From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from lists.gentoo.org ([140.105.134.102] helo=robin.gentoo.org) by nuthatch.gentoo.org with esmtp (Exim 4.43) id 1E06bN-0007ZW-Vh for garchives@archives.gentoo.org; Tue, 02 Aug 2005 23:55:18 +0000 Received: from robin.gentoo.org (localhost [127.0.0.1]) by robin.gentoo.org (8.13.4/8.13.4) with SMTP id j72NrssW010390; Tue, 2 Aug 2005 23:53:54 GMT Received: from wproxy.gmail.com (wproxy.gmail.com [64.233.184.203]) by robin.gentoo.org (8.13.4/8.13.4) with ESMTP id j72No6T3027211 for ; Tue, 2 Aug 2005 23:50:07 GMT Received: by wproxy.gmail.com with SMTP id i1so6198wra for ; Tue, 02 Aug 2005 16:50:31 -0700 (PDT) DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=J5L+EnhP+lpdRboR/cnxQ4eddrICe3Q6xNqt20hoR8VotExvNV28m4sb7PnUaXoLuBMw/r6SThxpmIBbY7Ear/VfEFzxlGgik/bGEQBMkxPQRBvpCFRPkX+kAyfpeWzu+H4KukB1sO8Ba44HDYHrJKWuNQPlVACm2OtIGPZK0xs= Received: by 10.54.27.46 with SMTP id a46mr84564wra; Tue, 02 Aug 2005 16:50:31 -0700 (PDT) Received: by 10.54.39.56 with HTTP; Tue, 2 Aug 2005 16:50:31 -0700 (PDT) Message-ID: <8f7a9d5805080216505f9b4a51@mail.gmail.com> Date: Tue, 2 Aug 2005 23:50:31 +0000 From: Raphael Melo de Oliveira Bastos Sales To: gentoo-user@lists.gentoo.org Subject: [gentoo-user] Testing how secure a server is... Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@gentoo.org Reply-to: gentoo-user@lists.gentoo.org Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by robin.gentoo.org id j72No6T3027211 X-Archives-Salt: 291ec8ac-3d16-4416-abe1-5eb8df22acec X-Archives-Hash: a453169d251449be97709cfb1cd8f70e Hi there, I was wondering what tools should I use to detect security flaws to my server and a few tips on how to use them. What are the most common forms of attack and how do I avoid being attacked by one of them? The services avaliable are only Apache - SSL and SSH. I've installed an firewall, iptables and firestarter to control it, and blocked all ports except 443 and 8080, where the SSH is listening. Apache has PHP installed as a module. Thanks for the attention, Raphael. -- gentoo-user@gentoo.org mailing list