Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 12 Aug 1998 13:37:48 +0100 (BST)
From:      Jay Tribick <netadmin@fastnet.co.uk>
To:        Luis Saiz <LSaiz@atos-ods.com>
Cc:        andrew@squiz.co.nz, Marius Bendiksen <Marius.Bendiksen@scancall.no>, freebsd-security@FreeBSD.ORG
Subject:   Re: UDP port 31337
Message-ID:  <Pine.BSF.3.96.980812133711.4811l-100000@bofh.fast.net.uk>
In-Reply-To: <35D188EB.A03975A4@atos-ods.com>

next in thread | previous in thread | raw e-mail | index | archive | help


| > Fake network services are an interesting idea.  They're not going to be
| > viable for most users, but how many of these systems need to be scattered
| > around the net and monitored to provide an effective deterrent to scan
| > based attacks?  ....
| 
| That's the idea Cheswick exposes in the clasical "Firewalls and Internet Security,
| Repelling the Wily Hacker". He created a "jail" simulating a real system "on the
| fly" after discovering an attack.

An interesting idea, create a duplicate of your filesystem within a
subdirectory and chroot them into that directory. Would it be possible
to fool things like 'ps' that read /proc using this method?

Regards,

Jay Tribick
--
[| Network Administrator | FastNet International | http://fast.net.uk/ |]
[|        Finger netadmin@fastnet.co.uk for contact information        |]
[| T: +44 (0)1273 677633 F: +44 (0)1273 621631 e: netadmin@fast.net.uk |]



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980812133711.4811l-100000>