Re: halted firewalls

2007-02-25 Thread Sam Couter
sed some part of the discussion here, but... the computer won't route packets without power. Are you really switching the machine off and then wondering why you lose network connectivity? -- Sam Couter | mailto:[EMAIL PROTECTED] | jabber:[EMAIL PROTECTED] OpenPGP fin

Re: halted firewalls

2007-02-25 Thread Sam Couter
Ludo <[EMAIL PROTECTED]> wrote: > How else does the IP address get released? DHCP leases have a limited lifetime. If they're not renewed by the client within that time they're considered expired. -- Sam Couter | mailto:[EMAIL PROTECTED] | jabb

Re: Firewall-troubleshooting

2005-07-03 Thread Sam Couter
Daniel Pittman <[EMAIL PROTECTED]> wrote: > Sure, a lot of them suck. In fact, most of them *really* suck, in my > opinion. > > I found that 'firehol' was quite a surprise to me -- not only didn't it > suck, it actually improved my hand-written firewall somewhat. Firehol still sucks: It's ba

Re: MAC-based ssh

2003-05-03 Thread Sam Couter
Hans van Leeuwen <[EMAIL PROTECTED]> wrote: > Hello, > > My company has created an application that allows remote users to edit > their DNS-records. This app needs to restart bind on the remote nameservers. This is a poor way to do dynamic DNS. > I have decided to do this thrue SSH by putting t

Re: Secure remote syslogging?

2003-04-29 Thread Sam Couter
Stefan Neufeind <[EMAIL PROTECTED]> wrote: > what is the best way to remotely syslog? In Use a dedicated machine. Cut the 'transmit' pair in the CAT5 cable. syslog is UDP, which is only one-way, so it doesn't need to transmit. Obviously you'll have no remote access to the syslog server, but neith

Re: Fixing file system privileges

2002-05-12 Thread Sam Couter
Peter Cordes <[EMAIL PROTECTED]> wrote: > dpkg --get-selections | grep '[^A-Za-z]install$' | cut -f1 > should work. > > This time for sure :) How about matching what you really want instead of guessing with grep: The second field is exactly "install". And how about doing it all with one command

Re: Fixing file system privileges

2002-05-12 Thread Sam Couter
Peter Cordes <[EMAIL PROTECTED]> wrote: > dpkg --get-selections | grep '[^A-Za-z]install$' | cut -f1 > should work. > > This time for sure :) How about matching what you really want instead of guessing with grep: The second field is exactly "install". And how about doing it all with one comman

Re: what is means ? + rootkits..

2002-04-20 Thread Sam Couter
Jan Johansson <[EMAIL PROTECTED]> wrote: > Now, run AIDE check periodically (nightly) against that db. And all is well. Here's a weakness: The attacker can replace AIDE (or any libraries it links to, if any exist, or even the kernel) with a fake that just says "Everything's OK" without really chec

Re: what is means ? + rootkits..

2002-04-20 Thread Sam Couter
Jan Johansson <[EMAIL PROTECTED]> wrote: > Now, run AIDE check periodically (nightly) against that db. And all is well. Here's a weakness: The attacker can replace AIDE (or any libraries it links to, if any exist, or even the kernel) with a fake that just says "Everything's OK" without really che

Re: ping problem

2001-12-12 Thread Sam Couter
Wichert Akkerman <[EMAIL PROTECTED]> wrote: > > It leads to better solutions :) And fun and entertainment along the way! -- Sam Couter | Internet Engineer | http://www.topic.com.au/ [EMAIL PROTECTED]| tSA Consulting | OpenPGP key ID: DE89C75C, avai

Re: ping problem

2001-12-12 Thread Sam Couter
Wichert Akkerman <[EMAIL PROTECTED]> wrote: > > It leads to better solutions :) And fun and entertainment along the way! -- Sam Couter | Internet Engineer | http://www.topic.com.au/ [EMAIL PROTECTED]| tSA Consulting | OpenPGP key ID: DE89C75C, avai

Re: New IIS worm

2001-09-22 Thread Sam Couter
your DNS server our default gateway... To forge a Nimda attack would require you to forge a TCP connection. That's not easy, unless the attacker is on the network path to the forged address. -- Sam Couter | Internet Engineer | http://www.topic.com.au/ [EMAIL PROTECTED]|

Re: New IIS worm

2001-09-22 Thread Sam Couter
your DNS server our default gateway... To forge a Nimda attack would require you to forge a TCP connection. That's not easy, unless the attacker is on the network path to the forged address. -- Sam Couter | Internet Engineer | http://www.topic.com.au/ [EMAIL PROTECTED]|

Re: File transfer using ssh

2001-08-23 Thread Sam Couter
ite happy to allow RSA authenticated root logins with SSH. Plus, su doesn't forward X connections. -- Sam Couter | Internet Engineer | http://www.topic.com.au/ [EMAIL PROTECTED]| tSA Consulting | OpenPGP key ID: DE89C75C, available on key servers OpenPGP fingerprint

Re: File transfer using ssh

2001-08-23 Thread Sam Couter
ite happy to allow RSA authenticated root logins with SSH. Plus, su doesn't forward X connections. -- Sam Couter | Internet Engineer | http://www.topic.com.au/ [EMAIL PROTECTED]| tSA Consulting | OpenPGP key ID: DE89C75C, available on key servers OpenPGP fingerprint

Re: CGI Perl Security

2001-07-25 Thread Sam Couter
ode on when coding perl scripts that must run in hostile environments (eg. CGIs), you're an idiot, and you're going to have problems sooner or later. If you *do* have taint mode on, then you need to untaint everything you want to use, including environment variables that y

Re: CGI Perl Security

2001-07-25 Thread Sam Couter
ode on when coding perl scripts that must run in hostile environments (eg. CGIs), you're an idiot, and you're going to have problems sooner or later. If you *do* have taint mode on, then you need to untaint everything you want to use, including environment variables that y

Re: red worm amusement

2001-07-21 Thread Sam Couter
bsolute security. See above about unnecessary risk. Also see above about layers of security, and think of the OFF button as just another layer that's fast, easy and very cheap to implement, as well as being very effective. -- Sam Couter | Internet Engineer | http://www.topic.com

Re: red worm amusement

2001-07-21 Thread Sam Couter
bsolute security. See above about unnecessary risk. Also see above about layers of security, and think of the OFF button as just another layer that's fast, easy and very cheap to implement, as well as being very effective. -- Sam Couter | Internet Engineer | http://www.topic.com