/l3/trainings/nt-bsdnet/2005-11-21/fbsd4.linux.nt/root :1 :2 :3 :4 :5 :6 :7 :8 :9 |
|
#ftp.proxy -f /usr/local/etc/ftpproxy.conf 192.168.15.254
starting ftp.proxy 1.2.3 in daemon mode ... ^Z [1]+ Stopped ftp.proxy -f /usr/local/etc/ftpproxy.conf 192.168.15.254 |
#bg
[1]+ ftp.proxy -f /usr/local/etc/ftpproxy.conf 192.168.15.254 & |
#sockstat -4
USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS root kdeinit 3490 7 tcp4 192.168.15.24:52970 70.84.47.84:80 root kdeinit 3489 8 tcp4 192.168.15.24:57756 70.84.47.84:80 root ftp.proxy 3488 4 tcp4 *:8000 *:* root kdeinit 3124 8 tcp4 192.168.15.24:58228 70.84.47.84:80 root sshd 2951 3 tcp4 192.168.15.24:22 192.168.15.254:37960 root natd 2924 3 div4 *:8668 *:* root sshd 2339 3 tcp4 192.168.15.24:22 192.168.15.254:36155 root Xorg 634 3 tcp4 *:6000 *:* root xinetd 504 5 tcp4 *:21 *:* root xinetd 504 7 tcp4 *:23 *:* root xinetd 504 8 tcp4 *:79 *:* root sendmail 448 4 tcp4 127.0.0.1:25 *:* root sshd 442 4 tcp4 *:22 *:* root syslogd 316 6 udp4 *:514 *:* |
#tail /var/log/messages
Nov 23 12:00:06 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 12:00:11 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:00:18 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 12:00:20 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:00:23 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 12:00:33 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:00:48 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 12:37:46 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:49:10 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 13:10:47 fbsd4 ftp.proxy[3488]: configured to use config file. (null) |
#killall ftp.proxy
[1]+ Terminated: 15 ftp.proxy -f /usr/local/etc/ftpproxy.conf 192.168.15.254 |
#cat /usr/local/etc/ftpproxy.conf
bind 8000 debug yes |
#vi /etc/inetd.conf
124c124 < #ftp-proxy stream tcp nowait root /usr/libexec/ftp-proxy ftp-proxy --- > ftp-proxy stream tcp nowait root /usr/libexec/ftp-proxy ftp-proxy -n |
#ls /usr/libexec/
atrun ipropd-master mail.local rpc.rwalld bootpd ipropd-slave make_index rpc.sprayd bootpgw kadmind makekey rshd catman.local kdc makewhatis.local save-entropy cc1 kpasswdd mknetid sendmail cc1obj ld-elf.so.1 ntalkd sftp-server cc1plus lint1 phttpget sm.bin comsat lint2 pppoed smrsh f771 locate.bigram pt_chown ssh-keysign fingerd locate.code rbootd tcpd ftp-proxy locate.concatdb revnetgroup telnetd ftpd locate.mklocatedb rlogind tftpd getty locate.updatedb rpc.rquotad vfontedpr hprop lpr rpc.rstatd yppwupdate hpropd lukemftpd rpc.rusersd ypxfr |
#vi /etc/inetd.conf
|
#grep ftp-proxy /etc/services
ftp-proxy 8021/tcp # FTP proxy |
#ipfw list
00010 divert 8668 ip from any to any via xl0 00015 allow ip from 192.168.15.24 to any out 00015 allow ip from any to 192.168.15.24 in 00050 allow tcp from any 80 to 192.168.16.131 00060 allow tcp from any 20 to 192.168.16.131 00070 allow tcp from any 21 to 192.168.16.131 01000 deny log tcp from any to any out 65535 allow ip from any to any |
#ipfw add 5 fwd 127.0.0.1,25 tcp from any to any 21
00005 fwd 127.0.0.1,25 tcp from any to any dst-port 21 |
#ipfw listr
ipfw: bad command `listr' |
#ipfw list
00005 fwd 127.0.0.1,25 tcp from any to any dst-port 21 00010 divert 8668 ip from any to any via xl0 00015 allow ip from 192.168.15.24 to any out 00015 allow ip from any to 192.168.15.24 in 00050 allow tcp from any 80 to 192.168.16.131 00060 allow tcp from any 20 to 192.168.16.131 00070 allow tcp from any 21 to 192.168.16.131 01000 deny log tcp from any to any out 65535 allow ip from any to any |
#ipfw add 900 allow ip from any to any via xl1
00900 allow ip from any to any via xl1 |
#ipfw list
00005 fwd 127.0.0.1,25 tcp from any to any dst-port 21 00010 divert 8668 ip from any to any via xl0 00015 allow ip from 192.168.15.24 to any out 00015 allow ip from any to 192.168.15.24 in 00050 allow tcp from any 80 to 192.168.16.131 00060 allow tcp from any 20 to 192.168.16.131 00070 allow tcp from any 21 to 192.168.16.131 00900 allow ip from any to any via xl1 01000 deny log tcp from any to any out 65535 allow ip from any to any |
#/etc/rc.d/inetd restart
|
#vi /etc/inetd.conf
|
#vi /etc/rc.conf
|
#killall xinetd
|
#/etc/rc.d/inetd restart
inetd not running? (check /var/run/inetd.pid). Starting inetd. |
#/etc/rc.d/inetd restart
Stopping inetd. Starting inetd. |
#tail /var/log/messages
Nov 23 12:00:11 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:00:18 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 12:00:20 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:00:23 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 12:00:33 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:00:48 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 12:37:46 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:49:10 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 13:10:47 fbsd4 ftp.proxy[3488]: configured to use config file. (null) Nov 23 13:49:31 fbsd4 xinetd[504]: Exiting... |
#tail -f /var/log/messages
Nov 23 12:00:11 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:00:18 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 12:00:20 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:00:23 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 12:00:33 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:00:48 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 12:37:46 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:49:10 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 13:10:47 fbsd4 ftp.proxy[3488]: configured to use config file. (null) Nov 23 13:49:31 fbsd4 xinetd[504]: Exiting... ^C |
#tail -f /var/log/auth.log
Makefile distinfo pkg-descr |
#tail -f /var/log/auth.log
Nov 23 09:24:04 fbsd4 login: login on ttyv0 as root Nov 23 09:24:04 fbsd4 login: ROOT LOGIN (root) ON ttyv0 Nov 23 12:36:39 fbsd4 sshd[2339]: Address 192.168.15.254 maps to linux.nt, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT! Nov 23 12:36:39 fbsd4 sshd[2339]: Accepted publickey for root from 192.168.15.254 port 36155 ssh2 Nov 23 12:56:56 fbsd4 sshd[2951]: Address 192.168.15.254 maps to linux.nt, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT! Nov 23 12:56:56 fbsd4 sshd[2951]: Accepted publickey for root from 192.168.15.254 port 37960 ssh2 Nov 23 13:30:31 fbsd4 sshd[3615]: Address 192.168.15.254 maps to linux.nt, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT! Nov 23 13:30:31 fbsd4 sshd[3615]: Accepted publickey for root from 192.168.15.254 port 37983 ssh2 Nov 23 13:30:42 fbsd4 sshd[3631]: Address 192.168.15.254 maps to linux.nt, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT! Nov 23 13:30:42 fbsd4 sshd[3631]: Accepted publickey for root from 192.168.15.254 port 37984 ssh2 ^C |
#tail -f /var/log/messages
Nov 23 12:00:11 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:00:18 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 12:00:20 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:00:23 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 12:00:33 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:00:48 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 12:37:46 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:49:10 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 13:10:47 fbsd4 ftp.proxy[3488]: configured to use config file. (null) Nov 23 13:49:31 fbsd4 xinetd[504]: Exiting... ^C |
#tcpdump -n -i xl1 port 21
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl1, link-type EN10MB (Ethernet), capture size 96 bytes 13:53:02.801655 IP 192.168.16.131.56971 > 10.0.0.188.21: F 4096090222:4096090222(0) ack 1972279266 win 33304 <nop,nop,timestamp 16277746 16227388> 13:53:02.801751 IP 10.0.0.188.21 > 192.168.16.131.56971: . ack 1 win 33304 <nop,nop,timestamp 16270120 16277746> 13:53:02.802094 IP 10.0.0.188.21 > 192.168.16.131.56971: F 1:1(0) ack 1 win 33304 <nop,nop,timestamp 16270120 16277746> 13:53:02.803938 IP 192.168.16.131.56971 > 10.0.0.188.21: . ack 2 win 33303 <nop,nop,timestamp 16277747 16270120> 13:53:02.815035 IP 192.168.16.131.62335 > 10.0.0.188.21: S 4171112943:4171112943(0) win 65535 <mss 1460,nop,wscale 1,nop,nop,timestamp 16277760 0,sackOK,eol> 13:53:02.815131 IP 10.0.0.188.21 > 192.168.16.131.62335: S 3859237043:3859237043(0) ack 4171112944 win 65535 <mss 1460,nop,wscale 1,nop,nop,timestamp 16270133 16277760,sackOK,eol> 13:53:02.815314 IP 192.168.16.131.62335 > 10.0.0.188.21: . ack 1 win 33304 <nop,nop,timestamp 16277760 16270133> 13:53:07.759794 IP 192.168.16.131.53339 > 10.0.0.188.21: F 3554974020:3554974020(0) ack 3855783499 win 33304 <nop,nop,timestamp 16282706 16260595> 13:53:07.759907 IP 10.0.0.188.21 > 192.168.16.131.53339: . ack 1 win 33304 <nop,nop,timestamp 16275078 16282706> ^C 9 packets captured 19 packets received by filter 0 packets dropped by kernel |
#tcpdump -n -i xl0port 21
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 42 packets received by filter 0 packets dropped by kernel |
#man ftp-proxy
|
#vi /etc/inetd.conf
|
#/etc/rc.d/inetd restart
Stopping inetd. Starting inetd. |
#tail -f /var/log/messages
Nov 23 12:00:33 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:00:48 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 12:37:46 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 12:49:10 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 13:10:47 fbsd4 ftp.proxy[3488]: configured to use config file. (null) Nov 23 13:49:31 fbsd4 xinetd[504]: Exiting... Nov 23 13:52:53 fbsd4 kernel: xl1: promiscuous mode enabled Nov 23 13:53:11 fbsd4 kernel: xl1: promiscuous mode disabled Nov 23 13:53:13 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 13:54:03 fbsd4 kernel: xl0: promiscuous mode disabled ^C |
#ipfw list
00005 fwd 127.0.0.1,25 tcp from any to any dst-port 21 00010 divert 8668 ip from any to any via xl0 00015 allow ip from 192.168.15.24 to any out 00015 allow ip from any to 192.168.15.24 in 00050 allow tcp from any 80 to 192.168.16.131 00060 allow tcp from any 20 to 192.168.16.131 00070 allow tcp from any 21 to 192.168.16.131 00900 allow ip from any to any via xl1 01000 deny log tcp from any to any out 65535 allow ip from any to any |
#ipfw delete 5
|
#ipfw add 5 fwd 127.0.0.1,8021from any to any 21
00005 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 |
#tcpdump -n -i xl0 port 21
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on xl0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 17 packets received by filter 0 packets dropped by kernel |
#sockstat -4
USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS root inetd 4057 4 tcp4 *:21 *:* root inetd 4057 5 tcp4 *:23 *:* root inetd 4057 6 tcp4 *:79 *:* root inetd 4057 7 tcp4 *:8021 *:* root sshd 2951 3 tcp4 192.168.15.24:22 192.168.15.254:37960 root natd 2924 3 div4 *:8668 *:* root sshd 2339 3 tcp4 192.168.15.24:22 192.168.15.254:36155 root Xorg 634 3 tcp4 *:6000 *:* root sendmail 448 4 tcp4 127.0.0.1:25 *:* root sshd 442 4 tcp4 *:22 *:* root syslogd 316 6 udp4 *:514 *:* |
#man ftp-proxy
|
#vi /etc/inetd.conf
124c124 < ftp-proxy stream tcp nowait root /usr/libexec/ftp-proxy ftp-proxy --- > ftp-proxy stream tcp nowait root /usr/libexec/ftp-proxy ftp-proxy -V |
#/etc/rc.d/inetd restart
Stopping inetd. Starting inetd. |
#tail -f /var/log/messages
Nov 23 13:53:11 fbsd4 kernel: xl1: promiscuous mode disabled Nov 23 13:53:13 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 13:54:03 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 13:56:43 fbsd4 ftp-proxy[4119]: cannot open /dev/pf (No such file or directory) Nov 23 13:56:56 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 13:57:03 fbsd4 ftp-proxy[4145]: cannot open /dev/pf (No such file or directory) Nov 23 13:57:07 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 13:57:08 fbsd4 ftp-proxy[4154]: cannot open /dev/pf (No such file or directory) Nov 23 13:57:10 fbsd4 ftp-proxy[4155]: cannot open /dev/pf (No such file or directory) Nov 23 13:57:45 fbsd4 ftp-proxy[4169]: cannot open /dev/pf (No such file or directory) ^C |
#man ftpproxy
|
#man ftp.roxy
|
#man ftp.proxy
|
#man ftp.proxy
|
#cd /usr/ports/
|
#ls
.cvsignore arabic devel hungarian net-mgmt ukrainian CHANGES archivers distfiles irc news vietnamese INDEX-6 astro dns japanese palm www LEGAL audio editors java polish x11 MOVED benchmarks emulators korean portuguese x11-clocks Makefile biology finance lang print x11-fm Mk cad french mail russian x11-fonts README chinese ftp math science x11-servers Templates comms games mbone security x11-themes Tools converters german misc shells x11-toolkits UPDATING databases graphics multimedia sysutils x11-wm accessibility deskutils hebrew net textproc |
#cd /usr/ports
|
#make search name=proxy | grep ftp
Port: ftpproxy-1.2.3 Path: /usr/ports/ftp/ftpproxy Info: A ftp proxy WWW: http://www.ftpproxy.org/ |
#cd ftp/ftpproxy/
|
#ls
Makefile distinfo pkg-descr |
#cat pkg-descr
ftp.proxy is an application level gateway for FTP. It sits between a client and a server forwarding command and data streams supporting a subset of the file transfer protocol as described in RFC 959. Beside this basic function which makes the program useful on firewall or masqueraders it offers fixing the FTP server (e.g. for connections into a protected LAN) and proxy authentication. WWW: http://www.ftpproxy.org/ -Philippe philippe@le-berre.com |
#man ftpprox
|
#man ftpproxe
|
#man ftpproxy
|
#man ftp.roxy
|
#man ipfw
|
#man ipfw
|
#man ftpproxy
|
#man ftp_roxy
|
#man ftp-roxy
|
#tail /var/log/messages
Nov 23 13:53:11 fbsd4 kernel: xl1: promiscuous mode disabled Nov 23 13:53:13 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 13:54:03 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 13:56:43 fbsd4 ftp-proxy[4119]: cannot open /dev/pf (No such file or directory) Nov 23 13:56:56 fbsd4 kernel: xl0: promiscuous mode enabled Nov 23 13:57:03 fbsd4 ftp-proxy[4145]: cannot open /dev/pf (No such file or directory) Nov 23 13:57:07 fbsd4 kernel: xl0: promiscuous mode disabled Nov 23 13:57:08 fbsd4 ftp-proxy[4154]: cannot open /dev/pf (No such file or directory) Nov 23 13:57:10 fbsd4 ftp-proxy[4155]: cannot open /dev/pf (No such file or directory) Nov 23 13:57:45 fbsd4 ftp-proxy[4169]: cannot open /dev/pf (No such file or directory) |
#man ftpproxy
|
#man ftp-roxy
|
#man ftp.proxy
|
#man ftp.proxy
|
#ipfw list
00005 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 divert 8668 ip from any to any via xl0 00015 allow ip from 192.168.15.24 to any out 00015 allow ip from any to 192.168.15.24 in 00050 allow tcp from any 80 to 192.168.16.131 00060 allow tcp from any 20 to 192.168.16.131 00070 allow tcp from any 21 to 192.168.16.131 00900 allow ip from any to any via xl1 01000 deny log tcp from any to any out 65535 allow ip from any to any |
#ipfw add 900 allow tcp from any to ay
00900 allow tcp from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901315 828748199 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 922 997728 allow tcp from any 80 to 192.168.16.131 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 00900 316 46976 allow ip from any to any via xl1 00900 0 0 allow tcp from any to any 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901319 828748493 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 922 997728 allow tcp from any 80 to 192.168.16.131 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 00900 317 47036 allow ip from any to any via xl1 00900 0 0 allow tcp from any to any 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901319 828748493 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 922 997728 allow tcp from any 80 to 192.168.16.131 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 00900 317 47036 allow ip from any to any via xl1 00900 0 0 allow tcp from any to any 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901319 828748493 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 922 997728 allow tcp from any 80 to 192.168.16.131 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 00900 317 47036 allow ip from any to any via xl1 00900 0 0 allow tcp from any to any 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901319 828748493 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 922 997728 allow tcp from any 80 to 192.168.16.131 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 00900 317 47036 allow ip from any to any via xl1 00900 0 0 allow tcp from any to any 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901319 828748493 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 922 997728 allow tcp from any 80 to 192.168.16.131 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 00900 317 47036 allow ip from any to any via xl1 00900 0 0 allow tcp from any to any 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901321 828748796 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 922 997728 allow tcp from any 80 to 192.168.16.131 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 00900 318 47100 allow ip from any to any via xl1 00900 0 0 allow tcp from any to any 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901322 828748856 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 922 997728 allow tcp from any 80 to 192.168.16.131 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 00900 319 47160 allow ip from any to any via xl1 00900 0 0 allow tcp from any to any 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901322 828748856 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 922 997728 allow tcp from any 80 to 192.168.16.131 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 00900 319 47160 allow ip from any to any via xl1 00900 0 0 allow tcp from any to any 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901322 828748856 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 922 997728 allow tcp from any 80 to 192.168.16.131 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 00900 319 47160 allow ip from any to any via xl1 00900 0 0 allow tcp from any to any 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901322 828748856 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 922 997728 allow tcp from any 80 to 192.168.16.131 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 00900 319 47160 allow ip from any to any via xl1 00900 0 0 allow tcp from any to any 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901322 828748856 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 922 997728 allow tcp from any 80 to 192.168.16.131 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 00900 319 47160 allow ip from any to any via xl1 00900 0 0 allow tcp from any to any 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901323 828748920 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 922 997728 allow tcp from any 80 to 192.168.16.131 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 00900 320 47224 allow ip from any to any via xl1 00900 0 0 allow tcp from any to any 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 902253 828805137 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 170 9168 allow ip from any to any 65535 1748802 1635602861 allow ip from any to any |
#ipfw -d show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901415 828754302 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 922 997728 allow tcp from any 80 to 192.168.16.131 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 00900 346 48632 allow ip from any to any via xl1 00900 0 0 allow tcp from any to any 00900 0 0 allow ip from any to any 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ping rambler.ru
^C |
#ping rambler.ru
^C |
#ipfw del 50
ipfw: DEPRECATED: 'del' matched 'delete' as a sub-string |
#ipfw add 50 allow ip from any to any
00050 allow ip from any to any |
#ping rambler.ru
^C |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901560 828762937 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 5 288 allow ip from any to any 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 00900 387 51168 allow ip from any to any via xl1 00900 0 0 allow tcp from any to any 00900 0 0 allow ip from any to any 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw del 900
ipfw: DEPRECATED: 'del' matched 'delete' as a sub-string |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901586 828764551 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 8 432 allow ip from any to any 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901590 828764743 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 9 480 allow ip from any to any 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901590 828764743 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 9 480 allow ip from any to any 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901590 828764743 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 9 480 allow ip from any to any 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901590 828764743 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 9 480 allow ip from any to any 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901590 828764743 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 9 480 allow ip from any to any 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
#ipfw show
00005 26 1424 fwd 127.0.0.1,8021 tcp from any to any dst-port 21 00010 901590 828764743 divert 8668 ip from any to any via xl0 00015 14028 8859518 allow ip from 192.168.15.24 to any out 00015 12199 1722995 allow ip from any to 192.168.15.24 in 00050 9 480 allow ip from any to any 00060 0 0 allow tcp from any 20 to 192.168.16.131 00070 135 12072 allow tcp from any 21 to 192.168.16.131 01000 724 43424 deny log tcp from any to any out 65535 1748802 1635602861 allow ip from any to any |
bind 8000 debug yes
ftp.proxy is an application level gateway for FTP. It sits between a client and a server forwarding command and data streams supporting a subset of the file transfer protocol as described in RFC 959. Beside this basic function which makes the program useful on firewall or masqueraders it offers fixing the FTP server (e.g. for connections into a protected LAN) and proxy authentication. WWW: http://www.ftpproxy.org/ -Philippe philippe@le-berre.com
Время первой команды журнала | 13:08:57 2006-11-23 | ||||||||||||||||||||||||||||||||||||||||||||||||
Время последней команды журнала | 14:51:26 2006-11-23 | ||||||||||||||||||||||||||||||||||||||||||||||||
Количество командных строк в журнале | 101 | ||||||||||||||||||||||||||||||||||||||||||||||||
Процент команд с ненулевым кодом завершения, % | 7.92 | ||||||||||||||||||||||||||||||||||||||||||||||||
Процент синтаксически неверно набранных команд, % | 0.00 | ||||||||||||||||||||||||||||||||||||||||||||||||
Суммарное время работы с терминалом *, час | 1.19 | ||||||||||||||||||||||||||||||||||||||||||||||||
Количество командных строк в единицу времени, команда/мин | 1.41 | ||||||||||||||||||||||||||||||||||||||||||||||||
Частота использования команд |
|
В журнал автоматически попадают все команды, данные в любом терминале системы.
Для того чтобы убедиться, что журнал на текущем терминале ведётся, и команды записываются, дайте команду w. В поле WHAT, соответствующем текущему терминалу, должна быть указана программа script.
Команды, при наборе которых были допущены синтаксические ошибки, выводятся перечёркнутым текстом:
$ l s-l bash: l: command not found |
Если код завершения команды равен нулю, команда была выполнена без ошибок. Команды, код завершения которых отличен от нуля, выделяются цветом.
$ test 5 -lt 4 |
Команды, ход выполнения которых был прерван пользователем, выделяются цветом.
$ find / -name abc find: /home/devi-orig/.gnome2: Keine Berechtigung find: /home/devi-orig/.gnome2_private: Keine Berechtigung find: /home/devi-orig/.nautilus/metafiles: Keine Berechtigung find: /home/devi-orig/.metacity: Keine Berechtigung find: /home/devi-orig/.inkscape: Keine Berechtigung ^C |
Команды, выполненные с привилегиями суперпользователя, выделяются слева красной чертой.
# id uid=0(root) gid=0(root) Gruppen=0(root) |
Изменения, внесённые в текстовый файл с помощью редактора, запоминаются и показываются в журнале в формате ed. Строки, начинающиеся символом "<", удалены, а строки, начинающиеся символом ">" -- добавлены.
$ vi ~/.bashrc
|
Для того чтобы изменить файл в соответствии с показанными в диффшоте изменениями, можно воспользоваться командой patch. Нужно скопировать изменения, запустить программу patch, указав в качестве её аргумента файл, к которому применяются изменения, и всавить скопированный текст:
$ patch ~/.bashrc |
Для того чтобы получить краткую справочную информацию о команде, нужно подвести к ней мышь. Во всплывающей подсказке появится краткое описание команды.
Если справочная информация о команде есть, команда выделяется голубым фоном, например: vi. Если справочная информация отсутствует, команда выделяется розовым фоном, например: notepad.exe. Справочная информация может отсутствовать в том случае, если (1) команда введена неверно; (2) если распознавание команды LiLaLo выполнено неверно; (3) если информация о команде неизвестна LiLaLo. Последнее возможно для редких команд.
Большие, в особенности многострочные, всплывающие подсказки лучше всего показываются браузерами KDE Konqueror, Apple Safari и Microsoft Internet Explorer. В браузерах Mozilla и Firefox они отображаются не полностью, а вместо перевода строки выводится специальный символ.
Время ввода команды, показанное в журнале, соответствует времени начала ввода командной строки, которое равно тому моменту, когда на терминале появилось приглашение интерпретатора
Имя терминала, на котором была введена команда, показано в специальном блоке. Этот блок показывается только в том случае, если терминал текущей команды отличается от терминала предыдущей.
Вывод не интересующих вас в настоящий момент элементов журнала, таких как время, имя терминала и других, можно отключить. Для этого нужно воспользоваться формой управления журналом вверху страницы.
Небольшие комментарии к командам можно вставлять прямо из командной строки. Комментарий вводится прямо в командную строку, после символов #^ или #v. Символы ^ и v показывают направление выбора команды, к которой относится комментарий: ^ - к предыдущей, v - к следующей. Например, если в командной строке было введено:
$ whoami
user
$ #^ Интересно, кто я?в журнале это будет выглядеть так:
$ whoami
user
Интересно, кто я? |
Если комментарий содержит несколько строк, его можно вставить в журнал следующим образом:
$ whoami
user
$ cat > /dev/null #^ Интересно, кто я?
Программа whoami выводит имя пользователя, под которым мы зарегистрировались в системе. - Она не может ответить на вопрос о нашем назначении в этом мире.В журнале это будет выглядеть так:
$ whoami user
|
Комментарии, не относящиеся непосредственно ни к какой из команд, добавляются точно таким же способом, только вместо симолов #^ или #v нужно использовать символы #=
1 2 3 4Группы команд, выполненных на разных терминалах, разделяются специальной линией. Под этой линией в правом углу показано имя терминала, на котором выполнялись команды. Для того чтобы посмотреть команды только одного сенса, нужно щёкнуть по этому названию.
LiLaLo (L3) расшифровывается как Live Lab Log.
Программа разработана для повышения эффективности обучения Unix/Linux-системам.
(c) Игорь Чубин, 2004-2008