View unanswered posts    View active topics

All times are UTC - 6 hours





Post new topic Reply to topic  [ 23 posts ] 
Go to page Previous  1, 2

Print view Previous topic   Next topic  
Author Message
Search for:
 Post subject:
PostPosted: Sun Aug 07, 2005 12:46 pm 
Offline
Joined: Thu Mar 25, 2004 11:00 am
Posts: 9551
Location: Arlington, MA
jimmyfergus wrote:
Who mentioned WEP :)? Wireless has its uses, and is very secure if you use WPA. Granted it can never be as secure as wired.

http://wifinetnews.com/archives/002453.html
How good is your pass phrase?

As for the rest, I can't really disagree. Cheap, hackable (vs. crackable), ... What's not to like?


Top
 Profile  
 
 Post subject:
PostPosted: Sun Aug 07, 2005 1:09 pm 
Offline
Joined: Fri Sep 19, 2003 7:05 pm
Posts: 5088
Location: Fontana, Ca
jimmyfergus wrote:
I haven't retried with R5A16... some time when I have a chance...
This would certainly make a nice write up....

_________________
cesman

When the source is open, the possibilities are endless!


Top
 Profile  
 
 Post subject:
PostPosted: Sun Aug 07, 2005 3:52 pm 
Offline
Joined: Fri Apr 02, 2004 10:08 am
Posts: 1637
Location: Virginia, USA
Quote:
I wanted tweakable firmware for traffic shaping (very useful when using VOIP during downloads)


Me too, particularly since the QoS with the Linksys firmware didn't work correctly with Vonage. And I have wireless turned off.


Top
 Profile  
 
 Post subject:
PostPosted: Sun Aug 07, 2005 5:58 pm 
Offline
Joined: Fri May 21, 2004 11:55 pm
Posts: 1206
Location: Silicon Valley, CA
While we're drifting... I've been really pleased by my little "m0n0wall" firewall. It's based on FreeBSD and focused on small dedicated hardware platforms. I have it running on a little single-board computer called a WRAP. Its small, quiet, very configurable, and solid. I also use it for IPSec VPN with my work location.

I agree with cesman and the others -- a decent hardware firewall is a MUST these days!

_________________
Do you code to live, or live to code?
Search LinHES forum through Google


Top
 Profile  
 
 Post subject:
PostPosted: Wed Aug 17, 2005 3:19 am 
Offline
Joined: Sun Jul 24, 2005 1:37 am
Posts: 42
I understand the stated position for the original security concern that I brought up and I was going to let this drop.. But then a good friend of mine asked me why I don't just deny remote login for the mythtv user.

I thought about it, and that also seems like a good idea. One could just add a line to the end of /etc/ssh/sshd_config like so:

Code:
# echo "DenyUsers mythtv" >> /etc/ssh/sshd_config
# /etc/init.d/ssh reload


... to prevent people from logging into a knoppmyth box via SSH as the mythtv user. Wouldn't need to change passwords, should work to protect users.

Again, just throwing this out as an idea. I'm not meaning to press the issue.

-Aubrey


Top
 Profile  
 
 Post subject:
PostPosted: Thu Oct 06, 2005 9:51 pm 
Offline
Joined: Fri May 13, 2005 8:46 am
Posts: 48
Location: Grand Rapids, MI
thanks for the tips! i used the denyuser mythtv in ssh, changed the ssh external port on my router, and also installed the iptables sshdfilter script since earlier today i noticed some ssh login attempts in my auth.log.

_________________
ASUS P5N7A-VM, 2.5gHz E5200, 2GB crucial DDR2, pvr-250, hdhomerun, URC-8820 remote, Panasonic TH-42PZ80U, LinHES 6.01.00


Top
 Profile  
 
 Post subject:
PostPosted: Tue Oct 10, 2006 5:03 pm 
Offline
Joined: Thu Apr 27, 2006 1:07 am
Posts: 54
In my /etc/ssh/sshd_config file I am using...

AllowUsers mythtv@192.168.0.* root@192.168.0.* myuseracct

This way root and mythtv can have direct access on my 192.168.0.* based home lan (yes I know I could ssh and su from myuseracct) and I can ssh from on the road if things start acting weird to fix them for my family.

If you wanted to get really tricky you could run dyndns on your personal computer and then add;

AllowUsers mythtv@192.168.0.* root@192.168.0.* myuseracct@dyndnsaddress

Then you could only ssh when you auto update your dyndns acct.


Top
 Profile  
 
 Post subject:
PostPosted: Wed Oct 11, 2006 2:24 pm 
Offline
Joined: Sun Sep 25, 2005 3:50 pm
Posts: 1013
Location: Los Angeles
You can also use public-key encryption to help keep prying eyes out. A Windows-to-Linux scenario is detailed here:

[url]http://www.knoppmythwiki.org/index.php?page=RemoteAccessfromWindows[/url]

_________________
Mike
My Hardware Profile


Top
 Profile  
 

Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 23 posts ] 
Go to page Previous  1, 2



All times are UTC - 6 hours




Who is online

Users browsing this forum: No registered users and 18 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Jump to:  
Powered by phpBB® Forum Software © phpBB Group

Theme Created By ceyhansuyu