Welcome, Guest
You have to register before you can post on our site.

Username/Email:
  

Password
  





Search Forums

(Advanced Search)

Forum Statistics
» Members: 5,219
» Latest member: glassagencies
» Forum threads: 4,029
» Forum posts: 16,404

Full Statistics

Online Users
There are currently 175 online users.
» 0 Member(s) | 172 Guest(s)
Bing, DuckDuckGo, Google

Latest Threads
How to install Archboot i...
Forum: Network Problems
Last Post: Meup
2025-05-13, 01:41 PM
» Replies: 0
» Views: 511
clear logs in smoothwall
Forum: Security and Firewalls
Last Post: amanda63
2024-03-10, 03:27 PM
» Replies: 8
» Views: 89,160
I cannot install RedHat 8...
Forum: Redhat
Last Post: hybrid
2023-11-11, 01:01 PM
» Replies: 1
» Views: 42,517
How things are done, usin...
Forum: Xorg Problems
Last Post: ross
2023-09-04, 09:03 AM
» Replies: 0
» Views: 1,922
Im back.....
Forum: Hello
Last Post: anyweb
2021-01-17, 11:36 AM
» Replies: 1
» Views: 5,415
add mp3 plugin to xmms in...
Forum: Fedora
Last Post: anyweb
2021-01-17, 11:30 AM
» Replies: 11
» Views: 41,531
Configuring VSFTPd Server
Forum: FTP Server
Last Post: Johnbaca
2020-10-14, 10:25 AM
» Replies: 32
» Views: 118,522
Wolf won't play sound!
Forum: Game Problems
Last Post: Guest
2020-10-03, 05:51 PM
» Replies: 1
» Views: 56,306
Using git + python
Forum: How Do I?
Last Post: Clueless puppy
2020-08-21, 04:37 PM
» Replies: 0
» Views: 46,204
what does your nick mean ...
Forum: Hello
Last Post: volt
2020-08-06, 03:25 PM
» Replies: 28
» Views: 42,186

 
  Port scan detection
Posted by: xDamox - 2005-07-10, 07:45 PM - Forum: Security and Firewalls - Replies (8)


Well, it's another one of my security articles :) before I start I would like to thank the man znx ;)

for getting PortSentry working due to a little programming error.

 

The piece of software you will need to install is "PortSentry" which can be downloaded from here.

 

Once you have downloaded the source file you can decompress it by issue the following command:

 



Code:
tar zvxf portsentry-1.2.tar.gz




 

Once this has been decompressed you should see a directory called: "portsentry_beta" change

into that directory this can be do by issue the cd command as shown below:

 



Code:
cd portsentry_beta




 

Once you are in this directory you should be able to see a file called portsentry.c open this with

your favorte editor (mine is vim as it counts the lines) and scroll down to line 1584 and it will look

like:

 



Code:
 printf ("PortSentry - Port Scan Detector.\n");
 printf ("Copyright 1997-2003 Craig H. Rowland <craigrowland at users dot
sourceforget dot net>\n");
 printf ("Licensing restrictions apply. Please see documentation\n");
 printf ("Version: %s\n\n", VERSION);




 

You need to change the line that wraps so the above should now look like:

 



Code:
 printf ("PortSentry - Port Scan Detector.\n");
 printf ("Copyright 1997-2003 Craig H. Rowland <craigrowland at users dot sourceforget dot net>\n");
 printf ("Licensing restrictions apply. Please see documentation\n");
 printf ("Version: %s\n\n", VERSION);




 

Now that the file is fixed issue the following commands

 



Code:
make linux
make install




 

Now portsentry is installed :) you can edit the configuration file portsentry.conf this file is well

commented so I wont go into detail. Once you have edited the config file open the portsentry.ignore

file and you should see the following:

 



Code:
# Put hosts in here you never want blocked. This includes the IP addresses
# of all local interfaces on the protected host (i.e virtual host, mult-home)
# Keep 127.0.0.1 and 0.0.0.0 to keep people from playing games.
#
# PortSentry can support full netmasks for networks as well. Format is:
#
# <IP Address>/<Netmask>
#
# Example:
#
# 192.168.2.0/24
# 192.168.0.0/16
# 192.168.2.1/32
# Etc.
#
# If you don't supply a netmask it is assumed to be 32 bits.
#
#

127.0.0.1/32
0.0.0.0




 

Because we are going to test portsentry comment out 127.0.0.1/32 with a hash # so it will look like:

 



Code:
# Put hosts in here you never want blocked. This includes the IP addresses
# of all local interfaces on the protected host (i.e virtual host, mult-home)
# Keep 127.0.0.1 and 0.0.0.0 to keep people from playing games.
#
# PortSentry can support full netmasks for networks as well. Format is:
#
# <IP Address>/<Netmask>
#
# Example:
#
# 192.168.2.0/24
# 192.168.0.0/16
# 192.168.2.1/32
# Etc.
#
# If you don't supply a netmask it is assumed to be 32 bits.
#
#

#127.0.0.1/32
0.0.0.0




 

Once that is done its time to start portsentry. PortSentry can be started with a -tcp or a -udp these

are for basic stealth scans but you can also issue -atcp and -audp which mean advanced monitoring.

 

To start portsentry issue the following:

 



Code:
./portsentry -atcp
./portsentry -audp




 

Once these two have started check they are running fine by issuing the following command:

 



Code:
tail /var/log/messages




 

you should have similar output to mine as shown below:

 



Code:
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced mode will manually exclude port: 520
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced mode will manually exclude port: 138
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced mode will manually exclude port: 137
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced mode will manually exclude port: 67
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced Stealth scan detection mode activated. Ignored UDP port: 68
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced Stealth scan detection mode activated. Ignored UDP port: 520
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced Stealth scan detection mode activated. Ignored UDP port: 138
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced Stealth scan detection mode activated. Ignored UDP port: 137
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: Advanced Stealth scan detection mode activated. Ignored UDP port: 67
Jul 10 20:23:13 localhost portsentry[9918]: adminalert: PortSentry is now active and listening.




 

Now to run the test, issue the following nmap command:

 



Code:
nmap -sS -O 127.0.0.1




 

if you check the /var/log/messages again you should see the following or similar:

 



Code:
Jul 10 20:02:20 localhost portsentry[9667]: attackalert: Host: localhost.localdomain/127.0.0.1 is already blocked Ignoring
Jul 10 20:02:20 localhost portsentry[9667]: attackalert: TCP SYN/Normal scan from host: localhost.localdomain/127.0.0.1 to TCP port: 487
Jul 10 20:02:20 localhost portsentry[9667]: attackalert: Host: localhost.localdomain/127.0.0.1 is already blocked Ignoring
Jul 10 20:02:20 localhost portsentry[9667]: attackalert: TCP SYN/Normal scan from host: localhost.localdomain/127.0.0.1 to TCP port: 617




 

:)portsentry works now if you check the /etc/hosts.deny you will notice a new entry in there

which is 127.0.0.1 which portsentry blacklisted. Now finally delete the entry in the /etc/hosts.deny

and in the portsentry.ignore uncomment out 127.0.0.1/32 and you are ready to go.

 

Well thats it another tutorial finished :)

Print this item

  UAE - Compiling for network access
Posted by: Memphisartguy - 2005-07-09, 02:11 AM - Forum: Compiling - Replies (6)


So I used WinUAE to set up a nice Amiga OS 3.9, with a Cnet Pro BBS, debugged the telser.deviced and telnetd.device to work with the CnEt Pro. Every thing runs great.

 

So when moving to the Linux platform I have to compile the configure file with the bsddevice-=new uncommented.

 

How do I Compile this? Nothing has yet to make a binary I can use.

 

I am using the latest version of E-UAE

Print this item

  Webmin & Virtualmin & Fedora
Posted by: Memphisartguy - 2005-07-09, 01:15 AM - Forum: Fedora - Replies (4)


Been trying to follow these instructions in Fedora Core 4

 

Every things cool unitl step three. Sense these instructions are 1 year old, i have adapted it a little. Main issue is part 3

 

rpm -ivh ~/httpd-2.0.40-21.16.legacy.src.rpm

 

Does this.

 

warning: ./httpd-2.0.50-1.0.src.rpm: Header V3 DSA signature: NOKEY, key ID 4f2a6fd2

1:httpd ########################################### [100%]

 

No files are created as the guide below says should happen.

 

 

 

-------------------------- missing how to -----------------------------

Here's how to rebuild Apache from SRPM, including the change you want to make.

 

1. Grab the httpd SRPM from the FC1 updates:

 

% wget [/url][url=http://download.fedora.us/fedora/fe....48-1.2.src.rpm]http://download.fedora.us/fedora/fe....48-1.2.src.rpm

 

2. Set up your RPM build area:

 

% echo "%_topdir /home/yourname/src/rpm" >> ~/.rpmmacros

% mkdir -p ~/src/rpm/

% cd ~/src/rpm

% mkdir BUILD RPMS RPMS/i386 SOURCES SPECS SRPMS

 

3. Install the SRPM:

 

% rpm -ivh ~/httpd-2.0.48-1.2.src.rpm

 

This will put the source tarball and patches in SOURCES, and a specfile (metadata and instructions for building) in SPECS.

 

4. Edit the specfile, bumping up the release number, changing the suexec docroot, and noting this in the changelog:

 

% vi SPECS/httpd.spec

 

line 8:

< Release: 1.2

> Release: 1.3

 

line 202:

< --with-suexec-docroot=%{contentdir} \

> --with-suexec-docroot=/home \

 

line 510:

%changelog

* Tue May 18 2004 Your Name <you@yours> 2.0.48-1.3

- Rebuilt with suexec-docroot set to /home instead of %{contentdir}

 

5. Rebuild httpd, creating both a binary RPM and a source SRPM:

 

% rpmbuild -ba SPECS/httpd.spec

 

You may have to install some additional packages to satisfy build dependencies here. When it's done, you'll have binary packages in RPMS/i386/, and a source package including your modified specfile in SRPMS/.

 

6. You can now either upgrade to the httpd you just compiled...

 

% sudo rpm -Fvh RPMS/i386/httpd*.rpm RPMS/i386/mod_ssl*.rpm

 

7. ...or simply extract the suexec binary and copy it over the original one:

 

% rpm2cpio RPMS/i386/httpd-2.0.48-1.3.i386.rpm | cpio -imVd ./usr/sbin/suexec

% sudo cp -p /usr/sbin/suexec /usr/sbin/suexec.orig

% sudo cp ./usr/sbin/suexec /usr/sbin/suexec

% sudo chown root:apache /usr/sbin/suexec

% sudo chmod 4510 /usr/sbin/suexec

 

Personally, I haven't yet had any problems with just keeping the suexec binary I compiled months ago and reusing it with later updates of Apache (i.e., repeat step 7 after installing an httpd update), YMMV. Obviously if there is ever a security update involving suexec itself, though, you should rebuild again.

________________________________________

Last edited by bradthemad : 2004-05-18 at 07:14 AM PDT.

------------------how to that was missing --------------------------

Print this item

  Installing Samba 3.0.14a-2 under Fedora Core 4
Posted by: ASrael - 2005-07-08, 07:31 PM - Forum: Samba and NFS - Replies (5)


This Tutorial is free and may be distributed with reference to this website

It is for people running Fedora Core 4 wanting to setup a working Samba

Server to access the Shares on a Linux machine from a Windows machine

 

Commands are written in green

Everything else are things you might edit / write / add

 

Get my Tutorials from [/url][url=http://www.bildunxxluecke.de/usr/fedora]http://www.bildunxxluecke.de/usr/fedora

 

1.

 

--------------------------------------------------------------------------------

 

Prepare your Enviroment:

 

- samba-common-3.0.14a-2.i386.rpm

- samba-3.0.14a-2.i386.rpm

- samba-client-3.0.14a-2.i386.rpm

- samba-swat-3.0.14a-2.i386.rpm (install only if you want have samba-webinterface)

 

2.

 

--------------------------------------------------------------------------------

 

Now its time to configure SAMBA:

 

rpm -i samba-common-3.0.14a-2.i386.rpm

rpm -i samba-3.0.14a-2.i386.rpm

rpm -i samba-client-3.0.14a-2.i386.rpm

rpm -i samba-swat-3.0.14a-2.i386.rpm

 

3.

 

--------------------------------------------------------------------------------

 

Everything should be installed now, its time to configure Samba:

 

- cd /etc/samba/

- vi smb.conf

 

You can safely edit this file (in fact you must) necessary is :

workgroup = < your windows network workgroup > e.g.: WORKGROUP

server string = < Information about your Samba Server >

netbios name = < Hostname of Sambaserver > e.g.: SMBSERV01

 

You dont need to touch the shares so far, if you want to share

other directorys keep and eye on the examples in the smb.conf

 

4.

 

--------------------------------------------------------------------------------

 

Now everything is done and you can start:

[root@test] smbd -D

[root@test] nmbd -D

 

Now you should be able to access your Sambaserver from your

Windowsmachine via \\< smb machine ip >

 

(5.)

 

--------------------------------------------------------------------------------

 

For those who want to use swat with samba :

 

- cd /etc/xinetd.d/

- vi swat

change disable = yes to => disable = no

- cd /etc/

- vi services

make sure the following line is in it : swat 901/tcp # Samba Web Administration Tool

to test do 'grep 901 /etc/services' , if not in insert it

now do : service xinetd restart

 

Swat should be running now !

 

(6.)

 

--------------------------------------------------------------------------------

 

To access Swat Webinterface from Lan :

 

- cd /etc/xinetd.d/

- vi swat

change 'only_from = 127.0.0.1' to 'only_from = 'your.netmask.0.0' e.g.: '192.168.0.0'

the 0 stands for wildcards (e.g. 192.168.0.0 to 192.168.255.255)

 

 

--------------------------------------------------------------------------------

 

Everything is fine .. enjoy now just do http:// SAMBAIP : 901 and login as root

Print this item

  Easily save embeded media in Firefox
Posted by: hijinks - 2005-07-08, 11:58 AM - Forum: Web Browsers - Replies (3)


I just found out this nice little feature in firefox. If you like to save those funny video clips you see on some websites and hate searching through the page source for the link to the media then this is for you.. So lets go to this funny video for example

 

[/url][url=http://www.ebaumsworld.com/videos/signfun.html]http://www.ebaumsworld.com/videos/signfun.html

 

Ok so when viewing that page in firefox right click anywhere on the page and goto "View Page Info" and then click the tab "Media"

 

Now the embeded movie should be listed as embeded in type.. just click on that and then the save as button and your saving it without looking at the source and then using wget.. NICE!

Print this item

  Audio on IBM 600X
Posted by: brodyj - 2005-07-07, 11:07 PM - Forum: Xorg Problems - Replies (1)


Ok, so I just installed Core 4 on my IBM Thinkpad 600X, everything went smooth, except for the audio.

 

When I go to "soundcard detection", i'm presented with the nifty little screen, and it says it found a

 

Cirrus

Logic CS 4614/22/24 [CrystalClear SoundFusion Audio Accelerator

snd-cs46xx

 

But when I click "Play test sound", nothing seems to happen, and yes the volume is up and on.

 

 

Any ideas?

Print this item

  dns/dhcp using dnsmasq
Posted by: mechtn - 2005-07-07, 09:31 PM - Forum: DNS and DHCP - Replies (1)


/etc/dnsmasq.conf

 

---------------------------------

 

domain-needed

bogus-priv

interface=eth0

local=/rkbrb.local/

expand-hosts

domain=rkbrb.local

dhcp-range=10.10.23.105,10.10.23.240,255.255.255.0,192h

dhcp-option=44,10.10.23.99 # WINS server(s)

 

---------------------------------

 

 

Currently working on getting dhcp/dns running using dnsmasq!

Print this item

  updated BF2 with the new patch
Posted by: anyweb - 2005-07-07, 12:05 PM - Forum: Game Problems - Replies (2)


help !

 

it just trys to connect and then bombs back to the server menu, see attached screenshot for one of two errors

 

mostly:

 

a:/ it will look as if its joining the server and then bomb back to the server list menu with no error at all

 

or less often i see

 

b:/ (the screenshot)

 

any ideas ?

 

cheers

 

anyweb

<a class="ipsAttachLink ipsAttachLink_image" href="<fileStore.core_Attachment>/post-1-1120737927.png" data-fileid="343">[img]<fileStore.core_Attachment>/post-1-1120737927.png[/img]</a>



Attached Files
.png   Image1.png (Size: 395.24 KB / Downloads: 0)
Print this item

  Internet Access
Posted by: xDamox - 2005-07-05, 08:42 PM - Forum: Security and Firewalls - Replies (6)


Hi,

 

I was curious on how you could limit users surfing the Internet, I found KobrAs's guide useful :)

I setup a group called Internet and assigned users to it and apply this to my iptable

 



Code:
iptables -t filter -A OUTPUT -p tcp -dport 80 --match owner --gid-owner 501 -j DROP




 

This worked great, but I was wondering if you had your users logging in all over your network

using LDAP, How could you make these rules apply still?

Print this item

  Linux-Noob uptime league
Posted by: magikman - 2005-07-05, 05:08 PM - Forum: General Chat - Replies (3)


I thought that it would be fun for us all to have an uptime-league, so i have created one. All you have to do is go to uptime-project, create an account, join the Linux-Noob team and download the proper client for your platform - linux only please. Then install the client and edit the /etc/yasuc.conf to reflect the proper values for the account that you created. It might also be a good idea to use cron to update the time. While you are there go into your profile and get an uptime image and place it in your signature for the linux-noob forums.

 

 

Please, no jokes about my uptime. I just installed this yesterday. :)

Print this item