<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.staffordnet.uk/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://www.staffordnet.uk/feed.php">
        <title>Saucepan - networking:linux</title>
        <description></description>
        <link>https://www.staffordnet.uk/</link>
        <image rdf:resource="https://www.staffordnet.uk/lib/exe/fetch.php?media=favicon.ico" />
       <dc:date>2026-04-05T19:57:00+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=networking:linux:linux_networking&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=networking:linux:telnet_root_login&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=networking:linux:ubuntu_firewall&amp;rev=1669207782&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=networking:linux:view_attacklog&amp;rev=1669207782&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://www.staffordnet.uk/lib/exe/fetch.php?media=favicon.ico">
        <title>Saucepan</title>
        <link>https://www.staffordnet.uk/</link>
        <url>https://www.staffordnet.uk/lib/exe/fetch.php?media=favicon.ico</url>
    </image>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=networking:linux:linux_networking&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>linux_networking</title>
        <link>https://www.staffordnet.uk/doku.php?id=networking:linux:linux_networking&amp;rev=1669207782&amp;do=diff</link>
        <description>Linux Networking

Disable IPv6

On CentOS 6, run the following in the terminal as root.

cat &lt;&lt;&#039;END_OF_TEXT&#039; &gt;&gt; /etc/sysctl.conf
net.ipv6.conf.all.disable_ipv6 = 1
net.ipv6.conf.default.disable_ipv6 = 1
net.ipv6.conf.lo.disable_ipv6 = 1
END_OF_TEXT
sysctl -p
service network restart</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=networking:linux:telnet_root_login&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>telnet_root_login</title>
        <link>https://www.staffordnet.uk/doku.php?id=networking:linux:telnet_root_login&amp;rev=1669207782&amp;do=diff</link>
        <description>Allow Telnet Root Login

Think twice before doing this

Simply edit the file /etc/securetty and add the following to the end of the file:

pts/0
pts/1
pts/2
pts/3
pts/4
pts/5
pts/6
pts/7
pts/8
pts/9</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=networking:linux:ubuntu_firewall&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ubuntu_firewall</title>
        <link>https://www.staffordnet.uk/doku.php?id=networking:linux:ubuntu_firewall&amp;rev=1669207782&amp;do=diff</link>
        <description>Ubuntu Firewall

Overview

This page contains a bunch of useful tips for managing the Ubuntu firewall from this site.

Today I learned a different way to configure the firewall on my Ubuntu 10.04 Lucid Lynx Server: the ufw command. UFW stands for “Uncomplicated FireWall,” and it’s just that. It provides a simpler interface to add or remove firewall rules to iptables, the default Linux firewall. It’s installed on Ubuntu Server by default (and has been, since Ubuntu 8.04), and I find a little simp…</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=networking:linux:view_attacklog&amp;rev=1669207782&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-23T12:49:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>view_attacklog</title>
        <link>https://www.staffordnet.uk/doku.php?id=networking:linux:view_attacklog&amp;rev=1669207782&amp;do=diff</link>
        <description>View Attacklog

This is a script for viewing who has tried and failed to SSH into your box.

#!/bin/bash
# Created by jbstafford.co.uk
# By default, we go with option -i
IP_COL=11
USR_COL=9
COL=${IP_COL}

DATE=`date +%Y-%m-%d`
LOG_DIR=/var/log_history/ssh
LOG_FILE=${LOG_DIR}/attack_${DATE}.log
TMP_FILE=/tmp/attack_${DATE}_${RANDOM}.log

# Read in any arguments
while getopts crushi name
do
        case $name in
          i)iopt=1;;
          r)ropt=1;;
          u)uopt=1;;
          h)hopt=1;;
  …</description>
    </item>
</rdf:RDF>
