: Why did you decide to write the iptables reference? Oskar Andreasson: When I started using Linux I noticed a huge black hole in the. More information about Oskar Andreasson and his/her books listed in FreeTechBooks. Iptables Tutorial – Linux Firewall Configuration. Post date: 22 Aug. Oskar Andreasson [email protected] by Oskar Andreasson. Copyright © .. 1. txt.
|Published (Last):||17 March 2004|
|PDF File Size:||8.46 Mb|
|ePub File Size:||5.36 Mb|
|Price:||Free* [*Free Regsitration Required]|
The iptables-tutorial is currently rather stable, and contains information on all the currently available matches and targets in kernelas well as a couple of complete example scripts and explanations. After this, it is all a matter of keeping those few packages you have installed up to date. Oskar, thanks much for your time, and we look forward to reading your future Linux security documents.
Only registered users can write comments.
Do you believe the open source nature of Linux provides a superior vehicle to making security vulnerabilities easier to spot and fix? The second time around, “it” crashed my monitor OK, I had to blame something, didn’t I and I had to get another monitor out on the warranty.
There is actually something people could do to contribute to this tutorial. I don’t think there is a single most common Linux system vulnerability, and it will definitely not stop a determined attacker.
How can I rate this item? If not, well, it would be sad if not even persons liked it enough to actually buy it. At the top of that, if you’re really security conscious, I’d suggest using kernel security patches and such.
The tutorial was under heavy scrutiny and updating, as can be seen in the latest version of the tutorial. Sure, there are a lot of pieces of information available out there, but a lot of it raises more questions than they answer.
Iptables-tutorial : Frozentux
My answer to the first question would, hence, be that they might do errors due to a lack of documentation. This would not change the fact that the tutorial will be available on andreassn Internet, it will always be.
However, good security practices on a server includes installing only the absolutely necessary packages. I have also started another project on my spare time, to document the iproute2 package and its uses. What do you feel is the most common Linux system vulnerability?
It was not until or so that I started seeing Linux around and tested it. Please login or register. Both Lists Newsletter Security Advisories. I most definitely uptables so. Their way of handling this was to allow the book to be published, and then every once in a while when someone ordered a book and paid for itthey all of a sudden cancelled the publication, sent me a note that they did so not explaining whyand so forth.
Iptxbles is the most important Linux security technology? What are some of the major pitfalls Linux Administrators fall into? Andreassln to be Secure Without Fail. One example would be iptables in the beginning, by today there is a wast amount of documentation and different introductions etceteras. It contains a complete section on iptables syntax, as well as other interesting commands such as iptables-save and iptables-restore.
Brazilian bank Inter pays fine over customer data leak. This constitutes a small problem since I anereasson have so many hours to write.
New version of iptables and ipsysctl tutorials
If you need help, you are iotables off by asking the netfilter mailing list which you can reach at netfilter at lists. Of course, there are those who don’t report the bugs, and instead start using it to their own advantage for example, hack sites with the bug and so on.
The central voice for Linux and Open Source security news. Tricky question, I don’t know really.
If anyone living in Sweden Stockholm knows about a party of computers of pskar type that some company or private person is willing to give away, either as junk, or just as a contribution, Andreassson will owe them extremely much.
You may also contact the linuxsecurity mailing list at security-discuss AT linuxsecurity dotcom. What are your future plans for the iptables reference? For Red Hat, do the same thing select the installed packages. It was quite small, only pages or so, and didn’t cover all the intricacies of iptables and the more I used iptables and tested it; the more things I found that needed documentation.
I would suggest andrdasson least installing a NIDS i. I haven’t put a lot of time into this project so far, mainly because I want to finish up a lot of loose ends with the iptables tutorial before walking into another huge project.
Closed source on the other hand is harder to debug for a third party, and if you really do find a bug, you are more iptablds to just throw the bug on the crap pile and hope for it to be fixed in the next release, they don’t feel anything in common for the actual development of the product nor do they actually have a good reason for telling the developers about the bug.
Security Highlights from Defcon