Post Jobs


sections, with the Front-Cover Texts being “Original Author: Oskar http://people. Oskar Andreasson speaks with about his comprehensive IP . I hope that the iptables-tutorial give Linux administrators the possibility to. Oskar Andreasson [email protected] by Oskar Andreasson. Copyright © .. 1. txt.

Author: Taulkis Dodal
Country: Saudi Arabia
Language: English (Spanish)
Genre: Science
Published (Last): 13 October 2008
Pages: 114
PDF File Size: 7.7 Mb
ePub File Size: 15.15 Mb
ISBN: 583-9-34937-256-4
Downloads: 92947
Price: Free* [*Free Regsitration Required]
Uploader: Yozshushicage

It contains a complete section on iptables syntax, as well as other interesting commands such as iptables-save and iptables-restore. One of iptxbles main problems of Linux today is in my way of seeing things, that there is a huge lack of documentation, especially when you start digging into the deeper aspects of Linux.

During the time, I was also doing a lot of “work” for our site www. Why did you decide to write the iptables reference? The tutorial was under heavy scrutiny and updating, as can be seen in the latest version of the tutorial.

Iptables-tutorial : Frozentux

One of the long-term goals of this project is actually to print a book of ipyables whole tutorial and sell to the readers who liked the tutorial. I think that this project will look a lot like the iptables tutorial when it gets going, especially in writing style and how it will be built up with a lot of examples among other things. Slackware can be a bit hard to do this with, since it has no package system of its own except the old.

Designed to be Secure Without Fail. There was no documentation at all describing how to get started, nor was there any examples available. My private budget would not in any way make this possible at this stage, and to be able to finish both the iptables tutorial, and the iproute2 tutorial this would be more or less necessary.

At the top of that, if you’re really security conscious, I’d suggest using kernel security patches and such. Also, some commands and functions are clearly not documented enough. Both are fairly large, and should be able to help you much much better than I can.


I haven’t put a lot of time into this project so far, mainly because I want to finish up a lot of loose ends with the iptables tutorial before walking into another huge project. The Year Ahead in Cybersecurity. Of course, the tutorial also aims at the security interested people out there and anyone who might be interested in setting up a local network with Internet access. There is actually something people could do to contribute to this tutorial.

Then there is a request by some people that want to know how to make a transparent http proxy with iptables and squid. At the beginning, I can’t say I liked it. Of course, there are those who don’t report the bugs, and instead start using it to their own advantage for example, hack sites with the bug and so on.

Documentation about the netfilter/iptables project

It was quite small, only pages or so, and didn’t cover all the intricacies of iptables and the more I tutodial iptables and tested it; the more things I found that needed documentation.

If you have fixed the most common vulnerability and someone is determined to get into your host, then you can be certain that the attacker will leave the second most common vulnerability out, or the third for that matter.

Then there was problems with the size of the cover generated in their own webtoolsetc. I hope that the iptables-tutorial give Linux administrators the possibility to easily learn about netfilter and iptables and in an as complete document as possible.

What are some of the major pitfalls Linux Administrators fall into? Is there something the community can do to assist you with writing and maintaining your security research?

Oskar Andreasson IP Tables Tutorial – The Community’s Center for Security

However, the percentage of users doing the latter is a dwindling small amount of people, I think. Only registered users can write comments. Brazilian bank Inter pays fine over customer data leak. This site uses cookies. What I hope that this tutorial do, is that it gives people new knowledge about the Linux firewalling possibilities, how they work, and a general knowledge of how to set it up properly.


What can be done to prevent this? Security Highlights from Defcon Oskar, thanks much for your time, and we look forward to reading your future Linux security documents. To leave packages such as these without documentation makes people go away and start using other operating systems such as Windows. When finally installed, erase everything not needed, including the man reader. I don’t think there is a single most common Linux system vulnerability, and it will definitely not stop a determined attacker.


Their way of owkar this was to allow the book to be published, and then every once in a while when someone ordered a book and paid for itthey oslar of a sudden cancelled the publication, sent me a note that they did so not explaining whyand so forth.

Computer security has always intrigued me ever since I started using a PC for the first time around or so.

Both Lists Newsletter Security Advisories. In other words, I continued writing on the tutorial, and today it is much larger and contains much more information, to say the least. How did you get started with Linux and security? I still think the tutorial is aimed at those, but it contains more information today about the advanced functions of netfilter and iptables so it might be fairly well suited for the advanced users as well who might find some interesting reads in the tutorial.

Currently there are quite a lot of plans. How can your iptables reference help to avoid these problems?