>I disabled most of the unused services in inetd.conf, including
>TFTP. I do have a few services which I am not familiar with, and am
>wondering if I can get away with removing the following lines from
>inetd.conf:
>discard                stream  tcp     nowait  root    internal
>discard                dgram   udp     wait    root    internal
>daytime                stream  tcp     nowait  root    internal
>daytime                dgram   udp     wait    root    internal
>time           stream  tcp     nowait  root    internal
>time           dgram   udp     wait    root    internal

anyone can access these by telnetting to your box,
(telnet localhost daytime)
they are not tcp-wrappable, but you can safely disable them.  there
are few applications that need them, actually none that i can think
of, but i'm sure someone somewhere is using them.
not that they're really a security problem, but there is a
denial-of-service attack playing chargen and discard off of one
another.  at any rate i disable them all except daytime which i
actually use to make sure xntpd is functioning properly.



>Furthermore, what else can I do to protect my system? And while I'm
>thinking about it, is there some way to avoid sending unencrypted
>passwords when retrieving mail from mail.utexas.edu? It doesn't appear
>as if SSH is running there, but is there a site between resnet and
>mail through which I can tunnel encrypted data?

as much as piglet can't be trusted, you could do it with an account
on piglet, or any other unix machine off of resnet.  tunnelling
connections is fairly simple if you read the docs.
there is mention of a script that allows tunnelled pop connections in
the ssh faq
http://www.uni-karlsruhe.de/~ig25/ssh-faq/ssh-faq-4.html#ss4.8
but the link appears to be bad.  and i think it might require you to
have a login account on the pop server, anyway.

anyone know if mail.utexas.edu supports APOP?  i believe it is a
"secure" pop protocol.
---------------------------------------------------------------------------
Send administrative requests to [EMAIL PROTECTED]

Reply via email to