Berkeley CSUA MOTD:Entry 18465
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/03 [General] UID:1000 Activity:popular
4/3     

2000/6/14-16 [Computer/SW/Security] UID:18465 Activity:high
6/14    I have written a program that "pipes" port1 to port2 on a machine
        [so if you do say telnet foo 25 that can automatically send to
        to port 19, chargen].  Is there a way to grab all the unbound ports
        and map them to chargen, to deter people scanning my machine?  Will
        that be an expensive program to run?  I don't want to launch one
        version of the process for each port.  Thanks!
        \_ Why are you even doing this?  You're reinventing the wheel.
           Just use the IP firewall rules built into your OS to port
           forward a range of ports.
                \_ I want to turn this on and off.  Also not all OSes support
                IP firewall.  Would like to do this at the application level.
                Can you tell me how to listen on all the unbound ports like
                inetd?
                \_ Sheesh, get a real os.  What are you using?  win 3.1?
                   \_ It's actually a vintage box; running a hacked-up
                      TCP/IP stack for CP/M. I'm using it as a low-load
                      web server
                \_ inetd doesn't listen on all unbound ports - it listens on
                   the ports listed in inetd.conf.  You could write a program
                   that looped through all possible port numbers and bound them
                   (if your OS supports opening 64k fd's in a single process)
                   but that would prevent any other app from being able to bind
                   a listening port.
                        \_ N0H0ZERZ!
                \_ If the ports are unused what's the big deal?  You can't stop
                   a scan.  And if you have insecure services running on other
                   ports, your program won't help that either.  What are you
                   trying to do?  What's the point?  Your program won't do
                   anything useful for you.
        \_ An easier thing to do is run FreeBSD 4.x and in /etc/rc.conf set
           tcp_restrict_rst="YES"  This will cause connections to ports with
           nothing listening to hang until timed out.  This pretty much kills
           portscanning.  --dbushong
                \_ Who cares?  Let em scan.  Security through obfuscation and
                   irritation is not security.  You're only slowing down the
                   inevitable.
                   \_ If you don't believe in "security through obfuscation"
                      you won't mind sharing all your passwords with me.
                        \_ That's different.  A password is obscure in a
                           way that in order to crack it, you need to
                           try a bunch of random combinations before you
                           can get it right.  Security through obscurity
                           is where a backdoor exists but you just hid it
                           somewhere.  It's the difference between a key
                           to your house and hiding that key under the mat.
                           The key is like the password.  Hiding the key
                           under the mat the the obscure part.  Obviously,
                           most prowlers will usually look under the mat
                           first before actually cracking the windows.
                        \_ A password is not obfuscation.  Hiding your buggy
                           service on a random port and making it hard to scan
                           is obfuscation.  Given a few extra minutes your
                           s00per sekret buggy service will turn up.  My ssh
                           passphrase won't.  You know I could give you my
                           ssh passphrase and it won't help you get into any
                           of the machines I run but you wouldn't undersand
                           why.  Damn, it's so sad there's no real ugrad
                           security classes.  It shows.
                        \- i was thinkign about writing a something to wedge
                        the iss scanner specifically. am trying to decide
                        whether to do it at a tcp level [long time outs etc.]
                        or generate random data on port 80, when talking to
                        nfsd, mountd etc. i am also thinking about using
                        xinetd. would be interested in more discussion on
                        this. --psb
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/04/03 [General] UID:1000 Activity:popular
4/3     

You may also be interested in these entries...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/13-8/19 [Computer/SW/Security, Computer/Companies/Yahoo] UID:54436 Activity:nil
7/13    Why would Yahoo store passwords unencrypted?  I recall that even 20+
        years ago the passwords stored in /etc/passwd on instructional
        machines here at Cal were one-way encrypted.  (I think those were
        Ultrix machines.)
        \_ Doesn't this say anything already?
           http://finance.yahoo.com/echarts?s=YHOO+Interactive#symbol=yhoo;range=5y
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/5/8-6/4 [Computer/SW/Unix] UID:54383 Activity:nil
5/8     Hello everyone!  This is Josh Hawn, CSUA Tech VP for Spring 2012.
        About 2 weeks ago, someone brought to my attention that our script
        to periodically merge /etc/motd.public into /etc/motd wasn't
        running.  When I looked into it, the cron daemon was running, but
        there hadn't been any root activity in the log since April 7th.  I
        looked into it for a while, but got lost in other things I was
	...