Re: Web-page based proxy service [signed]

2005-01-15 Thread MB [c]
Peter Clark wrote: On Friday 14 January 2005 19:59, MB [c] wrote: You should be able to do this with a JSP. You should also be able to get SSL pages as well. I don't have an example handy, but this is not a trivial task. If there has not been answer from someone else, I'll try to get you

Re: Web-page based proxy service [signed]

2005-01-14 Thread MB [c]
Peter Clark wrote: I would like to provide a proxy service that can be used only by accessing a web page. In other words, I don't want users to enter proxy details in their browser settings, but rather, if they want to go through a proxy, they can visit a webpage, enter a URL in a form, and

Re: restricting sftp/ssh login access

2004-06-28 Thread MB
Hi, It sounds to me like you are looking for a chroot jail for some users. apt-get install jailer ( jailer - Builds and maintains chrooted environments ) You will need to run a special daemon (jk_socketd) to log users into the jail, but that is about the hardest part. I'll post my startup

Re: restricting sftp/ssh login access

2004-06-28 Thread MB
John, First off, I make a small mistake, the package I used was jailkit, from either: http://www.gnu.org/directory/All_Packages_in_Directory/jailkit.html or http://freshmeat.net/projects/jailkit/ It has tons of documentation to help you create a jailed environment, including loading your jail

Re: restricting sftp/ssh login access

2004-06-28 Thread MB
John, Looks like there is a debian package created for jailkit now: http://olivier.sessink.nl/jailkit/jailkit_0.9-1_i386.deb md5 sums for these packages: de67f1dbf6cec002290fe4faadf53821 jailkit_0.9-1_i386.deb Mark --- MB [EMAIL PROTECTED] wrote: John, First off, I make a small mistake

RE: restricting sftp/ssh login access

2004-06-28 Thread MB
/libcrypto.so.0.9.7 ./usr/lib/libz.so.1 ./usr/lib/rssh ./usr/lib/rssh/rssh_chroot_helper ./usr/lib/sftp-server -Original Message- From: Robert Cates [mailto:[EMAIL PROTECTED] Sent: Monday, June 28, 2004 11:54 AM To: [EMAIL PROTECTED] Cc: Andreas John; MB; [EMAIL PROTECTED

Re: nat ipchains on debian woody

2004-06-28 Thread MB
Have you tried iptables instead? If your kernel supports iptables, then: echo 1 /proc/sys/net/ipv4/ip_forward echo 1 /proc/sys/net/ipv4/conf/$both_eth_devs/rp_filter iptables -t nat -I POSTROUTING -s 192.168.0.0/24 -i eth1 -o eth0 -j MASQUERADE iptables also does the firewalling in other

Re: nat ipchains on debian woody

2004-06-28 Thread MB
Christoph, You are right. Looks like he should also modprobe or insmod iptables and many other modules. I insmod a whole list of routing modules: ipt_REDIRECT ipt_MASQUERADE iptable_mangle iptable_nat ipt_REJECT iptable_filter

Re: restricting sftp/ssh login access

2004-06-28 Thread MB
John, First off, I make a small mistake, the package I used was jailkit, from either: http://www.gnu.org/directory/All_Packages_in_Directory/jailkit.html or http://freshmeat.net/projects/jailkit/ It has tons of documentation to help you create a jailed environment, including loading your jail

Re: restricting sftp/ssh login access

2004-06-28 Thread MB
John, Looks like there is a debian package created for jailkit now: http://olivier.sessink.nl/jailkit/jailkit_0.9-1_i386.deb md5 sums for these packages: de67f1dbf6cec002290fe4faadf53821 jailkit_0.9-1_i386.deb Mark --- MB [EMAIL PROTECTED] wrote: John, First off, I make a small mistake

RE: restricting sftp/ssh login access

2004-06-28 Thread MB
/libcrypto.so.0.9.7 ./usr/lib/libz.so.1 ./usr/lib/rssh ./usr/lib/rssh/rssh_chroot_helper ./usr/lib/sftp-server -Original Message- From: Robert Cates [mailto:[EMAIL PROTECTED] Sent: Monday, June 28, 2004 11:54 AM To: debian-isp@lists.debian.org Cc: Andreas John; MB; [EMAIL

Re: nat ipchains on debian woody

2004-06-28 Thread MB
Christoph, You are right. Looks like he should also modprobe or insmod iptables and many other modules. I insmod a whole list of routing modules: ipt_REDIRECT ipt_MASQUERADE iptable_mangle iptable_nat ipt_REJECT iptable_filter

Re: Eth*'s and they corresponding hardwares

2004-05-04 Thread MB
How does that work when he/she has got 3 of the same model nic? Somehow you should be able to reference each card (MAC) with a specific setup. With pcmcia cards you can specify a config for each MAC address. Much like my wireless setup: # Lucent Wavelan IEEE (+ Orinoco, RoamAbout and ELSA) #

Re: restricting shell accounts

2004-05-03 Thread MB
I use a chroot jail for this. apt-cache search jail jailer - Builds and maintains chrooted environments jailtool - Tool to build chroot-jails for daemons Jailer walks you through a setup, and explains how to add 'ssh', 'bash', etc into the jailed environment. Mark --- Jody Grafals [EMAIL

Re: /etc/sudoers precedence question

2004-02-21 Thread MB
Dan, Are you running the update command using the full path? /usr/cs/2002/omacneil/sbin/update Your sudo file allows running the above command only with no password. Also you should note that a sudo file like this allows for you to get a root shell via sudo bash, which may or may not be

Re: /etc/sudoers precedence question

2004-02-21 Thread MB
Ok, I got things to work if I used my FQDN: omacneil www.yourserver.com = NOPASSWD: /usr/cs/2002/omacneil/sbin/update Mark MB wrote: Looks like I forgot to test my answer. It does not seem that you can use localhost as a hostname in omacneil localhost=NOPASSWD: /usr/cs/2002