Re: [Full-disclosure] RE: Example firewall script

2005-09-01 Thread Ron DuFresne
http://www.ranum.com/security/computer_security/papers/a1-firewall/ Thanks, Ron DuFresne On Sat, 27 Aug 2005, [EMAIL PROTECTED] wrote: > > > > = > ORIGINAL MESSAGE: > - > Date: Sat,

RE: [Full-disclosure] RE: Example firewall script (iptables)

2005-08-30 Thread fd
On Wed, 31 Aug 2005, Aditya Deshmukh wrote: > > -Original Message- > > From: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED] On Behalf > > Of Bernardo Mart?n > > Sent: Tuesday, August 30, 2005 1:11 PM > > To: Full Disclosure > > Subject: RE: [Fu

RE: [Full-disclosure] RE: Example firewall script (iptables)

2005-08-30 Thread Aditya Deshmukh
> -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf > Of Bernardo Martín > Sent: Tuesday, August 30, 2005 1:11 PM > To: Full Disclosure > Subject: RE: [Full-disclosure] RE: Example firewall script (iptables) > > In my first

Re: [Full-disclosure] RE: Example firewall script

2005-08-30 Thread fd
On Tue, 30 Aug 2005, Rachael Treu Gomes wrote: > > There are also issues of what KIND of ACL to > > use and where to place them; Inbound or Outbound. > > > > In terms of the original question, the only > > difference between a "good" line item or a > > "bad" line item is whether or not the syn

Re: [Full-disclosure] RE: Example firewall script (iptables)

2005-08-30 Thread Valdis . Kletnieks
On Tue, 30 Aug 2005 08:41:20 BST, =?iso-8859-1?Q?Bernardo_Mart=EDn?= said: > In my first email i requested about bad example firewall script, in later > mail i said that this script was to learn more so the scene isn't important > because i'm loking for bad script in any scene The scenario is *ver

Re: [Full-disclosure] RE: Example firewall script

2005-08-30 Thread Rachael Treu Gomes
Just a couple of caveats, in-line... On Sat, Aug 27, 2005 at 12:41:33PM -0400, [EMAIL PROTECTED] said something to the effect of: > > Actually, that's not true. > I would agree that as a general rule of thumb > you should have a deny statement at the end > of every ACL. In fact, Cisco places an

RE: [Full-disclosure] RE: Example firewall script (iptables)

2005-08-30 Thread Bernardo Martín
Enviado el: lunes, 29 de agosto de 2005 15:48 Para: Full Disclosure Asunto: Re: [Full-disclosure] RE: Example firewall script (iptables) Maybe you'd get more informative and less 'get a clue!' answers if you rephrased and explained your question a little. For one, what in the world

Re: [Full-disclosure] RE: Example firewall script (iptables)

2005-08-29 Thread Anders B Jansson
mailto:[EMAIL PROTECTED] Enviado el: lunes, 29 de agosto de 2005 14:01 Para: Full Disclosure Asunto: RE: [Full-disclosure] RE: Example firewall script I look for bad rules set to learn a little more. I thought that my question was interesting because here there are many people who knows about this.

RE: [Full-disclosure] RE: Example firewall script (iptables)

2005-08-29 Thread Bernardo Martín
Anybody have more information about bad example firewall script?? -Mensaje original- De: Bernardo Martín [mailto:[EMAIL PROTECTED] Enviado el: lunes, 29 de agosto de 2005 14:01 Para: Full Disclosure Asunto: RE: [Full-disclosure] RE: Example firewall script I look for bad rules set

RE: [Full-disclosure] RE: Example firewall script

2005-08-29 Thread Bernardo Martín
, 27 de agosto de 2005 18:17 Para: Full Disclosure Asunto: Re: [Full-disclosure] RE: Example firewall script Screw these arguments. What you should really do is get a security consultant to teach you the basics, and provide you with some exposure to the various different options you may have

RE: [inbox] RE: [Full-disclosure] RE: Example firewall script

2005-08-28 Thread Exibar
Exactly! FireWall 101 if you will :-) Exibar > -Original Message- > From: Jan Nielsen [mailto:[EMAIL PROTECTED] > Sent: Saturday, August 27, 2005 2:25 PM > To: full-disclosure@lists.grok.org.uk > Subject: [inbox] RE: [Full-disclosure] RE: Example firewall script >

RE: [inbox] [Full-disclosure] RE: Example firewall script

2005-08-28 Thread Exibar
should be the last rule, IMHO. heheh, I never meant to be the catalyst for such a huge battle between people Exibar > -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] > Sent: Saturday, August 27, 2005

Re: [Full-disclosure] RE: Example firewall script

2005-08-27 Thread J.A. Terranson
On Sun, 28 Aug 2005, Jason Coombs wrote: > The problem with knowing a thing or two about a thing or two is that > you're constantly arguing with other people who know nothing about > things that nobody else can possibly understand, and that nobody will be > forced to learn about or consider caref

Re: [Full-disclosure] RE: Example firewall script

2005-08-27 Thread Jason Coombs
ly for the benefit of everyone who comes after you. Regards, Jason Coombs [EMAIL PROTECTED] -Original Message- From: "J.A. Terranson" <[EMAIL PROTECTED]> Date: Sat, 27 Aug 2005 15:38:11 To:"[EMAIL PROTECTED]" <[EMAIL PROTECTED]> Cc:Full-Disclosure Subje

Re: [Full-disclosure] RE: Example firewall script

2005-08-27 Thread J.A. Terranson
ot; <[EMAIL PROTECTED]> > To: [EMAIL PROTECTED] > Subject: Re: [Full-disclosure] RE: Example firewall script > > > As does Juniper, as does. > > >> Your Point? > > > > Uh... No. Traffic shaping may make use of ACLs, but ACL != Shaping. > > >>

Re: [Full-disclosure] RE: Example firewall script

2005-08-27 Thread mayhem
On Sat, 2005-08-27 at 12:41 -0400, [EMAIL PROTECTED] wrote: > However, Access Control Lists are not firewalls. > Yes, we use them as firewalls, but that's not what > they are. > > ACL's ARE TRAFFIC SHAPING DEVICES. ACL identify what traffic you are dealing with. what to do with/on that traffic

RE: [Full-disclosure] RE: Example firewall script

2005-08-27 Thread Jan Nielsen
Jan -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: 27. august 2005 18:42 To: full-disclosure@lists.grok.org.uk Subject: [Full-disclosure] RE: Example firewall script = ORI

Re: [Full-disclosure] RE: Example firewall script

2005-08-27 Thread James Tucker
Screw these arguments. What you should really do is get a security consultant to teach you the basics, and provide you with some exposure to the various different options you may have available, and in the case of your request, offer you some of the old horror stories. If your only aim is to

Re: [Full-disclosure] RE: Example firewall script

2005-08-27 Thread J.A. Terranson
On Sat, 27 Aug 2005, [EMAIL PROTECTED] wrote: > REPLY: > --- > > Actually, that's not true. > I would agree that as a general rule of thumb > you should have a deny statement at the end > of every ACL. In fact, Cisco places an implicit > DENY ANY ANY at the end of their ACL's > automaticall

[Full-disclosure] RE: Example firewall script

2005-08-27 Thread [EMAIL PROTECTED]
= ORIGINAL MESSAGE: - Date: Sat, 27 Aug 2005 From: "Exibar" Subject: Example firewall script >The absolute worse Firewal rule >you can have: > > Allow ANY ANY > >The best: > > Deny ANY ANY

[Full-disclosure] RE: Example firewall script

2005-08-26 Thread [EMAIL PROTECTED]
ORIGINAL MESSAGE: == Date: Fri, 26 Aug 2005 From: Bernardo Mart?n Example firewall script Hello, I'm looking for bad examples of firewall script to extend knowledge but I don't find much inf