lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: lists at bleepyou.com (M. Osten)
Subject: Full-Disclosure digest- good reverse dns
	server

On Thu, 2003-07-03 at 04:43, Philip Stortz wrote:
> does any one know of a free reverse dns server that's good?  the dns servers my isp provides frequently fail to identify the owners 

> of ip# in my firewall log.  while i do sometimes manually look them up at arin.net etc., i'd really like to find a reverse dns server

>  to identify all those ip#, many of which are incursion attempts by dsl or dialup or cable modem users on other isp's, and many

>  of which are advertising or tracking sites (which i aggressively block for privacy and because the ad servers tend to be overloaded 

> and greatly slow down surfing, especially since i'm limited to dialup at present).  

Chances are that if your ISP's dns is not giving you a reverse for IP's,
there isn't one, or your ISP's DNS is severely borked.


> along the same lines, i'm considering getting a cable modem in the future, but of course there are security issues, are there services set up such that i could have ssl or vpn contact 
> to a remote machine and they would reroute it to the actual destination so that my communications would be secure on the cable line 
>(i.e. encrypted) and then routed on the backbone unencrypted to sites that don't use encryption or parts of sites that don't? 

Why?  Are you suggesting that your local cable network is more insecure
than the Internet at large?  You have to remember that once packets
leave your ISP's gateway, they may travel through many untrusted
networks before reaching final destination.  Encryption to your cable
providers gateway would gain you nothing.

A more sane approach would be to use Freeswan's "Opportunistic
Encryption" which creates an IPSEC tunnel to other public machines that
support OE.  This would give you encryption to a small sub-section of
the Internet.

-- 
--------------------------
M. Osten
www.bleepyou.com


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ