Date: Wed, 12 Aug 1998 13:37:48 +0100 (BST) From: Jay Tribick <netadmin@fastnet.co.uk> To: Luis Saiz <LSaiz@atos-ods.com> Cc: andrew@squiz.co.nz, Marius Bendiksen <Marius.Bendiksen@scancall.no>, freebsd-security@FreeBSD.ORG Subject: Re: UDP port 31337 Message-ID: <Pine.BSF.3.96.980812133711.4811l-100000@bofh.fast.net.uk> In-Reply-To: <35D188EB.A03975A4@atos-ods.com>
next in thread | previous in thread | raw e-mail | index | archive | help
| > Fake network services are an interesting idea. They're not going to be | > viable for most users, but how many of these systems need to be scattered | > around the net and monitored to provide an effective deterrent to scan | > based attacks? .... | | That's the idea Cheswick exposes in the clasical "Firewalls and Internet Security, | Repelling the Wily Hacker". He created a "jail" simulating a real system "on the | fly" after discovering an attack. An interesting idea, create a duplicate of your filesystem within a subdirectory and chroot them into that directory. Would it be possible to fool things like 'ps' that read /proc using this method? Regards, Jay Tribick -- [| Network Administrator | FastNet International | http://fast.net.uk/ |] [| Finger netadmin@fastnet.co.uk for contact information |] [| T: +44 (0)1273 677633 F: +44 (0)1273 621631 e: netadmin@fast.net.uk |] To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980812133711.4811l-100000>
