Een link over hoe een firewall met nat op te zetten onder OpenBSD.
[url=http://www.nomoa.com/bsd/firewalling.htm]Link[/url]
FreeBSD 4.6 Release Path
Bron: [url=http://www.freebsd.org/releases/4.6R/schedule.html]FreeBSD.org[/url]
Gister (1 mei) is de RELENG_4 branche bevroren‚ in opmars naar de 4.6 Release die gepland staat om op 1 juni uit te komen. Wil je weten wat er in de komende maand nog allemaal gaat gebeuren‚ voordat de gedenkwaardige dag daar is‚ klik [url=http://www.freebsd.org/releases/4.6R/schedule.html]hier[/url].
[quote]After this date‚ all commits to the RELENG_4 branch must be approved by re@FreeBSD.org. Certain highly active documentation committers are exempt from this rule for routine man page / release note updates. Heads-up emails should be sent to the developers@‚ stable@‚ and qa@ lists.
[/quote]
FreeBSD 5 To Get Firewire Support
Bron: [url=http://www.osnews.com/]OSNews[/url]
Katsushi Kobayashi is opgenomen in het FreeBSD team zodat hij de support voor IEEE 1394 kan toevoegen aan FreeBSD 5.0.
Lees hier meer over. [url=http://docs.freebsd.org/cgi/getmsg.cgi?fetch=1707127+0+archive/2002/cvs-all/20020428.cvs-all]Link 1[/url]‚ [url=http://www.usenix.org/events/usenix99/kobayashi.html]Link 2[/url]
Jordan Hubbard resigns from FreeBSD
Bron: [url=http://daily.daemonnews.org]DaemonNews[/url]
Door het gebrek aan tijd‚ energie‚ plezier en doorzettingsvermogen heeft Jordan Hubbard‚ een grondlegger van het FreeBSD project‚ ontslag genomen bij het FreeBSD core team. Ondanks dat Hubbard zijn handen van de administratieve taken afhaalt‚ is hij nog wel van plan om te blijven coden aan FreeBSD.
De onstslag brief:
[quote][i]From: Jordan Hubbard
Subject: Resignation from FreeBSD core team
Date: Mon‚ 29 Apr 2002 13:55:05 -0700[/i]
Guys‚
After giving it a fair bit of thought over the last few weeks‚ I have decided to step down from core. I am doing this for a variety of reasons‚ any one of which would probably be sufficient grounds in and of its own and‚ taken in combination‚ certainly constitute ample justification for doing so:
The first and certainly foremost reason is a lack of time and energy. I simply no longer have the time to devote to doing what I would consider an adequate job of being a responsible core member and the “honorable” thing to do in such case is clearly to step down and let the next election hopefully sweep someone else with more time and energy into the position.
Another reason‚ and I hate to say this but it probably needs saying‚ is that being in core is honestly not what it once was. For a old-timer like myself‚ who was used to a core team that was far more cohesive and generally on the same page‚ it’s simply a painful experience a lot of the time. Perhaps this is due to overly rose-colored recollections of the old core on my part‚ and I do certainly recall us having more than our share of disagreement and inefficiency in the past‚ but on the balance core still feels too much like the pre-WWII Polish Parliment sometimes‚ where we’re fully capable of arguing some issue right up to the point where tanks are rolling through the front door and rendering the whole debate somewhat moot. I’m also not blaming this on the democratic model we’ve adopted‚ a stance which would be hypocritical at best since I’m one of the folks who argued strongly in favor of it‚ but I guess it’s going to take a few more iterations before we get it right. It will also probably be a lot easier for truly new people who don’t have a lot of preconceived notions of what core is to make that happen.
Finally‚ it also bears noting that while being part of the FreeBSD project is many things‚ it should always be “fun” to at least some degree for its participants or there’s really not much point in being involved. Being in core‚ where one gets to deal almost solely with conflict resolution and bureaucracy‚ is not fun in any sense of the word and while being in core constitutes the bulk of my involvement‚ without any cool development work (which I also haven’t had time for) to counter-balance it‚ it simply leaves me with less and less enthusiasm for FreeBSD. Better to pull the ejection handle now than to let things get to the point to where I’m simply bitter and annoyed ALL of the time vs merely some of the time. 🙂
While my time has been very limited lately‚ I hope to get back to a point where I can start actively contributing to FreeBSD again‚ and the best place for me to make those contributions is not in core. I would therefore like to officially tender my resignation and request that I be removed from the core mailing list at the earliest opportunity. Thanks!
– Jordan
[/quote]
[url=http://daily.daemonnews.org/view_story.php3?story_id=2837]Het orginele artikel[/url]
Network Forensics: Tapping the Inte
Bron: [url=http://www.oreillynet.com]OReilly Network[/url]
In dit artikel wordt een stukje geschiedenis van het monitoren van netwerk verkeer verteld en hoe dit is uitgegroeid tot de huidige beveiligings systemen.
[quote]The incident in the Persian Gulf became a cause celebre in the years that followed. Tsutomu Shimomura bragged about the incident in his book Takedown. Many experts in the field of computer security used the story as proof‚ of sorts‚ that the U.S. military was asleep at the switch when it came to computer security.
One of the more dramatic outcomes of the incident was a videotape played at the annual meeting of the American Association for the Advancement of Science in February 1993 — a video that showed each of the attacker’s keystrokes‚ replete with mistakes‚ and the results‚ as he systematically penetrated the defenses of the ship’s computer and scavenged the system.
[/quote]
[url=http://www.oreillynet.com/pub/a/network/2002/04/26/nettap.html]Het hele artikel[/url]
[FreeBSD] Creating a VPN using PPTP
Met deze howto kan je een VPN opzetten via een PPTP verbinding..
[quote]I’m working for a US based company which has an office here in Ottawa. I also work from home‚ as do two other employees here. Until today‚ I’ve been using a VPN from my W2K box‚ which is what I usually use from day to day when accessing the office network. But this morning I found a need to access the office network using one of my FreeBSD boxes. This article shows how I set that VPN up using a pptp client. I put this client on my gateway box which enabled my entire network to access the VPN. Which is a good thing.
[/quote]
[url=http://www.freebsddiary.org/pptp.php]Het hele artikel[/url]
Linux 2002 – Open Source Business c
Bron: [url=http://www.linux2002.nl]Linux2002.nl[/url]
Binnenkort is alweer de “4e editie van hét Business congres & expo op Open Source gebied in Nederland” zoals ze het zelf aankondigen. Mischien stiekum toch wel een klein beetje intressant‚ ondanks dat het over een inferieur systeempje gaat (*BSD all the way!!)
Op de site van de expo kan je je [url=http://www.linux2002.nl/linux2002-sub.asp]inschrijven[/url] voor gratis toegangskaarten voor dit evenement wat gehouden wordt op 26 september in Ahoy te rotterdam‚ doe je dit namelijk niet en besluit je toch te gaan kost het je namelijk 27‚- EUR aan de ingang.
[quote]Vorig jaar weer het jaar waarin [i]Linux[/i] vaste voet aan de grond kreeg. Dit jaar heeft het Duitse parlement gekozen voor [i]Linux[/i]. AOL is in zee gegaan met[i]Linux[/i] (Red Hat). En dat Microsoft Open Source met een kankergezwel vergelijkt is tekenend voor de inhaalslag die [i]Linux[/i] momenteel binnen het bedrijfsleven maakt. Ook onze overheid ziet het belang van open source in. Het ministerie van EZ heeft het daarom opgenomen in haar nota “de digitale delta”.
[/quote]
[OpenBSD] Securing Small Networks Part 3
Deze howto gaat net als deel 1 en 2 over het beveiligen van je netwerk met OpenBSD als router / firewall. Deze keer bespreekt de schrijver nogmaals packet filter PF.
[quote]That question pops up quite frequently in mail I receive and in conversations with my students. The answer lies in the difference between how pf looks at packets and interfaces and how we view them. Unlike the administrator writing the rules‚ pf knows nothing about the routes that packets have to follow. Its only job is to check packets arriving or leaving network interfaces on the machine it runs on; all it does is check their type‚ flags‚ shape‚ state‚ origin‚ and destination. Inbound packets are matched against in rules and outbound packets are matched against out rules. That’s the whole magic.
[/quote]
[url=http://www.onlamp.com/pub/a/bsd/2002/04/25/securing.html]Het hele artikel[/url]
Attacking FreeBSD with Kernel Modul
Bron: [url=http://www.anticrack.de]AntiCrack[/url]
[quote]FreeBSD is an often used server operating system. Lots of ISPs, universities and some firms are using it. After releasing my Linux LKM text van Hauser asked my to take a look at the FreeBSD kernel, so here we go.
[/quote]
[url=http://www.anticrack.de/article.php?sid=1979]Het hele artikel[/url]
[FreeBSD] Securing Wireless Networks with IPSEC
Met deze howto kan je je draadloze netwerk met IPSEC beveiligen maar je kan het ook voor je gewone netwerk gebruiken.
[quote]Though this article mainly deals with problems inherent to wireless networks‚ the principals apply equally well to wired networks. Also‚ though FreeBSD is the OS referenced‚ this may work equally well with other flavors of BSD . The version of FreeBSD used was 4.5-release.
[/quote]
[url=http://www.bsdtoday.com/2002/April/Features671.html]Het hele artikel[/url]