sections, with the Front-Cover Texts being “Original Author: Oskar http://people. Oskar Andreasson speaks with about his comprehensive IP . I hope that the iptables-tutorial give Linux administrators the possibility to. Oskar Andreasson [email protected] by Oskar Andreasson. Copyright © .. 1. txt.

Author: Moogugrel Aralkree
Country: Colombia
Language: English (Spanish)
Genre: Literature
Published (Last): 8 June 2007
Pages: 20
PDF File Size: 11.78 Mb
ePub File Size: 10.95 Mb
ISBN: 342-8-88787-538-9
Downloads: 26230
Price: Free* [*Free Regsitration Required]
Uploader: Toshicage

Another example that I have noticed is the iproute2 package, which in my way of seeing things is one of the most complex and hardest to understand packages for Linux that is available today.

I hope that the iptables-tutorial tutoral Linux administrators the possibility to easily oskad about netfilter and iptables and in an as complete document as possible. Who are your target audience and why? R ecently I had an opportunity to speak with Oskar Andreasson, author of the Linux IP Tables Tutorial Oskar announces his documents after spending the last several months writing and researching the information necessary to provide a Linux administrator with the information necessary to secure his Linux box.

I know the last has already been described by the squid documentation, so it is not high priority right now, however I feel that it should at least be mentioned. After this, it is all a matter of keeping those few packages you have installed up to date. One example would be iptables in the beginning, by today there is a wast amount of documentation and different introductions etceteras. If there is any Swedish speaking people, I suggest them to check out http: The aim of the iptables-tutorial tutotial to explain iptables in a complete and simple way.

Open tuyorial gives everyone the chance to look at the source code, and it becomes easier to spot errors for a third party, and hence report to the producer. In those days Amiga daysit was mainly tutoria I found interest in.

Iptables-tutorial : Frozentux

Oskat so, I think it’s worth printing a series. Sorry, your blog cannot share posts by email. This would more or less be a way for me to get some money from the project, and a way for those who has read and liked it to actually contribute to what I have written and to show that they support me.


The tutorial was under heavy scrutiny and updating, as can be seen in the latest version of the tutorial. During the time, I was also doing a lot of “work” for our site www. In open source, you can have the problem fixed within 3 minutes by yourself and have a bug report sent away and how to fix it, in closed source, you find a bug, send a bug report and then sit down and wait for weeks before anything happens.

Both Lists Newsletter Security Advisories.

Computer security has always intrigued me ever since I started using a PC for the first time around or so. At the top of that, if you’re really security conscious, I’d suggest using kernel security patches and such. Oskar, thanks much for your time, and we look forward to reading your future Linux security documents. A person using an iptavles source product is more likely to actually look at the code and to try and fix the problem, and then send the bug over to the developer, in my own experience.

Are there other documents you have written that you think might be beneficial to the Linux and open source security communities? I think that this project will look a lot like the iptables tutorial when it gets going, especially in writing style and how it will be built up with a lot of examples among other things.

Oskar Andreasson speaks with LinuxSecurity. Closed source on the other hand is harder to debug owkar a ozkar party, and tutorizl you really do find a bug, you are more likely to just throw the bug on the crap pile and hope for it to jptables fixed in the next release, they don’t feel anything in common for the actual development of the product nor do they actually have a good reason for telling the developers about the bug.

After that it took a year or so until I tried getting Linux to run again, and by that time it had evolved incredibly I could get it to install, isn’t that evolution?

Red Hat and Debian may be easier to maintain in this sense, as they contain more or less integrated package updating and package lists. The fewer packages we have to keep up to date, the less work to maintain and to keep it up and running. I would suggest at least installing a NIDS i. Yes, I think there is. However, a firewall is never near good enough based on only a packet filtering mechanism.



If not, well, it would be sad if not even persons liked it enough to actually buy it. As it looks now, I want to finish the chapter about how a rule is written, and then I want to add a chapter about the state sokar.

Why did you decide to write the iptables reference? By that time, I went up to the second or third step on the ladder to becoming a “Linux Guru” I got saved from the Windows hell and started preachingand I iptablws I’m still stuck somewhere around there.

Anyway, my aims with this documentation is to get more people to understand the extremely advanced routing functionalities that really are part of Linux. There is actually something people could do to contribute to this tutorial.

Any kind of computer would suffice, even Pentiums at the moment, as long as I can have a few network cards with them 9 or so, but less would suffice too. Arbitrary command execution Debian LTS: Slackware can be a bit hard to do this with, tutorkal it has no package system of its own except the old. Of course, there are those who don’t report the bugs, and instead start osiar it to their own advantage for example, hack sites with the bug and so on.

I hope that there will be at least a persons or so willing to buy the printed version for a reasonable price.

When I started using Linux 2. However, I don’t plan to get this project really moving until the iptables tutorial has stabilized, in perhaps months. Guardian Digital Mail Systems: Common Myths and Misconceptions Addressed. Security Highlights from Defcon How can your iptables reference help to avoid these problems?