[CLUE-Tech] enabling ftp
Brandon N
bneill at yahoo.com
Sat Mar 17 16:37:52 MST 2001
To find almost any Linux software, go to freshmeat.net
http://freshmeat.net/projects/tripwire/
there is a very good book about tripwire and other linux security
measures called, Linux System Security.
Brandon
--- Cyberclops <Cyberclops at hawaii.rr.com> wrote:
> And where can you find "tripwire" again is this for Linux too? I
> assume
> it is.
>
> ian wrote:
> >
> > On Sat, Mar 17, 2001 at 09:37:03AM -0700, rfrank wrote:
> > > On Saturday 17 March 2001 08:49, Ian wrote:
> > > > I can't say this enough. TURN OFF FTP ASAP!!!!
> > >
> > > Okay I disabled ftp (but not telnet). I commented out the lines
> for
> > > ftp and ftp.data in /etc/services. Is telnet as risky? I guess
> with ssh
> > > I don't need either one of them.
> >
> > Yeah.. Both of them send stuff in cleartext. It is very much worth
> the time
> > to learn about the security implications of these tools.
> >
> > Another thing is look into tripwire to monitor your system or
> something
> > similar like an IDS system. Just if your going to be always on the
> > net.
> >
> > > > Especially since your on a cable modem (Road Runner?). It is
> amazingly
> > > > easy to snoop on the Cable modem network to capture cleartext
> login
> > > > passwords.
> > >
> > > I'm on Sprint Broadband service. I've heard that cable modems
> are
> > > easily snooped, but I haven't heard if wireless Broadband
> connections are
> > > susceptible. I'm guessing not.
> >
> > Well I don't know what how the MMDS system works exactly. Guess I
> should
> > look into. However most if not all of the wireless things have
> proven
> > less than stellar in their security view. I would be at least
> minimally
> > paranoid about anything that is not in your direct control. So
> that would
> > fall into whenever information is left from your box at home and
> your
> > remote box. That connection in between is always suspect.
> >
> > > > That was how I originally got compromised. I went down the
> same path that
> > > > you are with how to secure your box. First I'll get ftp.. then
> I'll get
> > > > apache.. then I'll get ssh.. then I'll put a firewall up.
> Wrong order..
> > >
> > > Okay so now the order is ipchains, then ssh. OpenSSH seems to be
> > > preferred. But that means I'll have to put new software on any
> machine
> > > that needs to get to my site. A small price, I guess, for
> security.
> >
> > Just a suggestion from someone who was compromised. Lock down the
> firewall
> > first. Then start opening things up. One service at a time. That
> way
> > you can do snoops from outside (i.e. your remote box) to check the
> > security. Look at nmap and SATAN to run against yourself from your
> > remote box to check and confirm that you only opened the service
> that you
> > want and didn't accidently open up something else.
> >
> > ian
> >
> > _______________________________________________
> > CLUE-Tech mailing list
> > CLUE-Tech at clue.denver.co.us
> > http://clue.denver.co.us/mailman/listinfo/clue-tech
> _______________________________________________
> CLUE-Tech mailing list
> CLUE-Tech at clue.denver.co.us
> http://clue.denver.co.us/mailman/listinfo/clue-tech
__________________________________________________
Do You Yahoo!?
Get email at your own domain with Yahoo! Mail.
http://personal.mail.yahoo.com/
More information about the clue-tech
mailing list