Date: Sat, 15 Aug 1998 01:27:34 -0700 (PDT) From: Tim Baur <tbaur@xcert.com> To: Andrew McNaughton <andrew@squiz.co.nz> Cc: Scott <sevn@336.net>, Roger Marquis <marquis@roble.com>, security@FreeBSD.ORG Subject: Re: Scans to ports 1090 and 1080 Message-ID: <Pine.BSF.4.02.9808150122520.4305-100000@home.x509.com> In-Reply-To: <Pine.BSF.3.96.980815200635.2286B-100000@aniwa.sky>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 15 Aug 1998, Andrew McNaughton wrote: > As Wingate is so convenient for hackers wanting to anonymise their > connections (and I've seen it happening a few times) I'd quite like to be > able to refuse connections if the connecting machine is running an > unsecured wingate. > > Does anyone have any suggestions as to how such a thing could be > implemented under freebsd without modifying the daemons? It would need to > run on selected ports only. Well, it would be a programming effort. But could be done, something like TCPD. Incomming inetd connections could be routed via a script/program which would check for open socks, if found the connected would be refused. Prehaps even an extension to TCPD. Even tho TCPD isnt perfect, it could work. Since I am not a hard core programmer, the coding effort isnt in my field :> But I am sure there is many ways to go about doing something like this. -- Tim Baur xcert software inc. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.02.9808150122520.4305-100000>
