Challison <[EMAIL PROTECTED]> writes:

> Yep.....behind a firewall and it told me much as well.  I.E. must
> advertise system info or something.

all browsers do. All of this is part of standard HTTP.

> On an interesting note......went to the site with my RH severn beta
> machine and the site collected most of the same info for that box.
> My take on this is that you need to tighten your security regardless
> of the OS you are running.
> Did I hear someone say  Bastille? Tripwire? etc?

Those things are not going to help.  Your browser transmits this
information upon request.  You could browse through a proxy or
anonymizer.  A firewall doesn't help because, after all, you initiated
the connection.

Your concern with this is the browser itself.  some possible attack
vectors. 1)ActiveX 2)Java 3)Javascript (mostly denial of service
due to popups). buffer overflows introduced by the above three.
Cookies etc. 

Bastille and Tripwire are both good hard hardening tools (although
I think aide from http://aide.sf.net is probably an easier
to use replacement for TW).  Bastille may help a little bit, but 
probably no more than turning off java and the like.  Building
web browsers and other items with buffer overflow protection is
another possibility (ProPolice).  TW and AIDE will let you know
if you've been potentially exploited.

It's actually a really GOOD idea to go to sites like this one
and particularly to run the port scans available. They will give
you a good idea of what your firewall looks like to intruders.  
You should be unsurprised by what you see. If you are, you have more
work to do and more to learn :)

-- 
Scott Harney<[EMAIL PROTECTED]>
"...and one script to rule them all."
gpg key fingerprint=7125 0BD3 8EC4 08D7 321D CEE9 F024 7DA6 0BC7 94E5

Reply via email to