Hi all,
can someone give info on following ports on a NT system 1046 and 1128
TIA
Madhur
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
unsubscribe firewalls in the body of the message.]
On Wed, 30 May 2001, Stilgherrian wrote:
May 14 18:48:00 pooky ftpd[987]: FTP session closed
Well, these *are* FTP logins. wu-ftpd doesn't run all the time, but is
spawned from inetd when a connection comes in.
Exactly, those are logins to *ftpd*, not wu-ftpd
Brian;
Question in-line...
Brian Ford wrote:
With the new TCP intercept feature, once the optional embryonic
connection limit is reached, and
until the embryonic connection count falls below this threshold,
every SYN bound for the affected server is intercepted. For each SYN,
PIX
http://www.iana.org/assignments/port-numbers
- Those fall inside 2 unassigned ranges here
http://www.sys-security.com/html/papers/trojan_list.html
- They do not show up here at all
http://www.robertgraham.com/pubs/firewall-seen.html
- Not here either
How did you find these ports? Perhaps
FYI:
deadly.org, aka openbsd journal, has a note from theo himself that ipf has
been removed from openbsd-current due to licensing changes (changes
committed at about 10 pm tuesday night).
2.9-release (which ships in two days) will have it, though. this affects
only -current.
i have not yet
At 05:04 29/05/01 +0200, Bernd Eckenfels wrote:
On Mon, May 28, 2001 at 10:21:13PM -0400, Paul D. Robertson wrote:
That point is now obvious. Most licenses have a default deny policy,
modification was never had a permit line. It still doesn't have a permit
line, so the access list hasn't
Well, I posted this last week but have since gotten a few requests for it,
so I wanted to post this again. Following is the starting list I give to
people when they ask me for book suggestions. My personal library is much
more than this, and I can certainly recommend more books than what I list
Well so far I haven't gotten any horror stories, so yesterday evening I
upgraded our lab unit. Since we had an older PIX unit I had to replace the
flash card with a new 16MB unit so my upgrade process may be a little bit
different then yours.
Basically you write off the current config to tftp,
comments inline...
Ken Claussen MCSE CCNA CCA
[EMAIL PROTECTED]
The Mind is a Terrible thing to Waste!
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Graham, Randy (RAW)
Sent: Wednesday, May 30, 2001 10:38 AM
To: '[EMAIL PROTECTED]'
Subject:
On Wed, 30 May 2001, Graham, Randy (RAW) wrote:
IDS:
Network Intrusion Detection: An Analysts' Handbook - Northcutt
Intrusion Signatures and Analysis - Northcutt
these are good from a practical standpoint, but theory is needed to really
evaluate products and interpret situations.
I eventually wound up blocking all traffic from t-dialin because of
the volume of anonymous FTP scans I was getting from them, and their
lackadaisical response to complaints.
David G
On 29 May 2001, at 15:20, jeremy cassidy wrote:
Hrmm okay here is my logs, and i dont have wu-ftpd
This is a firewalls list, not a venting boo-hoo i can't find a job
list.
This is a firewalls list. Please think (at least) twice before
feeding an off-topic thread.
Goto monster.com, there are thousands of jobs in this industry.
If you choose to post advice, it should be useful. I
Hi,
Does any of you know how to determine the connection load of a PIX 520?
How to figure out if I need another PIX for load sharing?
How to figure out if I'm using all the IP translations available from the
global pool (including the last address used for PAT)?
Your help would be appreciated...
Some security experts claim that NAT could be used as a firewall (or
let's say, some means of hiding the internal network). I have a question
about that. The assumption is that no packets could be sent directly
from the Internet to clients behind NAT. However, imagine this scenario
and tell me
How is the scenario you describe different from session hijacking
irrespective of the presence of NAT?
Steve Riley (MCS) wrote:
Some security experts claim that NAT could be used as a firewall (or
let's say, some means of hiding the internal network). I have a question
about that. The
Steve Riley (MCS) wrote:
Some security experts claim that NAT could be used as a firewall (or
let's say, some means of hiding the internal network).
No security expert I know would assert such a thing. If they did, I'd
give their title an instant expertectomy.
I have a question
about
Michael Batchelder wrote:
Use explicit filtering rules or proxies, whichever
is applicable.
I don't know that a filtration rule as such can protect against a
session splice, either. Proxies may be a different matter (for example
if the attack is a known exploit you can have an application
-Original Message-
From: Steve Riley (MCS) [mailto:[EMAIL PROTECTED]]
Sent: Thursday, May 31, 2001 5:44 AM
To: [EMAIL PROTECTED]
Subject: Penetrating a NAT
Some security experts claim that NAT could be used as a firewall (or
let's say, some means of hiding the internal
Which security experts?? I would like names so I never
make the mistake of consulting with them.
--- Steve Riley (MCS) [EMAIL PROTECTED]
wrote:
Some security experts claim that NAT could be used
as a firewall (or
let's say, some means of hiding the internal
network). I have a question
about
This is one reason why router/gateway vendors touting NAT as a
natural firewall is EVIL.
[It appears that recently some vendors may have been touting static
NAT (providing access through NAT to servers) as effectively a DMZ.
Grrr]
Some security experts claim that NAT could be used
Michael R. Jinks wrote:
Michael Batchelder wrote:
Use explicit filtering rules or proxies, whichever
is applicable.
I don't know that a filtration rule as such can protect against a
session splice, either. Proxies may be a different matter (for example
if the attack is a known
21 matches
Mail list logo