Jeff Hubbs on Thursday, April 06, 2000 11:35 PM wrote
>
>
> Bill -
>
> I've seen in more than one place that machines configured for firewall
> duty (to include IP masquerading) should do that and NOTHING
> ELSE. Any
> other daemons that run just represent an opportunity for the
> machine to
> be cracked.
>
> I'm going to be heading down a similar road soon and inasmuch
> as I would
> LIKE to use the same system for NTP, DHCP, DNS, sendmail,
> etc. I'm going
> to suck it up and not do any of that there.
>
> If I were able, I'd like to set up the machine to boot from a
> burned CD,
> with all config files etc. "hardcoded" into it - maybe even
> just setting
> up a ramdisk for /var and taking out the hard drive.
>
> - Jeff
>
You might want to take a look at Coyote Linux Pro - which is still under
development at ftp://ftp.vortech.net/pub/coyotepro/devel this is a IP
masquerading firewall which can be run from a CDROM, a bootable Zip Drive or
an LS120 and is based on Coyote Linux at http://www.coyotelinux.com
Ray Knight
">audilvr@speakeasy.org
--
To unsubscribe: mail ">majordomo@ale.org with "unsubscribe ale" in message body.