Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 25 Mar 2001 11:26:15 +0200 (EET)
From:      Domas Mituzas <domas.mituzas@delfi.lt>
To:        jessemonroy@email.com
Cc:        security@FreeBSD.ORG
Subject:   Re: Fwd: A Simple TCP Port Alarm
Message-ID:  <Pine.BSF.4.21.0103251119240.49827-100000@axis.tdd.lt>
In-Reply-To: <200103250146.RAA36357@dnull.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi,
> I've written a simple TCP port alarm in Perl.
> The default configuration spoofs the daytime service on port 13.
> It logs all connections, then emails to the configured recipient.
> You can check it out at:

How is it connected with security? :-) Actually tcpwrappers
(hosts.allow) support various actions on denied or accepted connections,
like sending email message or a bomb to the blackhat. There are a lot of
other tools like portsentry, that happen to be rather succesful.

And connections to daytime service are often very hazardous. Time is
very valuable information, so we'd log all connections, that are trying to
obtain it from us, cause a simple leak will make whole network open to bad
guys.

No offence, congrats dear Linux coder, you've written your first public
software :) (How long are you going to support it?)

Regards,
Domas


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0103251119240.49827-100000>