home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.unix.admin
- Path: sparky!uunet!paladin.american.edu!darwin.sura.net!jvnc.net!princeton!phoenix.Princeton.EDU!spencer
- From: spencer@phoenix.Princeton.EDU (S. Spencer Sun)
- Subject: Re: Where can I find a "fingerd" that fingers the person back?
- Message-ID: <1992Aug18.155521.7840@Princeton.EDU>
- Sender: news@Princeton.EDU (USENET News System)
- Nntp-Posting-Host: phoenix.princeton.edu
- Reply-To: spencer@phoenix.princeton.edu (S. Spencer Sun)
- Organization: Live Organ Transplants
- References: <1992Aug18.060635.29063@csus.edu>
- Distribution: usa
- Date: Tue, 18 Aug 1992 15:55:21 GMT
- Lines: 37
-
- In article <1992Aug18.060635.29063@csus.edu>, tching@target.water.ca.gov (Tracy Ching <SysAdmin>) writes:
- >[among other things]
- >I do this because it seems that one
- >machine (not on my floor or under my administration - thank the Lord)
- >has been compromised by a few. Sloppy on their part. Keeping a list
- >of people who finger and try to randomly telnet in or whatever helps
- >me stay on top of things. This is the reason for wanting to know who
- >fingers. "Who" is the info I'm after - not just the site. Altho' the
- >security people were notified because we are a gov't agency, I feel
- >a little prevention goes a longer way than reparations.
-
- Any or all of the following may be wrong (someone please tell me if it
- is), but it seems to me that knowing "where" the connect came from is
- half the battle. After that, no matter what, you are going to need some
- sort of cooperation from the remote site in order to track down the
- original person, RFC931 or not. Either they're running the RFC931 thing
- (I don't know a thing about it so apologies if I'm abusing terminology),
- which is sort of implicit cooperation, or else you're going to need
- their help tracking down the "who" anyway, because simply fingering back
- isn't going to tell you who's running the finger/telnet/whatever
- process. It will just tell you who's logged on.
-
- Sure, you could say "Well we fingered back 100 times and every time user
- X was listed as being logged on so that looks very suspicious." Maybe
- so, but it lacks any substance if you want to use it to prove anything.
-
- So it seems to me that at some point you will have to have cooperation
- from the other site anyway. Thus, looking for a fingerd that fingers
- the remote site back is not the best solution to your problem, because
- it won't tell you anything you couldn't figure out anyway with existing
- mechanisms.
-
- ----------- The opinions expressed in this article are solely mine. -----------
- <Insert lame attempt at disclaimer humor>
- sss/PU'94 Dept of CS (spencer@phoenix.princeton.edu)/JvNCnet (spencer@jvnc.net)
- "Your mother puts license plates in your underwear? How do you sit?"
-
-