Re: pf port knocking

2004-12-19 Thread jared r r spiegel
On Sun, Dec 19, 2004 at 10:29:49PM +1100, A wrote: > My heartfelt thanks for all the assistance there. ffs, you speak like > some sort of lord who cannot be bothered assisting the peasants. I get > an inkling you eminate for from such lofty heights. Now, I admit I am > not on the main bsd list (eve

Re: pf port knocking

2004-12-19 Thread Glenn Gaetz
I'm wondering, wouldn't port knocking be fairly simple to attack, with a systematic knock on random ports? I'm just a newbie, but that seems like a real concern to me... On Sunday 19 December 2004 3:29 am, you wrote: > [EMAIL PROTECTED] My heartfelt thanks for all the assistance there. ffs, you

Re: pf port knocking

2004-12-19 Thread A
My heartfelt thanks for all the assistance there. ffs, you speak like some sort of lord who cannot be bothered assisting the peasants. I get an inkling you eminate for from such lofty heights. Now, I admit I am not on the main bsd list (even if I was, I don't have time to even skim the headers from

Re: pf port knocking

2004-12-18 Thread jared r r spiegel
On Fri, Dec 17, 2004 at 06:05:39PM -0500, Roy Morris wrote: > If you want to knock off most of the port pounding twits, stop allowing > ssh from 'any', filter instead by source. If you can't do that, because you > MUST have access from your remote laptop, then maybe try using a ssh > rule that s

RE: pf port knocking

2004-12-17 Thread Roy Morris
> not trying to speak for ed, but IMHO...it's dumb because any > yahoo with > a local account on a machine can create a listening socket on > a port >= > 1024. Anyone can create a socket above 1024 anyway, regardless .. this has nothing to do with ssh. If you are running a server, full of users

Re: pf port knocking

2004-12-17 Thread Jason Opperisano
On Fri, 2004-12-17 at 15:51, Peter GILMAN wrote: > Ed White <[EMAIL PROTECTED]> wrote: > > | On Friday 17 December 2004 15:45, Roy Morris wrote: > | > change your ssh port to like 30222 or something .. > | > | That's dumb. > > why? > > > Choose a port < 1024. > > why? not trying to speak for

Re: pf port knocking

2004-12-17 Thread Peter GILMAN
Ed White <[EMAIL PROTECTED]> wrote: | On Friday 17 December 2004 15:45, Roy Morris wrote: | > change your ssh port to like 30222 or something .. | | That's dumb. why? Choose a port < 1024. why?

Re: pf port knocking

2004-12-17 Thread Ed White
On Friday 17 December 2004 06:11, A wrote: > Further, "jasper" is the only machine that is externally accessible via > SSH (the only other open ports are domain, web and mail on other > servers). I need to leave SSH open as a number of people work remotely > and tunnel through it to some of the ser

Re: pf port knocking

2004-12-17 Thread Ed White
On Friday 17 December 2004 15:45, Roy Morris wrote: > change your ssh port to like 30222 or something .. That's dumb. Choose a port < 1024.

Re: pf port knocking

2004-12-17 Thread Attila Fülöp
I will also need to write a windows util to do the knocking for the contractors - can Perl run on a Windows machine or will I have to dust off my C compiler? :) http://www.activestate.com/ or http://www.cygwin.com/

RE: pf port knocking

2004-12-17 Thread Roy Morris
change your ssh port to like 30222 or something .. > -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] Behalf Of > A > Sent: December 17, 2004 12:12 AM > To: [EMAIL PROTECTED] > Subject: pf port knocking > > > Hey all > &

Re: pf port knocking

2004-12-17 Thread jared r r spiegel
> For those unfamiliar with the technique, it is like > knocking a certain pattern/code on a door to open it. anyone unfamiliar with the technique hasn't read the archives whatsoever and thus is not going to garner favour from anyone here at all. > Has anyone heard of anyone working on a p

pf port knocking

2004-12-17 Thread A
Hey all I am getting tired of seeing the following popping up every day (with various IPs) on my log server. * ROOT FAILURES jasper ssh2(pw) @221.143.156.58(3) * User Failures admin ssh2(pw) jasper(2) andrew ssh2(pw) jasper(1) angel ssh2(pw) jasper(1) barbara ssh2(pw) jasper(1) ben ssh2(pw

Re: low-cost pf port-knocking idea

2004-05-01 Thread Alexey E. Suslikov
please, give me at least a theoretical model of such flooding. how your "packet wave" must looks like to hit says 5-rules on random chosen source and destination ports? http://www.zeroflux.org/knock/ as lab for your researches. it listens over linklayer for knocking sequence. Daniel Staal wote:

Re: low-cost pf port-knocking idea

2004-04-30 Thread Daniel Staal
Looks fairly good. Just one question (and I don't know how more standard port-knocking systems handle this): Is there a way to prevent someone from port-stomping? (Eg: Flooding your machine with waves of packets so that no matter what port you are looking for next they've hit it?) Daniel T. S

Re: low-cost pf port-knocking idea

2004-04-29 Thread Miroslav Kubik
AIL PROTECTED]> Sent: Tuesday, April 27, 2004 12:29 PM Subject: low-cost pf port-knocking idea Dear [EMAIL PROTECTED], $ext - stands for server listening interface, ($ext) - stands for server listening interface's address. server side: pass in quick on $ext inet proto udp \ from any p

low-cost pf port-knocking idea

2004-04-27 Thread Alexey E. Suslikov
Dear [EMAIL PROTECTED], $ext - stands for server listening interface, ($ext) - stands for server listening interface's address. server side: pass in quick on $ext inet proto udp \ from any port 333 to ($ext) port 333 keep state \ tag knock333 pass in quick on $ext inet proto udp \ from any po