Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
At a brief glance of the info about protowall and those that use it, I'd say you're all paranoid and don't know how to use a real firewall. Wanna block IP addresses (for baseless reasons..?) ? - Use IPTables, the firewall build into linux's networking stack...
Edit: Ok, that comes off sounding harsh. Just wtf are you trying to achieve??
1) Someone hosts a file you shouldn't be downloading.
2) You connect to them via BT and start downloading - they have your IP address.
3) They don't need to 'connect' to your machine, they just ask your ISP for details of which user was assigned that IP at that time, showing their records of you initialising a download.
4) Knowing someone's IP has nothing to do with hijacking their machine, browsing through it, etc. If they want in, they have to find an exploitable service you're running (web/ftp server, etc) or a flaw in the basic networking code.
I have a block list containing The IP address the Riaa is using.
If the Riaa starts to host the file i will not be able to connect the the RIAA and download it from them.
They can still see if i am trying to get the file but i will not get it from them.
So therefore they could not take legal action against me because they do not know what i am actually downloading. I can be getting a single Info file from the torrent instead of the whole torrent.
They would have to come to my house and take my computer to see if i actually downloaded the file or not. Because i did not receive it from them.
They can keep track of what they sent to users, so if they sent me the whole file then they know i downloaded the whole thing.
This is NOT a full proof method but it had been prooven to help.
The blocklists are updated daily from numerous security groups.
People who actually do get caught get a letter in the mail saying who caught them and the IP Address they were using when they caught them. So then that can also be added to the database.
Surely the letters say the IP address of the offending downloader, not the machine used to catch them.
What about the copyright owner using a normal ISP with dynamic IP addresses allocated, firing up a p2p app and downloading from you? You're ilegally hosting the file, they're just a common ISP's user, and you can't blacklist the IP or range or you'll cut out all their customers from your p2p system.
Basically I dont think there is a way to tack on protection to current p2p apps to hide from those that can request IP->user details from ISPs.
Oh and if you read the linblock blurb you'll see it just submits some new rules to the linux kernel firewall. System which controls network connections to your machine=firewall.
you have failed to understand what he is trying to accomplish. hes not trying to hide his ip. he is attempting to prevent connections to well known and potentially hazardous ip's or proxy's or edu. but most of all ad servers. if your just needing it for bt get tixati.deb from tixati.co but as far as a host file manager there are a couple out there but i have not tried any of them. and dont forget to get your lists from iblocklist.