Re: is iptables slow?

2001-11-14 Thread Karun
Are you using dns? - Original Message - From: "phadell" <[EMAIL PROTECTED]> To: Sent: Thursday, November 15, 2001 2:44 PM Subject: Re: is iptables slow? > I think I was not so clear. Sorry, but my english is poor. > I'll try to explain better. > > my policy is drop all INPUT, OUTPUT and

Re: is iptables slow?

2001-11-14 Thread phadell
I think I was not so clear. Sorry, but my english is poor. I'll try to explain better. my policy is drop all INPUT, OUTPUT and FORWARD. So, I must to open all the services that I'm using, that are: ssh, ftp, ftp-data, smtp, pop3, http, https In all services, I'm having a long delay if the iptable

netkit ftpd bug ?

2001-11-14 Thread Guillem Jover
Packages: linux-ftpd_0.11-8potato.2, linux-ftpd_0.17-8 since the inclusion of PAM support in this package, when used with "-l*" command line option, syslog(3) uses the facility LOG_AUTH (setup by PAM) instead of LOG_FTP (setup by ftpd and as stated in the man page). i've looked at the code and d

RE: Mentioning Layne one more time

2001-11-14 Thread Antropov Anton
Oops... I am stupid little monkey :) ! > -Original Message- > From: Dmitriy Kropivnitskiy [mailto:[EMAIL PROTECTED] > Sent: Wednesday, November 14, 2001 11:59 PM > To: Antropov Anton; debian-security@lists.debian.org > Subject: Re: Mentioning Layne one more time > > > The name was Gerast

Re: is iptables slow?

2001-11-14 Thread Karun
Are you using dns? - Original Message - From: "phadell" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Thursday, November 15, 2001 2:44 PM Subject: Re: is iptables slow? > I think I was not so clear. Sorry, but my english is poor. > I'll try to explain better. > > my policy is drop a

Re: is iptables slow?

2001-11-14 Thread phadell
I think I was not so clear. Sorry, but my english is poor. I'll try to explain better. my policy is drop all INPUT, OUTPUT and FORWARD. So, I must to open all the services that I'm using, that are: ssh, ftp, ftp-data, smtp, pop3, http, https In all services, I'm having a long delay if the iptabl

RE: Mentioning Layne one more time

2001-11-14 Thread Antropov Anton
Oops... I am stupid little monkey :) ! > -Original Message- > From: Dmitriy Kropivnitskiy [mailto:[EMAIL PROTECTED]] > Sent: Wednesday, November 14, 2001 11:59 PM > To: Antropov Anton; [EMAIL PROTECTED] > Subject: Re: Mentioning Layne one more time > > > The name was Gerastrat :) > > O

RE: Suggestion for debian-security

2001-11-14 Thread Howland, Curtis
I'm glad to hear it. I will forward your message to Debian-Security, where I saw it discussed. Curt- -Original Message- From: Jaakko Niemi [mailto:[EMAIL PROTECTED] Sent: Thursday, November 15, 2001 04:28 To: Howland, Curtis Cc: [EMAIL PROTECTED] Subject: Re: Suggestion for debian-securit

RE: Suggestion for debian-security

2001-11-14 Thread Howland, Curtis
I'm glad to hear it. I will forward your message to Debian-Security, where I saw it discussed. Curt- -Original Message- From: Jaakko Niemi [mailto:[EMAIL PROTECTED]] Sent: Thursday, November 15, 2001 04:28 To: Howland, Curtis Cc: [EMAIL PROTECTED] Subject: Re: Suggestion for debian-securi

Re: is iptables slow?

2001-11-14 Thread Dmitriy Kropivnitskiy
FTP is a funny protocol. Do you use masquarading? Did you use state modules or just opened port 21? You need to have -s RELATED in order to have nice FTP. On Wednesday 14 November 2001 02:33 pm, phadell wrote: > I am having some problems in relation to speed of traffic of packages when > using ip

Re: 'mirror' with iptables

2001-11-14 Thread Tim Haynes
Dmitriy Kropivnitskiy <[EMAIL PROTECTED]> writes: [snip] > > how does this stop the scanner from identifying open ports? > > If you actually drop packets instead of rejecting them your port scanner > will slow down to a crawl, since it has to wait for timeout on every try. Bzzt. Push out lo

Re: 'mirror' with iptables

2001-11-14 Thread Dmitriy Kropivnitskiy
On Wednesday 14 November 2001 08:08 am, thomas lakofski wrote: > On 14 Nov 2001, Tim Haynes wrote: > > If you want to stop port-scans, use a proper firewall with DENY > > (ipchains) or DROP (iptables) by default. > > how does this stop the scanner from identifying open ports? > If you actually dro

Re: is iptables slow?

2001-11-14 Thread Yotam Rubin
On Wed, Nov 14, 2001 at 05:33:28PM -0200, phadell wrote: > I am having some problems in relation to speed of traffic of packages when > using iptables. > > The problem is the following: > > When there is not any iptables? rules, a inner connection through FTP is less > than 1 second long to be

Re: SSH-RSH Conflict

2001-11-14 Thread Vineet Kumar
* Walter D. Sessions ([EMAIL PROTECTED]) [03 09:38]: > Can anyone enlighten me as to why openssh-2.9..(deb package) would have a > conflict > with (rsh-client << 0.16.0)? I can see that other packages might need > rsh-client, but why > would ssh not install unless rsh-client > 0.16? Isn't ssh

is iptables slow?

2001-11-14 Thread phadell
I am having some problems in relation to speed of traffic of packages when using iptables. The problem is the following: When there is not any iptables´ rules, a inner connection through FTP is less than 1 second long to be made. With the rules that I did, a inner connection delay more than 7

Re: Mentioning Layne one more time

2001-11-14 Thread Dmitriy Kropivnitskiy
The name was Gerastrat :) On Wednesday 14 November 2001 02:44 am, Antropov Anton wrote: > Hi, guys! > I would remember one ancient story... > > It's name was Herodot... > > So let Layne to rest on his laurels... > Don't call him in vain... :) > > > -Original Message- > > From: [EMAIL PROTE

Re: is iptables slow?

2001-11-14 Thread Dmitriy Kropivnitskiy
FTP is a funny protocol. Do you use masquarading? Did you use state modules or just opened port 21? You need to have -s RELATED in order to have nice FTP. On Wednesday 14 November 2001 02:33 pm, phadell wrote: > I am having some problems in relation to speed of traffic of packages when > using i

Re: 'mirror' with iptables

2001-11-14 Thread Tim Haynes
Dmitriy Kropivnitskiy <[EMAIL PROTECTED]> writes: [snip] > > how does this stop the scanner from identifying open ports? > > If you actually drop packets instead of rejecting them your port scanner > will slow down to a crawl, since it has to wait for timeout on every try. Bzzt. Push out l

Re: 'mirror' with iptables

2001-11-14 Thread Dmitriy Kropivnitskiy
On Wednesday 14 November 2001 08:08 am, thomas lakofski wrote: > On 14 Nov 2001, Tim Haynes wrote: > > If you want to stop port-scans, use a proper firewall with DENY > > (ipchains) or DROP (iptables) by default. > > how does this stop the scanner from identifying open ports? > If you actually dr

Re: is iptables slow?

2001-11-14 Thread Yotam Rubin
On Wed, Nov 14, 2001 at 05:33:28PM -0200, phadell wrote: > I am having some problems in relation to speed of traffic of packages when > using iptables. > > The problem is the following: > > When there is not any iptables? rules, a inner connection through FTP is less > than 1 second long to be

Re: SSH-RSH Conflict

2001-11-14 Thread Vineet Kumar
* Walter D. Sessions ([EMAIL PROTECTED]) [03 09:38]: > Can anyone enlighten me as to why openssh-2.9..(deb package) would have a conflict > with (rsh-client << 0.16.0)? I can see that other packages might need rsh-client, >but why > would ssh not install unless rsh-client > 0.16? Isn't ssh a

is iptables slow?

2001-11-14 Thread phadell
I am having some problems in relation to speed of traffic of packages when using iptables. The problem is the following: When there is not any iptables´ rules, a inner connection through FTP is less than 1 second long to be made. With the rules that I did, a inner connection delay more than 7

Re: Mentioning Layne one more time

2001-11-14 Thread Dmitriy Kropivnitskiy
The name was Gerastrat :) On Wednesday 14 November 2001 02:44 am, Antropov Anton wrote: > Hi, guys! > I would remember one ancient story... > > It's name was Herodot... > > So let Layne to rest on his laurels... > Don't call him in vain... :) > > > -Original Message- > > From: [EMAIL PROT

Interpreted Network Service?

2001-11-14 Thread Kenneth Pronovici
This might be a bit off topic...if it is, please take replies to me directly. Can anyone tell me if there is any reason, from a security standpoint, that one would not want to write a publicly-available network service in an interpreted language such as Python or Perl? Thanks... KEN -- Kenn

Interpreted Network Service?

2001-11-14 Thread Kenneth Pronovici
This might be a bit off topic...if it is, please take replies to me directly. Can anyone tell me if there is any reason, from a security standpoint, that one would not want to write a publicly-available network service in an interpreted language such as Python or Perl? Thanks... KEN -- Ken

Re: 'mirror' with iptables

2001-11-14 Thread Tim Haynes
thomas lakofski <[EMAIL PROTECTED]> writes: > > I've considered it, to some extent, but in my case I figured it's best > > just to look at snort's logs in a bit more detail before blocking > > things left right & center. > > yes, familiarity with the traffic patterns you get over a few weeks is >

Re: 'mirror' with iptables

2001-11-14 Thread thomas lakofski
On 14 Nov 2001, Tim Haynes wrote: > > that looks pretty practical. have you considered looking at something > > like 'guardian' http://www.chaotic.org/guardian/ to do automated response > > to selected snort rules? > > I've considered it, to some extent, but in my case I figured it's best just > t

Re: 'mirror' with iptables

2001-11-14 Thread Tim Haynes
thomas lakofski <[EMAIL PROTECTED]> writes: [snip how I set up a box] > > It's pretty rarely that I see any abuse that gets as far down the chain > > as to deserve human intervention. > > that looks pretty practical. have you considered looking at something > like 'guardian' http://www.chaotic.or

Re: 'mirror' with iptables

2001-11-14 Thread thomas lakofski
On 14 Nov 2001, Tim Haynes wrote: > Personally, I go for > a) DROP-by-default firewall with stateful filtering in iptables; > b) such ports that are wide open (22, 80, 53/udp... whatever) are still >behind the protection of `INVALID'; > c) such services that listen on the open ports are as sec

Re: 'mirror' with iptables

2001-11-14 Thread Tim Haynes
thomas lakofski <[EMAIL PROTECTED]> writes: [snip, `get a good firewall'] > > > how does this stop the scanner from identifying open ports? > > > > Why is a port open to a scanner's IP#, if not in order to be used? > > good point. what we're trying to do here though is heuristically (or more > si

Re: 'mirror' with iptables

2001-11-14 Thread thomas lakofski
On 14 Nov 2001, Tim Haynes wrote: > thomas lakofski <[EMAIL PROTECTED]> writes: > > [snip] > > snort (as you mention) good for detecting attacks on ports you must > > provide service on -- portsentry is just the one facet but the question > > was in re portscans. > > > > > If you want to stop port

Re: 'mirror' with iptables

2001-11-14 Thread Tim Haynes
thomas lakofski <[EMAIL PROTECTED]> writes: [snip] > snort (as you mention) good for detecting attacks on ports you must > provide service on -- portsentry is just the one facet but the question > was in re portscans. > > > If you want to stop port-scans, use a proper firewall with DENY > > (ipch

Re: 'mirror' with iptables

2001-11-14 Thread thomas lakofski
On 14 Nov 2001, Tim Haynes wrote: > Frying pan: > > If done properly... it's a risk, but one that's assessable. i assess it to be high :) > > if you want to stop portscans maybe portsentry would help you? > > Fire: > > If you use portsentry in dynamic mode, you're open to spoofed IP#s just as >

Re: 2.4.x boot floppies, was: Vulnerable SSH versions

2001-11-14 Thread Ethan Benson
On Wed, Nov 14, 2001 at 12:42:10PM +0100, Goswin Brederlow wrote: > > People with such old hardware are probably better of with bo or hamm > or potato. They probably need the low-mem target too. which are not (or will not in potato's case) be supported with security updates. -- Ethan Benson htt

Re: 'mirror' with iptables

2001-11-14 Thread Tim Haynes
thomas lakofski <[EMAIL PROTECTED]> writes: > On Tue, 13 Nov 2001, phadell wrote: > > > I would like to do a rule that mirror the packets that incoming from a > > portscanner. The rule must return the packets to the source. If anyone > > scan my machine ports, the result will be the list of sourc

Re: 'mirror' with iptables

2001-11-14 Thread thomas lakofski
On Tue, 13 Nov 2001, phadell wrote: > I would like to do a rule that mirror the packets that incoming from a > portscanner. > The rule must return the packets to the source. If anyone scan my machine > ports, the result will be the list of source address open ports. this will enable an attacker

Re: 'mirror' with iptables

2001-11-14 Thread Tim Haynes
thomas lakofski <[EMAIL PROTECTED]> writes: > > I've considered it, to some extent, but in my case I figured it's best > > just to look at snort's logs in a bit more detail before blocking > > things left right & center. > > yes, familiarity with the traffic patterns you get over a few weeks is

Re: 'mirror' with iptables

2001-11-14 Thread thomas lakofski
On 14 Nov 2001, Tim Haynes wrote: > > that looks pretty practical. have you considered looking at something > > like 'guardian' http://www.chaotic.org/guardian/ to do automated response > > to selected snort rules? > > I've considered it, to some extent, but in my case I figured it's best just >

Re: 'mirror' with iptables

2001-11-14 Thread Tim Haynes
thomas lakofski <[EMAIL PROTECTED]> writes: [snip how I set up a box] > > It's pretty rarely that I see any abuse that gets as far down the chain > > as to deserve human intervention. > > that looks pretty practical. have you considered looking at something > like 'guardian' http://www.chaotic.o

Re: 2.4.x boot floppies, was: Vulnerable SSH versions

2001-11-14 Thread Goswin Brederlow
Jørgen Hermanrud Fjeld <[EMAIL PROTECTED]> writes: > Hi. > Although it might sound stupid, my question is: > Will there ever come a time when making 1220 boot floppies with 2.4.x kernel > will be doable? > If I assume that it's the kernel size that makes it difficult, then it > doesn't matter we

Re: 'mirror' with iptables

2001-11-14 Thread thomas lakofski
On 14 Nov 2001, Tim Haynes wrote: > Personally, I go for > a) DROP-by-default firewall with stateful filtering in iptables; > b) such ports that are wide open (22, 80, 53/udp... whatever) are still >behind the protection of `INVALID'; > c) such services that listen on the open ports are as se

Re: 'mirror' with iptables

2001-11-14 Thread Tim Haynes
thomas lakofski <[EMAIL PROTECTED]> writes: [snip, `get a good firewall'] > > > how does this stop the scanner from identifying open ports? > > > > Why is a port open to a scanner's IP#, if not in order to be used? > > good point. what we're trying to do here though is heuristically (or more > s

Re: 'mirror' with iptables

2001-11-14 Thread thomas lakofski
On 14 Nov 2001, Tim Haynes wrote: > thomas lakofski <[EMAIL PROTECTED]> writes: > > [snip] > > snort (as you mention) good for detecting attacks on ports you must > > provide service on -- portsentry is just the one facet but the question > > was in re portscans. > > > > > If you want to stop por

Re: 'mirror' with iptables

2001-11-14 Thread Tim Haynes
thomas lakofski <[EMAIL PROTECTED]> writes: [snip] > snort (as you mention) good for detecting attacks on ports you must > provide service on -- portsentry is just the one facet but the question > was in re portscans. > > > If you want to stop port-scans, use a proper firewall with DENY > > (ipc

Re: 'mirror' with iptables

2001-11-14 Thread thomas lakofski
On 14 Nov 2001, Tim Haynes wrote: > Frying pan: > > If done properly... it's a risk, but one that's assessable. i assess it to be high :) > > if you want to stop portscans maybe portsentry would help you? > > Fire: > > If you use portsentry in dynamic mode, you're open to spoofed IP#s just as >

Re: 2.4.x boot floppies, was: Vulnerable SSH versions

2001-11-14 Thread Ethan Benson
On Wed, Nov 14, 2001 at 12:42:10PM +0100, Goswin Brederlow wrote: > > People with such old hardware are probably better of with bo or hamm > or potato. They probably need the low-mem target too. which are not (or will not in potato's case) be supported with security updates. -- Ethan Benson ht

Re: 'mirror' with iptables

2001-11-14 Thread Tim Haynes
thomas lakofski <[EMAIL PROTECTED]> writes: > On Tue, 13 Nov 2001, phadell wrote: > > > I would like to do a rule that mirror the packets that incoming from a > > portscanner. The rule must return the packets to the source. If anyone > > scan my machine ports, the result will be the list of sour

Re: 'mirror' with iptables

2001-11-14 Thread Eric Veldhuyzen
On Tue, Nov 13, 2001 at 02:06:56AM -0200, phadell wrote: > hello there, > > I would like to do a rule that mirror the packets that incoming from a > portscanner. > The rule must return the packets to the source. If anyone scan my machine > ports, the result will be the list of source address o

2.4.x boot floppies, was: Vulnerable SSH versions

2001-11-14 Thread Jørgen Hermanrud Fjeld
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi. Although it might sound stupid, my question is: Will there ever come a time when making 1220 boot floppies with 2.4.x kernel will be doable? If I assume that it's the kernel size that makes it difficult, then it doesn't matter wether we use boot-

Re: 'mirror' with iptables

2001-11-14 Thread thomas lakofski
On Tue, 13 Nov 2001, phadell wrote: > I would like to do a rule that mirror the packets that incoming from a > portscanner. > The rule must return the packets to the source. If anyone scan my machine > ports, the result will be the list of source address open ports. this will enable an attacker

Re: 2.4.x boot floppies, was: Vulnerable SSH versions

2001-11-14 Thread Goswin Brederlow
Jørgen Hermanrud Fjeld <[EMAIL PROTECTED]> writes: > Hi. > Although it might sound stupid, my question is: > Will there ever come a time when making 1220 boot floppies with 2.4.x kernel > will be doable? > If I assume that it's the kernel size that makes it difficult, then it > doesn't matter w

Re: 'mirror' with iptables

2001-11-14 Thread Eric Veldhuyzen
On Tue, Nov 13, 2001 at 02:06:56AM -0200, phadell wrote: > hello there, > > I would like to do a rule that mirror the packets that incoming from a > portscanner. > The rule must return the packets to the source. If anyone scan my machine > ports, the result will be the list of source address

2.4.x boot floppies, was: Vulnerable SSH versions

2001-11-14 Thread Jørgen Hermanrud Fjeld
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi. Although it might sound stupid, my question is: Will there ever come a time when making 1220 boot floppies with 2.4.x kernel will be doable? If I assume that it's the kernel size that makes it difficult, then it doesn't matter wether we use boot

RE: Mentioning Layne one more time

2001-11-14 Thread Antropov Anton
Hi, guys! I would remember one ancient story... It's name was Herodot... So let Layne to rest on his laurels... Don't call him in vain... :) > -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] Behalf Of Christian Haugan Toldnes > Sent: Wednesday, November 14, 2001

Re: Mentioning Layne one more time

2001-11-14 Thread Christian Haugan Toldnes
Dmitriy Kropivnitskiy <[EMAIL PROTECTED]> writes: > I have just found a residiual page in the google cache. It shows that Layne ( > remember the rude guy from september was subscribed to a whole bunch of mls > most of them debian related ) > http://www.google.com/search?q=cache:SPW2_7zBmf8:justi