Linux.com

ShaneH57

ShaneH57

  • Linux.com Member
  • Posts: 12
  • Member Since: 13 Oct 09
  • Last Logged In: 4 days ago

Latest Posts

Posted by
Topic
Post Preview
Posted
  • ShaneH57
    RE: Wireless Not Working in Ubuntu 10.10
    I have figured this problem out. rf-kill was blocking my wireless adapter.
    Link to this post 29 Mar 11

    I have figured this problem out. rf-kill was blocking my wireless adapter.

  • ShaneH57
    Wireless Not Working in Ubuntu 10.10
    So, I have finally made my way back to Linux after a long hiatus playing mmorpgs on Windows. I have installed Ubuntu 10.10 on my HP Compaq Presario CQ50. I cannot get my wireless adapter to work. I have enable my wireless but I still cannot connect with to any wireless networks. Any help would be accepted.
    Link to this post 28 Mar 11

    So, I have finally made my way back to Linux after a long hiatus playing mmorpgs on Windows. I have installed Ubuntu 10.10 on my HP Compaq Presario CQ50. I cannot get my wireless adapter to work. I have enable my wireless but I still cannot connect with to any wireless networks. Any help would be accepted.

  • ShaneH57
    RE: Server Security
    Thanks for the help mfillpot. I really appreciate all the help you have gave me.
    Link to this post 24 Feb 10

    Thanks for the help mfillpot. I really appreciate all the help you have gave me.

  • ShaneH57
    RE: Server Security
    Ok then, why are some files listed at different and how can I get them back to saying ok beside them.
    Link to this post 24 Feb 10

    Ok then, why are some files listed at different and how can I get them back to saying ok beside them.

  • ShaneH57
    Server Security
    I am back again with another question that involves Lynis. Can someone please tell me what all of this means: - Comparing sysctl key pairs with scan profile... - kernel.core_uses_pid (1) [ OK ] - kernel.ctrl-alt-del (0) [ OK ] - kernel.exec-shield (1) [ OK ] - kernel.sysrq (0) [ OK ] - net.ipv4.conf.all.accept_redirects (0) [ DIFFERENT ] - net.ipv4.conf.all.accept_source_route (0) [ OK ] - net.ipv4.conf.all.bootp_relay (0) [ OK ] - net.ipv4.conf.all.forwarding (0) [ OK ] - net.ipv4.conf.all.log_martians (1) [ DIFFERENT ] - net.ipv4.conf.all.mc_forwarding (0) [ OK ] - net.ipv4.conf.all.proxy_arp (0) [ OK ] - net.ipv4.conf.all.rp_filter (1) [ DIFFERENT ] - net.ipv4.conf.all.send_redirects (0) [ DIFFERENT ] - net.ipv4.conf.default.accept_redirects (0) [ DIFFERENT ] - net.ipv4.conf.default.accept_source_route (0) [ OK ] - net.ipv4.conf.default.log_martians (1) [ DIFFERENT ] - net.ipv4.icmp_echo_ignore_broadcasts (1) [ OK ] - net.ipv4.icmp_ignore_bogus_error_responses (1) [ OK ] - net.ipv4.tcp_syncookies (1) [ DIFFERENT ] - net.ipv4.tcp_timestamps (0) [ DIFFERENT ] - net.ipv6.conf.all.accept_redirects (0) [ DIFFERENT ] - net.ipv6.conf.all.accept_source_route (0) [ OK ] - net.ipv6.conf.default.accept_redirects (0) [ DIFFERENT ] - net.ipv6.conf.default.accept_source_route (0) [ OK ] Thanks for the help in advanced. -Shane
    Link to this post 24 Feb 10

    I am back again with another question that involves Lynis. Can someone please tell me what all of this means:
    - Comparing sysctl key pairs with scan profile...
    - kernel.core_uses_pid (1) [ OK ]
    - kernel.ctrl-alt-del (0) [ OK ]
    - kernel.exec-shield (1) [ OK ]
    - kernel.sysrq (0) [ OK ]
    - net.ipv4.conf.all.accept_redirects (0) [ DIFFERENT ]
    - net.ipv4.conf.all.accept_source_route (0) [ OK ]
    - net.ipv4.conf.all.bootp_relay (0) [ OK ]
    - net.ipv4.conf.all.forwarding (0) [ OK ]
    - net.ipv4.conf.all.log_martians (1) [ DIFFERENT ]
    - net.ipv4.conf.all.mc_forwarding (0) [ OK ]
    - net.ipv4.conf.all.proxy_arp (0) [ OK ]
    - net.ipv4.conf.all.rp_filter (1) [ DIFFERENT ]
    - net.ipv4.conf.all.send_redirects (0) [ DIFFERENT ]
    - net.ipv4.conf.default.accept_redirects (0) [ DIFFERENT ]
    - net.ipv4.conf.default.accept_source_route (0) [ OK ]
    - net.ipv4.conf.default.log_martians (1) [ DIFFERENT ]
    - net.ipv4.icmp_echo_ignore_broadcasts (1) [ OK ]
    - net.ipv4.icmp_ignore_bogus_error_responses (1) [ OK ]
    - net.ipv4.tcp_syncookies (1) [ DIFFERENT ]
    - net.ipv4.tcp_timestamps (0) [ DIFFERENT ]
    - net.ipv6.conf.all.accept_redirects (0) [ DIFFERENT ]
    - net.ipv6.conf.all.accept_source_route (0) [ OK ]
    - net.ipv6.conf.default.accept_redirects (0) [ DIFFERENT ]
    - net.ipv6.conf.default.accept_source_route (0) [ OK ]

    Thanks for the help in advanced.


    -Shane

  • ShaneH57
    RE: Securing Ubuntu
    Here is the output of iptables -L : Chain INPUT (policy DROP) target prot opt source destination ufw-before-logging-input all -- anywhere anywhere ufw-before-input all -- anywhere anywhere ufw-after-input all -- anywhere anywhere ufw-after-logging-input all -- anywhere anywhere ufw-reject-input all -- anywhere anywhere ufw-track-input all -- anywhere anywhere Chain FORWARD (policy DROP) target prot opt source destination ufw-before-logging-forward all -- anywhere anywhere ufw-before-forward all -- anywhere anywhere ufw-after-forward all -- anywhere anywhere ufw-after-logging-forward all -- anywhere anywhere ufw-reject-forward all -- anywhere anywhere Chain OUTPUT (policy ACCEPT) target prot opt source destination ufw-before-logging-output all -- anywhere anywhere ufw-before-output all -- anywhere anywhere ufw-after-output all -- anywhere anywhere ufw-after-logging-output all -- anywhere anywhere ufw-reject-output all -- anywhere anywhere ufw-track-output all -- anywhere anywhere Chain ufw-after-forward (1 references) target prot opt source destination Chain ufw-after-input (1 references) target prot opt source destination RETURN udp -- anywhere anywhere udp dpt:netbios-ns RETURN udp -- anywhere anywhere udp dpt:netbios-dgm RETURN tcp -- anywhere anywhere tcp dpt:netbios-ssn RETURN tcp -- anywhere anywhere tcp dpt:microsoft-ds RETURN udp -- anywhere anywhere udp dpt:bootps RETURN udp -- anywhere anywhere udp dpt:bootpc RETURN all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST Chain ufw-after-logging-forward (1 references) target prot opt source destination Chain ufw-after-logging-input (1 references) target prot opt source destination Chain ufw-after-logging-output (1 references) target prot opt source destination Chain ufw-after-output (1 references) target prot opt source destination Chain ufw-before-forward (1 references) target prot opt source destination ufw-user-forward all -- anywhere anywhere Chain ufw-before-input (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED ufw-logging-deny all -- anywhere anywhere state INVALID DROP all -- anywhere anywhere state INVALID ACCEPT icmp -- anywhere anywhere icmp destination-unreachable ACCEPT icmp -- anywhere anywhere icmp source-quench ACCEPT icmp -- anywhere anywhere icmp time-exceeded ACCEPT icmp -- anywhere anywhere icmp parameter-problem ACCEPT icmp -- anywhere anywhere icmp echo-request ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc ufw-not-local all -- anywhere anywhere ACCEPT all -- BASE-ADDRESS.MCAST.NET/4 anywhere ACCEPT all -- anywhere BASE-ADDRESS.MCAST.NET/4 ufw-user-input all -- anywhere anywhere Chain ufw-before-logging-forward (1 references) target prot opt source destination Chain ufw-before-logging-input (1 references) target prot opt source destination Chain ufw-before-logging-output (1 references) target prot opt source destination Chain ufw-before-output (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED ufw-user-output all -- anywhere anywhere Chain ufw-logging-allow (0 references) target prot opt source destination Chain ufw-logging-deny (2 references) target prot opt source destination Chain ufw-not-local (1 references) target prot opt source destination RETURN all -- anywhere anywhere ADDRTYPE match dst-type LOCAL RETURN all -- anywhere anywhere ADDRTYPE match dst-type MULTICAST RETURN all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST ufw-logging-deny all -- anywhere anywhere limit: avg 3/min burst 10 DROP all -- anywhere anywhere Chain ufw-reject-forward (1 references) target prot opt source destination Chain ufw-reject-input (1 references) target prot opt source destination Chain ufw-reject-output (1 references) target prot opt source destination Chain ufw-track-input (1 references) target prot opt source destination Chain ufw-track-output (1 references) target prot opt source destination ACCEPT tcp -- anywhere anywhere state NEW ACCEPT udp -- anywhere anywhere state NEW Chain ufw-user-forward (1 references) target prot opt source destination Chain ufw-user-input (1 references) target prot opt source destination Chain ufw-user-limit (0 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning prefix `[UFW LIMIT BLOCK] ' REJECT all -- anywhere anywhere reject-with icmp-port-unreachable Chain ufw-user-limit-accept (0 references) target prot opt source destination ACCEPT all -- anywhere anywhere Chain ufw-user-logging-forward (0 references) target prot opt source destination Chain ufw-user-logging-input (0 references) target prot opt source destination Chain ufw-user-logging-output (0 references) target prot opt source destination Chain ufw-user-output (1 references) target prot opt source destination
    Link to this post 19 Jan 10

    Here is the output of iptables -L : Chain INPUT (policy DROP)
    target prot opt source destination
    ufw-before-logging-input all -- anywhere anywhere
    ufw-before-input all -- anywhere anywhere
    ufw-after-input all -- anywhere anywhere
    ufw-after-logging-input all -- anywhere anywhere
    ufw-reject-input all -- anywhere anywhere
    ufw-track-input all -- anywhere anywhere

    Chain FORWARD (policy DROP)
    target prot opt source destination
    ufw-before-logging-forward all -- anywhere anywhere
    ufw-before-forward all -- anywhere anywhere
    ufw-after-forward all -- anywhere anywhere
    ufw-after-logging-forward all -- anywhere anywhere
    ufw-reject-forward all -- anywhere anywhere

    Chain OUTPUT (policy ACCEPT)
    target prot opt source destination
    ufw-before-logging-output all -- anywhere anywhere
    ufw-before-output all -- anywhere anywhere
    ufw-after-output all -- anywhere anywhere
    ufw-after-logging-output all -- anywhere anywhere
    ufw-reject-output all -- anywhere anywhere
    ufw-track-output all -- anywhere anywhere

    Chain ufw-after-forward (1 references)
    target prot opt source destination

    Chain ufw-after-input (1 references)
    target prot opt source destination
    RETURN udp -- anywhere anywhere udp dpt:netbios-ns
    RETURN udp -- anywhere anywhere udp dpt:netbios-dgm
    RETURN tcp -- anywhere anywhere tcp dpt:netbios-ssn
    RETURN tcp -- anywhere anywhere tcp dpt:microsoft-ds
    RETURN udp -- anywhere anywhere udp dpt:bootps
    RETURN udp -- anywhere anywhere udp dpt:bootpc
    RETURN all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST

    Chain ufw-after-logging-forward (1 references)
    target prot opt source destination

    Chain ufw-after-logging-input (1 references)
    target prot opt source destination

    Chain ufw-after-logging-output (1 references)
    target prot opt source destination

    Chain ufw-after-output (1 references)
    target prot opt source destination

    Chain ufw-before-forward (1 references)
    target prot opt source destination
    ufw-user-forward all -- anywhere anywhere

    Chain ufw-before-input (1 references)
    target prot opt source destination
    ACCEPT all -- anywhere anywhere
    ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
    ufw-logging-deny all -- anywhere anywhere state INVALID
    DROP all -- anywhere anywhere state INVALID
    ACCEPT icmp -- anywhere anywhere icmp destination-unreachable
    ACCEPT icmp -- anywhere anywhere icmp source-quench
    ACCEPT icmp -- anywhere anywhere icmp time-exceeded
    ACCEPT icmp -- anywhere anywhere icmp parameter-problem
    ACCEPT icmp -- anywhere anywhere icmp echo-request
    ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc
    ufw-not-local all -- anywhere anywhere
    ACCEPT all -- BASE-ADDRESS.MCAST.NET/4 anywhere
    ACCEPT all -- anywhere BASE-ADDRESS.MCAST.NET/4
    ufw-user-input all -- anywhere anywhere

    Chain ufw-before-logging-forward (1 references)
    target prot opt source destination

    Chain ufw-before-logging-input (1 references)
    target prot opt source destination

    Chain ufw-before-logging-output (1 references)
    target prot opt source destination

    Chain ufw-before-output (1 references)
    target prot opt source destination
    ACCEPT all -- anywhere anywhere
    ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
    ufw-user-output all -- anywhere anywhere

    Chain ufw-logging-allow (0 references)
    target prot opt source destination

    Chain ufw-logging-deny (2 references)
    target prot opt source destination

    Chain ufw-not-local (1 references)
    target prot opt source destination
    RETURN all -- anywhere anywhere ADDRTYPE match dst-type LOCAL
    RETURN all -- anywhere anywhere ADDRTYPE match dst-type MULTICAST
    RETURN all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST
    ufw-logging-deny all -- anywhere anywhere limit: avg 3/min burst 10
    DROP all -- anywhere anywhere

    Chain ufw-reject-forward (1 references)
    target prot opt source destination

    Chain ufw-reject-input (1 references)
    target prot opt source destination

    Chain ufw-reject-output (1 references)
    target prot opt source destination

    Chain ufw-track-input (1 references)
    target prot opt source destination

    Chain ufw-track-output (1 references)
    target prot opt source destination
    ACCEPT tcp -- anywhere anywhere state NEW
    ACCEPT udp -- anywhere anywhere state NEW

    Chain ufw-user-forward (1 references)
    target prot opt source destination

    Chain ufw-user-input (1 references)
    target prot opt source destination

    Chain ufw-user-limit (0 references)
    target prot opt source destination
    LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning prefix `[UFW LIMIT BLOCK] '
    REJECT all -- anywhere anywhere reject-with icmp-port-unreachable

    Chain ufw-user-limit-accept (0 references)
    target prot opt source destination
    ACCEPT all -- anywhere anywhere

    Chain ufw-user-logging-forward (0 references)
    target prot opt source destination

    Chain ufw-user-logging-input (0 references)
    target prot opt source destination

    Chain ufw-user-logging-output (0 references)
    target prot opt source destination

    Chain ufw-user-output (1 references)
    target prot opt source destination

  • ShaneH57
    RE: Securing Ubuntu
    Thanks for helping me. Right after I posted that I installed a firewall but now it keeps giving me this: Found possible unused iptables rules (1 2 3 4 5 3 6 1 1 5 6 7 8 9 10 12 1 4 5 1 1 2 1).
    Link to this post 19 Jan 10

    Thanks for helping me. Right after I posted that I installed a firewall but now it keeps giving me this: Found possible unused iptables rules (1 2 3 4 5 3 6 1 1 5 6 7 8 9 10 12 1 4 5 1 1 2 1).

  • ShaneH57
    Securing Ubuntu
    I ran Lynis auditing software and it gave me back some things I need to do to my computer. Some of these I just cannot figure out. Can someone please help? Here is the output of Lynis: -[ Lynis 1.2.9 Results ]- Tests performed: 160 Warnings: ---------------------------- - [10:46:25] Warning: Couldn't find 2 responsive nameservers [test:NETW-2705] [impact:L] - [10:46:26] Warning: iptables module(s) loaded, but no rules active [test:FIRE-4512] [impact:L] Suggestions: ---------------------------- - [10:45:56] Suggestion: Configure password aging limits to enforce password changing on a regular base [test:AUTH-9286] - [10:45:57] Suggestion: To decrease the impact of a full /tmp file system, place /tmp on a separated partition [test:FILE-6310] - [10:45:58] Suggestion: Disable drivers like USB storage when not used, to prevent unauthorized storage or data theft [test:STRG-1840] - [10:45:58] Suggestion: Disable drivers like firewire storage when not used, to prevent unauthorized storage or data theft [test:STRG-1846] - [10:46:25] Suggestion: Install package apt-show-versions for patch management purposes [test:PKGS-7394] - [10:46:25] Suggestion: Check your resolv.conf file and fill in a backup nameserver if possible [test:NETW-2705] - [10:46:26] Suggestion: Disable iptables kernel module if not used or make sure rules are being used [test:FIRE-4512] - [10:46:26] Suggestion: Configure a firewall/packet filter to filter incoming and outgoing traffic [test:FIRE-4590] - [10:46:35] Suggestion: Enable logging to an external logging host for archiving purposes and additional protection [test:LOGG-2154] - [10:46:38] Suggestion: Enable auditd to collect audit information [test:ACCT-9628] - [10:46:44] Suggestion: Check ntpq peers output for time source candidates [test:TIME-3128] - [10:46:48] Suggestion: Install a file integrity tool [test:FINT-4350] - [10:46:52] Suggestion: Harden the system by removing unneeded compilers. This can decrease the chance of customized trojans, backdoors and rootkits to be compiled and installed [test:HRDN-7220]
    Link to this post 19 Jan 10

    I ran Lynis auditing software and it gave me back some things I need to do to my computer. Some of these I just cannot figure out. Can someone please help? Here is the output of Lynis:

    -[ Lynis 1.2.9 Results ]-

    Tests performed: 160
    Warnings:
    ----------------------------
    - [10] Warning: Couldn't find 2 responsive nameservers [test:NETW-2705] [impact:L]
    - [10] Warning: iptables module(s) loaded, but no rules active [test:FIRE-4512] [impact:L]

    Suggestions:
    ----------------------------
    - [10] Suggestion: Configure password aging limits to enforce password changing on a regular base [test:AUTH-9286]
    - [10] Suggestion: To decrease the impact of a full /tmp file system, place /tmp on a separated partition [test:FILE-6310]
    - [10] Suggestion: Disable drivers like USB storage when not used, to prevent unauthorized storage or data theft [test:STRG-1840]
    - [10] Suggestion: Disable drivers like firewire storage when not used, to prevent unauthorized storage or data theft [test:STRG-1846]
    - [10] Suggestion: Install package apt-show-versions for patch management purposes [test:PKGS-7394]
    - [10] Suggestion: Check your resolv.conf file and fill in a backup nameserver if possible [test:NETW-2705]
    - [10] Suggestion: Disable iptables kernel module if not used or make sure rules are being used [test:FIRE-4512]
    - [10] Suggestion: Configure a firewall/packet filter to filter incoming and outgoing traffic [test:FIRE-4590]
    - [10] Suggestion: Enable logging to an external logging host for archiving purposes and additional protection [test:LOGG-2154]
    - [10] Suggestion: Enable auditd to collect audit information [test:ACCT-9628]
    - [10] Suggestion: Check ntpq peers output for time source candidates [test:TIME-3128]
    - [10] Suggestion: Install a file integrity tool [test:FINT-4350]
    - [10] Suggestion: Harden the system by removing unneeded compilers. This can decrease the chance of customized trojans, backdoors and rootkits to be compiled and installed [test:HRDN-7220]

  • ShaneH57
    RE: NTFS on Red Hat
    Yeah, its installed. But, yet it still won't work. I had it working before but I had to rebuilt the server and could not remember how I did it before. Thanks for the idea though.
    Link to this post 18 Dec 09

    Yeah, its installed. But, yet it still won't work. I had it working before but I had to rebuilt the server and could not remember how I did it before. Thanks for the idea though.

  • ShaneH57
    NTFS on Red Hat
    Ok, so I am not really a noob to Linux but I just cannot seem to get my 1.0TB external hard drive to mount in Red Hat. Can someone please help with this problem. I would like to back up my server to this external HD so I can put my backups in a safe place. Thanks for the help in advance, Shane
    Link to this post 18 Dec 09

    Ok, so I am not really a noob to Linux but I just cannot seem to get my 1.0TB external hard drive to mount in Red Hat. Can someone please help with this problem. I would like to back up my server to this external HD so I can put my backups in a safe place.


    Thanks for the help in advance,

    Shane

Who we are ?

The Linux Foundation is a non-profit consortium dedicated to the growth of Linux.

More About the foundation...

Frequent Questions

Join / Linux Training / Board