Search squid archive

Re: Squid attack?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi

The best thing to have done is tighten up what sockets are listening if you have socklist utility run # socklist this should show tcp/udp sockets that are listening and thus open.

Thus any sockets that are listening investigate what there are and why you need them.
Run some tools like nikto, nessus and nmap and harden your box.
Before you commissioned your squid cache box this lot should have been done.
Thus you will know what services is open to the general populace.

Cheers


Henrik Nordstrom wrote:

lör 2007-02-24 klockan 08:28 +0100 skrev Henrik Nordstrom:

To diagnose after you have made changes somehow stopping the abuse then
checking all logs in detail is the only available, or maybe tcpdump
looking for users still trying to access the service and from that
derive how they gained access in the first place..

One educated guess: Maybe the port dansguardian is listening on is
accessible from the outside.

Regards
Henrik


[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux