I'd like to expand on my security skills, it's definately an important 
topic.

One quick question, if my iptables rules are like rusty's Netfilter 
HOWTO ones, what mechanisms might someone have for getting in, especially 
if I am running server programs on that same machine?
In a nutshell those rules are:
Drop on the ppp0 interface, unless the packet is flagged as a established 
or related connection.
Accept new connections on any interface but ppp0.

Can someone spoof the interface? I wouldn't think so (but also wouldn't 
know!) Or can they spoof an established connection?

Also, can anyone recommend any good 'across the board' security books,
i.e covering the other major OS(es) as well?  Typical attacks, how 
to avoid them and system design/implementation considerations?  "Hacking 
Exposed" has been touted as one option.  Opinions?

'ta
Steve
-- 
"We live in an age of continuous partial attention."
--Ms. Linda Stone, researcher and VP at Microsoft

http://www.helmsdeep.net/capn-k/
Linux | Windows | CAD | Audio Visualisation and more







-- 
SLUG - Sydney Linux User's Group - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug

Reply via email to