-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 638-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
January 13th, 2005
Jan Lühr a écrit :
Do you recommend to use kernel-source-2.4.27 from sid (sarge) instead of
2.4.18 from woody?
On a production server, I would run 2.4, not 2.6. And as Debian security
support seems better now for the 2.4.27 kernel, I would choose it.
It include fixes backported from kernel.org
Greetings,
Am Donnerstag, 13. Januar 2005 10:06 schrieb Christophe Chisogne:
Jan Lühr a écrit :
Do you recommend to use kernel-source-2.4.27 from sid (sarge) instead of
2.4.18 from woody?
On a production server, I would run 2.4, not 2.6.
m2
And as Debian security
support seems better
Hi,
In context of latest problems with kernel, php ...
Lets assume that I am average user who was told that debian is stable, secure,
etc. I read some information and decided to install stable version.Subscribed
myself to debian-security-anounce added proper line to apt.sources and I
Jan Lühr a écrit :
Will kernel-source-2.4.27 be available in days or weeks?
I guess days, since security fixes often means 'priority=high'.
There are people working on it, ex Simon Horman. More infos:
activity on kernel-source-2.4.27-2.4.27 (svn, Debian subversion)
Hi,
Thu, 13 Jan 2005 08:27:57 +0100 (CET), Martin Schulze
[SECURITY] [DSA 637-1] New exim-tls packages fix arbitrary code execution
Package: exim-tls
snip
Philip Hazel announced a buffer overflow in the host_aton function in
exim-tls, the SSL-enabled version of the default
Hello.
I´m new to packet-filtering. As you can imaging starting to use
iptables. Well once I´ve reached my first configuration I want to test
it by asking iptables if a certain type of traffic is going to be
ACCEPTED or not. To do this I make use of the -c option as follows:
iptables -c forward
Incoming from RatÓn:
I´m new to packet-filtering. As you can imaging starting to use
iptables. Well once I´ve reached my first configuration I want to test
it by asking iptables if a certain type of traffic is going to be
ACCEPTED or not. To do this I make use of the -c option as follows:
Incoming from RatÓn:
So it is not ment for iptables testing. How can I test my config then??
Here's how I do it:
iptables -A INPUT -s ! 127.0.0.1/32 -m state --state NEW -j LOG
iptables -A INPUT -s ! 127.0.0.1/32 -m state --state NEW -j DROP
Then I just watch Xconsole. Modify those to LOG
Hello.
I´m looking after a way to simulate traffic in order to probe my
iptables' rules.
In other words. Is there any way, any command or any iptables parameter
to ask iptables what is going to do (according with the active rules)
when some traffic arrives?
Thanks in advanced. RatÓn.
--
* Javier Pardo [EMAIL PROTECTED] wrote:
Hello.
Im looking after a way to simulate traffic in order to probe my
iptables' rules.
You can look at ${KERNEL_DIR}/Documentation/networking/pktgen.txt
--
::)^|^(:: Michal Jeczalik Jr, [EMAIL PROTECTED], http://www.salvador.eu.org
:(:\:/:): GPG:
On Thu, 2005-01-13 at 20:37 +0100, Javier Pardo wrote:
Hello.
I´m looking after a way to simulate traffic in order to probe my
iptables' rules.
In other words. Is there any way, any command or any iptables parameter
to ask iptables what is going to do (according with the active rules)
IMO, hping2 is the best for doing this as it will create some custom
crafted packets that you can send towards your system to see its response.
Thanks,
Ryan Yagatich
,__,
/ Ryan Yagatich Pantek Incorporated |
\
am 13.01.2005, um 18:04:06 +0100 mailte RatÓn folgendes:
Hello.
I´m new to packet-filtering. As you can imaging starting to use
iptables. Well once I´ve reached my first configuration I want to test
it by asking iptables if a certain type of traffic is going to be
ACCEPTED or not. To do
14 matches
Mail list logo