1 |
Joseph could you direct me toward a how to on how to set that up, please. |
2 |
|
3 |
Raphael have you gone through |
4 |
http://www.gentoo.org/doc/en/security/index.xml it has some good |
5 |
points and worth going through and ticking off each one. |
6 |
|
7 |
Cheers |
8 |
Rav |
9 |
|
10 |
On 8/3/05, Joseph <syscon@×××××××××.com> wrote: |
11 |
> On Tue, 2005-08-02 at 23:50 +0000, Raphael Melo de Oliveira Bastos Sales |
12 |
> wrote: |
13 |
> > Hi there, |
14 |
> > |
15 |
> > I was wondering what tools should I use to detect security flaws to |
16 |
> > my server and a few tips on how to use them. What are the most common |
17 |
> > forms of attack and how do I avoid being attacked by one of them? |
18 |
> > |
19 |
> > The services avaliable are only Apache - SSL and SSH. I've |
20 |
> > installed an firewall, iptables and firestarter to control it, and |
21 |
> > blocked all ports except 443 and 8080, where the SSH is listening. |
22 |
> > Apache has PHP installed as a module. |
23 |
> > |
24 |
> > Thanks for the attention, |
25 |
> > |
26 |
> > Raphael. |
27 |
> |
28 |
> I have port knocking installed on firewall, to further protect any SSH |
29 |
> attacks. |
30 |
> So port 22 is closed (in stealth mode) and only opens if it received the |
31 |
> right knock sequence, moreover it is only opened to an IP address from |
32 |
> which received successful knock sequence; all others see this port as |
33 |
> closed (in stealth mode). |
34 |
> |
35 |
> -- |
36 |
> #Joseph |
37 |
> -- |
38 |
> gentoo-user@g.o mailing list |
39 |
> |
40 |
> |
41 |
|
42 |
|
43 |
-- |
44 |
"When you play a Microsoft CD backwards you can hear demonic Voices... |
45 |
that's nothing - when you play it forward it installs Windows" |
46 |
Are you fearing my mouse? <:3___)~~~~ |
47 |
|
48 |
-- |
49 |
gentoo-user@g.o mailing list |