Displaying 20 results from an estimated 2000 matches similar to: "have anyone configured "synproxy state" beforce"
2007 May 28
0
have anyone configured "synproxy state" beforce (Sorry for the previouly base64 encode mail caused by M$ outlook)
high everyone,( in pariticular Max :-))
The configuration line in my pf.conf is:
pass in quick on lo0 proto tcp from any to any port 21 flags S/SA synproxy
state
But:
the connection is established, but the control did not seams to pass to the
ftpd
Sincerely yours
Zhouyi Zhou
2006 Mar 16
1
pf: synproxy broken
Hello
from ealier 6.0 there is problem with synproxy in pf filter:
this one 6.1-PRERELEASE #2: Wed Mar 15 02:02:37 MSK 2006
pf.conf just with single rule
pass in quick on lo0 proto tcp from any to any port 22 flags S/SA synproxy state
result
telnet 127.0.0.1 22
Trying 127.0.0.1...
Connected to 127.0.0.1.
Escape character is '^]'.
and it's hangs
pfctl -s rules -v
No ALTQ support in
2016 Mar 05
2
[Bug 1054] New: SYNPROXY
https://bugzilla.netfilter.org/show_bug.cgi?id=1054
Bug ID: 1054
Summary: SYNPROXY
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: kernel
Assignee: pablo at netfilter.org
Reporter:
2003 Dec 19
6
Configuring JAIL to bind on lo0 interface
Hello,
I have configured jail for users with sshd ftpd and auth. I started this
jail on IP 127.0.0.10(there is an alias on lo0 interface), there was
not any bigger problem to start it. But i have a problem with internet in
this jail. I can log in to this jail through ssh or ftpd but i can't
connect to the internet. I try to set up some kind of nat but it doesn't
work.
Can anybody help me
2007 May 29
1
(Security Regression Testsuites)Request for comments
Dear All,
I am a student enrolled google summer code 2007. My job is to write
security regression testsuites for FreeBSD under the guidance of my mentor
Dr. Robert Watson. Under his encourage, I write following request for comments
RFC :-)
//////////////////////////////////////////////////////////////
What I plan to do:
1) to test the stability of Mandatory Access Control and Audit
2008 Dec 22
0
FreeBSD Security Advisory FreeBSD-SA-08:12.ftpd
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-08:12.ftpd Security Advisory
The FreeBSD Project
Topic: Cross-site request forgery in ftpd(8)
Category: core
Module: ftpd
Announced:
1999 Oct 21
0
SECURITY: [RHSA-1999:043] New wu-ftpd packages available
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Security problems in WU-FTPD
Advisory ID: RHSA-1999:043-01
Issue date: 1999-10-21
Updated on:
Keywords: wu-ftp security remote exploit
Cross references:
---------------------------------------------------------------------
1. Topic:
Various computer security groups have
1999 Oct 21
1
[RHSA-1999:042-01] screen defaults to not using Unix98 ptys
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: screen defaults to not using Unix98 ptys
Advisory ID: RHSA-1999:042-01
Issue date: 1999-10-20
Updated on:
Keywords:
Cross references: screen unix98 pty permissions
---------------------------------------------------------------------
1. Topic:
Screen uses ptys with world
1999 Oct 21
1
-----BEGIN PGP SIGNED MESSAGE-----
- ---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Security problems in WU-FTPD
Advisory ID: RHSA-1999:043-01
Issue date: 1999-10-21
Updated on:
Keywords: wu-ftp security remote exploit
Cross references:
- ---------------------------------------------------------------------
1. Topic:
2000 Jun 23
0
[RHSA-2000:039-02] remote root exploit (SITE EXEC) fixed
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: remote root exploit (SITE EXEC) fixed
Advisory ID: RHSA-2000:039-02
Issue date: 2000-06-23
Updated on: 2000-06-23
Product: Red Hat Linux
Keywords: wu-ftpd, root exploit, site exec, buffer overrun
Cross references: N/A
2013 Nov 22
0
[ANNOUNCE] iptables 1.4.21 release
Hi!
The Netfilter project proudly presents:
iptables 1.4.21
iptables is the userspace command line program used to configure the
Linux packet filtering ruleset. It is targeted towards system administrators.
Since Network Address Translation is also configured from the packet filter
ruleset, iptables is used for this, too. The iptables package also includes
ip6tables. ip6tables is used
2024 Jul 15
0
[ANNOUNCE] libnftnl 1.2.7 release
Hi!
The Netfilter project proudly presents:
libnftnl 1.2.7
libnftnl is a userspace library providing a low-level netlink
programming interface (API) to the in-kernel nf_tables subsystem.
This library is currently used by nftables.
This release contains fixes only:
* Avoid potential use-after-free when clearing set's expression list
* Avoid misc buffer overflows in attribute
2000 Jun 21
1
Warning regarding new kernel RPMs
The instructions in RHSA-2000:037-01 (2.2.16 kernel update) tell you:
4. Solution:
For each RPM for your particular architecture, run:
rpm -Fvh [filename]
where filename is the name of the RPM.
These instructions are incomplete and may result in a system that
is unbootable.
After updating the RPM files, you should also:
(1) run mkinitrd to create a new initial ramdisk image
2005 Feb 19
2
Bug#296017: logcheck: ignore.d.server pure-ftpd user with trailing whitespace
Package: logcheck
Version: 1.2.34
Severity: normal
the patterns for pure-ftpd in ignore.d.server are not matching a user
with a trailing whitespace. here a some examples:
Feb 18 13:02:33 web1 pure-ftpd: (stupid-pure-ftpd @84.56.131.73) [NOTICE]
/example/example.txt downloaded (5908 bytes, 152196.03KB/sec)
Feb 18 13:16:14 web1 pure-ftpd: (stupid-pure-ftpd @84.56.131.73) [INFO]
Logout.
every
2000 Jun 23
1
Security Update: wu-ftpd vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera Systems, Inc. Security Advisory
Subject: wu-ftpd vulnerability
Advisory number: CSSA-2000-020.0
Issue date: 2000 June, 23
Cross reference:
______________________________________________________________________________
1. Problem Description
There is
1999 Sep 15
0
FreeBSD Security Advisory: FreeBSD-SA-99:03.ftpd REISSUED
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
FreeBSD-SA-99:03 Security Advisory
FreeBSD, Inc.
Topic: Three ftp daemons in ports vulnerable to attack.
Category: ports
Module: wu-ftpd and proftpd
2008 May 28
3
7-STABLE: bridge and em
Hello list!
When em0 has an inet address while bridge0 doesn't, it seems to be OK:
-----
bs1% uname -a
FreeBSD bs1.sp34.ru 7.0-STABLE FreeBSD 7.0-STABLE #0: Sun May 25 20:15:26 MSD 2008 root@bs1.sp34.ru:/usr/obj/usr/src/sys/BSM i386
bs1% ifconfig em0; ifconfig tap0; ifconfig bridge0
em0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> metric 0 mtu 1500
2005 Jan 26
0
Controlling Outbound traffic...alternative to dsl_qos_queue
Hi , this probably was asked many times before , but here it goes..
Until now i was using dsl_qos_queue - http://www.sonicspike.net/software/
Which limits outbound traffic and does packet priorites with iptables
using MARKed packets.. works very well , I run a ftpserver + webserver so
it''s usefull to set these 2 with lowest priority and my multiplayer gaming
running on certain UDP ports
2010 Feb 17
1
Bug#570207: logcheck wu-ftpd rules do'nt match
Package: logcheck
Version: 1.2.69
Severity: normal
In the file /etc/logcheck/ignore.d.server/wu-ftpd
^\w{3} [ :0-9]{11} [._[:alnum:]-]+ wu-ftpd: PAM-listfile: Refused user [._[:alnum:]-]+ for service wu-ftpd$
should be
^\w{3} [ :0-9]{11} [._[:alnum:]-]+ wu-ftpd\[[0-9]{4}\]: PAM-listfile: Refused user [._[:alnum:]-]+ for service wu-ftpd$
There is a number after "wu-ftpd"
-- System
2007 Feb 18
1
Secure shared web hosting using MAC Framework
Hi all,
I am looking at securing a web server using the FreeBSD MAC Framework.
To make things clear I will call the hosted users "web users". Those are the issues I am dealing with:
** Network Security **
- Web users shouldn't be able to connect to reserved local ports apart from 25(smtp); 80(http); 443(https) and 3306(MySQL)
Solution:
run the web server and web users shell in