At 01:32 AM 11/17/01, Pong wrote:

>if they allow you to connect to port 21 (the ftp control port),
>there's no reason to block you from downloading from the data port.
>simply put, something is blocking your access to the ftp data port that's
>why it times out. try forcing a passive mode ftp data connection
>by typing 'passive' repeatedly until the ftp session toggles it to
>'Passive mode on'
>
>ftp> passive
>Passive mode off.
>ftp> passive
>Passive mode on.
>
>once it's in passive mode, then do an 'ls'. if it succeeds
>then, you now can download.  in passive mode, both connections
>(control and data) to the ftp server is initiated from your
>ftp client and helps you bypass any probable firewall in between 
>preventing the ftp server from initiating the data connection 
>to you instead.

ahh, that's the problem.  i forgot that i was on a box that 
had input deny as the default policy (but with allow established 
connections. this was on FreeBSD).  i just tried that and i 
see that it's 5.2 on there so i guess i won't be grabbing 
that tonight.  i already have that.

i've got some other questions about firewalls and networking 
and i may as well ask them now that the topic comes up.

1.  i've got ip-masq on my dialup-server.  when i do 

     netstat -a 

     i see connections from the server to internal boxes and
     connections from the server to external boxes, but i don't
     see masqueraded connections.  is there a way to see what
     masqueraded connections are active?  

2.  in general, "input deny by default is more secure" than
     input accept by default.  of course.  but if i've got
     my firewall selectively allowing only trusted hosts to
     connect to ports where daemons are listening 

        e.g., the only service on box B1 is HTTP and i've got 
        a firewall rule that says only IPs in the range 
        ABC.DEF.GHI.0-16 can connect to B1:80

     what benefit is there in denying by default to ports where
     no servers are listening?  (naturally, i'd let established
     connections, started from inside, through the firewall).

     or maybe that's the wrong question.  better would be, how
     would an attacker, ah, attack a box like that where there
     are no open ports to connect to?  i don't think "deny by
     default (allowing established)" defends against man in the
     middle or session hijacking.  and the attacker can't run 
     a portmap exploit if the firewall won't let him see the 
     portmap service.  so what else could an attacker try?  
     just wondering.

At 04:13 AM 11/16/01, Rommel Feria wrote:
>StarOffice 6.0 beta does not include Adabas.

OK, thanks.  i was mixing my experience with 5.2 and 
6.0beta.  

tiger
-- 
Gerald Timothy Quimpo                      [EMAIL PROTECTED]
Research, Development, Consulting          [EMAIL PROTECTED]
   Entia non sunt multiplicanda praetere necessitatem
                  Veritas liberabit vos

_
Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
To leave: send "unsubscribe" in the body to [EMAIL PROTECTED]

To subscribe to the Linux Newbies' List: send "subscribe" in the body to 
[EMAIL PROTECTED]

Reply via email to