Date: Sun, 25 Mar 2001 11:26:15 +0200 (EET) From: Domas Mituzas <domas.mituzas@delfi.lt> To: jessemonroy@email.com Cc: security@FreeBSD.ORG Subject: Re: Fwd: A Simple TCP Port Alarm Message-ID: <Pine.BSF.4.21.0103251119240.49827-100000@axis.tdd.lt> In-Reply-To: <200103250146.RAA36357@dnull.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi, > I've written a simple TCP port alarm in Perl. > The default configuration spoofs the daytime service on port 13. > It logs all connections, then emails to the configured recipient. > You can check it out at: How is it connected with security? :-) Actually tcpwrappers (hosts.allow) support various actions on denied or accepted connections, like sending email message or a bomb to the blackhat. There are a lot of other tools like portsentry, that happen to be rather succesful. And connections to daytime service are often very hazardous. Time is very valuable information, so we'd log all connections, that are trying to obtain it from us, cause a simple leak will make whole network open to bad guys. No offence, congrats dear Linux coder, you've written your first public software :) (How long are you going to support it?) Regards, Domas To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0103251119240.49827-100000>