Displaying 20 results from an estimated 30 matches for "ipfwadm".
1998 Jun 14
14
SSH w/ttysnoop
I was wondering if anyone here has or knows how to implement ttysnoop
w/ssh ?
1998 Jun 17
0
Re: Linux and IPFWADM
..." options to log all connection attempts (ie. SYN bit set) to
syslog (you need verbose firewall logging compiled into the kernel), and
accept the packets in both directions for these connections.
2a) Example of a bi-directional service
# SMTP mail traffic
/bin/echo -n "SMTP/"
/sbin/ipfwadm -O -a accept -P tcp -S ${ME} ${HI} -D ${ANY} 25 -y -o
/sbin/ipfwadm -O -a accept -P tcp -S ${ME} ${HI} -D ${ANY} 25
/sbin/ipfwadm -I -a accept -P tcp -S ${ANY} 25 -D ${ME} ${HI}
/sbin/ipfwadm -I -a accept -P tcp -S ${ANY} ${HI} -D ${ME} 25 -y -o
/sbin/ipfwadm -I -a accept -P tcp -S ${ANY} ${HI} -D...
1998 Jul 30
0
ipfwadm configuration utility
...39;t
seen anything on here about this, so my apologies if maybe I missed it.
>Date: Thu, 30 Jul 1998 08:37:27 -0400
>From: Alan Spicer <aspicer@ebiznet.com>
>Organization: Electronic Business Network
>X-Mailer: Mozilla 4.05 [en] (Win95; I)
>To: aspicer@ebiznet.com
>Subject: ipfwadm configuration utility
>
>http://www.redhat.com:8080/HyperNews/get/khg/55/3/1.html The HyperNews
>Linux KHG Discussion Pages
>
> ipfwadm configuration utility
>
> Forum: The Linux Kernel Hackers' Guide
> Re: Can you block or ign...
1998 Jun 20
0
Named and Firewalls
...ng is that in all examples shown so far
it seemed that everyone suggested to leave named full-open. However,
it does not always have to be case. Say, if you are running an private
network then you want just to allow named get data transfers from
trusted host and that is all.
[root@eax /root]# cat ipfwadm-named
#!/bin/sh
#allow connection only from trusted named servers
ME="1.2.3.4" # MY ip
NS1="10.20.30.41" # IP of the primary name server
NS2="10.20.30.42" # IP of the secondary name server
NS3="10.20.30.43" # IP of the trietary na...
2002 Jul 06
0
FW: Newbie Help
...x cyber.helix.org helix.org <--put your samba server here
(Note: Neither of these entries is a real internet address!)
If #2a is the problem, then post back.
The following is just a description of an extreme means of finding
information on a linux system, assuming you have already tried
man ipfwadm
and gotten no information.
ipfwadm is a bit dated, but you are using on old version of redhat.
I don't want to give you wrong information. I do have ipfwadm on my
system, but don't use it. However, you can get information about this
even if you have no documentation for it. Try, as root:...
1999 Jan 18
0
ipfwadm and filtering ICMP?
I would like to allow certain types of ICMP traffic and not others.
Is there a way, with ipfwadm do this? I currently either can deny
access to ICMP for what I want or allow it.
Any good examples out there?
[mod: Please summarize in about a week, OK? -- REW]
--
--
#include <std_disclaimer.h>
Peter Kelly
Email: pkelly@ETS.net
PGP Public key: http://www.ets.net/pkelly/pgp.html
Key...
2009 Aug 18
3
Rules based on ipmasq
...q but I have
installed shorewall. This is content of I89tproxy.rul file:
#!/bin/sh
#
# redirect http requests to non-local hosts to the transparent proxy
# GPL 2.0 or later (C) 2004 Johannes Martin <jmartin@notamusica.com>
# 1. do not redirect http requests to localhost
case $MASQMETHOD in
ipfwadm)
$IPFWADM -I -a accept -P tcp -D localhost 80
;;
ipchains)
$IPCHAINS -A input -p tcp -d localhost 80 -j ACCEPT
;;
netfilter)
$IPTABLES -A INPUT -p tcp -d localhost --dport 80 -j ACCEPT
;;
esac
# 2. do not redirect http request to hosts on the local network
for i in $INTERNA...
1998 Oct 06
1
Unwanted browse lists
...0/24
network. Each Windows workstation will automatically announce itself with
a udp packet broadcast to 192.168.15.255 on port 137. So if your OS
supports firewalling you can just write a deny rule for packets that meet
those criteria.
For instance, using Linux, I can write the following rule:
ipfwadm -I -a deny -S 192.168.15.0/24 -D 192.168.15.255 137 -P udp
which drops all packets destined for the udp netbios-ns port at 137. Of
course, you could enable specific machines to be listed by adding
additional rules above this one. If, for instance, you wanted the machine
at 192.168.15.1 to appear...
1998 Dec 05
8
portmap vulnerability?
Are there any known vulnerabilities in portmap (redhat''s
portmap-4.0-7b)? I''ve been receiving a lot of attempts to access the
portmap port on some linuxppc machines I administer by various
machines which clearly have no business with mine, and I wonder if
this is an attempt to break in to my machines.
I''ve searched some archives, but I haven''t yet found any
1998 Oct 13
5
compare / contrast of linux fw and others
...kpoint-1 and gauntlet.
Can someone direct me to a good book or online doc that compares linux
to some other firewall methods?
Mind you, I''m not talking about a firewall in the classical sense, ie
ip forwarding turned off and used as a proxy, but the typical Linux box
with masquerading and ipfwadm rules, ipautofw, etc. vs. CheckPoint or
whatever.
What are the differences in features, security, control,
administration, etc.
[mod: Replies to Robert please. Robert, please summarize in a week -- REW]
--
Robert Bringman, Systems Engineer mailto:rob@trion.com
TRION Technologies, Inc...
1998 Aug 05
6
IP Security for Linux (IPSec)
I''ve kept this one on the back burner for a while, waiting for it to
mature before attempting to use it, and now having seen OpenBSD
ship with IPSec I''m getting a bit impatient =).
What is the status of IPSec for Linux (and more specifically RedHat)?
By this I mean I just did some www browsing/etc and found about a
half dozen different implimentations, ranging from NRL, to a
2000 Feb 09
2
Netbios port 139
On http://grc.com/default.htm
I've found some bad news on the above service.
It's true that if your windows network expose shared resources AND it is
connect to Internet it can be bombed
by hacker's attacks ?
If yes, how to prevent it thru Linux-Samba ?
1998 May 27
0
Updated: Sentry Port Scan Detector 0.60
...hat it does
=-=-=-=-=-=-
Sentry monitors your systems for port probing activity and will then take
any of the following actions:
1) Log the attacker hostname/IP and ports probed.
2) Run external program.
3) Configure routing table to drop route of attacking host.
4) Configure local packet filter (ipfwadm/ipfw) to drop all packets from
attacking host.
New Features in version 0.60
=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Full stealth scan detection and response
----------------------------------------
Sentry will now detect and respond to stealth scans against your host from
advanced scanners such as nmap:...
1998 Jun 16
2
masquerading
Following Situation:
Having an intranet-application that needs to know the ip-Address of the
clients before running.
Clients anywere in the Internet with any ip-address.
So I thought about using masquerading the opposite way than normal.
But then anybody could use this application.
Dos anybody know how to make it a little bit more secure, like proofing
the mac-address of the client, or something
1998 Jun 16
7
Ethernet card addr <-> IP
-----BEGIN PGP SIGNED MESSAGE-----
Hi everyone -
Someone I''m working with has a requirement to map ethernet card addresses
to unique IP addresses, and then have a Linux IP masquerade server know of
this mapping list and not allow any data to pass from any ethernet card
that a) it doesn''t know about, or b) isn''t assigned the right IP. Ideally
it would also log this
1997 Dec 05
3
New Program: Abacus Sentry - Port Scan Detector
...te" engine to track past host
connections and alarm when a threshold of connections is past.
- The ability to react to a port sweep in real time. Abacus Sentry will
take any of the following actions when a port sweep is detected:
- Add the target host to the local Linux filter list using
ipfwadm.
- Drop the route to the target host via the route command.
- Add the target host to the local TCP wrappers hosts.deny file.
- Execute an external program.
- Fully log the attacking host IP and port numbers to syslog.
- Uses essentially zero system resources when running.
- It''s...
1999 Jan 13
1
Secure? Samba over internet
...the signature, and
if everything checks out compares the time given in the message to the
current system time. If the message is less than 20 mins old (somebody else
may have Joe's current IP later on, but we must allow for inaccurate clocks
and processing time) the server does something like:
ipfwadm -I -a accept -D $SERVER_IP 139 -V $SERVER_IP -P tcp -S $IP_FROM_EMAIL
and possibly alerts Joe User in some fashion to tell me that my request has
been processed.
Joe User then successfully sync's his clock with the server, maps his home
directory to drive X: and plays with his favorite M$ pro...
2004 Mar 24
2
multipath routing
I have a private lan that is connected to the world via 3 dsl lines. I put
up a linux box that handles all the dsl lines, lan gateway and all is
working well...until...one of the dsl lines goes down. My routing table is:
x.x.x.x dev ppp0 proto kernel scope link src x.x.x.x
x.x.x.x dev ppp1 proto kernel scope link src x.x.x.x
x.x.x.x dev ppp2 proto kernel scope link src x.x.x.x
1998 Jun 08
27
Services not required?
I''m in the process of locking down as much of my systems here
as possible as to available ports. I am down to only a handful
but am not sure how much of a security risk they pose and was
wondering if anyone here might be able to comment, or suggest
secure versions to run:
21/FTP (WU-ftpd v2.4.2 BETA 14)
22/SSH (1.22)
23/TELNET (Netkit 0.09)
25/SMTP (Sendmail
2009 Dec 18
17
Optimizing CentOS for gigabit firewall
Hi,
I want to configure CentOS on powerful server with gigabit
adapters as transparent bridge and deploy it in front of server farm.
Can you tell how to optimize the OS for hight packet processing? What
configurations I need to do to achieve very hight speeds and thousands of
packets?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: