Re: crazy hackers and logwatch

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 8 Aug 2005, Nathan Grennan wrote:
> That sounds like auto-shunning, a term that Dan Kaminsky, uses. You are
> basically allowing the cracker add rules. Auto-shunning + IP Spoofing =
> Nastiness. They could say spoof your default gateway, root dns servers,
> the dns servers you use, etc. Then you automatically block those things
> that you need access to. They can also do this to you so that they can
> pretend to be you. They just get you to block the people that they want
> to appear to you to. The reverse is also possible. They get you to block
> your bank and then pretend to be your bank to phish you.

AFAIK no this is not possible with denyhosts. The logs it looks for 
requires complete end to end TCP connections. Good luck spoofing a 
complete end to end TCP connection on the modern internet (hint:source 
routing does not work for some 15 years now).

Another good one is pam_abl. And I'm afraid that one is immune to spoofing 
also.

-Dan

-- 
fedora-test-list mailing list
fedora-test-list@xxxxxxxxxx
To unsubscribe: 
http://www.redhat.com/mailman/listinfo/fedora-test-list

[Index of Archives]     [Fedora Desktop]     [Fedora SELinux]     [Photo Sharing]     [Yosemite Forum]     [KDE Users]