RE: portsentry etc

2001-11-18 Thread leon
See the problem with portsentry and your ids doing things like that is this; if I am an attacker and I know you are doing that I can just spoof port scans from yahoo.com, your dns server, hotmail.com, blah blah blah, and basically cause a d0s attack. Since I don't really care about the response (

Re: portsentry etc

2001-11-13 Thread Rafael 'Dido' Sevilla
On Fri, Nov 09, 2001 at 09:26:44AM -0600, Dustin Puryear wrote: > One big issue is that it would be easy to spoof someone else's IP address in > order to cause the server to block that person from accessing the machine. A > very good DOS attack. (Imagine if the server in question was a DNS server

RE: portsentry etc

2001-11-12 Thread SecLists
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 This is true but you can tell PortSentry what IPs to always ignore... so you would probably want to put in your DNS servers, mail servers, etc... thanks, On Fri, 9 Nov 2001, Dustin Puryear wrote: > Well, PortSentry will alert you via syslog of it's

Re: portsentry etc

2001-11-10 Thread jaywhy
on 11/8/01 2:37 PM, Karel Jennings at [EMAIL PROTECTED] wrote: > Hello, I was recently working on a remote server, playing with mysql. > Anyway. I wanted to see what ports were open, and nmaped the box.:) They > machine had portsentry running, and it dropped my connection *AND* put my ip > in the

RE: portsentry etc

2001-11-10 Thread Dustin Puryear
Well, PortSentry will alert you via syslog of it's action, so you can view the operation as the software immediately reacting and then letting you take appropriate steps for a long-term solution. You can turn this feature off if desired, and in fact, I usually do. One big issue is that it would b

Re: portsentry etc

2001-11-09 Thread Rafael 'Dido' Sevilla
On Thu, Nov 08, 2001 at 12:37:53PM -0700, Karel Jennings wrote: > Hello, I was recently working on a remote server, playing with mysql. > Anyway. I wanted to see what ports were open, and nmaped the box.:) They > machine had portsentry running, and it dropped my connection *AND* put my ip > in th