Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
10-04-2002, 02:56 PM
|
#1
|
LQ Newbie
Registered: Oct 2002
Posts: 2
Rep:
|
URLSCAN tool MS = Linux tool ?
I am needing to forward ports on my firewall coming in on port 80 to an internal Web server (MS IIS) and I know that they have a urlscan tool to help eliminate possible exploits on this machine but I was hoping that Linux had an equivalent program I could run on my firewall (ipchains) that would keep most of these URL exploits from ever entering my LAN and just get filtered at the firewall to help eliminate this before getting to my web server.
thanks,
K
|
|
|
10-04-2002, 03:31 PM
|
#2
|
Member
Registered: Jun 2001
Location: Centralia, WA
Posts: 274
Rep:
|
Have you read the IPchains how-to? Also, you should probably upgrade to get IPTABLES since 1) ipchains is soon to be deprecated and 2) You can define IPTABLES (a stateful firewall) to do much of this for you.
|
|
|
10-04-2002, 04:16 PM
|
#3
|
LQ Newbie
Registered: Oct 2002
Posts: 2
Original Poster
Rep:
|
I have read ipchains and have looked over iptables but I have not seen anything that allows looking at the actual content of a packet that would allow you to reject or accept based on that content. The only thing I have seen is making a decision based on src/dst or ports, not the actual content where the URL would be. Maybe you could enlighten me as to where this filtering occurs within either of these two programs.
|
|
|
All times are GMT -5. The time now is 04:10 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|