Sponsored Content
Special Forums Cybersecurity Looking Out from Behind a Firewall Post 38483 by mntamago on Thursday 17th of July 2003 08:39:26 AM
Old 07-17-2003
I am sorry if this whole thing seems confusing.

As far as posting specific details pertaining to system types and firewalls and such, I will try to give you what I can after a bit of explanation.

But first, the real problem.

In my section - the Promotion section - there is this person who has truly developed his IT knowledge and skills. By all rights, he could be the top of our IT section. Unfortunately he is so self serving that my company will not allow him to be the top because he is down right dangerous.

So, what happens is this person whats to show the company how "incompetent" our IT people are. From time to time he creates "little" disturbances to try and up his own personal value. You see, this person used to be in the IT section, so he basically has access to anything he wants at present.

This then brings us to my question and problem.

Certain decision making personnel in my department have started to experience trouble when they try to access the internet from our intranet. Up until recently this task presented no trouble. (BTW, In my examples with A and B, A is the person having trouble)

As such I believe this "unhappy" person has been tinkering with something in such a way as to try and force my company to put him in power.

I want to try and confirm his tinkering, if it is tinkering. If it is not, I would like to try and fix the problem anyway.

I get the feeling that because some internet pages are viewable without problem on the PCs that are having trouble, our "unhappy" person has been tinkering with our firewall, proxy server and settings, or something else.

Of course, there is always the possibility that our "unhappy" person has not tinkered with anything. But then again, no definite patterns can be seen in the PCs (and PCs environments) that experience problems and those that do not, so this problem looks/feels to be "man made".

This is my situation.

As for details, what I have is the following ( from nmap):

Device type: general purpose|router|load balancer|firewall
Running (JUST GUESSING) : HP HP-UX 11.X|10.X (93%), Cabletron embedded (90%), FreeBSD 4.X|3.X (89%), NetBSD (89%), Cisco IOS 12.X (88%), F5 Labs BSDI (88%), Secure Computing embedded (88%), BSDI BSD/OS 3.X (87%)
Aggressive OS guesses: HP-UX B11.00 U 9000/839 (93%), Cabletron Smart Switch Router 8600 (90%), FreeBSD 4.4-STABLE (89%), FreeBSD 4.7-STABLE (89%), HP-UX 10.20 E 9000/777 or A 712/60 with tcp_random_seq = 0 (89%), HP-UX 10.20 (89%), NetBSD 1.3I through 1.6 (89%), Cisco router running IOS 12.1.5-12.2.13a (88%), Cisco IOS 12.0(3.3)S (perhaps a 7200 router) (88%), F5 Labs Big/IP HA TCP/IP Load Balancer (BSDI kernel/x86) (88%)

Additionally, I believe that all requests to the internet from inside our intranet go through a proxy, which I believe to be squid.

So, there you have it. I suppose this is all very confusing as it should be.

My basic question then, or, perhaps better put, the point that stumps me the most then is the fact that while most internet pages are "unviewable", some may be viewed with no problem. Additionally, pages on our company's internet site that can not be view , are viewable when downloaded to an intranet server. This really stumps me! Why is this possible if someone has no been tinkering with something?

Sorry for the long story.
 

9 More Discussions You Might Find Interesting

1. Cybersecurity

What Firewall do you use?

Just out of curiosity, I see a lot of people here use Linux IPTables as their firewall. Anyone here use something else like OpenBSD PF or *BSD IPF, IPFW? I'm quite fond of OpenBSD and their Packet Filters. I find their syntax much easier to manage and from my personal experience, I find them... (5 Replies)
Discussion started by: tarballed
5 Replies

2. IP Networking

Linux Firewall

ON A LINUX NETWORK, HOW DO I ASSIGN IP ADDRESSES TO OTHER TERMINALS AND AFTER THAT HOW I CAN DENY/GRANT ACCESS TO TERMINALS ON A LAN TO MY TERMINAL.PLEASE SPECIFY THE EXACT COMMANDS.kINDLY HELP ME (3 Replies)
Discussion started by: ameya_shaligram
3 Replies

3. UNIX for Advanced & Expert Users

routing and firewall

I have a PC with KUBUNTU installed on it and with 2NIC's on it (two PCI network 100Mbit cards). I want to use it as a server packet router and firewall between two computers with windows installed on them, each of this computer being connected to one different card on the KUBUNTU server. The... (1 Reply)
Discussion started by: meorfi
1 Replies

4. Cybersecurity

help with firewall

hi everyone I am a newbee to firewall scripting. cannot understand how to write rules per host. in ip6tables. anyone plz:( (2 Replies)
Discussion started by: xecutioner
2 Replies

5. Homework & Coursework Questions

firewall query

Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted! 1. The problem statement, all variables and given/known data: produce a report containing an iptable firewall definition for a system requproduce a report containing an... (0 Replies)
Discussion started by: boabbyrab
0 Replies

6. AIX

Firewall

:b:Hi,, How do configure firewall in aix.. similar to linux iptable. Rgards, k.sumathi. (3 Replies)
Discussion started by: sumathi.k
3 Replies

7. SuSE

Firewall

Is there a command line interface to the firewall? (4 Replies)
Discussion started by: jgt
4 Replies

8. Linux

Firewall?

Dear All I have put my windows machine behind my centos firewall server with just one NIC. At now, the windows machine can ping 192.9.9.3 but cannot resolve valid url (like www.google.com). I have set DNS for it as well. Can you please let me know what is the missing step? Thank you (6 Replies)
Discussion started by: hadimotamedi
6 Replies

9. Cybersecurity

Firewall

Hey Guys, I am looking for a good firewall software to implement in medium/large office, with at least 150 users. I was hopping you guys could help me on this one. Regards, (4 Replies)
Discussion started by: andrevicente
4 Replies
XVisibilityEvent(3X11)						     MIT X11R4						    XVisibilityEvent(3X11)

Name
       XVisibilityNotifyEvent - VisibilityNotify event structure

Structures
       The structure for events contains:

       typedef struct {
	 int type;		/* VisibiltyNotify */
	 unsigned long serial;	/* # of last request processed by
				    server */
	 Bool send_event;	/* true if came from a SendEvent
				    request */
	 Display *display;	/* Display the event was read from */
	 Window window;
	 int state;
       } XVisibilityEvent;

       When you receive this event, the structure members are set as follows.

       The type member is set to the event type constant name that uniquely identifies it.  For example, when the X server reports a event to a
       client application, it sends an structure with the type member set to The display member is set to a pointer to the display the event was
       read on.  The send_event member is set to if the event came from a protocol request.  The serial member is set from the serial number
       reported in the protocol but expanded from the 16-bit least-significant bits to a full 32-bit value.  The window member is set to the win-
       dow that is most useful to toolkit dispatchers.

       The window member is set to the window whose visibility state changes.  The state member is set to the state of the window's visibility and
       can be or The X server ignores all of a window's subwindows when determining the visibility state of the window and processes events
       according to the following:

       o    When the window changes state from partially obscured, fully obscured, or not viewable to viewable and completely unobscured, the X
	    server generates the event with the state member of the structure set to

       o    When the window changes state from viewable and completely unobscured or not viewable to viewable and partially obscured, the X server
	    generates the event with the state member of the structure set to

       o    When the window changes state from viewable and completely unobscured, viewable and partially obscured, or not viewable to viewable
	    and fully obscured, the X server generates the event with the state member of the structure set to

See Also
       XAnyEvent(3X11), XButtonEvent(3X11), XCreateWindowEvent(3X11), XCirculateEvent(3X11), XCirculateRequestEvent(3X11), XColormapEvent(3X11),
       XConfigureEvent(3X11), XConfigureRequestEvent(3X11), XCrossingEvent(3X11), XDestroyWindowEvent(3X11), XErrorEvent(3X11), XEx-
       poseEvent(3X11), XFocusChangeEvent(3X11), XGraphicsExposeEvent(3X11), XGravityEvent(3X11), XKeymapEvent(3X11), XMapEvent(3X11), XMapRe-
       questEvent(3X11), XPropertyEvent(3X11), XReparentEvent(3X11), XResizeRequestEvent(3X11), XSelectionClearEvent(3X11), XSelectionEvent(3X11),
       XSelectionRequestEvent(3X11), XUnmapEvent(3X11),
       X Window System: The Complete Reference, Second Edition, Robert W. Scheifler and James Gettys

															    XVisibilityEvent(3X11)
All times are GMT -4. The time now is 05:04 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy