Ubuntu Security :: Install Proxy On Kubuntu 10.10?
Jan 10, 2011
I am trying to install a proxy on my Kubuntu 10.10, since I live in a country that blocks access to almost everything. I tried to install squid, anon, socks.. both with command-line and KPackageKit, but every time, I have this error message:
[code]...
View 6 Replies
ADVERTISEMENT
Mar 22, 2010
I have Kubuntu 9.10 and i cant update anything because I have a proxy set up. and I cant figure out how to turn it off. I did turn it off through synaptic but its still turned on.
this is what comes out when I try to install updates through kpackagekit
Failed to fetch [URL]
View 2 Replies
View Related
Jan 27, 2011
i have openssh on my box with kubuntu 10.10, i didn't install it and would like to know it's purpose being on here
View 4 Replies
View Related
Mar 5, 2011
When i click preferences-network proxy a screen of comes up showing the system internet configuration. Is there a way to make all system connections got through tor?
View 5 Replies
View Related
Feb 21, 2010
I'm using kubuntu-9.10-desktop-amd64.iso live (booted via grub2 loopback directly from iso on hd, in case that makes a difference). Processor is a E2180 which according to the Intel website supports the NX bit. I've enabled the option "Execute Bit Support" in the BIOS. /proc/cpuinfo shows both nx and pae in both flags lines. But dmesg says "Using x86 segment limits to approximate NX protection".
View 2 Replies
View Related
Jun 5, 2010
I'm using a local proxy server VPN'd to another network.
How do I setup either Firestarter or Gufw/ufw to ONLY allow in/out from ONE port? (The one port the proxy uses)
Ex: Firefox is proxied to 127.0.0.1, all ports, and then the proxy picks it up, and sends out on port xxxx, and recieves on port xxxx, then sends back thru 127.0.0.1, back to Firefox.
Any setting/rules I've treid on either Firestarter or Gufw kills the proxy>VPN (Proxy won't connect to remote network)
Addendum: If I start the proxy FIRST, then the firewall, all is good. I'm thinking the proxy uses a port to connect with remote network first, then switches to my configured xxxx port...hmmm
View 1 Replies
View Related
Apr 1, 2011
Rather than use pfsense, etc I decided to create my own router/proxy etc based on an atom base with 2 nics.Proxy/routing/dns/etc all working fine, I now though want to lockdown the fw rules.ETH1 is the WAN NICETH2 is the LAN NICI'm guessing i want to allow anything out of ETH1, but only allow incoming to ETH1 when its established or related... What about ETH2 though? Any ideas pls? Am used to configuring iptables on single nic, certainly not a router.
Code:
Chain INPUT (policy ACCEPT 18535 packets, 10M bytes)
pkts bytes target prot opt in out source destination
[code]....
View 8 Replies
View Related
Jul 6, 2011
Is my ssl connection secure if I'm going through a proxy. Is it possible to craft a malicious proxy to steal/crack authentication?
View 2 Replies
View Related
Feb 21, 2011
After discovering that the firewall was wide open I decided to finally study the iptables docs and learn how to add rules. Now, I've not yet finished reading guides and documentation but I'd like some advice before I set the default policy on the input chain to deny. I have added a permissive rule for the loopback adapter so that programs that use it do not become mute suddenly. I will also use netstat to see what ports to open for each program that connects to the internet. I'm not that interested in what ports to open but how to find what ports to open.
View 3 Replies
View Related
Mar 3, 2010
I installed DansGuardian. In order for it to work I set the system wide proxy. However it is really easy to get around DansGuardian by going to preference proxy setting. How do I password protect this setting so it requires a password to change proxy setting? Preferably a different password than the normal sudo password if possible. If not I at least want the sudo password protecting it! I run multiple browsers so doing it via the system rather than the browser made the most since.
View 5 Replies
View Related
Sep 19, 2010
I have a http proxy account. It works well under windows through wodTunnel(an active X control component). But, I usually works under linux. I want to use it here. But I don't know how. I tried gstm, it can connect to the server successfully, but it seems can't respond to my http request. What should I do next?
View 3 Replies
View Related
Jul 1, 2010
here i would like to inform you that my company ask me to block facebook site at the work time it is: 08:00-12:30 and 14:00-17:30 in proxy server.i'm still confuse how to do!i need the details configuration in squid regarding how to block the sites
View 2 Replies
View Related
Jun 25, 2011
Well I'm kinda a paranoid person, and got bored and ran a port scan from 0 to 500000 and turned up some interesting results, I was wondering how I find the programs tied to each open port. Its my computer and I'd like to very well know what programs are needing these ports and for what usage.
View 7 Replies
View Related
Mar 22, 2011
When I google this I get a million results, most of which are either too in-depth to be practical or advertisements for one solution or another. Is there a general guideline for hardening a linux (kubuntu) system? A set of steps say, to close all ports and disable all listening services like you would do to a windows machine? I can hardly believe that there are NO vulnerable points of attack on a default kubuntu 10.10 install. I don't know very much right now so I'm looking for something to fill in the gaps and translate my knowledge of windows (in)security into a holistic view of how the penguin operates.
View 5 Replies
View Related
Feb 27, 2010
I was willing to create proxy in between the web app. and MySQL database so that I can do some modification before sending the query to the DB. But how to grep the query in the middle isn't working in the head yet. I found a tool named 'greensql' which captures the query in the middle but couldn't get how they are doing it.
View 4 Replies
View Related
Nov 18, 2010
I want to install L7 iptables on my Linux that is used as a firewall for my internal network composed of some 200 computers. For my IDS , I plan to use Snort. Can I install snort on the same linux that I use as my firewall, or I have to install it on a different PC. Do I need to make use of L7 iptables, while I implement Snort. Shall I use Snort as IDS or IDPS? Where is the best place to install Snort, inside or outside the fire wall? Do I need to have a separate professional proxy installed on the linux, or the L7 proxy is sufficient? What would be the minimum hardware resource that Snorts requires(CPU, Ram)? For better security and performance , do I need to replace my present Linux with a PIX or any other hardware firewall?
View 1 Replies
View Related
Mar 24, 2011
i am using RHEL 5. i configured proxy server. now i want block one website.
View 2 Replies
View Related
Aug 7, 2011
I've got my netbook set up so that I can run a SOCKS proxy via my desktop machine. This works fine at home, but I'm wondering what happens at an internet cafe with public wifi.
Specifically, the connection needs initially to be set up with an ordinary direct internet connection so that I can log in to the cafe's router. I'm concerned that when I then set the network proxy to SOCKS host, the router will cease to recognise me and will disconnect me. This particular detail doesn't seem to have been covered in any instructions that I've seen (maybe I haven't looked hard enough).
View 5 Replies
View Related
Sep 17, 2010
I am working on a project to create a video conferencing environment. For this I use a default installation of BigBlueButton on ubuntu 10.04. One of the main problems here is that it's not safe enough to share classified documents trough this software. It's a simple webserver that uses nginx. What I want to do is make this connection secure.
One of the problems is that I don't only have a connection trough port 80 but it uses the following ports:
Port 80 (HTTP), 1935 (RTMP), 9123 (Desktop sharing).
I would like to use a proxy instead of some tunneling or vpn to do this. Would anyone happen to know anything about squid or another equivalent to do this?
View 3 Replies
View Related
Aug 30, 2010
My company web access is behind proxy(http://abc.proxy). Network admin can get to check who is top10 user and web they access. I owned a centos server. I have a thought that create an encrypted tunnel within proxy so the admin cant detect my http address. This is how it going to works
client with OpenVPN -> OpenVPN server(centos with company proxy)-> proxy -> internet
My connectivity in my client are using OpenVPN server as bridge. Hence, no record for client is recorded in my Network admin monitoring list. OpenVPN server's activity can be traced by network monitoring tools, just assume that our ultimate goal is to hide client activity.
View 2 Replies
View Related
Feb 9, 2010
is someone can guide the best open source tools to monitor as webbase,gui,shell prompt
View 1 Replies
View Related
Apr 5, 2010
I have a problem with sites or domain blocking by squid proxy server in rehl 5. I have trying lots of time but i'm not succed.pls help me how to block sites or domain in rhel 5.
View 3 Replies
View Related
May 30, 2010
I don't care so much the practicality and needlessness of actually setting up a computer for proxy server for personal usage, but none-the-less, i want to do it, and i'm just wondering about hardware.The proxy, i don't intend on having a desktop environment, so it'll be a terminal interface.But for a system that will handle traffic for 3 pc's and a ps3, how much hardware would one suggest i need, as far as RAM, HDD space, so on and so forth.
I was thinking it would be fun to do with with my old amd k6-2 processor and it's 32mb of ram, but in order for that pc to work, i'll need to replace a few hardware pieces, and before i dumb money into it and pull it out of the closet, i want to find out if it would even be worth my time to do it.
View 2 Replies
View Related
Feb 16, 2010
how to lock down individual users from setting a proxy server. Its a server not a WS so it should never go to the internet. I want to lock down the system side and firefox 5 settings.
View 14 Replies
View Related
Jul 22, 2010
I have setup a squid server on Rhel5.4. I would like to know how I can configure my squid server to block anon proxy sites.
View 3 Replies
View Related
Mar 7, 2010
I installed Kubuntu-Desktop on Ubuntu & now my Ubuntu installation is on the 2nd (data)partition! It's hard to believe but I'm looking at it from a live cd and that's what looks like happened.For right now, my main goal is to get Ubuntu back.Should I make the 2nd partition bootable so I have a dual-boot option at startup? Should I make the 2nd partition bootable & not the first? Can I uninstall Kubuntu somehow & have things return to how they were?I thought I was just loading an alternative sassion to Gnome.I thought that the only thing I said yes to was to use the KDE boot manager (or whatever).
View 8 Replies
View Related
Jun 18, 2011
I wish all of my Internet connections will go through a proxy server. HTTP as well as FTP, and every other type of link. How can i do that?
On top of that, is there a free ubuntu-users' public proxy list?
View 5 Replies
View Related
Sep 15, 2010
I have two OS in my system. Windows& and Kubuntu. Both are in separate hard disks. I was using both. In between i have upgraded my system. now when i am giving priority to hard disk containing kubuntu, i can login to kubuntu, but cant get in to windows7. i have upgraded grub but not working. when i am giving priority to hard disk containig windows7 it enters and work properly. but not working in the previous.
View 1 Replies
View Related
Mar 31, 2010
XP Pro SP3
Ubuntu 9.10
Kubuntu 9.10
Tri-booting. They were installed in the order I listed above. I ran into a few bugs with Kubuntu, so I no longer want to use it. I want to use GParted on a LiveCD to format Kubuntu and expand my Ubuntu home partition to sit on top of Kubuntu's space right now. If I nuke Kubuntu, will Grub still exist with my Ubuntu/XP entries to boot?
View 4 Replies
View Related
Dec 15, 2010
I used Avast webfilter (proxied webtraffic through Avast) when running Windows. Sometimes Avast would alert and "protect" me from being infected by a compromised website. NOTE: Avast would alert even absent clicking any links. Just viewing the page could result in infection. Should I be running some kind of proxy webfilter for protection? My understanding is that Firefox can be compromised and this can in turn compromise Ubuntu.Are these kinds of threats specific to Windows running Firefox, or Firefox per se. If Firefox per se it seems like I need some sort of Proxy webfiltering like Avast provides.
View 9 Replies
View Related