure Transparan Proxy. 
 Dan langkah2 yang sudah aku lakukan di antaranya sbb :

mungkin bisa membantu:
http://www.netfilter.org/documentation/FAQ/netfilter-faq-3.html#ss3.12



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



[linux-admin] Lagi cari komputer spesifikasi server

2003-03-24 Terurut Topik Oblek
Halo min2x :)

Perusahaanku di Surabaya bulan ini lagi cari komputer branded 
(lokal maupun luar) bagi yang bisa ngirimin referensi tempat (web)
jualan komputer yang ciamik atau anda sendiri yang punya penawaran
silahkan email balik (japri) ke aku, kalau bisa punya informasi
detil komputer (spesifikasi) silahkan langsung aja ok...

hm, sori kalo OOT (habis bingung mau cari kemana lagi)


pgp0.pgp
Description: PGP signature


Re: [admin] pertannyann ttg filesystem linux

2003-02-10 Terurut Topik Oblek
 Date: Mon, 10 Feb 2003 12:42:20 +0700 (JAVT)
 From: Donny Kurnia [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Message-ID: [EMAIL PROTECTED]
 Subject: Re: [admin] pertannyann ttg filesystem linux
 
 On Fri, 7 Feb 2003, andrew hartono wrote:
 
 Kalo mau lebih lengkap, baca aja buku Operating System-nya Andrew S
 Tanenbaum (Linus Torvald aja abis baca buku ini bikin Linux :D )

Kalau Mas Dony setelah baca buku itu, bikin Donyx ya? :)
Kalau nggak salah source-code Minix disertakan dihalaman belakang kan?
Pernah lihat percek-cokan antara Tanenbaum dengan Torvald mengenai desain kernel
yang bagus? cukup menarik dan historis (panjang banget threadnya)

http://www.dina.dk/~abraham/Linus_vs_Tanenbaum.html

--
Le Seigneur des Anneaux

-- 
Utk berhenti langganan, kirim email ke [EMAIL PROTECTED]
Informasi arsip di http://www.linux.or.id/milis.php3




Re: [admin] Postfix di bloklist

2003-01-19 Terurut Topik Oblek
 Date: Mon, 20 Jan 2003 13:02:56 +0700 (JAVT)
 From: Admin Bingung [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Message-ID: [EMAIL PROTECTED]
 Subject: [admin] Postfix di bloklist
 
 Dear Admin..
 sebagai kelanjutan dari open proxy saya, ternyata postfix saya juga
 menghubungkan diri dengan server yang saya nggak tahu berapa ratus
 jumlahnya. Dan sebab itu server saya telah masuk blocklist beberapa server
 mail sehingga server kami tidak bisa mengirim email ke server tersebut.
 bagaimana nih pemecahannya ?

Halo, 

Mungkin referensi dasar dari postfix bisa buat bacaan anda (cukup mudah
mengingat postfix default tidak membolehkan host anda menjadi
open-relay), hint: cek /etc/postfix/main.cf -- mynetwork_style
http://www.postfix.org/basic.html

Setelah yakin lulus test open relay ;),
silahkan kunjungi website dimana anda menjadi salah satu
blacklist disana, kemungkinan besar mereka mau menghapus komputer anda
dari daftar blacklist...agak sedikit berbelit-belit juga prosedurnya,
tapi mau gimana lagi? :)

--
Le Seigneur des Anneaux

-- 
Utk berhenti langganan, kirim email ke [EMAIL PROTECTED]
Informasi arsip di http://www.linux.or.id/milis.php3




Re: [admin] DNS

2003-01-14 Terurut Topik Oblek
 Reply-To: [EMAIL PROTECTED]
 Message-ID: 001401c2bbd3$252a7bf0$bd2a9aca@server
 From: Rio Martin. [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Date: Tue, 14 Jan 2003 20:45:05 +0700
 X-Mailer: Microsoft Outlook Express 6.00.2600.
 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.
 Subject: Re: [admin] DNS
 
 From: Muhammad Reza [EMAIL PROTECTED]
 Sent: Tuesday, January 14, 2003 2:42 PM
  IMHO...
  daftarin aja IP Public anda di DNS record nameserver 
  domain anda
 
 
 biar lebih mantap .. kayaknya dokumentasi DNS-HOWTO sangat diperlukan.
 
 Regards,
 Rio Martin.

Sekalian promosi, silahkan cek dokumentasi mengenai BIND di
http://lug.stikom.edu/pub/bind9.html

tentunya dokumen diatas bisa dibaca setelah membaca DNS-HOWTO :)

--
Le Seigneur des Anneaux

-- 
Utk berhenti langganan, kirim email ke [EMAIL PROTECTED]
Informasi arsip di http://www.linux.or.id/milis.php3




Re: [admin] Howto

2003-01-14 Terurut Topik Oblek
 Reply-To: [EMAIL PROTECTED]
 Message-ID: 006501c2bc3c$ead236e0$[EMAIL PROTECTED]
 From: Isngadi Nurjaman [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Date: Wed, 15 Jan 2003 09:22:10 +0700
 X-Mailer: Microsoft Outlook Express 6.00.2479.0001
 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2479.0001
 Subject: [admin] Howto
 
 Ada yan tau linknya howto mengenai :
 - tcp_syncookies
 - ip_always_defrag
 -dll

Your very own local kernel sources!
/usr/src/linux/Documentation/networking/ip-sysctl.txt

IP Fragmentation QA
http://www.geocities.com/SiliconValley/Vista/8672/network/ipfrag.html

Rob Thomas, IP Stack Tunning guide
http://www.cymru.com/Documents/ip-stack-tuning.html

Dan J. Bernstein, Syncookies debates
http://cr.yp.to/syncookies.html

--
Le Seigneur des Anneaux

-- 
Utk berhenti langganan, kirim email ke [EMAIL PROTECTED]
Informasi arsip di http://www.linux.or.id/milis.php3