On Sat, Apr 27, 2002 at 03:32:45AM +0200, martin f krafft wrote:
also sprach Dan Faerch [EMAIL PROTECTED] [2002.04.26.1955 +0200]:
Second more, if your users are allowed to have pages on the same
address as the login system, the browser can, without much effort,
be tricked into giving away
Steve Mickeler wrote:
Trust not in switches.
They too can be easily manipulated unless you have locked them down at a
mac address and port level.
'apt-get install dsniff' ; 'man arpspoof'
Of course, which is one of the things I had in mind when I said:
topology. Switches tend not to
hi ya
On Thu, 25 Apr 2002, Marcin Bednarz wrote:
but when i try to connect from 192.168.1.10 and 11 my server is allways
give a message :
ssh_exchange_identification: Connection closed by remote host
i just ran into that same silly exact message
turns out in our case... that the
Does the connection tracking hold the connections even if the
firewall
was flushed?
If it is so, is it a bug or a feature?
did you by chance forget to flush all tables and just flushed by doing
iptables -F ???
Gr,
Ivo
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of
Gareth Bowker wrote:
If someone's already logged in, and they visit a webpage on the same domain
which asks for a username and password for the same realm as the one used
to
log in, the browser will send the username/password pair without asking the
user for any confirmation.
At least I assume
also sprach Dan Faerch [EMAIL PROTECTED] [2002.04.27.2120 +0200]:
you know their algorithm against MAC table overflow?
No i dont.. I would be very interrested in reading about it, if you know of
a link.. Im sure that it would be possible to enforce some level of
security..
it's quite
On Sat, Apr 27, 2002 at 03:32:45AM +0200, martin f krafft wrote:
also sprach Dan Faerch [EMAIL PROTECTED] [2002.04.26.1955 +0200]:
Second more, if your users are allowed to have pages on the same
address as the login system, the browser can, without much effort,
be tricked into giving away
Steve Mickeler wrote:
Trust not in switches.
They too can be easily manipulated unless you have locked them down at a
mac address and port level.
'apt-get install dsniff' ; 'man arpspoof'
Of course, which is one of the things I had in mind when I said:
topology. Switches tend not to
hi ya
On Thu, 25 Apr 2002, Marcin Bednarz wrote:
but when i try to connect from 192.168.1.10 and 11 my server is allways
give a message :
ssh_exchange_identification: Connection closed by remote host
i just ran into that same silly exact message
turns out in our case... that the
Does the connection tracking hold the connections even if the
firewall
was flushed?
If it is so, is it a bug or a feature?
did you by chance forget to flush all tables and just flushed by doing
iptables -F ???
Gr,
Ivo
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of
also sprach vdongen [EMAIL PROTECTED] [2002.04.27.1812 +0200]:
Does the connection tracking hold the connections even if the
firewall
was flushed?
If it is so, is it a bug or a feature?
did you by chance forget to flush all tables and just flushed by doing
iptables -F ???
i have
Gareth Bowker wrote:
If someone's already logged in, and they visit a webpage on the same domain
which asks for a username and password for the same realm as the one used
to
log in, the browser will send the username/password pair without asking the
user for any confirmation.
At least I assume
also sprach Dan Faerch [EMAIL PROTECTED] [2002.04.27.2120 +0200]:
you know their algorithm against MAC table overflow?
No i dont.. I would be very interrested in reading about it, if you know of
a link.. Im sure that it would be possible to enforce some level of
security..
it's quite simple.
13 matches
Mail list logo