[NTLUG:Discuss] Strange iptables problem on CentOS 4.4
. Daniel
xdesign at hotmail.com
Sun Feb 18 22:56:22 CST 2007
>Chris Cox wrote:
> > . Daniel wrote:
> >
> >> That's an interesting question. I had seen something like that not
too
> >> long ago. It too was CentOS 4.4 in fact. I think when I saw the
error, I
> >> hadn't yes corrected a router configuration mistake I had made. I was
> >> attempting to forward all data for a given IP address to a specific
machine
> >> within the firewall. What I failed to do was make the machines
responses
> >> MASQ through the same IP address. Once I made the Masq correction, it
> >> worked just fine.
> >>
> >> My first impression was that "hey, this must be the 'secure' part of
ssh."
> >> I still don't understand why ssh is better than telnet... other than
the
> >> plain text thing, but then again, who will be sniffing in average
> >> situations?
> >>
> >
> > You would be surprised. Think of the poor folks on cable (a giant
> > neighborhood ethernet hub).... very easy to sniff out passwords
> > and such.
> >
> >
> > _______________________________________________
> > http://www.ntlug.org/mailman/listinfo/discuss
> >
> >
>A couple of other things to consider: Maybe the question shouldn't be
>"Who will be sniffing?" but "What damage could be done if they do?"
>Another way to view this is to ask "What is the cost/benefit?" The
>"cost" for using ssh seems to be pretty low - a little setup and some
>performance hit for the encryption (which may not matter depending on
>what you are doing). The benefit is in greatly reduced worry about
>"what if". If you are sniffed how much damage could be done by gaining
>the user name and password? Another consideration may be your
>reputation. Depending on the context, using an insecure protocol,
>regardless if anything happens, may be perceived negatively.
>
>Not knowing your situation I can't answer any of these questions. I do
>believe that they should be given serious consideration though.
I guess I can sort of understand what you're trying to say, but I don't
fully understand the benefits. For example, at a previous job, I couldn't
telnet into most of the Linux boxen, but ssh was available. By default,
even when telnet is available, root isn't available as a user. However,
with ssh, it is. I have never set up ssh before. It either is or it isn't
as far as I know. So as far as I am concerned, ssh is rather like https.
The two points have established an encrypted link.
But fundamentally, I have to wonder about perceptions. Is it better to use
something you don't fully understand simply because other people do? Or is
it better to understand what you're doing? I have always subscribed to the
latter as the former never made much sense to me. Been like that since I
was a little boy though, so maybe it's just me.
_________________________________________________________________
大切なあの人、気になるあの人とケータイでチャット!
http://messenger.live.jp/mobile.htm
More information about the Discuss
mailing list