Ubuntu Security :: Modify The Firewall To Let In Certain Ip Addresses But Lock Others Out?

Jan 12, 2010

how do i modify the ubuntu firewall to let in certain ip addresses but lock others out.

View 6 Replies


ADVERTISEMENT

Ubuntu Security :: Firewall Can Install Only Let Certain MAC Addresses Through On Certain Port?

Jul 25, 2010

Is there a firewall I can install that will only let certain MAC addresses through on a certain port?

View 2 Replies View Related

Security :: Use Iptables As Firewall Instead Of Juniper Firewall?

May 9, 2011

Can we use iptables as firewall instead of Juniper firewall

View 2 Replies View Related

General :: Dial-up Connectivity - Configure Kppp With Firewall - Find Lock Files

Mar 16, 2010

I have a desktop computer running Debian Lenny, a 56 K modem, and a dial-up account, currently configured like this: computer -> modem -> UPS -> phone jack

When I run off a Knoppix live CD, I can use kppp to configure pppd (using PAP/CHAP authentication and hardware control flow) to dialup and surf. When I try to user kppp to configure pppd exactly the same way on my hard drive installation, I get nothing. Both my Knoppix live CD and Debian Lenny use exactly the same version of kppp, but the pppd related files in /etc/ppp look a bit different.

Under both Knoppix and Debian Lenny hard drive installation, when I try to connect, the login debug window of kppp shows:

Code:
ATZ
OK
ATM1L1
OK
ATDT [phone number]

At this point I hear the modem dialing out, and when using Knoppix, after a few seconds I see

Code:

Which I think corresponds to my route to the InterNet being established through my ISP. When using the hard drive install, I never see the CONNECT, and all indications are that my modem is not sending authentication information at all, but getting stuck right after dialing out, so that my ISP gets a phone call from a modem which... refuses to speak. I never had any problems before, so I am baffled.

So apparently my system is currently misconfigured in some way which prevents point to point protocol from getting out.

Questions:
I have a firewall on my computer which I set up using guarddog. I have enabled point to point protocol from internet zone to local zone. I know that ppp is a symmetrical protocol, but my understanding is that I do not need to enable point to point from local to internet zone. I have not enabled irc protocol because my understanding is that this is only relevant to software flow control using chat scripts. Does this sound correct? Is there some additional protocol I need to allow in order to use pppd to dial out?

When I reboot my computer (off the hard drive) I sometimes see that the system complaining about a failure to stop every process, and sometimes I see mention of an eth0.pid. I have been looking for lock files; would they all be in /var/run?

When I use kppp to configure pppd, I want to do that as my ordinary user for at least two reasons, correct? don't want to run pppd as root user for security reasons kppp is a GUI and root user can't use X (on Debian)

So I should see in home directory of my ordinary user
.kde/share/config/kppprc
.kde/share/apps/kppp

But not in /root directory, correct? What pppd related processes should I see with ps -ef if everything is working?

View 2 Replies View Related

Ubuntu Security :: Gpg With Different Mail Addresses?

May 14, 2011

possible to use a gpg key registered on a different email account than the account I have linked to evolution. As is now, I have entered the key id into evolution, but it does not decrypt my mails. It does not even ask for a password.simply opens the message and displays a page of code.

View 2 Replies View Related

Security :: POP3 Through Iptyables And ConfigServer Security And Firewall

Sep 23, 2010

I have a Suse11 box with 2 network cards:

I have squid as a proxy on the Suse box, and with the default firewall I have to enable masquerading to allow clients on the eth3:1-3 to send and receive mail through the Suse box. I found the Suse firewall completely inadequate (all P2P software/connections are allowed once you enable masquerading) and had to install ConfigServer Security & Firewall. In die configuration of csf I could get my way around getting smtp to work for the eth3:1-3 clients, but pop3 connections does not go through the box. I know I need to allow port 110 and 995 to masquerade of NAT (or something) and then the same for port 22

View 2 Replies View Related

Ubuntu Security :: What IP Addresses To Be Used For Update Servers

Mar 22, 2010

Does anyone know the ubuntu update servers IP addresses. I am trying to fine tune my firewall rules and was unsure of what ip addresses to use for the update servers. I believe they are us.archive.ubuntu.com and security.ubuntu.com. However, I could be wrong.

View 3 Replies View Related

Ubuntu Security :: Modify The Iptables Rules In Any Way?

Jul 9, 2011

what do the following two commands do? Do they modify the iptables rules in any way?

sudo /sbin/iptables -L -n
sudo /sbin/ip6tables -L -n

View 5 Replies View Related

Ubuntu Security :: Resolving IP Addresses In Iptables Logs?

Jan 19, 2010

whether iptables logs can be set to automatically resolve IP addresses? I am running the firewall on a network with DDNS/DHCP, and this ability would really help quickly identify hosts with suspect traffic.Failing this, I guess the simplest solution will be to simply set static addresses!

View 1 Replies View Related

Security :: Security - Virus - Firewall Protection ?

Feb 23, 2011

I tried installing F-prot's linux scanner but it doesn't seem to want to install and I am tired of messing with it.

So I am wondering if I even need it or if there is something else.

I am behind a firewall already with my router if that helps any.

I guess I am having trouble understanding why virus protection is less necessary.

Do people not write viruses for linux systems?

View 7 Replies View Related

Security :: How To Modify Ftp Files Permission?

May 18, 2010

I have a ftponly user "rom" in my box. This is used by our vendor to send files through ftp. When they send files the ownership of files are all the same as user name group created in this machine.But our application engineers use another user name "deb" to process these file. But as the owner of these file are "rom", they cannot process with their user. Manually they modify the user name and group and then they able to process.The group ID of the two users are different and its application dependent.how should the ownership will be modified automatically or is there any workaround or script to modify the ownership of these file for application user's?

View 5 Replies View Related

Security :: IPTABLES Apply Certain Rules To Certain Mac Addresses

Jul 11, 2010

so the firewall rules I am currently using are displayed below.

Code:

# DROP ALL FORWARDED PACKETS
iptables -P FORWARD DROP # DROP ALL PACKETS
# ALLOW DHCP THROUGH THE FIREWALL

[code]....

View 6 Replies View Related

Security :: Unknown IP Addresses In Samba Logs?

Feb 1, 2011

I have a (headless) Debian (Linux debian 2.6.26-2-486) system running on an old Pentium machine in our home network. I use it as a Samba share, among other things. I recently noticed some Samba log files that I cannot explain the origin of. In /var/log/samba there are a couple of files like this one:/var/log/samba/log.istvan (Note: there is no machine named 'istvan' in my local network)

Code:
[2011/01/04 21:15:34, 1] smbd/service.c:make_connection_snum(1198)
istvan (::ffff:78.92.155.185) connect to service boeken initially as user nobody

[code]...

View 9 Replies View Related

Ubuntu Security :: Protected Secondary Log Files - Permission To Modify

Mar 19, 2010

Is it possible to somehow setup a secondary group of log files that log every action taken on the server where your average user wouldn't know that they're being logged. Perhaps if a hacker got in and messed around or something you'd be able to see what they did, but they wouldn't have permission to modify the file.

View 1 Replies View Related

Ubuntu Security :: Tcpdump: Filtering For Packets From A Site With Mulitple Ip Addresses?

Aug 13, 2011

I want to capture all packets from site "www.examplesite.com" so I checked its ip address in an ip address look up and it was 123.456.abc.def.So I set my filter to "dst host 23.456.abc.def"However I then realised that multiple ip address point to ww.examplesite.com, for example say the following ips also go to987.654.321.000111.222.333.444So is there a filter that will automatically capture all traffic going to www.examplesite.com or do I have to go and manually find all it's ip addresses and pass them all to the filter?

View 2 Replies View Related

Ubuntu Security :: Set Permissions Like Windows - User Can Delete Files But Can't Modify

Jul 16, 2011

look at this : Uploaded with ImageShack.us how can set permissions in linux like this? I want one user can delete files but can't modify them and ... in linux i have 3 group to assign read write and execute them. is ntfs flexible than linux file system?

View 4 Replies View Related

Server :: Modify Sources.list To Improve Security?

May 30, 2011

I've got an amazon EC2 instance running Natty 11.04. I want to harden this server and make sure it's very secure as I ultimately will be handling sensitive data. I'm wondering what should be in /etc/apt/sources.list. Can anyone comment on these contents? Or, better yet, recommend a good secure sources.list file?

Code:

## Note, this file is written by cloud-init on first boot of an instance
## modifications made here will not survive a re-bundle.
## if you wish to make changes you can:

[code]....

View 2 Replies View Related

Ubuntu Security :: Lock The CD / DVD When Absent

May 7, 2010

i tried to make a recommendation ( ups that link ain't comes from me - i only looked for a word in a dictionary ) about traveling around with a laptop. i talking about my own experinace ( sitting in a train go to dinner - chain my laptop but - DVD-drive?? ) for GUI user i think it will be a nice option in the screensaver setup to lock the CD/DVD drive and thus should be very easy to implement by the "eject" command. just have another buttom "lock/unlock" the drive in the menue. think it's usefull and easy to implement.
--> ecject -i 1 / 0. i use this on my sony - works. i know it possible to bypass this - but this will take some much more time.

View 3 Replies View Related

Ubuntu Security :: Lock Or Encrypt An Ext Hdd?

Jul 27, 2010

I have a ext hdd..seagate go. And my 14 yr old son likes to get into it without asking me; of course i dont care when he asks but i don't really want him to get in there and erase anything. I am about to leave for training for 18 weeks with the military. Is there a way i can "secure" the drive for the amount of time that I can't take it with me?

View 8 Replies View Related

Ubuntu Security :: Get VNC Through Firewall?

Jul 20, 2010

I have Ubuntu running on an old PE server. It is running Virtualbox with an instance of Ubuntu inside. The instance is there to run my honeypot.

The server box IP is192.168.1.10. The Virtualbox is bridged with it's own IP of 192.168.1.200. The honeypot daemon is listening to 192.168.1.201 with arpd.

I set up the UFW with DENY. And then enabled only the ports leading to the honeypot scripts which are abound to IP .201. I then forwarded the ports necessary to run VNC to .200.

Here is the UFW status:
buntu@ubuntu-desktop:/var/lib$ sudo ufw status
Status: active
To Action From
-- ------ ----
192.168.1.201 21/tcp ALLOW 21/tcp
192.168.1.201 4444/tcp ALLOW 4444/tcp
192.168.1.201 5544/tcp ALLOW 5544/tcp

[Code].....

View 8 Replies View Related

Security :: Iptables - Limit Access To Port 8443 On Server To 2 Specific IP Addresses

Dec 23, 2010

I'm trying to limit access to port 8443 on our server to 2 specific IP addresses. For some reason, access is still being allowed even though I drop all packets that aren't from the named IP addresses. The default policy is ACCEPT on the INPUT chain and this is how we want to keep it for various reasons I wont get into here. Here's the output from iptables -vnL

[Code]...

Note the actual IP we are using is masked here with 123.123.123.123. Until I can get everything working properly, we're only allowing access from 1 IP instead of 2. We can add the other one once it all works right. I haven't worked with iptables very much. So I'm quite confused about why packets matching the DROP criteria are still being allowed.

View 10 Replies View Related

Ubuntu Security :: Lock PC With Flash Drive?

Nov 6, 2010

Is there a program like BlueProximity but works with a file on a flash drive which will lock up the computer if it does not detect a file on a flash drive. What I am wanting to do is make certain features inaccessible if the flash drive is removed so if anyone uses my computer they can't hurt anything.

View 1 Replies View Related

Ubuntu Security :: Getting Past Lock Without Restart?

Jul 28, 2011

I had a buddy that swore he was such a linux guru he could bypass the lock screen easily but refused to elaborate. Was he just being faseeshis or was he legit. I don't accept starting a new X session using the terminal or restarting and using recovery tool to change password as an answer.

View 1 Replies View Related

Ubuntu Security :: Do I Need To Turn A Firewall On?

May 23, 2010

Will I need to actiavte the firewall that comes with Ubuntu since I'm using Transmission?

View 9 Replies View Related

Security :: Good Firewall To Use With Ubuntu?

Aug 13, 2010

I am new to the Ubuntu/Linix world (less than a week).

I have tried the search, but have had difficulty finding threads on this.

Can someone recommend an excellent firewall to use with Ubuntu?

View 9 Replies View Related

Ubuntu Security :: Hardening My Firewall ?

Aug 14, 2010

I have a VPS (Ubuntu 8.04 server eition) and as such am stuck with using a software firewall.

i currently have UFW installed.

I would ideally like to have my firewall be a little rude, or rather just not polite. I know what i am asking will break the RFC, but i consider this ok due to the security benefits.

I would like to have my firewall
1) ignore (eg drop without responding)all packets that dont start with a syn flag
2)for all other traffic that is currently blocked, have it dropped (again drop it without responding)

If there are any other rules you can think of i would like to know them. I already have only the services i want open and the rest blocked.

View 7 Replies View Related

Ubuntu Security :: Robust Firewall With GUI For 10.04

Nov 4, 2010

I've been using Windows for quite a few years now. I loved the way how I used to set incoming/outgoing rules for my applications. But I'm having hard time doing that in Ubuntu. I tried searching for a good GUI for iptables but I need your help selecting the best. I might learn iptables someday but for the time being I will be using a nice GUI. I'm currently using GUFW, I've tried Firestarter. All I need is a firewall that would allow me to configure rules for my applications.

View 9 Replies View Related

Ubuntu Security :: Allow SSH Tunnel Through Ufw Firewall?

Jun 15, 2011

I have set up a Ubuntu 10.10 server. I have been using ssh tunnels to encrypt my web traffic at public wifi. I am trying to make this server as secure as posible so I enabled ufw. I allowed SSH and HTTP traffic in and denied everything else. But when I do that I can not use SSH -D because when I try to visit a webpage it does not load and I get the following.

Code:
uname@mybox:~$ channel 3: open failed: connect failed: Connection timed out
^C
uname@mybox:~$ fclchannel 4: open failed: connect failed: Connection timed out
^C
uname@mybox:~$ exit
logout

What do I have to do to allow ufw to allow ssh tunnels through?

View 4 Replies View Related

Ubuntu Security :: UFW - How To Setup Firewall

Jun 21, 2011

I am a Linux newbie so please bear with me if I sound stupid. I was checking out how to set up a firewall for my system and landed on this webpage: [URL]. But I am so confused with how this ufw application works. What I understand is that once I set it to "default deny" it prevents unauthorized incoming connection but what does it mean when the author says to add exceptions for services I need? When do I need to do that? Also what's an SSH server?

View 2 Replies View Related

Security :: Set Up IDS And Firewall?

Feb 13, 2010

i want set up IDS(Intrusion detection system) and Firewall in my home just for learning.. The Goal is learn IDS log and Firewall log..

View 4 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved