<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPfilter question in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464587#M210673</link>
    <description>Though your rules are not perfect (I will explain it&lt;BR /&gt;later), they should block the connection you want&lt;BR /&gt;to block. Since all the rules have zero hits, I don't&lt;BR /&gt;think your IPFilter is working fine. Post the following&lt;BR /&gt;outputs:&lt;BR /&gt;&lt;BR /&gt;- Post the name (i.e lan0) and IP address of the&lt;BR /&gt;   interface that's passing the hacker traffic.&lt;BR /&gt;- Go to /etc/rc.log and post the outputs of &lt;BR /&gt;  /sbin/rc2.d/S130pfilboot  and &lt;BR /&gt;  /sbin/rc2.d/S131ipfboot startup scripts.&lt;BR /&gt;&lt;BR /&gt;Run following commands and post the output :&lt;BR /&gt; 1)     $ ndd pfil qif_status&lt;BR /&gt; 2)     $ ipf -V&lt;BR /&gt; 3)     $ ipfstat&lt;BR /&gt;&lt;BR /&gt;Now about your rules:&lt;BR /&gt;&lt;BR /&gt;0 pass out quick on lo0 from any to any&lt;BR /&gt;0 block in log quick from any to any with short&lt;BR /&gt;0 block in log quick from 200.27.182.114/32 to any&lt;BR /&gt;0 block in proto tcp from 200.27.182.114/32 to any port = 22&lt;BR /&gt;0 pass in quick on lo0 from any to any&lt;BR /&gt;&lt;BR /&gt;See that your 3rd rule blocks all traffic from &lt;BR /&gt;200.27.182.114 with a quick keyword; so your 4th&lt;BR /&gt;rule is unnecessary and never hit. Your 1st and last&lt;BR /&gt;rules filter on loopback interface and that's &lt;BR /&gt;unnecessary as IPFilter isn't effective on loopback &lt;BR /&gt;traffic (except under some particular onfigurations).&lt;BR /&gt;&lt;BR /&gt;I will suggest alternate rules, but first send me the&lt;BR /&gt;above output.&lt;BR /&gt;&lt;BR /&gt;- Biswajit&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Tue, 18 Jan 2005 14:43:23 GMT</pubDate>
    <dc:creator>Biswajit Tripathy</dc:creator>
    <dc:date>2005-01-18T14:43:23Z</dc:date>
    <item>
      <title>IPfilter question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464582#M210668</link>
      <description>Hi, &lt;BR /&gt;I wondered if anyone could tell me how to write a quick rule to block a specific IP address from connecting to my server, which doesn't block any other connections? I tried:&lt;BR /&gt; block in quick from 200.27.182.114 to any&lt;BR /&gt;added to the example1 ipf.conf, but a hacker there still seems to get through.. so I guess there must be another rule there letting it through? &lt;BR /&gt;thanks&lt;BR /&gt;John Henrikson &lt;BR /&gt;</description>
      <pubDate>Mon, 17 Jan 2005 10:19:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464582#M210668</guid>
      <dc:creator>John Henrikson</dc:creator>
      <dc:date>2005-01-17T10:19:30Z</dc:date>
    </item>
    <item>
      <title>Re: IPfilter question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464583#M210669</link>
      <description>You need to look at the /var/adm/syslog/syslog.log carefully to make sure your hacker is coming in in from the ip you think the hacker is coming in on.&lt;BR /&gt;&lt;BR /&gt;Here are some possible helpful entries:&lt;BR /&gt;&lt;BR /&gt;block in proto tcp from 200.27.182.114 to any port = 22&lt;BR /&gt;&lt;BR /&gt;That will block ssh access. I need this to block script kiddies.&lt;BR /&gt;&lt;BR /&gt;block in proto tcp from 200.27.182.114 to any&lt;BR /&gt;&lt;BR /&gt;That or some variation of it should stop your hacker on ALL tcp ports.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 17 Jan 2005 10:27:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464583#M210669</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-01-17T10:27:13Z</dc:date>
    </item>
    <item>
      <title>Re: IPfilter question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464584#M210670</link>
      <description>&lt;A href="http://www.obfuscation.org/ipf/ipf-howto.txt" target="_blank"&gt;http://www.obfuscation.org/ipf/ipf-howto.txt&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;go to 2.6 in the howto.&lt;BR /&gt;&lt;BR /&gt;Best Regards.</description>
      <pubDate>Mon, 17 Jan 2005 10:29:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464584#M210670</guid>
      <dc:creator>Jannik</dc:creator>
      <dc:date>2005-01-17T10:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: IPfilter question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464585#M210671</link>
      <description>If you are sure that the hacker is coming in from&lt;BR /&gt;200.27.182.114, then the rule you configured&lt;BR /&gt;should be sufficient. Are you sure the rule is&lt;BR /&gt;configured properly? To test this, run the following&lt;BR /&gt;command :&lt;BR /&gt;&lt;BR /&gt;# ipfstat -ioh&lt;BR /&gt;&lt;BR /&gt;If the rule is configured properly, the above &lt;BR /&gt;command  should print it out. Also, watchout for a&lt;BR /&gt;number at the beginning of each rule in the above&lt;BR /&gt;output. This should tell you howmany connections&lt;BR /&gt;have been blocked by the rule. You should see&lt;BR /&gt;a nonzero positive number if indeed someone is&lt;BR /&gt;coming from that IP address.&lt;BR /&gt;&lt;BR /&gt;I would suggest that you log all the incoming traffic&lt;BR /&gt;and see you if have any entry for IP addresses that&lt;BR /&gt;you can block. Use following rules:&lt;BR /&gt;&lt;BR /&gt;block in log quick from 200.27.182.114 to any&lt;BR /&gt;pass in log from any to any&lt;BR /&gt;&lt;BR /&gt;Finally, you have to think about the whole security&lt;BR /&gt;policy and configure your IPFilter. If you are not&lt;BR /&gt;providing any service or provide only few services&lt;BR /&gt;to machines outside your own network, then&lt;BR /&gt;you might want to block everything else and &lt;BR /&gt;selectively open those ports. Let me know if you&lt;BR /&gt;any help configuring IPFilter.&lt;BR /&gt;&lt;BR /&gt;One more thing. You are better off looking at the&lt;BR /&gt;HP IPFilter documentation at &lt;BR /&gt;&lt;A href="http://www.docs.hp.com/en/B9901-90021/index.html" target="_blank"&gt;http://www.docs.hp.com/en/B9901-90021/index.html&lt;/A&gt;&lt;BR /&gt;rather than going to public domain site as HP's&lt;BR /&gt;IPFilter has significant new features available.&lt;BR /&gt;&lt;BR /&gt;- Biswajit&lt;BR /&gt;</description>
      <pubDate>Mon, 17 Jan 2005 12:30:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464585#M210671</guid>
      <dc:creator>Biswajit Tripathy</dc:creator>
      <dc:date>2005-01-17T12:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: IPfilter question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464586#M210672</link>
      <description>Here is the output from my ipfstat:&lt;BR /&gt;# ipfstat -ioh&lt;BR /&gt;0 pass out quick on lo0 from any to any&lt;BR /&gt;0 block in log quick from any to any with short&lt;BR /&gt;0 block in log quick from 200.27.182.114/32 to any&lt;BR /&gt;0 block in proto tcp from 200.27.182.114/32 to any port = 22&lt;BR /&gt;0 pass in quick on lo0 from any to any&lt;BR /&gt;&lt;BR /&gt;despite this, the hacker at 200.27.182.114 tried to get in again last night.. Here's a few lines from the syslog:&lt;BR /&gt;Jan 13 14:57:05 pro sshd[12843]: Failed password for illegal user john from 200.27.182.114 port 21991 ssh2&lt;BR /&gt;&lt;BR /&gt;Jan 13 14:57:08 pro sshd[12845]: Failed password for root from 200.27.182.114 port 21793 ssh2&lt;BR /&gt;&lt;BR /&gt;Jan 13 14:57:09 pro sshd[12847]: Failed password for root from 200.27.182.114 port 21902 ssh2&lt;BR /&gt;&lt;BR /&gt;Jan 13 14:57:12 pro sshd[12849]: Failed password for root from 200.27.182.114 port 21787 ssh2&lt;BR /&gt;&lt;BR /&gt;Any ideas what I'm doing wrong? &lt;BR /&gt;many thanks for all your help, points coming. &lt;BR /&gt;</description>
      <pubDate>Tue, 18 Jan 2005 10:11:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464586#M210672</guid>
      <dc:creator>John Henrikson</dc:creator>
      <dc:date>2005-01-18T10:11:58Z</dc:date>
    </item>
    <item>
      <title>Re: IPfilter question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464587#M210673</link>
      <description>Though your rules are not perfect (I will explain it&lt;BR /&gt;later), they should block the connection you want&lt;BR /&gt;to block. Since all the rules have zero hits, I don't&lt;BR /&gt;think your IPFilter is working fine. Post the following&lt;BR /&gt;outputs:&lt;BR /&gt;&lt;BR /&gt;- Post the name (i.e lan0) and IP address of the&lt;BR /&gt;   interface that's passing the hacker traffic.&lt;BR /&gt;- Go to /etc/rc.log and post the outputs of &lt;BR /&gt;  /sbin/rc2.d/S130pfilboot  and &lt;BR /&gt;  /sbin/rc2.d/S131ipfboot startup scripts.&lt;BR /&gt;&lt;BR /&gt;Run following commands and post the output :&lt;BR /&gt; 1)     $ ndd pfil qif_status&lt;BR /&gt; 2)     $ ipf -V&lt;BR /&gt; 3)     $ ipfstat&lt;BR /&gt;&lt;BR /&gt;Now about your rules:&lt;BR /&gt;&lt;BR /&gt;0 pass out quick on lo0 from any to any&lt;BR /&gt;0 block in log quick from any to any with short&lt;BR /&gt;0 block in log quick from 200.27.182.114/32 to any&lt;BR /&gt;0 block in proto tcp from 200.27.182.114/32 to any port = 22&lt;BR /&gt;0 pass in quick on lo0 from any to any&lt;BR /&gt;&lt;BR /&gt;See that your 3rd rule blocks all traffic from &lt;BR /&gt;200.27.182.114 with a quick keyword; so your 4th&lt;BR /&gt;rule is unnecessary and never hit. Your 1st and last&lt;BR /&gt;rules filter on loopback interface and that's &lt;BR /&gt;unnecessary as IPFilter isn't effective on loopback &lt;BR /&gt;traffic (except under some particular onfigurations).&lt;BR /&gt;&lt;BR /&gt;I will suggest alternate rules, but first send me the&lt;BR /&gt;above output.&lt;BR /&gt;&lt;BR /&gt;- Biswajit&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 18 Jan 2005 14:43:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464587#M210673</guid>
      <dc:creator>Biswajit Tripathy</dc:creator>
      <dc:date>2005-01-18T14:43:23Z</dc:date>
    </item>
    <item>
      <title>Re: IPfilter question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464588#M210674</link>
      <description>I'm a bit hesitant to post the actual ip address.. its on lan0.. &lt;BR /&gt;Here's the output from rc.log:&lt;BR /&gt;Configuring PFIL&lt;BR /&gt;Output from "/sbin/rc2.d/S130pfilboot start":&lt;BR /&gt;----------------------------&lt;BR /&gt;&lt;BR /&gt;Starting IPFilter&lt;BR /&gt;Output from "/sbin/rc2.d/S131ipfboot start":&lt;BR /&gt;----------------------------&lt;BR /&gt;Set 0 now inactive&lt;BR /&gt;0 entries flushed from NAT table&lt;BR /&gt;0 entries flushed from NAT list&lt;BR /&gt;&lt;BR /&gt;but when the machine was last booted there was no ipf.conf file, I have run ipfboot start several times since then. &lt;BR /&gt;&lt;BR /&gt;ndd pfil qif_status&lt;BR /&gt;ifname ill q OTHERQ num sap hl len nr nw bad copy drop notip nodata notdata&lt;BR /&gt;QIF2    0 455e4c00 455e4d28 2 0 0 0 0 0 0 0 0 0 0 0&lt;BR /&gt;lan1    433da600 433d9c00 433d9d28 2 800 14 0 1609549 2345645 0 1570629 0 0 0 692&lt;BR /&gt;QIF1    0 433d9400 433d9528 1 806 0 0 1467 0 0 0 0 0 0 0&lt;BR /&gt;lan0    40d56800 433db800 433db928 1 800 14 0 3855400 6841719 0 6157740 0 0 0 1318&lt;BR /&gt;QIF0    0 433d9000 433d9128 0 806 0 0 1551770 0 0 0 0 0 0 0&lt;BR /&gt;&lt;BR /&gt;ipf -V&lt;BR /&gt;ipf: HP IP Filter: v3.5alpha5 (A.03.05.10.04) (400)&lt;BR /&gt;Kernel: HP IP Filter: v3.5alpha5 (A.03.05.10.04)                        &lt;BR /&gt;Running: yes&lt;BR /&gt;Log Flags: 0 = none set&lt;BR /&gt;Default: pass all, Logging: available&lt;BR /&gt;Active list: 1&lt;BR /&gt;# ipfstat&lt;BR /&gt;dropped packets:        in 0    out 0&lt;BR /&gt;non-data packets:       in 0    out 0&lt;BR /&gt;no-data packets:        in 0    out 0&lt;BR /&gt;non-ip packets:         in 0    out 0&lt;BR /&gt;   bad packets:         in 0    out 0&lt;BR /&gt;copied messages:        in 0    out 0&lt;BR /&gt; input packets:         blocked 0 passed 862667 nomatch 487080 counted 0 short 0&lt;BR /&gt;output packets:         blocked 0 passed 1253442 nomatch 491248 counted 0 short 0&lt;BR /&gt; input packets logged:  blocked 0 passed 0&lt;BR /&gt;output packets logged:  blocked 0 passed 0&lt;BR /&gt; packets logged:        input 0 output 0&lt;BR /&gt; log failures:          input 0 output 0&lt;BR /&gt;fragment state(in):     kept 0  lost 0&lt;BR /&gt;fragment state(out):    kept 0  lost 0&lt;BR /&gt;packet state(in):       kept 0  lost 0&lt;BR /&gt;packet state(out):      kept 0  lost 0&lt;BR /&gt;TCP connections:        in 0 out        0 &lt;BR /&gt;ICMP replies:   0       TCP RSTs sent:  0&lt;BR /&gt;Invalid source(in):     0&lt;BR /&gt;Result cache hits(in):  375587  (out):  762194&lt;BR /&gt;IN Pullups succeeded:   0       failed: 0&lt;BR /&gt;OUT Pullups succeeded:  0       failed: 0&lt;BR /&gt;Fastroute successes:    0       failures:       0&lt;BR /&gt;TCP cksum fails(in):    0       (out):  0&lt;BR /&gt;Packet log flags set: (0)&lt;BR /&gt;        none&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;let me know if you see something in this that is preventing the rules from being applied. &lt;BR /&gt;My sincere thanks for your help!!! &lt;BR /&gt;John Henrikson &lt;BR /&gt;</description>
      <pubDate>Tue, 18 Jan 2005 16:13:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464588#M210674</guid>
      <dc:creator>John Henrikson</dc:creator>
      <dc:date>2005-01-18T16:13:28Z</dc:date>
    </item>
    <item>
      <title>Re: IPfilter question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464589#M210675</link>
      <description>John,&lt;BR /&gt;&lt;BR /&gt;&amp;gt; I'm a bit hesitant to post the actual ip address..&lt;BR /&gt;&amp;gt; its on lan0..&lt;BR /&gt;&lt;BR /&gt;I should have been more clear.. I just need "lan0".&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Here's the output from rc.log:&lt;BR /&gt;&lt;BR /&gt;Looks perfect. No problem while loading DLKM &lt;BR /&gt;modules.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; ndd pfil qif_status&lt;BR /&gt;&amp;gt; ifname ill q OTHERQ num sap hl len nr nw bad copy drop notip nodata notdata&lt;BR /&gt;&amp;gt; QIF2 0 455e4c00 455e4d28 2 0 0 0 0 0 0 0 0 0 0 0&lt;BR /&gt;&amp;gt; lan1 433da600 433d9c00 433d9d28 2 800 14 0 1609549 2345645 0 1570629 0 0 0 692&lt;BR /&gt;&amp;gt; QIF1 0 433d9400 433d9528 1 806 0 0 1467 0 0 0 0 0 0 0&lt;BR /&gt;&amp;gt; lan0 40d56800 433db800 433db928 1 800 14 0 3855400 6841719 0 6157740 0 0 0 1318&lt;BR /&gt;&lt;BR /&gt;No problem here.. Above "lan0" entry shows that &lt;BR /&gt;IPFilter is active on this interface. "ipf -V" shows &lt;BR /&gt;that IPFilter on your system is the latest release.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; # ipfstat&lt;BR /&gt;&amp;gt; .. &lt;SNIP&gt;..&lt;BR /&gt;&amp;gt; input packets: blocked 0 passed 862667 nomatch 487080 counted 0 short 0&lt;BR /&gt;&amp;gt; output packets: blocked 0 passed 1253442 nomatch 491248 counted 0 short 0&lt;BR /&gt;&amp;gt; ..&lt;SNIP&gt;..&lt;BR /&gt;&lt;BR /&gt;So no packets blocked here.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; let me know if you see something in this that is preventing the rules from &lt;BR /&gt;&amp;gt; being applied.&lt;BR /&gt;&lt;BR /&gt;Let me see if I understand this correctly. Your rules &lt;BR /&gt;are not loaded immediately after boot though they&lt;BR /&gt;are at /etc/opt/ipf/ipf.conf. Correct? What happens &lt;BR /&gt;if, after the boot, you manually load the rules by&lt;BR /&gt;"ipf -f /etc/opt/ipf/ipf.conf" command? Is then the&lt;BR /&gt;hacker blocked? If yes, then just check if &lt;BR /&gt;IPF_CONFDIR and IPF_CONF parameters are set&lt;BR /&gt;to /etc/opt/ipf and ${IPF_CONFDIR}/ipf.conf &lt;BR /&gt;respectively in file /etc/rc.config.d/ipfconf.&lt;BR /&gt;&lt;BR /&gt;Also, use the following rules:&lt;BR /&gt;&lt;BR /&gt;block in log quick from any to any with short&lt;BR /&gt;block in log quick from 200.27.182.114  to any&lt;BR /&gt;pass in all&lt;BR /&gt;pass out all&lt;BR /&gt;&lt;BR /&gt;Let me know how it goes?&lt;BR /&gt;&lt;BR /&gt;- Biswajit&lt;BR /&gt;&lt;/SNIP&gt;&lt;/SNIP&gt;</description>
      <pubDate>Tue, 18 Jan 2005 16:48:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464589#M210675</guid>
      <dc:creator>Biswajit Tripathy</dc:creator>
      <dc:date>2005-01-18T16:48:36Z</dc:date>
    </item>
    <item>
      <title>Re: IPfilter question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464590#M210676</link>
      <description>Thanks.. &lt;BR /&gt;I meant that the rules weren't loaded after the *last* system boot, because the last boot was when I installed ipfilter. &lt;BR /&gt;I'll let you know how it goes today.. my thanks again for all your help. &lt;BR /&gt;John H. &lt;BR /&gt;</description>
      <pubDate>Tue, 18 Jan 2005 17:13:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464590#M210676</guid>
      <dc:creator>John Henrikson</dc:creator>
      <dc:date>2005-01-18T17:13:36Z</dc:date>
    </item>
    <item>
      <title>Re: IPfilter question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464591#M210677</link>
      <description>hacker didn't try to come in last night, I'm going to keep watching it but I think its working so far.. &lt;BR /&gt;thanks again for your help everyone. &lt;BR /&gt;John H. &lt;BR /&gt;</description>
      <pubDate>Wed, 19 Jan 2005 14:59:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464591#M210677</guid>
      <dc:creator>John Henrikson</dc:creator>
      <dc:date>2005-01-19T14:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: IPfilter question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464592#M210678</link>
      <description>One way to confirm would be to add another rule&lt;BR /&gt;exactly similar to the one you added to block the&lt;BR /&gt;hacker; but this time replace the hacker IP address&lt;BR /&gt;with the IP address of one of your machine. Then&lt;BR /&gt;try to login from that machine and see if the login&lt;BR /&gt;attempt is blocked. Once you confirm this, remove the&lt;BR /&gt;newly added rule.&lt;BR /&gt;&lt;BR /&gt;BTW, this "hacker" guy does not seem much of a&lt;BR /&gt;hacker to me, if (s)he has to keep trying the root&lt;BR /&gt;passwd knowing (?) fully well that it will be logged in &lt;BR /&gt;one of the system log file :-)&lt;BR /&gt;&lt;BR /&gt;- Biswajit&lt;BR /&gt;</description>
      <pubDate>Wed, 19 Jan 2005 15:19:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464592#M210678</guid>
      <dc:creator>Biswajit Tripathy</dc:creator>
      <dc:date>2005-01-19T15:19:52Z</dc:date>
    </item>
    <item>
      <title>Re: IPfilter question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464593#M210679</link>
      <description>Hi John,&lt;BR /&gt;&lt;BR /&gt;I would really appreciate if you could let us know about&lt;BR /&gt;status of this problem. I did try to replicate your&lt;BR /&gt;problem on my machines, but couldn't. Are you still&lt;BR /&gt;seeing the problem?&lt;BR /&gt;&lt;BR /&gt;- Biswajit&lt;BR /&gt; HP-UX IPFilter team&lt;BR /&gt; Hewlett Packard Company&lt;BR /&gt;</description>
      <pubDate>Sun, 30 Jan 2005 15:14:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464593#M210679</guid>
      <dc:creator>Biswajit Tripathy</dc:creator>
      <dc:date>2005-01-30T15:14:38Z</dc:date>
    </item>
    <item>
      <title>Re: IPfilter question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464594#M210680</link>
      <description>I did test the filter by adding an IP address of my own machine - it blocked the address as expected. So while I still have new addresses trying to hit the machien, the filter seems to be working as expected. &lt;BR /&gt;My thanks for your help. &lt;BR /&gt;John Henrikson &lt;BR /&gt;</description>
      <pubDate>Sun, 30 Jan 2005 16:46:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464594#M210680</guid>
      <dc:creator>John Henrikson</dc:creator>
      <dc:date>2005-01-30T16:46:02Z</dc:date>
    </item>
    <item>
      <title>Re: IPfilter question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464595#M210681</link>
      <description>Your attacking may be doing something that was tried against me, using someone elses IP address or appearing to do so.&lt;BR /&gt;&lt;BR /&gt;It is kind of a spoof that takes advantages of unused IP addresses.&lt;BR /&gt;&lt;BR /&gt;I recall bringing up a server after maintenance and being informed its primary IP address was already assigned.&lt;BR /&gt;&lt;BR /&gt;For a few seconds I was able to traceroute that IP outside of my ISP's network. It was actually  some kind of IP address slight of hand.&lt;BR /&gt;&lt;BR /&gt;If however you implement my monbad protocol, the attacks will eventually be stopped.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Sun, 30 Jan 2005 23:04:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464595#M210681</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-01-30T23:04:22Z</dc:date>
    </item>
    <item>
      <title>Re: IPfilter question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464596#M210682</link>
      <description>Could you elaborate a little on this mombad protocol? &lt;BR /&gt;Thanks! &lt;BR /&gt;</description>
      <pubDate>Mon, 31 Jan 2005 07:33:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-question/m-p/3464596#M210682</guid>
      <dc:creator>John Henrikson</dc:creator>
      <dc:date>2005-01-31T07:33:36Z</dc:date>
    </item>
  </channel>
</rss>

