- Original Message -
From: Kent Hundley [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; firewalls [EMAIL PROTECTED]
Sent: Monday, October 04, 1999 11:35 PM
Subject: RE: Router ACL's
Bill,
Comments imbedded:
snips
Without more specific information, it's hard to give a complete answer.
Bill,
Comments imbedded:
I've run into some packet filtering problems that are making me
"rethink"
router ACL's. I'm hoping that someone can clarify a few areas that I
formerly *thought* I understood... :)
Does an ACL on a given port process packets in *both* directions, or
only
those
Hi Everyone,
As i am new to the concept of NAT please could
someone help me out.
Please could someone tell me what is the function
of ARP while doing NAT.
I would also be very thankful if I was pointed to
some good Docs on NAT and configuring the same on cisco routers.
Thanking you in
Hello,
I have a question : does firewalls replace (or configure) TCP/IP stacks,
particularly in NT world ?
If yes, which products ? What is changed in the configuration of the
TCP/IP stack ?
Thanxs for any help.
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in
Yes, could someone please answer Mr. Diefenbach? He has
asked this question before, and I was dissappointed to see
that no one answered, as I am also having issues regarding this.
At 10:11 AM 10/4/99 -0500, Les Diefenbach wrote:
I'm running Gauntlet 5.0 on Solaris 2.6 and when I give the
No problem really. There is no need to have all the data being en/decrypted
in the cryptodevice (smartcard, clipper chip or whatever) at the same time.
The crypto algorithm on the device acts on either data blocks (eg 64-bits
for DES) or bit stream. so you need only move data stream in and out of
Hi to all,
Well I just wanted to know which is the best
commercially available firewall software.
Thanks,
Sushant.
PS- I hope this question does not offend anybody.
__
Do You Yahoo!?
Bid and sell for free at http://auctions.yahoo.com
-
I know the below can be done. But how fast can a 500k e-mail be decrypted
via smart card? Consumers have to be careful when they purchase stuff like
this.
Rgrds,
Wong.
-Original Message-
From: Myllymäki Sakari [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, October 05, 1999 4:57 PM
To:
On Tue, 5 Oct 1999, Sushant Lotlikar wrote:
Hi to all,
Well I just wanted to know which is the best
commercially available firewall software.
Which is the best vehicle?
There is no "best" because it depends on a lot of factors, all of which
are specific to your skillset, assets,
G'day all or night wherever you are,
I have static NAT setup on my firewall. So my FW reg. IP address is mapped
to my FW semi-secure private IP address to my DMZ. Should that be enough so
that all request from the Internet is forwarded to the DMZ as long as the
ports are opened.
Thank you in
If it's sendmail 8.8.8 (latest Sun patchs), you should add:
O RunAsUser=uucp
in /etc/mail/sendmail.cf.
HTH,
-JCT-
Date: Tue, 05 Oct 1999 01:29:00 -0400
From: W Joel Gridley [EMAIL PROTECTED]
To: Les Diefenbach [EMAIL PROTECTED], [EMAIL PROTECTED]
Yes, could someone
Hello and Good Day,
I sometimes see strange log entries in our firewall log. They always
come from a webserver and use source port HTTP. Because they use a range
of destination ports (services) it looks like a port scan. But I don't
think it's an attack, because when I connect to one of the
I'm sorry, I guess I didn't explain the situation properly.
I want to run a security auditor from a machine which
just happens to be a Solaris box with a SoftPC card running
NT inside it. The machine is in charge of the security
of a large network with many layers of firewalls. The
problem is
Joel,
This is caused by the Gauntlet is running sendmail as uucp while retaining
the
older sendmail.cf. When the Solaris sendmail patch 105395-06 is installed
the newer /usr/lib/sendmail
(version 8.8.8) complains about two things:
1. not having a fully qualified hostname - either
Hi,
Why uucp user owns aliases file?
Check permission and ownership. This is a quote from sendmail's README:
+---+
| DIRECTORY PERMISSIONS |
+---+
Sendmail often gets blamed for many problems that are actually the
result of other problems, such as
Sendmail is complainging about the '/etc/mail/aliases' file because it is owned
by UUCP not ROOT. Also, sendmail is SUID'd to UUCP, which is not normal.
Sendmail considers any file writeable by anybody but root to be unsafe, unless
built to not do the checking.
There isn't any mention which
Chris Osicki [EMAIL PROTECTED] wrote
Why uucp user owns aliases file?
Gauntlet runs sendmail as user "uucp". Remember it uses sendmail as the
backend mailer. it uses SMAP as the SMTP daemon which queues up the
received mail which then gets delivered by sendmail in the background.
Running
This message is because the $j macro is not fully qualified. $j is set from
the hostname of the machine. If this is a Solaris box just put the FQDN
name of the machine in /etc/nodename.
WARNING: local host name (hades) is not qualified; fix $j in config file
These messages are due to the
Those are the kind of answers you will get because your question is too wide
open.
Try to add info. like
The OS platform(s) you are running, and /or which the one you are more
comfortable with.
What are your goals, what kind of services you need to provide.
Do you have lots of money to throw at
Seeing that there has been more than just a handful of
Frequently Asked Questions lately, I'd like to take this
opportunity to point out that there is a fairly
extensive FAQ for this list.
It is located at:
http://lists.gnac.net/firewalls/
The firewalls FAQ contains FAQs and links on:
I don't really understand why a classical firewall shouldn't suits for
that sort of packets, i mean if they are tcp packets they'll be scanned
like other (the headers in fact ...) whatever the datas they contains...
I'm i wrong ??
Yes.
Try the following experiment (if you have the right
A NAT address or series of addresses looks like an internal network to
systems on the outside network. Say we have a pool
of NAT address 1.1.1.1 thru 1.1.1.64 configured on the outside interface of
the router. System on the outside that want to communicate with these
addresses first requests a
Bill,
Actually, by non-first fragments I mean all but the first IP fragment, not
non-SYN packets. An IP fragment attack is very different than a SYN attack,
and potentially more dangerous.
In most situations, only the first IP fragment contains the upper layer port
information, so all
Thanks to all for the input. There were some very well worded responses,
that were easy to understand and follow. Les, you got any further questions?
I'm pretty well sated on this topic now, and pretty sure it won't be a
problem for me in the future thanks to the response.
Is there an archive
24 matches
Mail list logo