What I've done along these lines is to set up an sshusers group then set ssh
to restrict to that group.
If you are using commerical ssh, they have a dummy shell you can set up for
sftp only users.
> From: Choman [mailto:[EMAIL PROTECTED]]
> can't seem to find what I'm looking for. Basically, I
Check out Ian Vitek's talk on IP spoofing and source routing for DefCon 8.
http://www.defcon.org/defcon-media-archives-defcon.html
But "source routing" is your simple answer... Assuming the target accepts
source routed packets (my systems don't ;).
Otherwise, you don't see what you get back, wh
> From: Jason Burfield [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, October 18, 2001 12:09 PM
> To: [EMAIL PROTECTED]
> Subject: t0rn help and questions...?
> The machine is obviously going to need a complete re-install. However, I
> would really like to figure out how someone got in. The mach
I agree with 'ken'. I suspect that what the original poster meant by
"boundary overflow" was actually the same thing as a buffer overflow.
The only other possibility that I can think of is a boundary condition,
where a variable gets set to a value that it should not ordinarily have
(e.g., you exp