Displaying 20 results from an estimated 2000 matches similar to: "[Bug 78] New: -m psd -j TARPIT returns all ports open from nmap"
2003 Apr 17
1
[Bug 78] -m psd -j TARPIT returns all ports open from nmap
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=78
------- Additional Comments From tools@die.net 2003-04-17 15:47 -------
Showing any ports open that are sent to it is the normal function of TARPIT
target. The psd match will start routing all ports to it after it decides that
an IP is portscanning, so this is the expected behavior.
That being said, the psd match won't
2006 Jul 08
2
TARPIT target in iptables
Has anyone been successful at using the TARPIT target in iptables under
CentOS 4?
I am using CentOS 4.3, fully updated with iptables-1.2.11-3.1.RHEL4 and
kernel-2.6.9-34.107.plus.c4
Doing a locate on TARPIT returns:
# locate TARPIT
/lib/iptables/libipt_TARPIT.so
This makes me think that the TARPIT target would be valid, however when I
try to use it, I get the following reponse:
# iptables
2016 Nov 09
0
[Bug 1097] New: TARPIT function does not work in ip6tables
https://bugzilla.netfilter.org/show_bug.cgi?id=1097
Bug ID: 1097
Summary: TARPIT function does not work in ip6tables
Product: netfilter/iptables
Version: unspecified
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: ip6_tables (kernel)
Assignee:
2006 Mar 20
6
[OT maybe] netcafe firewall
Hi all,
I appologise in advance if this is a little OT, but I am building
a box that will serve as firewall and router for a small ''internet
cafe / netcafe'' and am using CentOS...
So here it is:
What are the best tools to be used for keeping the potential
script kiddies from ''harming the Internet'' :) ? I specifically want
to be able to detect and prevent
2007 Nov 27
0
userspace tarpit
...
Hello!
I completed a simple userspace tarpit script:
http://www.radlinux.org/connexion/browser/branches/0.4.4/lib/cxnet
It is not a production solution, but an example of cxnet usage. Whilst not as
fast as libnfnetlink and kernel netfilter, cxnet is extremely simple and can
be used for rapid net-apps development or in GNU/Linux network studies (e.g.,
for educational purposes).
Cxnet
2003 Feb 04
0
[Bug 42] New: Kernel panic in PSD
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=42
Summary: Kernel panic in PSD
Product: netfilter/iptables
Version: patch-o-matic
Platform: i386
OS/Version: other
Status: NEW
Severity: major
Priority: P2
Component: ip_tables (kernel)
AssignedTo: laforge@netfilter.org
2006 Feb 02
0
How do I normalize a PSD?
Dear Tom,
Short answer, if your using spec.pgram(), use the smoothing kernel to get a
better estimate at the frequency centered in the bandwidth. If your
frequency bin of interest is wider than the bandwidth of the kernel, average
across frequencies (I think). The estimate appears to be normalized already.
If you are calculating your PSD independently, then oversample (e.g. 2,
perhaps 4 or more
2003 Feb 04
2
[Bug 42] Kernel panic in PSD
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=42
------- Additional Comments From laforge@netfilter.org 2003-02-04 11:37 -------
I've emailed this bugreport to Denis Koslowski [the author of the psd match].
Once he has opened a bugzilla account, I can assign the bug to him.
------- You are receiving this mail because: -------
You are on the CC list for the bug, or
2003 Feb 24
2
Shorewall / nmap question
I made the following adjustments to /etc/shorewall/common.def (1.3.13 with
all relevant patches).
############################################################################
# Shorewall 1.3 -- /etc/shorewall/common.def
#
# This file defines the rules that are applied before a policy of
# DROP or REJECT is applied. In addition to the rules defined in this file,
# the firewall will also define a
2003 Aug 28
0
[louisk@bend.com: snort, postgres, bridge]
----- Forwarded message from Louis Kowolowski <louisk@bend.com> -----
Date: Thu, 28 Aug 2003 11:37:42 -0700
From: Louis Kowolowski <louisk@bend.com>
To: freebsd-security@freebsd.org
Subject: snort, postgres, bridge
User-Agent: Mutt/1.5.4i
I've been prowling through the FreeBSD and Snort list archives in
search of information on setting up snort on a FreeBSD bridge(4)
that logs
2004 Sep 18
1
[Bug 18] iptables segfaults when the psd and recent match extensions are combined
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=18
netfilter@linuxace.com changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|ASSIGNED |RESOLVED
Resolution| |FIXED
------- Additional Comments From netfilter@linuxace.com
2008 Apr 09
1
[announce] Xtables-addons 1.5.4
Hi everyone,
Xtables-addons 1.5.4 has been released; highlights of this release are
the import, cleanup/bugfixing the "condition" and "ipp2p" matches and
additionally extending the "IPMARK" by IPv6. I hope people don''t mind,
but I have not heard back so far, so I take it it''s ok.
LOGMARK (for analyzing packet marks and connection states) now
2006 Jan 24
1
spec.pgram() normalized too what?
Dear list,
What on earth is spec.pgram() normalized too? If you would like to skip my
proof as to why it's not normed too the mean squared or sum squared
amplitude of the discrete function a[], feel free too skip the rest of the
message. If it is, but you know why it's not exact in spec.pgram() when it
should be, skip the rest of this message. The issue I refer herein refers
only too a
2016 Aug 26
2
Issue with acl_xattr:ignore system acls in 4.5rc2
On Fri, Aug 26, 2016 at 06:44:05PM +0200, Ralph Böhme wrote:
>
> Cheerio!
> -slow
Still reviewing this - but a few things that will need changing:
When adding the validate_nt_acl_blob() function in
[PATCH 06/12] vfs_acl_common: move the ACL blob validation to a helper function
this makes some of the existing function names in debug statements
incorrect.
Eg. validate_nt_acl_blob()
2016 Aug 29
1
Issue with acl_xattr:ignore system acls in 4.5rc2
On Sat, Aug 27, 2016 at 12:46:12PM +0200, Ralph Böhme via samba wrote:
>
> ...and this one even has bug urls in all commit messages. Sorry for
> forgetting this in the previous version.
Juuuusttt *one* leetle change, sorry :-).
I was following the changes to the talloc heirarchy in the
code and realized that adding the following change made it
much clearer (at least to me).
diff --git
2005 Apr 28
2
portsentry+shorewall
Hello,
i use shorewall for a very long time (2 years or so) and i use it for nat and
as firewall....i now use portsentrys to detect portscans but there is one
problem...i use the HOWTO from the shorewall mailing list to make portsentry
and shorewall work together....but there is one prob portscans get detected
and a drop rule is added to shorewall for example
shorewall drop 62.178.xxx.xx
2006 Jan 24
0
Relating Spectral Density to Chi-Square distribution
Dear list,
I had some confusion regarding what function too use in order too relate
results from spec.pgram() too a chi-square distribution. The documentation
indicates that the PSD estimate can be approximated by a chi-square
distribution with 2 degrees of freedom, but I am having trouble figuring out
how to do it in R, and figuring out what specifically that statement in the
documentation
2009 Oct 15
3
Inquiry:What is the equivalent of nmap command on CentOS 5.2 ?
Dear All
Please be informed that I have installed CentOS 5.2 on my client but it does
not have nmap command . Can you please do me favor and let me know what is
the equivalent of nmap command on CentOS 5.2 ?
Thank you in advance
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2005 Aug 03
0
Xen rebooting Dom-0 machine with nmap
Ok,
I''ve completely reinstalled Xen and I am still encountering the most curious
problem.
I set up a virtual network of eight domains: three are on a virtual DMZ
network (10.0.1.0/24), four are on a virtual internal network (10.0.2.0/24),
and a router connects the two.
All the domains can ping each other and traceroute-ing between them shows
the proper network structure (first hop:
2015 Aug 24
0
Host does not respond to nmap
On Sun, August 23, 2015 7:34 pm, Mark LaPierre wrote:
> Hey Y'all,
>
> I just set up a new old machine on my network. I did a net install of
> CentOS 6.7 on it replacing an outdated copy of Win XP. Of course I'm
> now in the throws of configuring the machine to be a useful member of
> society.
>
> [mlapier at peach ~]$ nmap -sn 192.168.15.0/24
>
> Starting