[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Pine.SGI.4.53.0310171624180.14898410@ohm.arago.de>
From: h1o at arago.de (Oliver Heinz)
Subject: Application level firewall
Hello,
you could try "delegate".
( http://wall.etl.go.jp/delegate/, or
http://www.netsw.org/net/ip/firewall/proxy/delegate/ )
Regards, Oliver Heinz
-------------------------------------------------------------------------
| arago, | Oliver Heinz |
| Institut fuer komplexes | Bereichsleiter Systembetrieb & Security |
| Datenmanagement AG | eMail: heinz@...go.de |
| Am Niddatal 3 | |
| 60488 Frankfurt am Main | http://www.arago.de/ |
| Tel: +49-69-40568-401 | PGP-Fingerprint: a5de d4b4 46b3 4d8b 2646 |
| Fax: +49-69-40568-111 | d4d0 e5fd d842 cc4e 7315 |
-------------------------------------------------------------------------
> > -----Original Message-----
> > From: Jason Freidman [mailto:jason.full-disclosure@...pnski.com]
> > Sent: Friday, October 17, 2003 2:02 PM
> > To: Full-Disclosure@...ts.netsys.com
> > Subject: [Full-Disclosure] Application level firewall
> >
> >
> > Is there any sort of application level firewall for linux? Something
> > like Zone alarm where you can trust an application? I think that
> > openBSD has something that allows you to choose which system calls a
> > program can run.
> >
> > The idea would be to restrict a bind call and connect call
> > using kernel
> > modules unless the program is in a config file. It would
> > make it easier
> > (i would think) to lockdown a computer for outgoing
> > connections as well
> > as add a new layer of security.
> >
> > --
> > Jason Freidman <jason.full-disclosure@...pnski.com>
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.netsys.com/full-disclosure-charter.html
> >
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
Powered by blists - more mailing lists