home *** CD-ROM | disk | FTP | other *** search
/ linuxmafia.com 2016 / linuxmafia.com.tar / linuxmafia.com / pub / linux / security / 00index.txt~ < prev    next >
Text File  |  2004-10-12  |  7KB  |  133 lines

  1.  
  2.         Date/Time of
  3.    Size File Arrival Filename           Description
  4. ------- ------------ ------------       -----------
  5.    5398 000602 14:02 00index.txt        This file you are reading.
  6.  219837 Apr 27 00:16 aide-0.7.tar.gz    Superior replacement for the now-
  7.                                         obsolete Tripwire(R) ASR package.
  8.                     Source ftp archive:
  9.                     ftp://ftp.cs.tut.fi/pub/src/gnu/
  10.   10066 980122 03:15 anonymous-ftp-config
  11.                                         CERT tips on security for anon ftp
  12.   10342 980126 15:56 chkexploit-1.13.tar.gz
  13.                                         Shell script to check for known
  14.                                         security exploits.  Very old.
  15.  288663 990913 18:58 cops104+.tar.gz    COPS security-auditing package for
  16.                                         *ix hosts, by Dan Farmer.  Old.
  17.     258 990913 19:04 cops-why-not.txt   Reasons why one might not want to
  18.                                         use COPS.
  19.    8319 000520 21:52 ftp-daemons        Survey of all available ftp daemons
  20.                                         for Linux, with an eye to security.
  21.   20777 980126 15:56 md5.tar.gz         MD5 encryption algorithm, from RSA.
  22.   17313 Jan 05  2003 mkchroot           Martynas Domarkas's script to make 
  23.                                         chroot jails.  From:
  24.                                         http://joker.hansabank.lt/mkchroot
  25.  601290 980415 00:41 pgp263is.tar.gz    Pretty Good Privacy 2.6.3, source code.
  26.                                         International version.  Proprietary.
  27.    1732 990912 20:10 pgp-any-version-why-not.txt
  28.                                         Reason why all PGP versions are now 
  29.                                         obsolete, and should be replaced by
  30.                                         GNU Privacy Guard.
  31.   14154 980329 20:07 pgp50-why-not.txt  Brad Knowles on why not to use PGP 5.0.
  32.  927363 990912 21:49 pgp50i-unix-src.tar.gz
  33.                                         Pretty Good Privacy 5.0 int'l (src).
  34.                                         Proprietaary.
  35.    9349 980415 00:41 pgp-redhat-tips.txt
  36.                                         James Youngman's tips about PGP use
  37.                                         under Red Hat Linux.
  38.    2279 980126 15:56 satan-1.1.1.README Quick instructions for SATAN 1.1.1.
  39.  306360 980126 15:56 satan-1.1.1.linux.fixed2.tar.gz
  40.                                         SATAN 1.1.1 security-auditor 
  41.                                         package for networks, by Dan Farmer.
  42.                                         Uses perl and has Web front-end.
  43.                                         Patched to build on Linux. Proprietary.
  44.    1711 980126 15:56 satan-doc.README   README for the documentation kit.
  45.  410736 980126 16:10 satan-doc.tar.gz   Full documentation kit for SATAN.
  46.     865 990913 18:45 satan-why-not.txt  Reasons why one might not want to
  47.                                         use SATAN.
  48.   51966 980126 15:56 security-by-break-in.txt
  49.                                         Dan Farmer's article "How to Improve
  50.                                         Your System's Security by Breaking in".
  51.   12012 990912 21:41 ssh-clients        Information on various SSH clients.
  52. k 11723 2004-10-01 10:20 ssh-dictionary-attack-blacklist
  53.                                         Script and explanatory e-mail by 
  54.                                         Victor Danilchenko to  monitor
  55.                                         the sshd logs, detect repeated failed 
  56.                                         login attempts, notify the sysadmin
  57.                                         of such attempts via e-mail, and 
  58.                                         blacklist hosts whence such attempts 
  59.                                         originated.  Perl script.  Licence 
  60.                                         terms for the script ("sshd-sentry")
  61.                                         are unstated.
  62.    1493 990912 20:49 ssh-why-not.txt    Information on SSH alternatives.
  63.    9403 Aug 22  2001 sux                Francois Gouget's sux is an "su with X"
  64.                                         Bourne shell script, under the MIT X11
  65.                                         licence.  From:
  66.                                         http://fgouget.free.fr/sux/
  67.                                         sux-readme.shtml
  68.  268578 980126 15:56 tiger-2.2.3.tar.gz Security-auditing package from TAMU.
  69.    2214 990912 18:57 tripwire-why-not.txt
  70.                                         Reasons to eschew Tripwire(R) in favour
  71.                                         of AIDE, for now.
  72.  212503 980126 15:56 xinetd-2.2.1.tar.gz
  73.                                         Replacement inetd with tcp wrapper.
  74.  
  75.  
  76.  
  77.  
  78.                      f00f               Subdirectory for Pentium F00F defect.
  79.                      gnupg              Subdirectory for GNU Privacy Guard.
  80.                      openssh            Subdirectory for OpenSSH.
  81.                  sshbuddy           Subdirectory for Charles Wright's SSH 
  82.                                         Buddy.
  83.                      ylonen-ssh         Subdirectory for Tatu Ylonen's SSH.
  84.  
  85.  
  86.  
  87.  
  88. To catalogue:
  89.   10916 1998-08-26 17:59 berferd
  90.    3952 2000-10-12 19:04 biometrics
  91.   11897 2000-04-20 13:27 firewalls
  92.    9681 2000-02-29 12:03 intruder-detection-checklist
  93.    1564 2000-06-02 17:42 ssh-protocol-v2-why.txt
  94.   14745 2000-02-29 12:03 unix-configuration-guidelines
  95.  
  96.  
  97.  
  98. Stuff from:
  99. http://phobos.cs.umass.edu/~danilche/sshd_sentry
  100.  
  101. Date: Tue, 12 Oct 2004 11:29:30 -0400 (EDT)                                     
  102. From: Victor Danilchenko <danilche@cs.umass.edu>                                
  103. To: secureshell@securityfocus.com                                               
  104. Subject: Re: OpenSSH -- a way to block recurrent login failures?
  105.                                                                                 
  106.         Further update, in case anyone cares:
  107.                                                                                 
  108.         I have implemented the client/server functionality, via
  109. server-push. It won't scale well for large installations, but for medium
  110. or small ones, server-push will work much better than client-pull.
  111. basically the clients try to contact the server each time they blacklist
  112. a new host, and the server maintains an aggregated blacklist. Each time
  113. the aggregated blacklist is updated (when a blacklisting request is made
  114. by three individual clients), the updated blacklist is pushed out to all
  115. the clients -- the server splits the list of clients into a number of
  116. queues, and forks a child to handle the distribution to each queue. The
  117. list of clients is constructed by the expedient of simply registering
  118. the IP of every host that attempts a connection to the server. It's
  119. rather simplistic, but it's been working fine on my network.
  120.  
  121.         Note that this is an alpha-grade release, and the server will
  122. dump a good deal of info (I run it in a terminal in foreground). I
  123. haven't even gotten around to writing in the explicit verbosity flag
  124. into it.
  125.  
  126.         The code is at http://phobos.cs.umass.edu/~danilche/sshd_sentry
  127. -- there's the server code, the client code, and also the SRPM
  128. containing the client and the startup script. Note that my SRPM symlinks
  129. the client into /etc/cron.hourly -- this is for our specific
  130. installation; feel free to remove that line from the spec file before
  131. building your own, should you wish to use the RPM.
  132.  
  133.