RE: User specific ssh and sftp-server

2002-06-20 Thread Blake R. Swopes
What I've done along these lines is to set up an sshusers group then set ssh to restrict to that group. If you are using commerical ssh, they have a dummy shell you can set up for sftp only users. > From: Choman [mailto:[EMAIL PROTECTED]] > can't seem to find what I'm looking for. Basically, I

RE: Spoofing question?

2001-12-01 Thread Blake R. Swopes
Check out Ian Vitek's talk on IP spoofing and source routing for DefCon 8. http://www.defcon.org/defcon-media-archives-defcon.html But "source routing" is your simple answer... Assuming the target accepts source routed packets (my systems don't ;). Otherwise, you don't see what you get back, wh

RE: t0rn help and questions...?

2001-10-21 Thread Blake R. Swopes
> From: Jason Burfield [mailto:[EMAIL PROTECTED]] > Sent: Thursday, October 18, 2001 12:09 PM > To: [EMAIL PROTECTED] > Subject: t0rn help and questions...? > The machine is obviously going to need a complete re-install. However, I > would really like to figure out how someone got in. The mach

RE: Needed info on Buffer/Boundary Overflow Attacks

2001-10-18 Thread Blake R. Swopes
I agree with 'ken'. I suspect that what the original poster meant by "boundary overflow" was actually the same thing as a buffer overflow. The only other possibility that I can think of is a boundary condition, where a variable gets set to a value that it should not ordinarily have (e.g., you exp