DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: B T

⟦e961c1236⟧ TextFile

    Length: 1180 (0x49c)
    Types: TextFile
    Names: »BLURB«

Derivation

└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦62b59102f⟧ »./log_tcp/3.1.tar.Z« 
        └─⟦1de3ed35f⟧ 
            └─⟦this⟧ »log_tcp/BLURB« 

TextFile

@(#) BLURB 1.4 91/10/02 23:02:02

This package provides a couple of tiny programs that log requests for
internet services (examples: TFTP, EXEC, FTP, RSH, TELNET, RLOGIN,
FINGER, SYSTAT). Optional features are: access control based on pattern
matching, and protection against rsh and rlogin attacks from hosts that
pretend to have someone elses host name.

The programs are nothing but small network daemon front ends. By
default, they just log the remote host name and then invoke the real
network daemon daemon, without requiring any changes to existing
software or configuration files.

Connections are reported through the syslog(3) facility. Each record
contains a time stamp, the remote host name and the name of the service
requested. The information can be useful to detect unwanted activities,
especially when logfile information from several hosts is merged.

Enhancements over the previous release are: support for datagram (UDP
and RPC) services, and execution of shell commands when a (remote host,
requested service) pair matches a pattern in the access control tables.

	Wietse Venema (wietse@wzv.win.tue.nl),
	Eindhoven University of Technology,
	The Netherlands.