http://www.ranum.com/security/computer_security/papers/a1-firewall/
Thanks,
Ron DuFresne
On Sat, 27 Aug 2005, [EMAIL PROTECTED] wrote:
>
>
>
> =
> ORIGINAL MESSAGE:
> -
> Date: Sat,
On Wed, 31 Aug 2005, Aditya Deshmukh wrote:
> > -Original Message-
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED] On Behalf
> > Of Bernardo Mart?n
> > Sent: Tuesday, August 30, 2005 1:11 PM
> > To: Full Disclosure
> > Subject: RE: [Fu
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf
> Of Bernardo Martín
> Sent: Tuesday, August 30, 2005 1:11 PM
> To: Full Disclosure
> Subject: RE: [Full-disclosure] RE: Example firewall script (iptables)
>
> In my first
On Tue, 30 Aug 2005, Rachael Treu Gomes wrote:
> > There are also issues of what KIND of ACL to
> > use and where to place them; Inbound or Outbound.
> >
> > In terms of the original question, the only
> > difference between a "good" line item or a
> > "bad" line item is whether or not the syn
On Tue, 30 Aug 2005 08:41:20 BST, =?iso-8859-1?Q?Bernardo_Mart=EDn?= said:
> In my first email i requested about bad example firewall script, in later
> mail i said that this script was to learn more so the scene isn't important
> because i'm loking for bad script in any scene
The scenario is *ver
Just a couple of caveats, in-line...
On Sat, Aug 27, 2005 at 12:41:33PM -0400, [EMAIL PROTECTED] said something to
the effect of:
>
> Actually, that's not true.
> I would agree that as a general rule of thumb
> you should have a deny statement at the end
> of every ACL. In fact, Cisco places an
Enviado el: lunes, 29 de agosto de 2005 15:48
Para: Full Disclosure
Asunto: Re: [Full-disclosure] RE: Example firewall script (iptables)
Maybe you'd get more informative and less 'get a clue!' answers if you
rephrased and explained your question a little.
For one, what in the world
mailto:[EMAIL PROTECTED]
Enviado el: lunes, 29 de agosto de 2005 14:01
Para: Full Disclosure
Asunto: RE: [Full-disclosure] RE: Example firewall script
I look for bad rules set to learn a little more. I thought that my question
was interesting because here there are many people who knows about this.
Anybody have more information about bad example firewall script??
-Mensaje original-
De: Bernardo Martín [mailto:[EMAIL PROTECTED]
Enviado el: lunes, 29 de agosto de 2005 14:01
Para: Full Disclosure
Asunto: RE: [Full-disclosure] RE: Example firewall script
I look for bad rules set
, 27 de agosto de 2005 18:17
Para: Full Disclosure
Asunto: Re: [Full-disclosure] RE: Example firewall script
Screw these arguments.
What you should really do is get a security consultant to teach you the
basics, and provide you with some exposure to the various different options
you may have
Exactly! FireWall 101 if you will :-)
Exibar
> -Original Message-
> From: Jan Nielsen [mailto:[EMAIL PROTECTED]
> Sent: Saturday, August 27, 2005 2:25 PM
> To: full-disclosure@lists.grok.org.uk
> Subject: [inbox] RE: [Full-disclosure] RE: Example firewall script
>
should be the last rule, IMHO.
heheh, I never meant to be the catalyst for such a huge battle between
people
Exibar
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
> Sent: Saturday, August 27, 2005
On Sun, 28 Aug 2005, Jason Coombs wrote:
> The problem with knowing a thing or two about a thing or two is that
> you're constantly arguing with other people who know nothing about
> things that nobody else can possibly understand, and that nobody will be
> forced to learn about or consider caref
ly for the benefit of everyone who comes after you.
Regards,
Jason Coombs
[EMAIL PROTECTED]
-Original Message-
From: "J.A. Terranson" <[EMAIL PROTECTED]>
Date: Sat, 27 Aug 2005 15:38:11
To:"[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
Cc:Full-Disclosure
Subje
ot; <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> Subject: Re: [Full-disclosure] RE: Example firewall script
>
>
> As does Juniper, as does.
>
> >> Your Point?
>
>
>
> Uh... No. Traffic shaping may make use of ACLs, but ACL != Shaping.
>
> >>
On Sat, 2005-08-27 at 12:41 -0400, [EMAIL PROTECTED] wrote:
> However, Access Control Lists are not firewalls.
> Yes, we use them as firewalls, but that's not what
> they are.
>
> ACL's ARE TRAFFIC SHAPING DEVICES.
ACL identify what traffic you are dealing with.
what to do with/on that traffic
Jan
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: 27. august 2005 18:42
To: full-disclosure@lists.grok.org.uk
Subject: [Full-disclosure] RE: Example firewall script
=
ORI
Screw these arguments.
What you should really do is get a security consultant to teach you the
basics, and provide you with some exposure to the various different
options you may have available, and in the case of your request, offer
you some of the old horror stories.
If your only aim is to
On Sat, 27 Aug 2005, [EMAIL PROTECTED] wrote:
> REPLY:
> ---
>
> Actually, that's not true.
> I would agree that as a general rule of thumb
> you should have a deny statement at the end
> of every ACL. In fact, Cisco places an implicit
> DENY ANY ANY at the end of their ACL's
> automaticall
=
ORIGINAL MESSAGE:
-
Date: Sat, 27 Aug 2005
From: "Exibar"
Subject: Example firewall script
>The absolute worse Firewal rule
>you can have:
>
> Allow ANY ANY
>
>The best:
>
> Deny ANY ANY
ORIGINAL MESSAGE:
==
Date: Fri, 26 Aug 2005
From: Bernardo Mart?n
Example firewall script
Hello,
I'm looking for bad examples
of firewall script
to extend knowledge but I
don't find much inf
21 matches
Mail list logo