The debian-private mailing list leak, part 1. Volunteers have complained about Blackmail. Lynchings. Character assassination. Defamation. Cyberbullying. Volunteers who gave many years of their lives are picked out at random for cruel social experiments. The former DPL's girlfriend Molly de Blanc is given volunteers to experiment on for her crazy talks. These volunteers never consented to be used like lab rats. We don't either. debian-private can no longer be a safe space for the cabal. Let these monsters have nowhere to hide. Volunteers are not disposable. We stand with the victims.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Security bugfix for Samba (fwd)



On Thu, 2 Oct 1997, Michael Meskes wrote:

> I agree, very valid point.

there are "allow hosts =" and "deny hosts =" directives for smb.conf.
These, combined with intelligent use of ipfwadm (block external access
to ports 137-139 at your firewall/router or on the host running samba),
should be enough.

e.g. in the [global] section of smb.conf, 
"allow hosts = X.X.X.0/255.255.255.0"


from the smb.conf(5) man page:

       You can specify the hosts by name or IP number. For  exam­
       ple,  you  could  restrict  access  to only the hosts on a
       Class  C  subnet  with  something  like  "allow  hosts   =
       150.203.5.".  The  full syntax of the list is described in
       the man page hosts_access(5).
    
       [...various examples and comments deleted...]

it's obviously been modelled on tcp wrappers for use when samba is run as a
daemon.

> > From: 	Andrew Howell[SMTP:andrew@avon.it.net.au]
> > Sent: 	Mittwoch, 1. Oktober 1997 04:06
> > To: 	meskes@topsystem.de
> > Cc: 	debian-private@lists.debian.org; eparis@ven.ra.rockwell.com
> > Subject: 	Re: Security bugfix for Samba (fwd)
> > 
> > Yeah I agree, however does samba have any method of not allowing
> > certain hosts to connect to the daemon if it's running as a daemon?
> > That's what I liked about running it via inetd, the extra security of
> > running it through tcpd. The security hole fixed in p2 was a a problem
> > but not as serious if you denied access to people outside your own
> > users.

craig

--
craig sanders
networking consultant                  Available for casual or contract
temporary autonomous zone              system administration tasks.


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
debian-private-request@lists.debian.org . 
Trouble?  e-mail to templin@bucknell.edu .