lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue Aug 30 15:02:51 2005
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: RE: Example firewall script (iptables) 

On Tue, 30 Aug 2005 08:41:20 BST, =?iso-8859-1?Q?Bernardo_Mart=EDn?= said:
> In my first email i requested about bad example firewall script, in later
> mail i said that this script was to learn more so the scene isn't important
> because i'm loking for bad script in any scene

The scenario is *very* important - the firewall rules that I have on my
laptop are demonstrably correct *for this usage*.  However, they are also
*incorrect* for other laptops, even others running Fedora Core 4 - of some
60 lines of rules, fully 3/4 of them are dealing with local oddities of
our network and what I do (for instance, there's a ruleset that does nothing
effective except make sure that iptables doesn't hit a '-j LOG' for a
retransmitted FIN+ACK for a just-torn-down connection to our mail server
that's no longer in the conntrack cache, so it doesn't show up in a feed
to our DSHield server).

And of course, it bears almost *no* relationship to what the firewall
rules look like for our Oracle servers - running my firewall rules on
the Oracle boxes would be a "bad script", as would running the Oracle
rulesets on my laptop.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050830/decd12ae/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ