unsubscruibe

2000-03-23 Thread daniel




Re: [SECURITY] [DSA 1571-1] New openssl packages fix predictable random number generator

2008-05-13 Thread daniel
very bad news

On Tue, 13 May 2008 14:06:39 +0200, Florian Weimer [EMAIL PROTECTED]
wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 -

 Debian Security Advisory DSA-1571-1  [EMAIL PROTECTED]
 http://www.debian.org/security/   Florian Weimer
 May 13, 2008  http://www.debian.org/security/faq
 -

 
 Package: openssl
 Vulnerability  : predictable random number generator
 Problem type   : remote
 Debian-specific: yes
 CVE Id(s)  : CVE-2008-0166
 
 Luciano Bello discovered that the random number generator in Debian's
 openssl package is predictable.  This is caused by an incorrect
 Debian-specific change to the openssl package (CVE-2008-0166).  As a
 result, cryptographic key material may be guessable.
 
 This is a Debian-specific vulnerability which does not affect other
 operating systems which are not based on Debian.  However, other systems
 can be indirectly affected if weak keys are imported into them.
 
 It is strongly recommended that all cryptographic key material which has
 been generated by OpenSSL versions starting with 0.9.8c-1 on Debian
 systems is recreated from scratch.  Furthermore, all DSA keys ever used
 on affected Debian systems for signing or authentication purposes should
 be considered compromised; the Digital Signature Algorithm relies on a
 secret random value used during signature generation.
 
 The first vulnerable version, 0.9.8c-1, was uploaded to the unstable
 distribution on 2006-09-17, and has since propagated to the testing and
 current stable (etch) distributions.  The old stable distribution
 (sarge) is not affected.
 
 Affected keys include SSH keys, OpenVPN keys, DNSSEC keys, and key
 material for use in X.509 certificates and session keys used in SSL/TLS
 connections.  Keys generated with GnuPG or GNUTLS are not affected,
 though.
 
 A detector for known weak key material will be published at:
 
   http://security.debian.org/project/extra/dowkd/dowkd.pl.gz
   http://security.debian.org/project/extra/dowkd/dowkd.pl.gz.asc
 (OpenPGP signature)
 
 Instructions how to implement key rollover for various packages will be
 published at:
 
   http://www.debian.org/security/key-rollover/
 
 This web site will be continously updated to reflect new and updated
 instructions on key rollovers for packages using SSL certificates.
 Popular packages not affected will also be listed.
 
 In addition to this critical change, two other vulnerabilities have been
 fixed in the openssl package which were originally scheduled for release
 with the next etch point release: OpenSSL's DTLS (Datagram TLS,
 basically SSL over UDP) implementation did not actually implement the
 DTLS specification, but a potentially much weaker protocol, and
 contained a vulnerability permitting arbitrary code execution
 (CVE-2007-4995).  A side channel attack in the integer multiplication
 routines is also addressed (CVE-2007-3108).
 
 For the stable distribution (etch), these problems have been fixed in
 version 0.9.8c-4etch3.
 
 For the unstable distribution (sid) and the testing distribution
 (lenny), these problems have been fixed in version 0.9.8g-9.
 
 We recommend that you upgrade your openssl package and subsequently
 regenerate any cryptographic material, as outlined above.
 
 Upgrade instructions
 - 
 
 wget url
 will fetch the file for you
 dpkg -i file.deb
 will install the referenced file.
 
 If you are using the apt-get package manager, use the line for
 sources.list as given below:
 
 apt-get update
 will update the internal database
 apt-get upgrade
 will install corrected packages
 
 You may use an automated update by adding the resources from the
 footer to the proper configuration.
 
 
 Debian GNU/Linux 4.0 alias etch
 - ---
 
 Source archives:
 
  

http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c-4etch3.dsc
 Size/MD5 checksum: 1099 5e60a893c9c3258669845b0a56d9d9d6
  

http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c.orig.tar.gz
 Size/MD5 checksum:  3313857 78454bec556bcb4c45129428a766c886
  

http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c-4etch3.diff.gz
 Size/MD5 checksum:55320 f0e457d6459255da86f388dcf695ee20
 
 alpha architecture (DEC Alpha)
 
  

http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.8c-4etch3_alpha.deb
 Size/MD5 checksum:  1025954 d82f535b49f8c56aa2135f2fa52e7059
  

http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8-dbg_0.9.8c-4etch3_alpha.deb
 Size/MD5 checksum:  4558230 399adb0f2c7faa51065d4977a7f3b3c4
  

http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.8_0.9.8c-4etch3_alpha.deb
 Size/MD5 checksum:  2620892 

Re: [SECURITY] [DSA 2896-1] openssl security update

2014-04-11 Thread daniel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Dear all,

We are very concerned about the 'Heartbeat' security problem which has
been discovered with OpenSSL. Thanks to our out-of-date old-stable
version of debian, we are using:

openssl 0.9.8o-4squeeze14

This page also claims debian 6 (which we use) is unaffected:
https://www.digitalocean.com/community/articles/how-to-protect-your-server-against-the-heartbleed-openssl-vulnerability

as does the text of the DSA below.

However, both of the heartbeat vulnerability checkers we have used have
told us that they were able to successfully exploit this vulnerability
against our site:

http://filippo.io/Heartbleed/#noflag.org.uk
https://www.ssllabs.com/ssltest/analyze.html?d=noflag.org.uk

What could be going on here?

Thanks in advance for all your help,

Daniel

Salvatore Bonaccorso wrote:
 -

 
Debian Security Advisory DSA-2896-1   secur...@debian.org
 http://www.debian.org/security/  Salvatore
 Bonaccorso April 07, 2014
 http://www.debian.org/security/faq 
 -

  Package: openssl CVE ID : CVE-2014-0160 Debian Bug
 : 743883
 
 A vulnerability has been discovered in OpenSSL's support for the 
 TLS/DTLS Hearbeat extension. Up to 64KB of memory from either client
 or server can be recovered by an attacker This vulnerability might
 allow an attacker to compromise the private key and other sensitive
 data in memory.
 
 All users are urged to upgrade their openssl packages (especially 
 libssl1.0.0) and restart applications as soon as possible.
 
 According to the currently available information, private keys should
 be considered as compromised and regenerated as soon as possible.
 More details will be communicated at a later time.
 
 The oldstable distribution (squeeze) is not affected by this 
 vulnerability.
 
 For the stable distribution (wheezy), this problem has been fixed in 
 version 1.0.1e-2+deb7u5.
 
 For the testing distribution (jessie), this problem has been fixed
 in version 1.0.1g-1.
 
 For the unstable distribution (sid), this problem has been fixed in 
 version 1.0.1g-1.
 
 We recommend that you upgrade your openssl packages.
 
 Further information about Debian Security Advisories, how to apply 
 these updates to your system and frequently asked questions can be 
 found at: http://www.debian.org/security/
 
 Mailing list: debian-security-annou...@lists.debian.org
 
 
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCgAGBQJTSAmqAAoJEJhsX8U2K7jUaD0H/2FUZIr4qKST1NCAKrgjP53V
jQknF8erQrGhUrP1hKE2FckuKJljeUAv6rUEVJCiuEPWmCgL08Eoy1SZuIG2S72q
vRbfyYaIz2GKVoGdbkW0GMe963mLUhJ1H5PdcPrsApUZ9AcwQPYKGqLx4/TTrOsB
nbr19ELLQbZCfE8SsUuMDpy/bHeF3c9gb5iUhcnpow6KIjzYGKaJfhiV6HxVlkDX
krdkegdOUn2wKu/deLoARpMqyz6a7son8YcbQ71/XIogtGnxY0L4T9Nabj4NChB/
ggIu+7x62teyb56vToySrXKF5HaqDE2Bna7cJSlD0ia64ME1yG/4joL93Jt10IY=
=kDpQ
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/534809aa.2000...@noflag.org.uk



Re: Aw: Re: [SECURITY] [DSA 2896-1] openssl security update

2014-04-11 Thread daniel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Thank you all for your help. Mod_spdy has a statically-linked vulnerable
version of OpenSSL. After the standard update we are no longer vulnerable.

Daniel

Estelmann, Christian wrote:
 Your server talks spdy. Have you upgraded mod_spdy to 0.9.4.2?
 
 (for mod_spy you need an Apache HTTP Server 2.4.X, in squeeze there
 is only 2.2.16 ...)
 
 Gesendet: Freitag, 11. April 2014 um 17:26 Uhr Von: daniel
 dan...@noflag.org.uk An: debian-security@lists.debian.org Cc: -
 Noflag ad...@lists.noflag.org.uk Betreff: Re: [SECURITY] [DSA
 2896-1] openssl security update
 
 Dear all,
 
 We are very concerned about the 'Heartbeat' security problem which
 has been discovered with OpenSSL. Thanks to our out-of-date
 old-stable version of debian, we are using:
 
 openssl 0.9.8o-4squeeze14
 
 This page also claims debian 6 (which we use) is unaffected: 
 https://www.digitalocean.com/community/articles/how-to-protect-your-server-against-the-heartbleed-openssl-vulnerability

  as does the text of the DSA below.
 
 However, both of the heartbeat vulnerability checkers we have used
 have told us that they were able to successfully exploit this
 vulnerability against our site:
 
 http://filippo.io/Heartbleed/#noflag.org.uk 
 https://www.ssllabs.com/ssltest/analyze.html?d=noflag.org.uk
 
 What could be going on here?
 
 Thanks in advance for all your help,
 
 Daniel
 
 Salvatore Bonaccorso wrote:
 -



 
Debian Security Advisory DSA-2896-1   secur...@debian.org
 http://www.debian.org/security/  Salvatore 
 Bonaccorso April 07, 2014 http://www.debian.org/security/faq 
 -


 
Package: openssl CVE ID : CVE-2014-0160 Debian Bug
 : 743883
 
 A vulnerability has been discovered in OpenSSL's support for
 the TLS/DTLS Hearbeat extension. Up to 64KB of memory from
 either client or server can be recovered by an attacker This
 vulnerability might allow an attacker to compromise the private
 key and other sensitive data in memory.
 
 All users are urged to upgrade their openssl packages
 (especially libssl1.0.0) and restart applications as soon as
 possible.
 
 According to the currently available information, private keys
 should be considered as compromised and regenerated as soon as
 possible. More details will be communicated at a later time.
 
 The oldstable distribution (squeeze) is not affected by this 
 vulnerability.
 
 For the stable distribution (wheezy), this problem has been
 fixed in version 1.0.1e-2+deb7u5.
 
 For the testing distribution (jessie), this problem has been
 fixed in version 1.0.1g-1.
 
 For the unstable distribution (sid), this problem has been
 fixed in version 1.0.1g-1.
 
 We recommend that you upgrade your openssl packages.
 
 Further information about Debian Security Advisories, how to
 apply these updates to your system and frequently asked
 questions can be found at: http://www.debian.org/security/
 
 Mailing list: debian-security-annou...@lists.debian.org
 
 
 
 
 -- To UNSUBSCRIBE, email to
 debian-security-requ...@lists.debian.org with a subject of
 unsubscribe. Trouble? Contact listmas...@lists.debian.org 
 Archive: https://lists.debian.org/534809aa.2000...@noflag.org.uk
 
 
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCgAGBQJTSJ6JAAoJEJhsX8U2K7jUalEH/1z4Se3I715yhKe0CKmA67qU
ngPQO8OxRmq9NxdWz+S5+htXEoX8MIF0PF6MIqNmN9toMhBEgGObTuG0UlxRgVa7
6T/6JaWm45Ivl3m8t8enwRddunjFWKTU4/M91eOOsdTmGt8Y7CHuYtN3NoPUMVHf
vUQeyMuWIawS+HiJl0eXTVb3522jVavnkh/WKOTcHGUeTSBBt95DErG2cldCuIXY
Vbru6nsAgNdEwL7dOxpqtsyXNWfCoBJCjsDAZD2nNs1z12Zv0Dx/GHvXf9z2HnH2
3+MIXS2nzgd1+F+tzzNxXlVergp3Q9zLlELckmJwTpvKDrF/hc0eHBYosn2m05k=
=N86v
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53489e89.2070...@noflag.org.uk



Re: Debians security features: Which are active?

2014-05-17 Thread daniel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

It would however be useful for Debian administrators interested in
security to know somehow what these features do, under what
circumstances they would be useful, and how to enable them in Debian. I
found the Hardening Debian guides on the wiki (linked to earlier)
difficult to understand and apply in this regard.

Daniel

Cédric Lemarchand wrote:
 Please, honestly, do you know what every features in this list does,
 how they could be benefit for you and in which way ?
 
 Or did your choice will *only* be based on the number of 
 supported/enabled features ?
 
 
 Le 17/05/2014 12:38, herzogbrigit...@t-online.de a écrit :
 Thank you for all your replies. I understand that the user is
 important for security, but it's a difference whether you start
 from scratch or you can work with somethink prebuilt. So, could you
 tell me, which of the following securit features are enabled in
 Debian by default and which I have to activate manually:
 
 Stack Protector Heap Protector Pointer Obfuscation Stack ASLR 
 Libs/mmap ASLR Exec ASLR brk ASLR VDSO ASLR Built as PIE Built with
 Fortify Source Built with RELRO Built with BIND_NOW Non-Executable
 Memory /proc/$pid/maps protection Symlink restrictions Hardlink
 restrictions ptrace scope 0-address protection /dev/mem protection 
 /dev/kmem disabled Block module loading Read-only data sections 
 Stack protector Module RO/NX Kernel Address Display Restriction 
 Blacklist Rare Protocols Syscall Filtering Block kexec
 
 For further information go to
 https://wiki.ubuntu.com/Security/Features
 
 
 Thank you very much!
 
 Brigitte Herzog
 
 
 -Original-Nachricht- Betreff: Debians security features in
 comparison to Ubuntu Datum: Fri, 16 May 2014 22:04:07 +0200 Von:
 herzogbrigit...@t-online.de herzogbrigit...@t-online.de An:
 debian-security@lists.debian.org
 
 Hello there, I'm a new user of the great Debian distro for my
 Desktop. But when I talked to a friend and I told him, that I'm
 using Debian (Wheezy) for my desktop computer, he told me that I
 shoudn't use it because it is not secure. He told me to use Ubuntu
 instead. He explained that with the fact, that Ubuntu has more
 security features enabled than Debian (also more compiler flags for
 security) in a fresh install. He gave me a link to the following
 site: https://wiki.ubuntu.com/Security/Features
 
 So, I'm very happy with Debian but because my friend seems to be an
 expert for Linux, I don't know if I can use Debian. Can you tell me
 which of the security features promoted by Ubuntu are also enabled
 in Debian?
 
 Thank you very much!
 
 Brigitte Herzog
 
 
  
 Mit einer kostenlosen E-Mail-Adresse @t-online.de werden Ihre Daten
 verschlüsselt übertragen und in Deutschland gespeichert. 
 www.t-online.de/email-kostenlos
 
 
 
 
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCgAGBQJTd0rKAAoJEJhsX8U2K7jUbSAIAI11RQsZyXq38rbbncsh59Vv
+7TX+olQ7B6tbQEbJ9pQD85GNjmt1UvEcaoDYmPyPI4NSoX6Y6bgb8QCStEAsgYo
ci4HlEatDiaSrj2vzYEqZdpeMYJX09XArZEhtDJTrbGLCF2upu11LlhXVqPbku33
B4gQbIZEzfCUP0S9ZaRt81bsR6UKPji7I5Z8LHr9bTYHRts4JNySnGFxkL5u1FoY
WF8xsoRhDfNtI74KcMMJg0okeur7kgQIY2928ZM5O+LLyCutbGlnI17Rv5P0JR8n
5xpnhSsWVlgyvNgPA6agnHz1Ss92DTfE2BEdUSQmM3Imp6B5WCwPoosL/CschUQ=
=rkAX
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53774aca.9080...@noflag.org.uk



Re: Debian mirrors and MITM

2014-05-30 Thread Daniel
On Fri, May 30, 2014 at 11:50:32PM +1000, Alfie John wrote:
 Several times (public and private) I tried to explain how the download
 of APT (the binary itself) on an initial Debian install could be
 compromised via MITM since it's over plaintext. Then the verification of
 packages could simply be skipped (hence NOP). I'm not sure why you're
 bringing libc and libgpg into the conversation.
 
 Alfie
 

Hello.

The thing is: When you download an .iso file, that .iso file also
contains a signing key used to verify each package it downloads during
the installation. Encryption is not important in this aspect, because
what you are downloading is already publicly available and not secret.
Everyone can download the same packages as the installer. Those are
already public.

The important bit is to verify that what you are downloading either
manually, or via the installer, hasn't been tampered with. That is
verification, and that is what is interesting here. The .iso file
already contains a public key, and verifies every package it downloads
along the way. You can disable that by hacking a bit in the installer,
but it does requires an effort.

For the next problem: Some mirror might theoretically have an .iso file
which has been tampered with, but you should check the checksum for that
file with what you find in the debian web-pages. If you download a .iso
file via HTTP, it might have been tampered with, and if someone is
intercepting your request for the public key, it might be changed. But i
think that would be a problem anyways...


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140530141605.GC17668@s1.t11.local



Re: concrete steps for improving apt downloading security and privacy

2014-07-08 Thread Daniel
On Mon, Jul 07, 2014 at 02:54:15PM -0400, Hans-Christoph Steiner wrote:
 
 Do you have another idea for making it difficult for network observers to keep
 track of the software people are using?
 
Well, you can always mirror the entire repository and configure
your server/desktop to use that instead. That way noone can tell
for certain which packages you are using, and as a bonus, you have
offline access if your internet connection goes down.

I am not sure about the size of it though.

 Do you think it does not matter that governments and companies are tracking
 the packages that people are downloading?
 
 
 .hc
 


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140708211638.gc24...@noserver.visp.name



Re: vacation mail

2014-08-07 Thread Daniel
It's not the first, and it won't be the last.

Y'know, if I was a malicious individual I might lurk the Debian security 
mailing lists until I saw such an announcement, and then wait for a security 
vulnerability, for example [DSA 2998-1] to be posted thereafter. Deducing that 
the individual or their organisation ran Debian, I might then scan or probe the 
domain which issued to vacation mail to ascertain if they were vulnerable. 
Having all the information I needed to take advantage of the vulnerability in 
the DSA, I might then attack said individual or their organisation, safe in the 
knowledge that they would not be back in the office to deal with the problem 
until August 25th. Such vacation mails would make my job alot easier.

IT is fortunate for the senders of such mails that I am not a malicious 
individual.

Best regards,

Daniel

On 6 Aug 2014, at 09:49, Grond wrote:

 Bugger, but someone has *reeaally* poor manners.
 
 A vacation notice to a mailing list?
 I mean; really?
 
 I do *hope* that we will not be spammed by this until 
 August 25th.
 
 (I realize that this rant may not meet
 minimum notability for this list.)
 
 
 On Tue, Aug 05, 2014 at 08:13:31PM +0200, programac...@sf-informatica.com 
 wrote:
 Els missatges enviats a aquesta adreça de correu no s'atendran fins al 25 
 d'agost. Si us plau, si és urgent, posi's en contacte amb 
 urgenc...@sf-informatica.com. Disculpi les molèsties.
 
 Los mensajes enviados a esta dirección de correo no se atenderán hasta el 25 
 de agosto. Por favor, si es urgente, póngase en contacto con 
 urgenc...@sf-informatica.com. Disculpe las molestias.
 
 
 
 
 -- 
 To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
 Archive: 
 https://lists.debian.org/20140805181331.32e066041d...@11vs2.vspain.net
 
 -- 
 
 Attached is my PGP public key.
 Primary key fingerprint: B7C7 AD66 D9AF 4348 0238  168E 2C53 D8FA 55D8 9FD9
 
 If you have a PGP key (and a minute to spare)
 please send it in reply to this email.
 
 If you have no idea what PGP is, feel free
 to ignore all this gobbledegook.
 Mail Attachment


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/646a2551-a655-4620-b57f-46a5cbed4...@noflag.org.uk



Re: are unattended updates a good idea?

2015-01-31 Thread Daniel
On Sat, Jan 31, 2015 at 02:50:31PM +0100, Ml Ml wrote:
 Thank you very much! Your comments has been really helpful.
 
 Cheers,
 Mario
 
 On Sat, Jan 31, 2015 at 12:53 PM, Michael Zoet michael.z...@zoet.de wrote:
  Hi,
 
  Hello List,
 
  i have got about 50 Debian 6+7 Servers. They are doing all kind of
  things like Webserver, Mailserver, DNS, etc…
 
  I am using apticron to keep track of the updates, but i seem to use
  more and more time updating the hosts.

Also, you should note that some services might be restarted automatically
during this process, so if you have long running nightly jobs or something
similar it might cause some issues. This issue could also true in reverse;
Some service might have to be manually restarted to load updated libraries
and such.

MySQL server upgrades might break nightly jobs because of restarts, kernel
upgrades would probably need a reboot etc so you should keep an eye on
these things.

That being said: We have used unattended-upgrades on our servers for a
couple of years and we have never had any problems with the packages
themselves yet though, so this seems to be a smaller problem. Still, you
should consider having a test server with tools like needsrestart and
apt-listchanges, and a test suite for your applications to check if
they still work with the new packages and that every service is back to
normal afterwards.

Just sharing my thoughts about this.

- Daniel


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150201051415.gb19...@noserver.visp.name



Re: funny rpc.statd events

2000-10-10 Thread Daniel Jacobowitz

This was fixed a month or two before potato was released.



On Tue, Oct 10, 2000 at 09:09:52PM -0500, Herbert Ho wrote:
 hi guys. i have logcheck installed so i got this message tonight:
 
 (sorry about the long lines, its the way it came to me)
 
 Unusual System Events
 =-=-=-=-=-=-=-=-=-=-=
 Oct 10 19:31:37 thosolin 
 Oct 10 19:31:37 thosolin /sbin/rpc.statd[125]: gethostbyname error for 
^X÷ÿ¿^X÷ÿ¿^Y÷ÿ¿^Y÷ÿ¿^Z÷ÿ¿^Z÷ÿ¿^[÷ÿ¿^[÷ÿ¿%8x%8x%8x%8x%8x%8x%8x%8x%8x%236x%n%137x%n%10x%n%192x%n\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2!
 !
 20\220\220\220\220\220\220\220\220\220\220
 Oct 10 19:31:37 thosolin 
Ç^F/binÇF^D/shA0À\210F^G\211v^L\215V^P\215N^L\211ó°^KÍ\200°^AÍ\200è\177ÿÿÿ
 Oct 10 19:31:37 thosolin 
 Oct 10 19:31:37 thosolin syslogd: Cannot glue message parts together
 Oct 10 19:31:37 thosolin /sbin/rpc.statd[125]: gethostbyname error for 
^X÷ÿ¿^X÷ÿ¿^Y÷ÿ¿^Y÷ÿ¿^Z÷ÿ¿^Z÷ÿ¿^[÷ÿ¿^[÷ÿ¿%8x%8x%8x%8x%8x%8x%8x%8x%8x%236x%n%137x%n%10x%n%192x%n\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2!
 !
 20\220\220\220\220\220\220\220\220\220\220
 Oct 10 19:31:37 thosolin 
Ç^F/binÇF^D/shA0À\210F^G\211v^L\215V^P\215N^L\211ó°^KÍ\200°^AÍ\200è\177ÿÿÿ
 
 
 it's nasty. sorry. =p
 
 so should i be worried? and is the rpc.statd a security risk?
 
 i have potato-based, "testing" installed.
 
 thanks in advance.
 
 
 herbert
 
 
 --  
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
 
 


Dan

/\  /----\
|   Daniel Jacobowitz|__|SCS Class of 2002   |
|   Debian GNU/Linux Developer__Carnegie Mellon University   |
| [EMAIL PROTECTED] |  |   [EMAIL PROTECTED]  |
\/  \/


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: funny rpc.statd events

2000-10-10 Thread Daniel Jacobowitz

On Tue, Oct 10, 2000 at 10:28:39PM -0400, Ben Pfaff wrote:
 Daniel Jacobowitz [EMAIL PROTECTED] writes:
 
  This was fixed a month or two before potato was released.
 
 I've seen those too, on up-to-date woody, so I don't think it
 really got fixed.

To clarify this, the logging of the message does not indicate a
problem.  If the attack had succeeded, rpc.statd would have most likely
have crashed before it finished writing to the syslog (I think... don't
quote me on that).  It will certainly continue to log the attack in
this annoying manner.  Potato and woody are not vulnerable.

Dan

/\  /\
|   Daniel Jacobowitz|__|SCS Class of 2002   |
|   Debian GNU/Linux Developer__Carnegie Mellon University   |
| [EMAIL PROTECTED] |  |   [EMAIL PROTECTED]  |
\/  \/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: what is on port 13223

2000-10-12 Thread Daniel Jacobowitz

On Wed, Oct 11, 2000 at 10:11:31PM -0800, Ethan Benson wrote:
 
 Does anyone know what port 13223 is?  today i have been getting a
 massive number of connection attempts to that port from several
 different addresses.  
 
 -- 
 Ethan Benson
 http://www.alaska.net/~erbenson/

Probably some current trojan.  Maybe a sub7 variant?  There's a trojan
list on the web somewhere.


Dan

/\  /\
|   Daniel Jacobowitz|__|SCS Class of 2002   |
|   Debian GNU/Linux Developer__Carnegie Mellon University   |
| [EMAIL PROTECTED] |  |   [EMAIL PROTECTED]  |
\/  \/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: php3 security update breaks imp webmailer

2000-10-20 Thread Daniel Jacobowitz

On Fri, Oct 20, 2000 at 04:39:39PM +0200, Thomas Gebhardt wrote:
 Hi,
 
 I got this response from the IMP mailing list:
 
 Chuck Hagenbuch [EMAIL PROTECTED] :
 
 Unfortunately, 3.0.17 is broken - it's nothing to do with IMP, except that we
 happen to hit the broken functionality. The PHP folks know about it, and
 hopefully. 3.0.18 will be out soon.

Yep, so I've gathered.  I'll do a new security upload when this
happens.

Dan

/\  /\
|   Daniel Jacobowitz|__|SCS Class of 2002   |
|   Debian GNU/Linux Developer__Carnegie Mellon University   |
| [EMAIL PROTECTED] |  |   [EMAIL PROTECTED]  |
\/  \/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: security.debian.org mirrors?

2000-10-20 Thread Daniel Jacobowitz

On Fri, Oct 20, 2000 at 01:32:54PM +0300, Mikko Kilpikoski wrote:
 Hi.
 
 I'm unable to reach security.debian.org or nonus.debian.org
 and can't find a mirror for security.debian.org.  Is there any?
 Where? Can I trust it/them? Oh, and does it contain the security
 fixes for nonus packages (if any)?

I believe it is a matter of trust and of instant distribution; we can
provide uploads to everyone using the security site in a very limited
amount of time.

Dan

/\  /\
|   Daniel Jacobowitz|__|SCS Class of 2002   |
|   Debian GNU/Linux Developer__Carnegie Mellon University   |
| [EMAIL PROTECTED] |  |   [EMAIL PROTECTED]  |
\/  \/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: security.debian.org mirrors?

2000-10-22 Thread Daniel Jacobowitz

On Sun, Oct 22, 2000 at 06:37:42PM +0200, Florian Friesdorf wrote:
 On Sat, Oct 21, 2000 at 03:50:18PM +0200, Wichert Akkerman wrote:
  Previously Florian Friesdorf wrote:
   What are the differences between
   http://http.us.debian.org/debian dists/potato-proposed-updates/ 
   and
   http://security.debian.org potato/updates main contrib non-free
   ?
  
  One is updates that might make it into a revision of potato, 
  and the other are verified security fixes.
 
 ok, please correct me if I'm wrong.
   - security fixes wil make it sooner or later into proposed-updates

That's the principle, yes.

   - to get security fixes as fast as possible I use
 security.debian.org

Yep.

   - new features only appear in proposed-updates

Generally (when possible), yes

   - I should use potato security fixes with woody

Well, it's safe to list it as an apt  source, and there will
occasionally be things available there before in unstable.  But fixes
also tend to go straight into unstable.


Dan

/\  /\
|   Daniel Jacobowitz|__|SCS Class of 2002   |
|   Debian GNU/Linux Developer__Carnegie Mellon University   |
| [EMAIL PROTECTED] |  |   [EMAIL PROTECTED]  |
\/  \/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: task-unstable-security-updates?

2000-11-20 Thread Daniel Jacobowitz

On Mon, Nov 20, 2000 at 08:21:10AM -0500, Itai Zukerman wrote:
   It would be very helpful if there was a pseudo-package that conflicted
   with packages that have known security problems that have been fixed in a
   later version.  That way one could do a regular 'apt-get install
   task-unstable-security-updates' and cause the upgrade of all the
   conflicting packages that are currently installed on your system.
 
 Seems like a great idea to me.
 
 If the BTS had a "security" tag, then this could be done
 automatically.  A quick look through the debian-devel archives, and I
 can't find discussion of this tag.  Was there some reason it wasn't
 introduced?

Most of our security fixes are never filed as bugs - and can not be. 
The BTS is public, and preliminary security advisories are not.
Filing them after they are publicized is, on the whole, redundant.

   Is that possible?  Would the security team be willing to maintain such a
   pseudo-package?
  
  Not really.  Our priority is stable; security fixes make it to unstable
  somewhat haphazardly, especially for more obscure architectures.  The
  maintenance cost on something like this is prohibitively high.
  
  The answer is just to watch one single list - debian-security-announce. 
  That's what it's for :)
 
 I'm not sure I understand the reasoning here.  If the answer is to
 watch the debian-security-announce list, then what prevents someone
 watching the list from maintaining the proposed virtual package?

The problem is that, for one thing, maintaining this package usefully
requires getting all fixes compiled on all architectures for unstable. 
That's impractical; we do the best that we can, but it's too time
consuming and too complicated, especially given the quirks of some of
our architectures.

Dan

/\  /\
|   Daniel Jacobowitz|__|SCS Class of 2002   |
|   Debian GNU/Linux Developer__Carnegie Mellon University   |
| [EMAIL PROTECTED] |  |   [EMAIL PROTECTED]  |
\/  \/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Problems with root on network clients

2000-11-26 Thread Daniel Jacobowitz

On Fri, Nov 24, 2000 at 01:08:14PM -0400, Brad Allen wrote:
 erbenson NFS is insecure, deal with it.
 
 Such as use something besides NFS that is secure; the options are thin
 and immature, but you may still look around because I have a feeling
 there may be a good match, if you're willing to sacrafice admin time
 to the task.  For instance, I'm curious if CODA has played this trick.
 They talk about distribution, security, etc.  Plus, administration of
 local disk caches could become really easy with CODA -- 4GB disk
 cache, now that's nice; it's as if you only really have one machine in
 some administrative senses.  Now, somebody tell me if I'm wrong.
 There is a whole page of Linux filesystems besides EXT2 and NFS out
 there someplace.  Find it and take a good research if you have the
 time.

If you're willing to invest the time to learn it properly, I recommend
AFS as a solution.  The linux port is a little immature, but coming
along surprisingly well.

See www.openafs.org for (not much) more information, and:
deb http://www.mit.edu/afs/sipb/project/openafs/debian packages/

for some preliminary packages.

Dan

/\  /\
|   Daniel Jacobowitz|__|SCS Class of 2002   |
|   Debian GNU/Linux Developer__Carnegie Mellon University   |
| [EMAIL PROTECTED] |  |   [EMAIL PROTECTED]  |
\/  \/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Debian audititing tool?

2000-12-26 Thread Daniel Ginsburg

On Tue, Dec 26, 2000 at 09:27:53PM +0200, Pavel Minev Penev wrote:
 On Tue, Dec 26, 2000 at 05:27:07PM +0300, [EMAIL PROTECTED] wrote:
  Of course plain md5 hashes are not very helpful. But we can keep MAC[1] for
  binaries. Tampering with MAC database is useless.
 
  ...
 
  [1] Message Authentication Code. One of possible ways to compute MAC is
  H(K,H(K,M)) where H is one-way hash function (MD5 or better SHA), K is key, M
  is message (protected binary).
 
 Hey, I'm not very good at crypto; however, I was wondering what prevents the
 intruder from regenerating the MAC data-base (and what is the point of the
 double hashing you have stated as "H(K,H(K,M))"?).



The Book (Bruce Schneier, "Applied Cryptography"):

Alice concatenates K and M, and computes the one-way hash of concatenation: 
H(K,M). This hash is the MAC. Since Bob knows K, he can reproduce Alice's
result. Mallory, who does not know K, can't.

This method works with MD-strengtheninig techniques, but has serious problems.  Malory 
can always add new blocks to the end of message and compute a valid MAC.
This attack can be thwarted if you put the message length at the beginning, but
Preneel is suspictios of this scheme. It is better to put the key at then end 
of message, H(M,K), but this has some problems as well.



The following constructions seem secure:
H(K1,H(K2,M))
H(K,H(K,M))
H(K,p,M,K), where p pads K to full message block.



 Sorry if off-topic (though a nice critical note would be fine).
 
 And don't forget to be gay (at least on Christmas),
 -- 
 Pavel M. Penev
 
 
 --  
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
 

-- 
dg


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: rpc.statd attack?

2001-01-09 Thread Daniel Jacobowitz

On Tue, Jan 09, 2001 at 12:31:59PM -0800, [EMAIL PROTECTED] wrote:
 I got the following (alarming) messages on syslog:
 
 Jan  8 13:34:23 yuban syslogd: Cannot glue message parts together Jan
 8 13:34:23 yuban /sbin/rpc.statd[159]: gethostbyname error for
 
^X\xf7\xff\xbf^X\xf7\xff\xbf^Y\xf7\xff\xbf^Y\xf7\xff\xbf^Z\xf7\xff\xbf^Z\xf7\xff\xbf^[\xf7\xff\xbf^[\xf7\xff\xbf%8x%8x%8x%8x%8x%8x%8x%8x%8
 x%236x%n%137x%n%10x%n%192x%n\220


 it looks like an attack (specially when I see /bin/sh hidden in
 there). I searched the lists and it seems that this problem should
 have been corrected before potato was released. Any reason for
 worries, or is there any reason why I should think it was an
 unsuccessful attack?


If it had been a successful attack, the %x and %n's in the above would
not have come through to syslog; it would have crashed well beforehand.

Dan

/\  /\
|   Daniel Jacobowitz|__|SCS Class of 2002   |
|   Debian GNU/Linux Developer__Carnegie Mellon University   |
| [EMAIL PROTECTED] |  |   [EMAIL PROTECTED]  |
\/  \/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Disappointment in security handling in Debian

2001-02-01 Thread Daniel Jacobowitz

On Thu, Feb 01, 2001 at 02:12:40PM +0100, Mathieu Dessus wrote:
 This is not directly related to this thread, but this post reminds me
 that generally the translations pages of Security Information page (
 http://www.debian.org/security/ ) are generally not up to date.
 And with the automatic switch to the page corresponding to your
 languange's preference, I've been fooled several times, thinking that
 Debian security was not up to date.
 
 What about adding a link to the original version with an warning or
 simply disabling automatic swicthing language for this page ?

The web people tell me that this was a bug in the automatic
regeneration of the web pages; it should be fixed.

Dan

/\  /\
|   Daniel Jacobowitz|__|SCS Class of 2002   |
|   Debian GNU/Linux Developer__Carnegie Mellon University   |
| [EMAIL PROTECTED] |  |   [EMAIL PROTECTED]  |
\/  \/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: How to use apt to install security updates ?

2001-02-11 Thread Daniel Jacobowitz

On Sun, Feb 11, 2001 at 06:14:39PM +0100, Christian Schlettig wrote:
 Hello,
 
 I'm new to the list and I've just read the security.debian.org page and inserted the 
"deb http://security.debian.org/ slink updates"
 line to my /etc/apt/sources.list.
 
 When i run apt-get update i'll get the following output:
 
 :/home/user# apt-get update
 Get:1 http://security.debian.org slink/updates Packages [19.4kB]
 Get:2 http://security.debian.org slink/updates Release [105B]
 Fetched 19.5kB in 3s (5958B/s)
 Reading Package Lists... Done
 Building Dependency Tree... Done
 
 and nothing else.
 
 I'm using the original files from somewhere October so i'm wondering why there are 
 no new packages for me ?!
 
 What am i doing wrong.

Are you really running slink?  We don't support that any more; you
should upgrade to potato, which has been out since last August.  The
web page does not reference slink any more...

Dan

/\  /\
|   Daniel Jacobowitz|__|SCS Class of 2002   |
|   Debian GNU/Linux Developer__Carnegie Mellon University   |
| [EMAIL PROTECTED] |  |   [EMAIL PROTECTED]  |
\/  \/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Food for thought - SECURITY (design flaw?)

2001-02-12 Thread Daniel Jacobowitz

On Mon, Feb 12, 2001 at 10:43:33AM -0200, Carlos Carvalho wrote:
 Andreas Tille ([EMAIL PROTECTED]) wrote on 12 February 2001 11:32:
  IMHO people of security team shouldn't spend their time to serve
  security fixes for testing.  People who want to use testing on
  security relevant machines should know what they do and should be
  able to handle those issues themselves.  Those hazardeurs could try
  to fix important bugs of the package which is stick to unstable for
  whatever reason which would help the whole distribution or backport
  the stuff themself.
 
 What's the purpose of testing exactly? If it's a preparation for
 becoming stable it should obviously include the security fixes,
 otherwise when the transition testing - stable happens you're... If
 it's not a preparation for stable it has no purpose.

It is preparation for becoming stable, but not "on half a moment's
notice".  Security fixes go into unstable and trickle into testing. 
The principal, I think, is that we can throttle the packages being
allowed into testing for an easier release cycle.

Dan

/\  /\
|   Daniel Jacobowitz|__|SCS Class of 2002   |
|   Debian GNU/Linux Developer__Carnegie Mellon University   |
| [EMAIL PROTECTED] |  |   [EMAIL PROTECTED]  |
\/  \/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: secure install

2001-02-20 Thread Daniel Stark

When you clone mirrors you usually have to take some steps.  Typically, 
depending on your mirror, you need to break the mirror and clone each side 
seperately.  Someone told me this was because of drive signing or some other 
thing, but I'm not sure if that's the truth.


From: Carel Fellinger [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: secure install
Date: Sun, 18 Feb 2001 03:38:24 +0100

On Sat, Feb 17, 2001 at 02:14:44PM -0500, Steve Robbins wrote:
  On Sat, Feb 17, 2001 at 06:21:04PM +0100, Carel Fellinger wrote:
...
   The disadvantage of this command is that it doesn't preserve 
hardlinks.
 
  Really?  Mine preserves hard (and soft) links.

strange...reading...hm it says it does...trying...and it does, how come?

I'm sure that just days ago whilst copying my mirror with cp -a to
a new drive the size of the new mirror exploded, but using good old
tar the size of the new mirror was about the same as the old mirror.
I think I checked some hardlinks, and sure enough they had vanished,
but in the light of this new test I'm not so sure anymore. Anyway,
cp -a seems to work.

--
groetjes, carel


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact 
[EMAIL PROTECTED]


_
Get your FREE download of MSN Explorer at http://explorer.msn.com


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Debian or Linux 7???

2001-02-20 Thread Daniel Stark

How exactly did you get hacked?  Did you leave security wholes large enough 
for a bus to drive through open?  Open your inetd.conf file and # out 
everything!  The only thing you need open is port 22.  Others will disagree, 
but depending on what you server is used for, this should be your first step 
for security.


From: Steve Rudd [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Debian or Linux 7???
Date: Mon, 19 Feb 2001 18:12:29 -0500

Hi!

I am frustrated with the linux 2.2 kernel. I have had two hacks in 3 months
and I am going broke rebuilding my server.

I went out and bought Redhat 7, and got hacked 6 weeks later.

I have been placed in contact with a guy who wants me to use Debian. But if
it based upon the same kernel as redhat, how is it going to be more secure?
I checked and found that

from (http://www.securityfocus.com/)
Security risks for years: 1997-2000 respectively:
Debian 3, 2, 32, 45, 12
RedHat 6, 10, 49, 85, 20

So Debian is about twice as good as redhat, but that is not real 
reassuring.

I am considering joining the debian family, but am a bit concerned about
security.

Just how much more secure is Debian than redhat?

Thanks!

Steve Rudd


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact 
[EMAIL PROTECTED]


_
Get your FREE download of MSN Explorer at http://explorer.msn.com


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: secure install

2001-02-20 Thread Daniel Stark

You know, Ghost 2001 supports the ext2 partition on certain versions of 
Linux.  It doesn't officially support Debian Linux, but I've cloned my 
Debian laptop and my Debian desktop many times.


From: "Thor" [EMAIL PROTECTED]
To: "Zak Kipling" [EMAIL PROTECTED], [EMAIL PROTECTED]
CC: [EMAIL PROTECTED]
Subject: Re: secure install
Date: Sat, 17 Feb 2001 14:49:03 +0100

Hi

  On Sat, 17 Feb 2001 [EMAIL PROTECTED] wrote:
 
   i am sure that is note the case,
   the only requirement is that the target media is the
   same size or larger?
 
  Indeed. Most filesystems, including ext2, are independent of the disk
  geometry. So you can "dd" _partitions_ (eg /dev/hda1) from smaller to
  larger disks, then add additional partitions if you want to take 
advantage
  of the extra space. The geometry is only relevant is you want to "dd"
  entire disks (eg /dev/hda). Alternatively you can tar the whole system 
--

and in effect we are talking about  "cloning" an entire disk from an
installed system
to n other systems.
Speak for cloning a single partition then i suggest a simple
'cp -ax /mount_point_of_original_parition /mount_point_of_target_partiton'
the 'a' stand for archive (recursive and same permission)
and with the 'x' the copy don't go out the indicated filesystem.
you can find the same suggestion in How-To/Large-Disk

---
;---+---;
bye |
bye |hor


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact 
[EMAIL PROTECTED]


_
Get your FREE download of MSN Explorer at http://explorer.msn.com


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Benign crackers?

2001-02-21 Thread Daniel Stark

You wouldn't actually imply that hackers are out their providing a welcome 
service do you?  I can see if you asked for your network to be stress 
tested, but to go as far as saying they provide a welcome service?  Come on! 
  Yeah, they might have found a security whole, but oops, now the firewall 
admin is out of a job.  People should constantly strive to secure their own 
boxen, we don't need hackers to do it for us.


From: "A. L. Meyers" [EMAIL PROTECTED]
To: Steve Rudd [EMAIL PROTECTED]
CC: [EMAIL PROTECTED]
Subject: Benign crackers?
Date: Wed, 21 Feb 2001 08:21:02 +0100 (CET)

-BEGIN PGP SIGNED MESSAGE-

On Tue, 20 Feb 2001, Steve Rudd wrote:

  Daniel Stark asked:
 
  At 01:53 PM 2/20/01 -0800, you wrote:
  How exactly did you get hacked?  Did you leave security wholes large
  enough for a bus to drive through open?  Open your inetd.conf file and 
#
  out everything!  The only thing you need open is port 22.  Others will
  disagree, but depending on what you server is used for, this should be
  your first step for security.
 
  Steve here,
 
  Several have voiced an interest in the hack. Well here is a guess and 
some
  facts:
 
  THE HACK:
  For those interested in the hack, I think it was the "Dameon worm" but
  could not find any evidence of the trace files on my system. Here is 
what
  happened:
 
  1. I get a letter from "[EMAIL PROTECTED]"  saying: "Urgent! Security
  incident on your machine! Attrition.org is a non-profit, hobby web site
  that monitors
  computer crime on the internet. In the past few minutes, we
  have been notified that your domain was hacked, and your web
  page defaced. This means that the intruder has edited your
  web page in some way. Due to this, it is quite likely that
  one or all of the machines on your network are compromised.
  You may wish to take immediate action to correct this problem
  and respond to the intrusion."
 
  2, I noticed my clock went forward maybe a day and had to reset it via
  "date" command.
 
  3. I notice a single page was changed: "index.html"
 
  Here is the code from that page:
 
 
  !-- BEGIN Naviscope Javascript --
  script language='javascript'
 NS_ActualOpen=window.open;
 function NS_NullWindow(){this.window;}
 function NS_NewOpen(url,nam,atr){return(new 
NS_NullWindow());}
 window.open=NS_NewOpen;
  /script
  !-- END Naviscope Javascript --
 
  html
  head
  title..:: Quit Crew ::../title
  /head
  body bgcolor="#FF"
  center
  OBJECT classid="clsid:D27CDB6E-AE6D-11cf-96B8-44455354"
   
codebase="http://active.macromedia.com/flash2/cabs/swflash.cab#version=4,0,0,0"
   ID=devil WIDTH=731 HEIGHT=562
   PARAM NAME=movie VALUE="qc.swf"
   PARAM NAME=loop VALUE=false
   PARAM NAME=quality VALUE=high
   PARAM NAME=bgcolor VALUE=#FF
 
 
  /OBJECT
  /center
  /body
  /html
 
  =
  end code
 
  4. I have noticed nothing other than these changes.
 
  So there you have it. I didn't even ever get to see what the flash was 
all
  about it just loaded forever without anything. You know for all my 
trouble,
  I should have at least got some free artwork!
 
  Steve
 
 
  --
  To UNSUBSCRIBE, email to [EMAIL PROTECTED]
  with a subject of "unsubscribe". Trouble? Contact 
[EMAIL PROTECTED]
 
 
Dear fellow debianites,

To dispel any doubts, I would not even know how to start a crack
attempt.

There seem to be more and more "benign" hackers and crackers on the web
who might even be a "blessing in disguise". If all they do it crack
sites without damaging anything and afterwards inform the sites, they
might just be performing a very valuable service.

My own experience is that no one believes he is vulnerable until he has
experienced a real security breach or worse. People in general seem to
prefer to remain blissfully unaware of internet security risks. Even
pursuading clients to download pgp and use it to transfer confidential
information encrypted is not easy.

Best regards,

Lucien Meyers

-BEGIN PGP SIGNATURE-
Version: 2.6.3ia
Charset: noconv

iQCVAwUBOpNsZYsavovzoIkNAQGLbAQAgjvixxb5CZuEQaso96iNTJCne9t3rVkN
52r7aHqfvGSzHcA64KDWBMv/59aNLDa/OqggJrTdPVIwXAyXTjFbc2jpPEmLD3fk
bsChFH3Zb0xAz537BBbpMRLeCcdvCHqQEyEDQB+WJz4mFt+8ET9N9xqnMIFCJ3Xn
TsLjeB2SlhM=
=XOB8
-END PGP SIGNATURE-


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact 
[EMAIL PROTECTED]


_
Get your FREE download of MSN Explorer at http://explorer.msn.com


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




RE: Anti Virus for Debian

2001-02-21 Thread Daniel Stark

You're talking about removing viruses though.  I'm talking about preventing 
them.  Anybody can manually remove a virus from a Windows machine, it's 
really easy.  I can even remove W95.MTX (The Matrix) virus in 5 minutes.  
I'm not sure of any network admin that wants to spend their time removing 
viruses though.  I think the easiest way to go about virus safety is just 
make it more difficult to get a virus.  Thus disabling scripting.  Of course 
many of Microsoft's auto updates are kind enough to enable it again.  That's 
why you use a program like Autoinstall to role out your updates. ;)


From: "Magus Ba'al" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: RE: Anti Virus for Debian
Date: Wed, 21 Feb 2001 09:32:28 -0700

After ILOVEYOU first came out and AV vendors didn't have a fix for it, we
had to figure out a way to quickly disable the virus. So I spent 5min
finding the reg key and writing 2 scripts to make the default action Edit,
instead of Open, and another in reverse, make the default action Open
instead of Edit. I wouldn't suggest renaming wscript.exe, jscript.exe or
csscript.exe, as Critical Updates, Repairing, or Upgrading IE will just put
those files back in place. The javascripts are attached, take a peek and 
see
if they fit the bill. If not, at least you still have the option to quickly
disable VBS scripting :)




-Original Message-----
From: Daniel Stark [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, February 21, 2001 9:12 AM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: Anti Virus for Debian


Speaking of Windows and *.vbs attacks.  What you should really do is 
disable
the scripting host on all of your Windows machines.  For those of you who
don't know, you can just rename "wscript.exe" "jscript.exe" and
"cscript.exe".  There's a good chance you'll only have one of them.


 From: Bradley M Alexander [EMAIL PROTECTED]
 To: Mario Zuppini [EMAIL PROTECTED]
 CC: Matthew Sherborne [EMAIL PROTECTED],
 [EMAIL PROTECTED]
 Subject: Re: Anti Virus for Debian
 Date: Mon, 19 Feb 2001 23:35:01 -0500
 
 On Tue, Feb 20, 2001 at 01:59:20PM +1000, Mario Zuppini wrote:
   I would also like to know of virus scanners especially for mail 
servers
 ie
   sendmail
   that will work on a SPARC ???
  
   there are a few that work under i386 ie like amavris etc can be found 
on
   freshmeat.net
   but nothing will work under a sparc
 
 As a quick and dirty option, you can use procmail to filter. Depending on
 your security posture and thread environment, you can filter on
 multi-extension vbs files (e.g. AnnaKournikova.jpg.vbs), all VBS files, 
exe
 files, or any combination. You could filter them to a quarantine area, 
then
 peruse them at your leisure.
 
 You should combine this with turning off auto execute of attachments on 
all
 of your windows boxen.
 
 --
 --Brad
 ===
=
 Bradley M. Alexander, CISSP  |   Co-Chairman,
 Beowulf System Admin/Security Specialist |NoVALUG/DCLUG Security SIG
 Winstar Telecom  |   [EMAIL PROTECTED]
 (703) 889-1049   |   [EMAIL PROTECTED]
 ===
=
 Those who trade liberty for security have neither.
 
 
 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of "unsubscribe". Trouble? Contact
 [EMAIL PROTECTED]
 

_
Get your FREE download of MSN Explorer at http://explorer.msn.com


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]

 VBSscripts.zip 

_
Get your FREE download of MSN Explorer at http://explorer.msn.com


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: how secure is mail and ftp and netscape/IE???

2001-02-21 Thread Daniel Stark

Yes, you should be concerned.  Now-a-days most people are using SSH for all 
communication.  It's really the way to go for remote access.  Take a look at 
openssh.com for some more information.  Plus it's free, and we like free. ;)


From: Steve Rudd [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: how secure is mail and ftp and netscape/IE???
Date: Wed, 21 Feb 2001 15:13:43 -0500

Hello! Steve here,

Well I am one of the family now! My server is Debian 2.2r2. A benign hacker
got me. All he seemed to do was overwrite my root index.html page and
notify the "hackers watchdog" group to take responsibility for the act!

I have some security questions:

1. How secure is it checking email with eudora pro, given they have not yet
got ssh or any other system that is secure? Since outlook has ssh, is it
worth switching for that? I use a separate user and password for mail and 
ftp.

2. Cute ftp is not secure yet, but should be soon.

3. Using netscape to port to private sections of the website:

www.abc.com:1020/systemconfig/index.html

(for example)

I am asked for a user name and password via netscape/IE

===

Ok all these things are really transmitting my user name and password via
plain text with no encryption. If I have sudo installed and a sniffer comes
along, they have root access very easily!

Should I be concerned about using email, ftp and IE ?

Steve


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact 
[EMAIL PROTECTED]


_
Get your FREE download of MSN Explorer at http://explorer.msn.com


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: how secure is mail and ftp and netscape/IE???

2001-02-22 Thread Daniel Stark

I ssh from my Windows 2000 machine at work to my Debian machine at home.  
You just need the proper client.  There are free ones out there for Windows.


From: Adam Spickler [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: how secure is mail and ftp and netscape/IE???
Date: Wed, 21 Feb 2001 15:40:05 -0500

What about if you are going from a Windows box to a *nix box.  Is there any 
way to do secure ftp transfers.  Mail, for me is no problem.  I ssh into my 
machines and use "Mutt" to deal with email.


...adam





On Wed, Feb 21, 2001 at 05:29:11PM -0300, Pedro Zorzenon Neto wrote:
  Hi Steve,
 
About sending plain text password and files with telnet and ftp:
 
uninstall your 'telnetd' and 'ftp server' and install 'ssh'
ssh is real secure and has two usefull commands:
'ssh' is a substitute for telnet
and 'scp' is not the same thing, but substitutes ftp with some 
advantages
 
read their manuals and compare.
 
  Bye
  Pedro
 
  On Wed, Feb 21, 2001 at 03:13:43PM -0500, Steve Rudd wrote:
   Hello! Steve here,
  
   Well I am one of the family now! My server is Debian 2.2r2. A benign 
hacker
   got me. All he seemed to do was overwrite my root index.html page and
   notify the "hackers watchdog" group to take responsibility for the 
act!
  
   I have some security questions:
  
   1. How secure is it checking email with eudora pro, given they have 
not yet
   got ssh or any other system that is secure? Since outlook has ssh, is 
it
   worth switching for that? I use a separate user and password for mail 
and ftp.
  
   2. Cute ftp is not secure yet, but should be soon.
  
   3. Using netscape to port to private sections of the website:
  
   www.abc.com:1020/systemconfig/index.html
  
   (for example)
  
   I am asked for a user name and password via netscape/IE
  
   ===
  
   Ok all these things are really transmitting my user name and password 
via
   plain text with no encryption. If I have sudo installed and a sniffer 
comes
   along, they have root access very easily!
  
   Should I be concerned about using email, ftp and IE ?
  
   Steve
  
  
   --
   To UNSUBSCRIBE, email to [EMAIL PROTECTED]
   with a subject of "unsubscribe". Trouble? Contact 
[EMAIL PROTECTED]
  
  
 
 
  --
  To UNSUBSCRIBE, email to [EMAIL PROTECTED]
  with a subject of "unsubscribe". Trouble? Contact 
[EMAIL PROTECTED]
 


-
Adam Spickler
Whaddu LLC.
http://www.whaddu.com
WebHosting and Design/Development Unlimited
-


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact 
[EMAIL PROTECTED]


_
Get your FREE download of MSN Explorer at http://explorer.msn.com


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Applications using Linux capabilities

2001-03-23 Thread Daniel Jacobowitz

On Thu, Mar 22, 2001 at 10:36:43AM +0100, Alexander Reelsen wrote:
 Hi folks
 
 I'm currently collecting a list of applications which make use of the
 capabilities introduced in Linux 2.2. However this list is quite short and
 I'm wondering whether I am searching wrong or the capabilities aren't
 advocated enough yet or just not used as they're bad or whatever (huge
 "huh?" here from my side).
 
 So if anyone has a application to add to this list, please tell me so.
 
 Incredibly long list of apps:
 - proftpd
 - xntp3 w/patch (just keeps CAP_SYS_TIME, drops uid 0)

Vsftpd does, too.

I'm fairly sure there's a lot more - you can access them through PAM
somehow, I think...

-- 
Daniel Jacobowitz   Debian GNU/Linux Developer
Monta Vista Software  Debian Security Team
 "I am croutons!"


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: rpc.statd

2001-04-08 Thread Daniel Jacobowitz

On Sun, Apr 08, 2001 at 06:04:54PM -0400, Robert Bartels wrote:
 I saw this in my logs today.
 
 Apr  8 15:08:43 mikado rpc.statd[179]: gethostbyname error for
 ^X^X^Y^Y^Z^Z^[^[%8x%8x%8x%8x%8x%8x%8x%8x%8x%236x%n%1
 37x%n%10x%n%192x%n\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
 20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
 20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
 20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
 20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
 20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
 20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
 20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
 20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
 20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
 20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
 20\220\220\220\2!
 20\220\220\220\220\220\220\220\220\220
 
 It looks like statd is still running. Is rpc still vulnerable? Is there a

Nope, you're safe if you saw the % signs in your logs.

 way to track down who
 connected to rpc.statd?

Run a tcp logger, like ippl.

-- 
Daniel Jacobowitz   Debian GNU/Linux Developer
Monta Vista Software  Debian Security Team
 "I am croutons!"


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: setting up sudo for tail

2001-04-11 Thread Daniel Jacobowitz

On Thu, Apr 12, 2001 at 01:10:17AM +, Adam Olsen wrote:
 And for the record, is there any way to get sudo working?

No, not really.  What you would have to do would be write a wrapper
script which verifies that all arguments are sane.  Deny lists in sudo
are known to be mostly a non-feature.

-- 
Daniel Jacobowitz   Debian GNU/Linux Developer
Monta Vista Software  Debian Security Team
 "I am croutons!"


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Security in a shell that starts ssh

2001-06-13 Thread Daniel Ginsburg

On Wed, Jun 13, 2001 at 10:57:08AM -0500, Steve Greenland wrote:
 Tim, good fixups, a few C coding/style nitpicks:
 
 On 12-Jun-01, 17:57 (CDT), Tim van Erven [EMAIL PROTECTED] wrote: 
  #include stdio.h
 
 #include unistd.h /* For execlp */
 #include stdlib.h /* For exit */
 
  int main()
 
 int main(void)   /* () != (void) in C */
 
  {
char  name[21]; /* Should be macro (#define NAMELEN 21) */
  
printf(Login as: );
fflush(stdout);
  
if(fgets(name, 21, stdin)) {
  /* if(name[strlen(name) - 1] != '\n') */
 
  if(name[strlen(name) - 1] != '\n') {


Possible access to unallocated memory if \0\n supplied as input.

fprintf(stderr, Username to long.\n);
  /* else { */
 
  } else {
 
name[strlen(name) - 1] = '\0';
execlp(/usr/bin/ssh, ssh, -l, name, foo.foo.es, (char *)0);
  }
}
  
/* return 0; */
 
 exit(EXIT_SUCCESS); /* return doesn't call atexit() registered functions,
which doesn't apply in this case, but it's a good
habit to get into */


Wrong comment. Returning from main _does_ call atexit() registered
functions.

  }
 
 
 You also should should make sure name doesn't contain any spaces: as
 written I can pass additional options to ssh. Also, for this kind of
 application you really ought to be checking the error conditions for
 *every* library call.
 

Spaces and other shell metacharecters are irrelevant in this case, since
executed command won't undergo shell interpretation.

-- 
dg


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Security in a shell that starts ssh

2001-06-13 Thread Daniel Ginsburg

On Wed, Jun 13, 2001 at 02:02:10PM -0500, Steve Greenland wrote:

[snip]

 I'd still argue that exit(_macro_) is better style than return from
 main(), but I'm hard pressed to find a technical argument.


There's subtle difference between returning from main and calling exit.
Excelent explanation is in C-FAQ 11.16
http://www.eskimo.com/~scs/C-faq/q11.16.html.

-- 
dg


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Proxy arp or bridge ?

2001-07-02 Thread Daniel Faller

On Monday 02 July 2001 18:25, you wrote:
 ipmasquerading?

No, they have public ip's and I would like to keep this setting. The clients 
config should not change at all.


Daniel


_
Daniel Faller
Fakultaet fuer Physik
Abt. Honerkamp
Albert-Ludwigs-Universitaet Freiburg

Tel.: 0761-203-5875
Fax.: 0761-203-5967 
e-mail: [EMAIL PROTECTED]
URL:http://webber.physik.uni-freiburg.de/~fallerd 


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: shared root account

2001-07-06 Thread Daniel Polombo

Just a friendly Jedi Knight wrote:

 On Fri, Jul 06, 2001 at 01:19:24PM +0300, Juha Jykk wrote:
 
  I distrust allowing root logins from anywhere but local console(s)
or non-modem gettys i.e. from anywhere over the not-owned-by-me cable.

  umm do You want to run in circles from one machine to another? ;o))
  if not than You need to remotely logon somehow, right?
  i think that ssh'ing into the machine and than than su'ing to root is no
  different than ssh'ing directly as root into that machine...
  (well when You do a su You leave a trace in logs of that fact, while You are
  directly ssh'ing into there is no info in logs on who actually logged on as
  root; there is some patch to at least partialy fix the latter and it was
  mentioned on debian-devel i think)


Disable every direct root login altogether (suppress root's password) 
and add anyone who needs root access to your /etc/sudoers file (if 
necessary, apt-get install sudo, of course). Need a root shell? sudo 
bash, and you're using only your own password ...



--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Port 6000/X11 Won't Close!

2001-08-10 Thread Daniel Polombo

vexation wrote:
 I use debian 2.2 (woody/unstable) with kernal 2.4.7, i use login.app to login
 to X.  I believe i have the --no-listen command set. However, no madder what i
 do port 6000 still remains open.  I really want to close this port for security
 reasons!  can someone please help me?! - Thank you!

Try running X -nolisten tcp.

HTH,

Daniel


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: rpc.statd being attacked?

2001-08-21 Thread Daniel Jacobowitz

On Tue, Aug 21, 2001 at 01:28:24PM -0700, Daniel Schepler wrote:
 I've gotten logs several times that read something like
 
 Aug 20 19:20:24 adsl-63-193-247-253 rpc.statd[330]: gethostbyname error for ^X
 F7FFBF^XF7FFBF^YF7FFBF^YF7FFBF^ZF7FFBF^ZF7FF
 BF^[F7FFBF^[F7FFBF%8x%8x%8x%8x%8x%8x%8x%8x%8x%236x%n%137x%n%10x%n%

You're safe.  It was fixed before potato; it would not have been logged
if it had succeeded.

-- 
Daniel Jacobowitz   Carnegie Mellon University
MontaVista Software Debian GNU/Linux Developer


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: apt sources.list

2001-08-21 Thread Daniel Jacobowitz

On Tue, Aug 21, 2001 at 09:36:02AM -0700, Jeff Coppock wrote:
Can I get a few recommendations on the proper sources.list for
a system running woody, that includes the security updates?  I
recently did an apt-get update  apt-get upgrade and the
security updates cause dependancy issues that I couldn't
recover from and made my system unbootable, since lilo was
involved.  I'm scared to death to run another update/upgrade
since I had to rebuild the system from scratch!

As others have said - don't do this :)

If security is especially important to you, run stable with security
updates, or track unstable daily and hope maintainers are responsive. 
We try to see that woody is in coherent shape just before release, but
we can't supply fixes for it on any more urgent basis.  It moves too
fast.

-- 
Daniel Jacobowitz   Carnegie Mellon University
MontaVista Software Debian GNU/Linux Developer


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




No Subject

2001-09-21 Thread Daniel Andrade



unsubscribe

[EMAIL PROTECTED]



Re[2]: Port Scan for UDP

2001-10-21 Thread Petre Daniel

-BEGIN PGP SIGNED MESSAGE-
Hash: MD5

also netstat -n -p -t --listening | grep :PORT


VD Hi,

VD On Sat, Oct 20, 2001 at 09:22:57PM -0700,
VD tony mancill [EMAIL PROTECTED] wrote:
 On Sat, 20 Oct 2001, Marc Wilson wrote:

  Adding or removing lines in /etc/services doesn't open or close ports...
  this is a common misconception.  Removing what's listening on a particular
  port is what closes that port.

 A good way to find out what process is listening on a port is to load the
 lsof package and use lsof -i (as root so that you'll see everything).

VD You can also use netstat -pan to find out which process is listening on
VD which port.

VD regards,
VD Volker

-BEGIN PGP SIGNATURE-
Version: 2.6

iQCVAwUAO9LuA8w1CXXrWGBbAQHHfwQAnnPo0f/RkZMaQk4S40qKjciv+YG+vOMw
JHP5c6JVGyrwIVq51v0lNGjIFRzg/jXkuVBNfIoDhDXvNwbzoy30r+KG0jAYRmWX
eoTdQzcd3MayOEhENei+ON67g6Ndw8lLW35gTXuSuGPkuAUqZCqYIwDJkVkPR3j4
bCSwXXX4FS8=
=6XxD
-END PGP SIGNATURE-


_
Do You Yahoo!?
Get your free @yahoo.com address at http://mail.yahoo.com



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Rspuns: How do I disable (close) ports?

2001-12-04 Thread Petre Daniel


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Well,111 is the portmap port..carefully,its a gate for intrusion with
rpc attacks..
you must disable portmap. try something like update-rc -f remove
portmap or
update-rc -f portmap remove i forgot..

if that doesn work try blocking ports vias ipchains with something
like
/sbin/ipchains -s 0/0 -d MY_MACHINE_IP 111 -p tcp -j DENY -l
 cya

 Petre L. Daniel
 Linux Administrator,Canad Systems Pitesti
 http://www.cyber.ro email:[EMAIL PROTECTED]
 phone: +4048220044,+4048206200

- -Mesaj original-
De la: J. Paul Bruns-Bielkowicz [mailto:[EMAIL PROTECTED]]
Trimis: Tuesday, December 04, 2001 12:18 PM
Ctre: [EMAIL PROTECTED]
Subiect: How do I disable (close) ports?


Hi,
I disabled all but a few ports in /etc/services, but I have
tcp0  0 pa237.olsztyn.sdi.t:111 80.116.215.37:1064
ESTABLISHED
when I netstat my machine. What exactly does this mean? I just want
25/tcp opensmtp
37/tcp opentime
66/tcp opensql*net
80/tcp openhttp
110/tcpopenpop-3
443/tcpopenhttps
3306/tcp   openmysql
open. How can I close ports 111 and 859? They are not enabled in
/etc/services
Thanks,
J. Paul Bruns-Bielkowicz
http://www.america.prv.pl


- --
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]

-BEGIN PGP SIGNATURE-
Version: PGPfreeware 7.0.3 for non-commercial use http://www.pgp.com

iQA/AwUBPA3VnSVopXqImSTYEQLWmACfeHFgiD5RXNVZlkTQR2TzJqAEiAAAn2Rl
dDQS28W+nY02Y6QyAN+NwrOU
=XZqf
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Debian GNU/Linux 2.2r3 vulnerabilities ?

2001-10-24 Thread Petre Daniel

-BEGIN PGP SIGNED MESSAGE-
Hash: MD5

Heya,
 I run a potato at home and i will set the computer at work
  with potato as well.Since that will be a 24h internet connected
 pc,i am wondering what are the 2.2 release 3 vulnerabilities for
  the sistem installed from the cds without any online update.
 Is the ssh package in potato vulnerable?
 I'd appreciate it if you can give me some urls.
 thx,
 Dani,
 hackers unsupport.

-BEGIN PGP SIGNATURE-
Version: 2.6

iQCVAwUAO9d5bcw1CXXrWGBbAQED7gQAmoKv0NVCTKa2MuEiPcVBHg27TMu58WCa
IcmoCDe9BAgq9VDQUENPzlRiFceFQQkK1skoO0+sCn8I4SXu+cO2vdVuaPyHtdlg
UpLpI5mx0BBYavLmQ1AmdUp0z4aTFkpMneTiXV1GEwvz6xzFXGRFqBkNbQGOnvvO
bjMyDw60aT4=
=wDVj
-END PGP SIGNATURE-


_
Do You Yahoo!?
Get your free @yahoo.com address at http://mail.yahoo.com



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




What this means in my logs?

2001-11-30 Thread Petre Daniel

Heya,i got those lines often lately..Can anyone explain me every
little part of it?
If you can drop an url link too,it would be great..
Thank you.

Nov 30 16:16:28 brutus-gw kernel: Packet log: input DENY eth1 PROTO=6 
210.86.20.213:1621
194.102.92.21:6000 L=48 S=0x00 I=52039 F=0x4000 T=102 SYN (#1)

c yah,
Dani.


_
Do You Yahoo!?
Get your free @yahoo.com address at http://mail.yahoo.com



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Exim mail

2001-12-14 Thread Daniel Rychlik

How do I stop this from happening.  Apparently my bud telented to port 25
and somehow sent mail from my root account.  Any suggestions, white papers
or links?  Id would like to block the telnet application all together, but I
dont think thats possible.

Thanks in advance,
Daniel

im a newbie so please send flame mail to [EMAIL PROTECTED]null   thanks.

Heres what he sent to me...

- Original Message -
From: [EMAIL PROTECTED]
Sent: Thursday, December 13, 2001 10:03 PM


 hehe this wasnt so hard either, i guess that makes me a pimp? lmfao,
anyway learn to call a brotha damnit! and dont act like you dont know who
dis be! foo! hehehe later..


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Exim mail

2001-12-14 Thread Daniel Rychlik

Thanks for the reply on this.  I just found the header info.  It does appear
that he sent it from a remailer.  Thanks again,  Sorry for the stupidity.


Envelope-to: [EMAIL PROTECTED]
Received: from rly-ip02.mx.aol.com ([152.163.225.160])
 by earth.rychlik.ws with esmtp (Exim 3.12 #1 (Debian))
 id 16Ejkt-0003kp-00
 for [EMAIL PROTECTED]; Thu, 13 Dec 2001 22:15:27 -0600
Received: from logs-tn.proxy.aol.com (logs-tn.proxy.aol.com [152.163.207.5])
   by rly-ip02.mx.aol.com (8.8.8/8.8.8/AOL-5.0.0)
   with ESMTP id XAA01462 for [EMAIL PROTECTED];
   Thu, 13 Dec 2001 23:06:10 -0500 (EST)
From: [EMAIL PROTECTED]
Received: from AC952543.ipt.aol.com (AC952543.ipt.aol.com [172.149.37.67])
 by logs-tn.proxy.aol.com (8.10.0/8.10.0) with SMTP id fBE430X219986
 for [EMAIL PROTECTED]; Thu, 13 Dec 2001 23:03:29 -0500 (EST)
Date: Thu, 13 Dec 2001 23:03:29 -0500 (EST)
Message-Id: [EMAIL PROTECTED]
X-Authentication-Warning: logs-tn.proxy.aol.com: AC952543.ipt.aol.com
[172.149.37.67] didn't use HELO protocol
X-Apparently-From: [EMAIL PROTECTED]
Bcc:
Status:

hehe this wasnt so hard either, i guess that makes me a pimp? lmfao, anyway
learn to call a brotha damnit! and dont act like you dont know who dis be!
foo! hehehe later..


- Original Message -
From: Jamie Heilman [EMAIL PROTECTED]
To: Daniel Rychlik [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Friday, December 14, 2001 6:33 PM
Subject: Re: Exim mail


 Daniel Rychlik wrote:

  How do I stop this from happening.  Apparently my bud telented to port
25
  and somehow sent mail from my root account.  Any suggestions, white
papers
  or links?  Id would like to block the telnet application all together,
but I
  dont think thats possible.

 He didn't use your root account, he used the nature of SMTP to trick
 you.  http://rfc821.x42.com/  And no, you can't block telnet, unless
 you choose to not run a mail server at all.

 --
 Jamie Heilman   http://audible.transient.net/~jamie/
 Paranoia is a disease unto itself, and may I add, the person standing
  next to you may not be who they appear to be, so take precaution.
 -Sathington Willoughby


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Exim mail

2001-12-14 Thread Daniel Rychlik


- Original Message -
From: Thomas Hallaran [EMAIL PROTECTED]
To: Daniel Rychlik [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Friday, December 14, 2001 6:53 PM
Subject: Re: Exim mail


 spoofing mail:
 telnet to port 25 on machine you want to spoof through.
 1.Type 'mail from: [EMAIL PROTECTED]'  (address you want to send mail as)
 2.Type 'rcpt to: [EMAIL PROTECTED]'(person you are sending mail to)
 3.Type 'data'
 4.Type 'whatever you want , ending with a period on its own line.'
 5.Type quit

Thomas Hallaran,THANK YOU!
Knowledge is power, difficult to find if you dont have direction.

Once again,  thank you...


 here is the smtp rfc:
 http://www.ietf.org/rfc/rfc0821.txt
 here is a primer on fake email:
 http://scipp.ucsc.edu/~mothra/support/fake_email.html
 here are dos on securing sendmail:
 http://mail-abuse.org/tsi/ar-fix.html


 Tom Hallaran
 Informatics
 Washington University Genome Sequencing Center
 314-286-1114
 [EMAIL PROTECTED]





 On Fri, 14 Dec 2001, Daniel Rychlik wrote:

  How do I stop this from happening.  Apparently my bud telented to port
25
  and somehow sent mail from my root account.  Any suggestions, white
papers
  or links?  Id would like to block the telnet application all together,
but I
  dont think thats possible.
 
  Thanks in advance,
  Daniel
 
  im a newbie so please send flame mail to [EMAIL PROTECTED]null   thanks.
 
  Heres what he sent to me...
 
  - Original Message -
  From: [EMAIL PROTECTED]
  Sent: Thursday, December 13, 2001 10:03 PM
 
 
   hehe this wasnt so hard either, i guess that makes me a pimp? lmfao,
  anyway learn to call a brotha damnit! and dont act like you dont know
who
  dis be! foo! hehehe later..
 
 
  --
  To UNSUBSCRIBE, email to [EMAIL PROTECTED]
  with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]
 
 



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Exim mail

2001-12-15 Thread Daniel Rychlik


- Original Message -
From: Brian P. Flaherty [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Saturday, December 15, 2001 8:41 AM
Subject: Re: Exim mail


 Daniel Rychlik [EMAIL PROTECTED] writes:

  How do I stop this from happening.  Apparently my bud telented to port
25
  and somehow sent mail from my root account.  Any suggestions, white
papers
  or links?  Id would like to block the telnet application all together,
but I
  dont think thats possible.

 I may be wrong, but from your email headers, it looks like you are
 mailing from a computer connected via dsl.  Are you running an smtp
 server for yourself (i.e., internal mail, getting mail from external
 source and sending via an exim smarthost) or are you actually supposed
 to be relaying mail for other machines?

Yes, im running a smtp server along with pop3.  I wanted to host my own
domain, email, and whatever else.  .  My debian machine is running NAT and
is a firewall for my internal machines.  Im learning the basics of security
and want to make it as secure as possible.   I dont have extra hardware
lying around so my debian server is also running apache.  My wife likes
building webpages and such so I thought, cool why not...




 I am connected with DSL and retrieve mail from three different
 sources.  I run fetchmail to get it and exim to send it out.  Exim is
 configured to send mail for the localhost only and it passes it all
 out to my smarthost.  Also, ipchains blocks all smtp traffic, except
 from the smarthost.  And finally, I have telenetd running from
 xinetd.conf, but it is bound to my internal NIC, so there isn't an
 open telnet port on the internet.  Maybe a configuration like this
 would work for you?

No telnet or ftp traffic for me, only 22,25, and 80...


 Brian


 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Problem with IPTables

2001-12-17 Thread Daniel Rychlik


- Original Message -
From: Bender, Jeff [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Monday, December 17, 2001 12:08 PM
Subject: Problem with IPTables


 I am having troubles with IPTables.  My rules are having troubles with
 handling -m state --state ESTABLISHED options.  The error I get is
 iptables: No chain/target/match by that name.  Any ideas?  Here is my
 script below.

 # http://www.cs.princeton.edu/~jns/security/iptables/index.html
 # Prepared by James C. Stephens
 # ([EMAIL PROTECTED])

 #!/bin/bash
 #
 # These lines are here in case rules are already in place and the script
is
 ever rerun on the fly.
 # We want to remove all rules and pre-exisiting user defined chains and
zero
 the counters
 # before we implement new rules.
 iptables -F
 iptables -X
 iptables -Z

Ok, the iptables -X rule needs a chain it can call on.  You have to supply a
name for that chain.  example
iptables -X (foo)
then on your rule set you can call that custom chain that you  have made.
Basically whats happening is Iptables is looking in its defualt directory
for a special chain that doesnt exist.  You have to create it..  No biggy,
just looks like you need to set that option here...


 # Set up a default DROP policy for the built-in chains.
 # If we modify and re-run the script mid-session then (because we have a
 default DROP
 # policy), what happens is that there is a small time period when packets
 are denied until
 # the new rules are back in place. There is no period, however small, when
 packets we
 # don't want are allowed.
 iptables -P INPUT ACCEPT
 iptables -P FORWARD ACCEPT
 iptables -P OUTPUT ACCEPT

For a more secure rule set you need to set these to DROP.  ESPECIALLY THE
FORWARD RULE!  What can happen here is someone can use your server to spoof
their own ip...   So im told..


 ## ===
 ## Some definitions:
 IFACE=eth0
 IPADDR=209.150.196.220
 LO=lo
 NAMESERVER_1=209.150.200.15
 NAMESERVER_2=209.150.200.10
 NAMESERVER_3=64.65.128.6
 BROADCAST=209.150.196.255
 LOOPBACK=127.0.0.0/8
 CLASS_A=10.0.0.0/8
 CLASS_B=172.16.0.0/12
 CLASS_C=192.168.0.0/16
 CLASS_D_MULTICAST=224.0.0.0/4
 CLASS_E_RESERVED_NET=240.0.0.0/5
 P_PORTS=0:1023
 UP_PORTS=1024:65535
 TR_SRC_PORTS=32769:65535
 TR_DEST_PORTS=33434:33523

 ## 
 # RULES
 echo Start Rules

 ## LOOPBACK
 # Allow unlimited traffic on the loopback interface.
 iptables -A INPUT  -i $LO -j ACCEPT
 iptables -A OUTPUT -o $LO -j ACCEPT

 echo -n Allow DNS servers incoming traffic...

 ## DNS
 # NOTE: DNS uses tcp for zone transfers, for transfers greater than 512
 bytes (possible, but unusual), and on certain
 # platforms like AIX (I am told), so you might have to add a copy of this
 rule for tcp if you need it
 # Allow UDP packets in for DNS client from nameservers.
 iptables -A INPUT -i $IFACE -p udp -s $NAMESERVER_1 --sport 53 -m state
 --state ESTABLISHED -j ACCEPT

I believe the command is ESTABLISHED,RELATED  May want to double check that.


 #iptables -A INPUT -i $IFACE -p udp -s $NAMESERVER_2 --sport 53 -m state
 --state ESTABLISHED -j ACCEPT
 #iptables -A INPUT -i $IFACE -p udp -s $NAMESERVER_3 --sport 53 -m state
 --state ESTABLISHED -j ACCEPT
 # Allow UDP packets to DNS servers from client.
 #iptables -A OUTPUT -o $IFACE -p udp -d $NAMESERVER_1 --dport 53 -m state
 --state NEW,ESTABLISHED -j ACCEPT
 #iptables -A OUTPUT -o $IFACE -p udp -d $NAMESERVER_2 --dport 53 -m state
 --state NEW,ESTABLISHED -j ACCEPT
 #iptables -A OUTPUT -o $IFACE -p udp -d $NAMESERVER_3 --dport 53 -m state
 --state NEW,ESTABLISHED -j ACCEPT

 echo done

 bash# ./test.firewall
 Start Rules
 Allow DNS servers incoming traffic...iptables: No chain/target/match by
that
 name
 done

It looks like you dont really need to define a new chain.  Try it out.





 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




/etc/passwd ?

2001-12-27 Thread Daniel Rychlik



I was wandering if I edited my /etc/passwd file and 
replaced all the /bin/sh to /bin/false , will that break anything?
What Im seeing is accounts like lp, games, uucp, 
proxy, postgres, and a slew of others that I dont use.

Thanks in advance Debian Guruz!
Daniel


Re: /etc/passwd ?

2001-12-27 Thread Petre Daniel

most of them are relics of software that you probably dont need,but be 
carefully what account you erase.
better comment them out.you can put a /etc/NOSHELL instead of /bin/sh or 
even /bin/false and they won't be able to login into the machine no more..

At 06:24 PM 12/27/01 -0600, Daniel Rychlik wrote:
I was wandering if I edited my /etc/passwd file and replaced all the 
/bin/sh to /bin/false , will that break anything?
What Im seeing is accounts like lp, games, uucp, proxy, postgres, and a 
slew of others that I dont use.

Thanks in advance Debian Guruz!
Daniel

Petre L. Daniel,System Administrator
Canad Systems Pitesti Romania,
http://www.cyber.ro, email:[EMAIL PROTECTED]
Tel:+4048220044, +4048206200


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Securing bind..

2001-12-30 Thread Petre Daniel

thank you all very much.
you're right.if one doesn't have anything useful to say i'll recommand him 
to let others help..
thx guys.

At 10:02 PM 12/30/01 +0100, jernej horvat wrote:
On Sunday 30 December 2001 18:46, P Prince wrote:
  The eaisest and most failsafe way to secure bind is to install djbdns.

If you have nothing to say - do not speak.
--
Configuration options for BIND are listed on
http://www.isc.org/products/BIND/docs/config/

List of URL that might be usefull is here:
http://www.isc.org/products/BIND/contributions.html

Cricket Liu's presentation on how to secure BIND:
http://www.acmebw.com/papers/securing.pdf

Securing DNS:
http://www.psionic.com/papers/dns/
-
acl defines hosts or networks that you can either allow or deny access

version defines version number that bind answers if asked for it.
(like: 'this space for rent. contact hostmaster' ;])

blackhole defines hosts or networks that bind will not answer at all.
(ie.: 10.x.x.x, 192.168.x.x, 224.x)

allow-recursion/allow-query defines hosts or networks that can use your
server to get non-auth answers or do recursive queries.

listen-on defines interfaces and ports bind will listen on. If you don't
have any domains to server to the outside world, you just list the intranet
(NAT) interface in here.

forward only means that you will forward all request (and work ;]) to the
dns servers listed in forwarders.
--
BOFH excuse #57:

Groundskeepers stole the root password

Petre L. Daniel,System Administrator
Canad Systems Pitesti Romania,
http://www.cyber.ro, email:[EMAIL PROTECTED]
Tel:+4048220044, +4048206200


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: faq? rpc.statd: gethostbyname error for

2001-12-31 Thread Daniel Jacobowitz

On Mon, Dec 31, 2001 at 09:11:41PM +0100, David Gestel wrote:
 What is this? I don't think anyone got in though, everything seems to be
 fine.
 I'm running woody and rpc.statd version 0.3.3

Yep.  The fact that it was logged in this particular case means you're
fine.

-- 
Daniel Jacobowitz   Carnegie Mellon University
MontaVista Software Debian GNU/Linux Developer


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




A Happy New Year From Romania to all of you!

2001-12-31 Thread Petre Daniel



Petre L. Daniel,System Administrator
Canad Systems Pitesti Romania,
http://www.cyber.ro, email:[EMAIL PROTECTED]
Tel:+4048220044, +4048206200


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




[security] What's being done?

2002-01-12 Thread Daniel Stone

Considering that an upload hasn't been made to rectify this root hole,
why hasn't something else been done about it - regular or security NMU?
One would think that this is definitely serious.

Oh and BTW, Slackware released an update today. Without trolling, I can
say that I was honestly surprised to note that Debian, a distro with
~850 developers and a dedicated security team, is behind Slackware on
security issues.

d

-- 
Daniel Stone[EMAIL PROTECTED]
WARNING: The consumption of alcohol may make you think you have mystical
 Kung Fu powers, resulting in you getting your arse kicked.



msg05182/pgp0.pgp
Description: PGP signature


Re: Debian security being trashed in Linux Today comments

2002-01-14 Thread Daniel Polombo

Adam Warner wrote:

 On Tue, 2002-01-15 at 01:05, Tim Haynes wrote:

Some of us wouldn't dare say such things without at least reviewing the
given distro's security policy, FAQ and history.

 But I was really impressed that updates for unstable/testing were
 released at the same time. For those of us that use/test the bleeding
 edge on our systems it's a great reassurance to see the security team
 giving consideration to the security of testing/unstable.


Well, maybe you should follow Tim's advice and go check the security team's FAQ :

Q: How is security handled for testing and unstable?

A: The short answer is: it's not. Testing and unstable are rapidly moving
   targets and the security team does not have the resources needed to
   properly support those. If you want to have a secure (and stable)
   server you are strongly encouraged to stay with stable.

Of course, if you're using unstable, fixes tend to appear quickly, but :

- tend to is not acceptable when security is concerned
- it may take a lot more time depending on your local mirror

--
Daniel


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Don't panic (ssh)

2002-01-14 Thread Daniel Polombo

Iain Tatch wrote:


 
AFAIK, all SSH1 connections are vulnerable to the CRC32 attack. Thus you need
to use SSH2 protocol. OpenSSH supports SSH2. You need different keys though,
as SSH2 so far does not support RSA keypairs and needs DSA keys.  

 That's the impression I was under, too. In which case the current stable
 release of Debian comes with an sshd which uses protocol 1 and is
 therefore open to allowing remote root compromises.

Just a quick precision here : you have to _disable_ v1 in order to be 
protected from that vulnerability. The point here is not that you have to 
support v2, it's that you have to disallow v1. A recent daemon allowing ssh1 
connections is vulnerable.

--
Daniel


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: dpkg-buildpackage (-rfakeroot) leaves setuid binaries

2002-01-21 Thread Daniel Jacobowitz

On Tue, Jan 22, 2002 at 01:11:18AM +0100, Christian Jaeger wrote:
 This can be a real security hole, at least when you are not aware of 
 it (I have just discovered a working way to exploit it on one of my 
 machines).

And isn't that a bug in the package in question? :)

-- 
Daniel Jacobowitz   Carnegie Mellon University
MontaVista Software Debian GNU/Linux Developer


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




strange log.

2002-05-16 Thread daniel mendoza

Hello ,
I've got 750k of this log daily

May 15 03:40:01  sm-msp-queue[16123]: STARTTLS=client, error: load verify locs 
/etc/ssl/certs/, /etc/mail/ssl/sendmail-server.crt failed: 0
May 15 03:40:01  sm-msp-queue[16123]: STARTTLS=client, error: load verify locs 
/etc/ssl/certs/, /etc/mail/ssl/sendmail-server.crt failed: 0
May 15 03:50:01  sm-msp-queue[16143]: STARTTLS=client, error: load verify locs 
/etc/ssl/certs/, /etc/mail/ssl/sendmail-server.crt failed: 0
May 15 03:50:01  sm-msp-queue[16143]: STARTTLS=client, error: load verify locs 
/etc/ssl/certs/, /etc/mail/ssl/sendmail-server.crt failed: 0
  
what can it be?
thanks,
bye.

mailto:[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: subscribe

2002-05-21 Thread Daniel Fairhead

makes a change not to have the un at the begining.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Netstat port list v/s PID

2002-10-09 Thread Daniel Hobe

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I can't remember where I found this program, but it should do what you want:
http://packetspike.net/~daniel/programs/sockstat.c


On Wednesday 09 October 2002 10:36 pm, Hantzley wrote:
 Hi,
   Is there a way to know to which process belong a particular port? e.g.,
 port 32773 - 32779, are known to be for rpc services. But to which process
 do they pertain to, that's another issue?

   Your comments and ideas are the most welcome.

 Thank you,

 Hantzley

- -- 
Daniel Hobe
[EMAIL PROTECTED]
http://www.nightrunner.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.0 (GNU/Linux)

iD8DBQE9pRUw3hvlKjISOQURAsQQAKDbe625XmDglsM8bNFRltNgaGqxbwCgxC0s
YAkEBFW30udL7jypg4w1UHE=
=GNej
-END PGP SIGNATURE-


/*
 *  SocketStat v1.0 - by Richard Steenbergen [EMAIL PROTECTED] and
 *  Drago [EMAIL PROTECTED]. Inspired by dreams, coded by nightmares.
 *
 *  Advantages:
 *- Nifty way to find which processes are using what sockets
 *- Can be used to detect users who clone on irc, connect where they
 *  shouldn't (bots on non-bot servers), are running hidden servers, etc.
 *  Disadvantages:
 *- Must be suid root in order to display sockets other then your own
 *- Kinda duplicates fuser and lsof but hey we had fun writing it.
 */

#include stdio.h
#include stdlib.h
#include unistd.h
#include string.h
#include sys/types.h
#include sys/stat.h
#include netinet/in.h
#include arpa/inet.h
#include dirent.h
#include ctype.h
#include errno.h
#include pwd.h
#include grp.h

#define error(x){ fprintf(stderr, sockstat: %s\n, x); }
#define fatal(x){ fprintf(stderr, sockstat: %s\n, x); exit(2); }

#define SEARCH_ALL  0   /* Display info on all sockets */
#define SEARCH_GID  1   /* Search by a specific group/gid */
#define SEARCH_PID  2   /* Search by a specific process/pid */
#define SEARCH_PNAME3   /* Search by a specific process name */
#define SEARCH_UID  4   /* Search by a specific user/uid */

#define PROTOCOL_TCP3
#define PROTOCOL_UDP2
#define PROTOCOL_RAW1

typedef struct {
   ino_t inode;
   struct in_addr local_addr, remote_addr;
   u_int local_port, remote_port;
   u_char status, protocol;
   uid_t uid;
} ProcNet;

char *states[] = {
   ESTBLSH,   SYNSENT,   SYNRECV,   FWAIT1,   FWAIT2,   TMEWAIT,
   CLOSED,CLSWAIT,   LASTACK,   LISTEN,   CLOSING,  UNKNOWN
};

uid_t o_uid;
gid_t o_gid;
pid_t o_pid;
char buf[128], o_pname[8];
DIR *proc, *fd;
FILE *tcp, *udp, *raw;
ProcNet *NetData;
u_char o_search = SEARCH_ALL;
u_int total = 0, stattcp = 0, statudp = 0, statraw = 0;

void usage(char *progname)
{
   fprintf(stderr, usage: %s [-u uid|user] [-g gid|group] [-p pid|process]\n,
   progname);
   exit(1);
}

int compare(const void *a, const void *b)
{
   ProcNet *a_rec, *b_rec;

   a_rec = (ProcNet *) a;
   b_rec = (ProcNet *) b;

   if (a_rec-inode == b_rec-inode)
  return 0;
   else
  return (a_rec-inode  b_rec-inode)?(1):(-1);
}

int read_tcp_udp_raw(char *buf, int bufsize)
{
   static char fc = PROTOCOL_TCP;
   FILE *fileptr;

change:
   switch(fc) {
  case PROTOCOL_TCP:
 fileptr = tcp;
 break;
  case PROTOCOL_UDP:
 fileptr = udp;
 break;
  case PROTOCOL_RAW:
 fileptr = raw;
 break;
  case 0:
 return 0;
  default:
 fatal(Program go down the hole.);
   }

   if (fgets(buf, bufsize, fileptr) != NULL)
  return fc;

   --fc;
   goto change;
}

char *get_program_name(char *pid) {
   char *ret;
   FILE *fp;

   if ((ret = malloc(8)) == NULL)
  fatal(Unable to allocate memory.);

   snprintf(buf, sizeof(buf), /proc/%s/status, pid);

   if ((fp = fopen(buf, r)) == NULL)
  goto error;

   if (fgets(buf, sizeof(buf), fp) == NULL)
  goto error;

   if (sscanf(buf, Name: %s\n, ret) != 1)
  goto error;

   fclose(fp);
   return ret;

error:
   fclose(fp);
   return unknown;
}

void display_record(ProcNet *Record, pid_t pid, char *pname)
{
   struct passwd *pwd;

   if (Record-protocol == PROTOCOL_TCP) printf(TCP );
  else if (Record-protocol == PROTOCOL_UDP) printf(UDP );
 else printf(RAW );
   pwd = getpwuid(Record-uid);
   pname[7] = '\0';
   pwd-pw_name[8] = '\0';

   printf(%-8s , pwd-pw_name);
   snprintf(buf, sizeof(buf), %s[%u], pname, pid);
   printf(%s%*s, buf, 15 - strlen(buf), );
   snprintf(buf, sizeof(buf), %s:%u , inet_ntoa(Record-local_addr),
Record-local_port);
   printf(%s %*s, buf, 21 - strlen(buf), );
   snprintf(buf, sizeof(buf), %s:%u, inet_ntoa(Record-remote_addr),
Record-remote_port);
   printf(%s %*s, buf, 21 - strlen(buf), );
   printf(%s\n, states[Record-status - 1]);

   switch(Record-protocol) {
  case PROTOCOL_TCP:
 ++stattcp;
 break;
  case PROTOCOL_UDP:
 ++statudp;
 break;
  case PROTOCOL_RAW:
 ++statraw;
 break;
   }
}

void read_proc_net(void

Re: port 16001 and 111

2002-10-15 Thread Daniel O'Neill

Specifically, port 16001 is ESD (ESound) IIRC..

On Tue, 2002-10-15 at 10:55, Giacomo Mulas wrote:
 On Tue, 15 Oct 2002, Jussi Ekholm wrote:
 
  So, what would try to connect to my system's port 16001 and 111 from
  within my own system? Should I be concerned? Should I expect the worst?
 
 port 16001 means that you are running gnome, and is perfectly normal. Port
 111 is the portmapper, which means that there is a client connecting to an
 RPC based service on your computer, i.e. NIS, whatever like that. As an
 example, there are a few encrypted file systems which make use of NFS
 on localhost, like CFS and SFS. Check it out. However, by the looks of it
 it does not seem anything dangerous.
 
 Bye
 Giacomo
 
 -- 
 _
 
 Giacomo Mulas [EMAIL PROTECTED], [EMAIL PROTECTED]
 _
 
 OSSERVATORIO ASTRONOMICO DI CAGLIARI
 Str. 54, Loc. Poggio dei Pini * 09012 Capoterra (CA)
 
 Tel.: +39 070 71180 248 Fax : +39 070 71180 222
 _
 
 When the storms are raging around you, stay right where you are
  (Freddy Mercury)
 _
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Strange access.log entries

2002-10-16 Thread Daniel O'Neill

I don't know if it's the catch on your problem, but it'll be interesting
reading noless;

http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0037.html

On Wed, 2002-10-16 at 12:19, Simon Langhof wrote:
 Hi
 I noticed some (40 until now) strange entries in my Apache access.log. They started 
today at 2:43 GMT and all look like this:
 IP - - [16/Oct/2002:07:42:56 +0200] \xe3@ 501 - - -
 
 Only the request string changes, there are:
 \xe3@   25 of this
 \xe3=  9 of this
 \xe3G  4 of this
 \xe3Y  2 of this
 
 They come from 9 IPs, where the last character always was the same from each IP.
 
 Is that a new worm, or an old one I missed?
 
 Simon Langhof
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 




signature.asc
Description: This is a digitally signed message part


Re: NIS

2002-10-28 Thread Daniel Lysfjord


On Tue, 29 Oct 2002, Francois Sauterey wrote:

 HI,

 I'm looking for any craft to secure YP:

 I'm working around shadow password  and yp.

 shadow passwords are stupid if ypcat passwd give the encripted passwords !
 Well, I use (in /etc/ypserv):
   *  : passwd.byname: port   : yes
   *  : passwd.byuid : port   : yes

 passwd are mangled , but the ftp server, on a YP-client machine, do not
 recognize any user.

 Any solution ?



If You are using ProFTPd, then using : PersistentPasswdoff in
your /etc/proftpd.conf would do the trick


-Daniel Lysfjord-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: [SECURITY] [DSA 193-1] New klisa packages fix buffer overflow

2002-11-11 Thread Daniel Stone
On Mon, Nov 11, 2002 at 06:07:40PM +0100, Martin Schulze scrawled:
 iDEFENSE reports a security vulnerability in the klisa package, that
 provides a LAN information service similar to Network Neighbourhood,
 which was discovered by Texonet.  It is possible for a local attacker
 to exploit a buffer overflow condition in resLISa, a restricted
 version of KLISa.  The vulnerability exists in the parsing of the
 LOGNAME environment variable, an overly long value will overwrite the
 instruction pointer thereby allowing an attacker to seize control of
 the executable.
 
 This problem has been fixed in version 2.2.2-14.2 the current stable
 distribution (woody) and in version 2.2.2-14.3 for the unstable
 distribution (sid).  The old stable distribution (potato) is not
 affected since it doesn't contain a kdenetwork package

KDE 3.0.5 packages, including the fixed kdenetwork (and, by extension,
klisa) packages, will start appearing on kde.org roughly Thursday
evening AEST (UTC+10). I've got exams until Thursday, so no sooner.

-d

-- 
Daniel Stone [EMAIL PROTECTED] [EMAIL PROTECTED]
Developer - http://kopete.kde.org, http://www.kde.org



msg07685/pgp0.pgp
Description: PGP signature


Re: Debian Apache Packaging - Option 4!

2002-11-16 Thread Daniel Stone
[CC finally changed to [EMAIL PROTECTED], whoops. Please keep editors@, or just
me].

On Sat, Nov 16, 2002 at 02:01:23PM -0800, Robert Woodcock scrawled:
 On Sat, Nov 16, 2002 at 04:25:22PM -0500, Robert C. wrote:
  The Apache suexec helper is special
 
 Is special the going euphamism for buggy?
 
 Seriously, lack of configuration file functionality is something worthy of
 at least a wishlist bug.

Not really, it's a security file: you can't change your area without
recompiling. I can see the use for this: h4x0rs can't just change a
config file and have a completely different suexec area, of their own
choosing.

-- 
Daniel Stone [EMAIL PROTECTED]
Developer, Trinity College, University of Melbourne



msg07781/pgp0.pgp
Description: PGP signature


Re: Spammers using a non-existant address as return-path

2002-11-25 Thread Daniel Rychlik
That is something that Ive always wanted to know, is how to turn verify off, 
but alas, due to sheer laziness,  I havent read up on it...

On Monday 25 November 2002 15:38, Kjetil Kjernsmo wrote:
 Dear all,

 I have just received a spam complaint, and unfortunately, some spammers
 have been using an address on one of my domains in their Return-Path
 and From-headers. How nice of them :-( . This address has never
 existed. I'm using the Exim packages from Woody.

 For quite some time, I have seen it show up in my server logs, I'm
 rotating them too often, I guess, and I don't remember exactly what I
 have seen long ago, but recently I have seen things like:
 2002-11-15 01:48:08 verify failed for SMTP recipient
 [EMAIL PROTECTED] from  H=mta458.mail.yahoo.com
 [216.136.130.123]

 I allow VRFY, and most of these come from yahoo.com or hotmail.com, I
 guess that has to do with spam filters they use. This address is
 probably getting a lot of bounces, which is then bounced off my server,
 and I don't want to waste my resources with accepting those, all in all
 I want to conserve as much as I can.

 But, is there something I _should_ do in this situation, like including
 some text in the bounce saying that this address has never existed, and
 is being abused by spammers? If yes, _how_ should I do it?

 I hope this is the right forum to ask...

 Cheers,

 Kjetil

-- 
Daniel J. Rychlik
Java/Perl Developer
http://daniel.rychlik.ws


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Intrusion Attempts

2002-12-03 Thread Daniel Rychlik
or use tcpwrappers and block them all together, or better yet,  
use Iptables and write a rule.  

g'times
dan

On Tuesday 03 December 2002 21:05, Phillip Hofmeister wrote:
 On Tue, 03 Dec 2002 at 09:19:28PM -0500, [EMAIL PROTECTED] wrote:
  Hi. Can you help me. Who do I report the above to. I have 2 firewalls
  running and tonight I was attacked from the same address 172 times in
  less than an hour. These people want banning off the net. It is certainly
  a violation of my privacy. A dozen times is an excuse but 172, I ask you.
  Please come back.

 You can usually find the domain associated with the ip by doing a
 reverse lookup:

 dig -x ipaddress

 Make sure to take the results from your lookup above and look that up to
 make sure they match.

 IE:

 I do this first:
 dig -x 127.0.0.1

 and get:
 1.0.0.127.in-addr.arpa. 604800  IN  PTR localhost.

 then I:

 dig localhost

 and I get:
 localhost.  604800  IN  A   127.0.0.1

 They match, wonderful.  Now I go to www.localhost and see if they have
 an address to report logs of undesireables to.  If not I'll:

 dig localhost SOA
 and get:

 localhost.  604800  IN  SOA localhost.
 root.localhost. 1 604800 86400 2419200 604800

 hmm...root.localhost, I bet you he can at least forward the email to the
 right person (since they are too lame to list that person on their
 web site).

 If all else fails do a whois lookup on the IP

 whois ipaddress

 and find one of the contacts listed there and bug them :)


 There is always an iptables blacklist you can set up and block the
 entire 24 (or 16, ouch) bit network if the admins do not take care of
 the undesireables.

 Regards,

-- 
Daniel J. Rychlik
Java/Perl Developer
http://daniel.rychlik.ws


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Too make a long story short...

2002-12-07 Thread Daniel Rychlik
I attempted to setup my cd read write so that I could do backups, and I hosed 
my Debian server.  You know, kernel panic  well I passed some init 
options and I got it back up.  I still would like to get my cd readwrite to 
work for redundantcy,  Are there Debian white papers on how to do this for an 
IDE cd burner?  
I apologize in advance, I know this is a security mailing list...  
-- 
Daniel J. Rychlik


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: init.d startup sequence for shorewall

2002-12-12 Thread Daniel Swärd
   networking comes up at S35 in runlevel 0 so my internet is up and there
   is no firewall running so far.
  
  runlevel 0 is system shutdown and halt.  The network is not brought up in
  this runlevel. :-)
  
 
 Actually that seems to be a highly secure firewall...Firewalls with no power cannot
 be compromised via the network:-)

http://www.samag.com/documents/s=1824/sam0201d/0201d.htm

Halted firewalls?

/Daniel
 
-- 
File not found. Should I fake it (y/n)?


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: FTP-SSL

2002-12-19 Thread Daniel Lysfjord
Quoting Cristian Ionescu-Idbohrn [EMAIL PROTECTED]:

 On Thu, 19 Dec 2002, Daniel Lysfjord wrote:
 
  It seems like FileZilla[1] supports ftp-ssl..
 
  [1]: http://sourceforge.net/projects/filezilla
 
 What about lftp?
 
 Depends: ..., libssl0.9.6, ...


From man lftp(1) :

   lftp can handle six file access methods - ftp, ftps, http,
   https, hftp, fish and file (https and ftps are only avail­
   able when lftp is compiled with openssl library).

apt-cache show ftp :

Description: Sophisticated command-line FTP/HTTP client programs
 Lftp is a file retrieving tool that supports FTP and HTTP protocols under
 both IPv4 and IPv6. Lftp has an amazing set of features, while preserving
 its interface as simple and easy as possible.

Seems like it should work with ftps, but the description doesn't mention it...
Anybody know about this. I don't know any ftps-servers, so I can't test if it
works...



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Can this be considered a DoS-attack?

2003-01-08 Thread Daniel O'Neill
No, and it seems they've fixed their problem on their end.

I think it hurt them a lot worse (on bandwidth) than it hurt you :)

On Wed, 8 Jan 2003 19:21:45 +0100 (CET)
Cristian Ionescu-Idbohrn [EMAIL PROTECTED] wrote:

 http://www.raycomm.com/techwhirl/magazine/technical/linux.html



msg08406/pgp0.pgp
Description: PGP signature


Re: scrollkeeper loading external (online) DTD

2003-01-09 Thread Daniel O'Neill
Thats absolutely ridiculous.

I would file one at once, that should definitely not go unchecked, at least.  I can 
appreciate the motivation, but for my own sanity I'm too paranoid to a) accept strange 
unknown files/connections or b) send out requests for such data.  Especially 
considering since it all happens without my knowledge, which thanks, now I know.  Who 
knows if the file is the original?  The checksum is verified, but that doesn't mean 
much all things considered, where did the checksum come from?

On 08 Jan 2003 22:54:12 +0100
Sebastien Chaumat [EMAIL PROTECTED] wrote:

 Hi,
 
  This a real example : 
 
  The xbill package contains : /usr/share/gnome/help/xbill/C/xbill.xml
 
  In this file the DTD is refered by an absolute external link :
 
 !DOCTYPE article PUBLIC -//OASIS//DTD DocBook XML V4.1.2//EN
 http://www.oasis-open.org/docbook/xml/4.1.2/docbookx.dtd; 
 
  Thus : scrollkeeper-update blindly connect to www.oasis-open.org to get
 the docbookx.dtd.
 
  I can trust signed debian packages but I can't trust 
 www.oasis-open.org.
 
 More than 18 files in /usr/share/gnome/help/ induce this download.
 
 I'am about to make bug report against scrollkeeper (for acting blindly,
 and dowloading the same file more than once) and against packages that
 provides the xml files (for using external DTD instead of provinding
 it)...
 
 Your opinion?
 
 Cheers,
 
 SEb
 
 
 
 
 
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 



msg08411/pgp0.pgp
Description: PGP signature


Re: I'm searching for a network wide system update tool

2003-01-19 Thread Daniel Freedman
On Sun, Jan 19, 2003, Ivo Marino wrote:
 I've setup apt-proxy server in my network, all Debian packages for each
 server in this network are downloaded from there.
 
 I think using a cron-job like cron-apt for updating security related
 packages automaticly on the servers not only could be a problem considering
 the securtiy point of view but also this could corrupt a server configuration
 and leave the system/service out of function.
 
 I prefer to launch manually a script which logs via ssh into each server
 and performs the packages update procedure.
 
 Anyone has allready written a script like the one described above or
 maybe knows an allready existing application which could perform this
 task? Thanks.

Hi Ivo,

Not a full solutiont, but try dsh maybe: Dancer Shell or Distributed
Shell, which can replicate commands via ssh on groups of
nodes/servers/etc...

HTH,
Daniel

 -- 
  =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
  Ivo Marino   [EMAIL PROTECTED]
  UN*X Developer, running Debian GNU/Linux
  irc.FreeNode.net#debian
  http://eimbox.org/~eimhttp://eimbox.org
  =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



-- 
Daniel A. Freedman [EMAIL PROTECTED], Graduate Fellow
  Electronic Structure Calculations, LASSP, Cornell University
Free University Project:   http://www.freeuniversityproject.org
  Help build an accredited open-admission, free-tuition online university!


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: question about SSH / IPTABLES

2003-01-23 Thread Daniel Kobras
On Thu, Jan 23, 2003 at 01:45:47PM +0100, DEFFONTAINES Vincent wrote:
 You can
 1. Remove the users access to the ssh program
 (eg change ownership and rights of /usr/bin/ssh and create a ssh group for
 allowed outgoing ssh users).
 2. Mount /home, /tmp and any other place users might have write access on
 with the noexec switch, so they can only use binaries installed (and
 allowed to them) on the system.

3. Kindly ask the users not to run '/lib/ld.so.1 /usr/bin/ssh' (or any
executable they upload to /home, /tmp, or wherever).

Daniel.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




H323 Gateways

2003-04-01 Thread Daniel Husand



Hi, does anyone know if its possible to setup 
this:

Clients - NAT - Internet - NAT- Clients with 
iptelephony without opening your NAT servers to the world.
Any software suggestions / tricks / 
ideas?


-- 
Daniel


Re: VPN gateway

2003-05-28 Thread Daniel Kobras
On Wed, May 28, 2003 at 03:36:07AM -0500, Warren Turkal wrote:
 I have a question that i have not been able to find a good conclusion for. Is 
 the Freeswan stuff compatible with the cisco vpn that require user/pass 
 logins?

It's definitely not compatible on its own.  I asked Cisco support, and
they told me that it _might_ work when running freeswan on top of l2tp.
Didn't get me much further, though. If someone else manages to figure it
out, please let me know. :)

Regards,

Daniel.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: recommendations for FTP server (fwd)

2003-06-21 Thread Daniel Lysfjord
FileZilla ( http://sourceforge.net/projects/filezilla/ ) is a great FTP client
for Windows that support SSL..


Quoting [EMAIL PROTECTED]:

 
 From:[EMAIL PROTECTED]
 To:  Dariush Pietrzak [EMAIL PROTECTED]
 Subject: Re: recommendations for FTP server
 Date:Sat, 21 Jun 2003 01:09:45 +
 
 I know about SSL/TLS support in Proftp, the only problem is that few
 clients
 support it (thanks fot the link to the Woody backport). I would use it if I
 could find clients that are supported by multiple OSes. Are there any
 SSL/TLS
 clients for Windows, OS X or Mac 9x? 
   Proftpd does support SSL/TLS.  It's a module that comes with it, it's
   just not enabled by default.  Some nice docs here:
   http://www.castaglia.org/proftpd/modules/mod_tls.html
  
 http://www.castaglia.org/proftpd/doc/contrib/ProFTPD-mini-HOWTO-TLS.html
   Actually... it's enabled by default, that's why it says 'no certificate
  found' when you start it the first time.
   Neither sftp nor anything else is a 'drop-in' replacement for ftp.
  
   The only problem with TLS/SSL in ftp is that there are not that many
  clients that support that - there are NONE in woody. You need to backport
  lftp from sid or compile it yourself ( I've got my backport available
 from
  http://eyck.forumakad.pl/woody ./ ) 
 
   There are few other options - tlswrap changes every passive-capable ftp
  client into TLS-capable ftp client, there is this nice POSIX/Windoze
  lundfxp client etc..
  
   The way I see it, sftp is way less secure way of providing access to
 files
  then tls/ftp, you see, you need to create valid ssh-able accounts for all
  your users, then it'll take you some time to secure those accounts just a
  bit ( scp-only acount? - great, if you wanna play around and compile
  special shell... there is no scp-shell in woody, there is one in sid.
  Is it safe enough? Who knows ).
   With ftp users need no shell, need no nothing. I create unlimited number
  of users and worry not
  
  -- 
  Dariush Pietrzak,
  I ain't the sharpest tool in a shed.
  Key fingerprint = 40D0 9FFB 9939 7320 8294  05E0 BCC7 02C4 75CC 50D9
  
  
  -- 
  To UNSUBSCRIBE, email to [EMAIL PROTECTED]
  with a subject of unsubscribe. Trouble? Contact
 [EMAIL PROTECTED]
  
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact
 [EMAIL PROTECTED]
 
 





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



unsubscribe

2003-09-17 Thread Daniel Lampertseder


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


Re: Watch out! vsftpd anonymous access always enabled!

2003-09-21 Thread Daniel Jacobowitz
On Sat, Sep 20, 2003 at 12:47:21PM +0200, Robert van der Meulen wrote:
 Hi,
 
 I was working on a newly-installed machine for a customer who requires an
 ftp server. After installing vsftpd (which i *had* good experience with), I
 noticed that the 'anonymous_enable' switch in /etc/vsftpd.conf, when set to
 'NO' *does* allow anonymous access.
 Logging in using the 'anonymous' user does not work, logging in using the
 'ftp' user *does* work.
 The 'ftp' user is listed in /etc/passwd and /etc/shadow, and has a disabled
 password on all machines where I tried this and saw it working.
 I was only able to test this with 1.2.0-2 .
 
 If anyone here is running vsftpd on a non-anonymous box, I'd make sure to
 check this too. In the case of this customer (who has pretty sensitive data
 on his box), this could have been quite a disaster. 
 
 'funny':
 |Description: The Very Secure FTP Daemon
 | A lightweight, efficient FTP server written from the ground up with
 | security in mind.
 
 Ahem.

I'm working on it.

Something is wrong with the PAM config...

-- 
Daniel Jacobowitz
MontaVista Software Debian GNU/Linux Developer


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Watch out! vsftpd anonymous access always enabled!

2003-09-21 Thread Daniel Jacobowitz
On Sat, Sep 20, 2003 at 12:47:21PM +0200, Robert van der Meulen wrote:
 Hi,
 
 I was working on a newly-installed machine for a customer who requires an
 ftp server. After installing vsftpd (which i *had* good experience with), I
 noticed that the 'anonymous_enable' switch in /etc/vsftpd.conf, when set to
 'NO' *does* allow anonymous access.
 Logging in using the 'anonymous' user does not work, logging in using the
 'ftp' user *does* work.
 The 'ftp' user is listed in /etc/passwd and /etc/shadow, and has a disabled
 password on all machines where I tried this and saw it working.
 I was only able to test this with 1.2.0-2 .
 
 If anyone here is running vsftpd on a non-anonymous box, I'd make sure to
 check this too. In the case of this customer (who has pretty sensitive data
 on his box), this could have been quite a disaster. 
 
 'funny':
 |Description: The Very Secure FTP Daemon
 | A lightweight, efficient FTP server written from the ground up with
 | security in mind.
 
 Ahem.

1.2.0-3 is in incoming, or remove the pam_ftp line.

If you're running something in situations that could be quite a
disaster, I suggest you immediately rething using the version of
vsftpd from _unstable_.

-- 
Daniel Jacobowitz
MontaVista Software Debian GNU/Linux Developer


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Watch out! vsftpd anonymous access always enabled!

2003-09-21 Thread Daniel Jacobowitz
On Sun, Sep 21, 2003 at 10:40:40PM +0400, tokza wrote:
 
   I was working on a newly-installed machine for a customer who requires an
   ftp server. After installing vsftpd (which i *had* good experience with),
   I noticed that the 'anonymous_enable' switch in /etc/vsftpd.conf, when
   set to 'NO' *does* allow anonymous access.
   Logging in using the 'anonymous' user does not work, logging in using the
   'ftp' user *does* work.
   The 'ftp' user is listed in /etc/passwd and /etc/shadow, and has a
   disabled password on all machines where I tried this and saw it working.
   I was only able to test this with 1.2.0-2 .
 
 
 What are you talking about?
 This is my box running fbsd 4-stable, vsftpd-1.2.0, anonymous access disabled:
 (take no look at the banner string, this is just kidding :)
 
 22:36:32:toxa $ ftp toxa.lan
 Trying 192.168.2.1...
 Connected to toxa.lan.
 220  toxadomain Microsoft FTP Service (Version 5.0) 
 Name (toxa.lan:toxa): ftp
 530 Permission denied.
 ftp: Login failed.
 ftp quit
 221 Goodbye.
 22:36:39:toxa $
 
 I use vsftpd.user_list with users allowed to acces to my box, ofcourse there's 
 no 'ftp' user in it.

If that's built for FreeBSD then it probably doesn't use PAM.  This is
a bug in the Debian PAM configuration.

-- 
Daniel Jacobowitz
MontaVista Software Debian GNU/Linux Developer


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: How efficient is mounting /usr ro?

2003-10-18 Thread Daniel B.
Matt Zimmerman wrote:
 
 On Fri, Oct 17, 2003 at 06:26:01PM +0200, Bernd Eckenfels wrote:
 
  And to reply to myself:
 
  Information Security - As defined by ISO-17799, information security is
  characterized as the preservation of:
 
  * Confidentiality - ensuring that information is accessible only to
those authorized to have access.
  * Integrity - safeguarding the accuracy and completeness of information
and processing methods.
  * Availability - ensuring that authorized users have access to
information and associated assets when required.
 
 ISO, I'm afraid, does not document either English or Information Technology.
 They are free to define terms however they like 

Preventing crackers from breaking into your system and stealing data
preserves your information's confidentially.

Preventing crackers from corrupting your data preserves your 
information's integrity.

Preventing successful denial-of-service attackes preserves the availability
or your information.

So how are those definitions invalid?

Daniel
-- 
Daniel Barclay
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Web based password changer

2004-01-23 Thread Daniel Lysfjord
Quoting Tom White [EMAIL PROTECTED]:

 Dear List,
 
 I'm looking for a decent, secure, web based password changer for
 user accounts.  Something that I can install on a debian box with a
 minimum amount of tweaking, and that isn't really any less secure than
 a shell user changing their password locally over ssh.  Is there
 anything out there that someone has had good experiences with?  
 
 ~Tom White
 
 PS - how do you fit down the chimney?  and please don't leave coal in
 my stocking this year.
 

Horde(1) has a password module. Works on ldap and unix accounts.

1: www.horde.org


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Some clarifications about the Debian-security-HOWTO

2004-02-21 Thread Daniel Kobras
On Sat, Feb 21, 2004 at 09:09:24AM +0100, Adrian 'Dagurashibanipal' von Bidder wrote:
 ... and sometimes people forget to leave urgency at 'high' until the fix is 
 really in testing when they upload a new version.

Doesn't make a difference. The testing scripts take into account the
maximum urgency between the version in testing and the version in
unstable.

Daniel.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: libxml, libxml2; Debian Security Advisory DSA 455-1

2004-03-05 Thread Daniel Kobras
On Fri, Mar 05, 2004 at 11:20:09AM -0700, s. keeling wrote:
 Incoming from Martin Schulze:
  s. keeling wrote:
   Incoming from Martin Schulze:
Debian Security Advisory DSA 455-1 [EMAIL PROTECTED]

Package: libxml, libxml2

libxml2 is a library for manipulating XML files.
[snip]
For the stable distribution (woody) this problem has been fixed in
version 1.8.17-2woody1 of libxml and version 2.4.19-4woody1 of libxml2.
   .
   
   (0) root /root_ apt-get install libxml libxml2
   Reading Package Lists... Done
   Building Dependency Tree... Done
   E: Couldn't find package libxml
   (100) root /root_ dpkg -l | grep libxml
   [snip]
   ii  libxml11.8.17-2   GNOME XML library
   ii  libxml22.5.7-1woody1  GNOME XML library
   
   So, is that libxml above a typo?  Should I instead have done
   apt-get install libxml1 libxml2?  Suggestions?  I'm using:
   
   deb ftp://ftp.rfc822.org/debian-security/ stable/updates main contrib non-free
  
  Please see the output of apt-cache show {libxml,libxml1,libxml2}.
 
 That says libxml doesn't exist (W: Unable to locate package libxml),
 so am I to take that as a hint that I only need update libxml2, since
 the advisory doesn't mention libxml1?

libxml is the name of the source package that builds the binary package
libxml1 (among others). The names of all affected binary packages are
mentioned in the URLs at the end of the advisory. So the libxml1 package
on your system ought to be updated as well. Simply running apt-get
upgrade will likely do the right thing for you, by the way.

Regards,

Daniel.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: passwords changed?

2004-04-11 Thread Daniel Pittman
On Sun, 11 Apr 2004, Noah Meyerhans wrote:
 On Sun, Apr 11, 2004 at 11:15:10AM +0200, LeVA wrote:
 I always compile the latest stable 2.4 kernel with loadable modules 
 disabled, but I don't apply any kernel patches.
 Is this safe, or I must apply some security patch?
 
 None of the recent kernel-level vulnerabilities have required module
 support to be enabled. So no, it is not safe to run pre-2.4.25 kernels
 unless you manually apply backported fixes or use the kernels provided
 by the Debian security team.

It is probably also worth pointing out that disabling module loading
does *not* prevent people installing a kernel-mode patch (root kit) at
all.

It does make it slightly harder to achieve, but at least a few of the
root-kit systems out there are happy doing a binary patch direct to the
kernel, ignoring the module loader completely.


The only situation I can see where disabling module loading will
increase real security is where a device driver, or other code built as
a module, has a root exploit available, or enables access to an exploit.

A device driver with a flaw could do this, as could allowing someone to
load (say) the SCTP protocol, and bypass your firewall as a result.


Overall, though, disabling modules does not increase security more than
a trivial amount.


That said, I don't use modules or the module loader on most of my
servers - the added management complexity of building a custom kernel is
lower, in my experience, than the management complexity of dealing with
module loading issues, especially at boot time.

   Daniel

-- 
Confidence comes not from always being right but from not fearing to be wrong. 
-- Peter T. Mcintyre


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: users and security ibwebadmin

2004-06-01 Thread Daniel Pittman
On 2 Jun 2004, Remco Seesink wrote:
 I tried the question below first on debian-mentors but harvested silence.
 Hopefully it is more on topic here.

In part, that is probably because you asked a very hard question. :)

[...]

 I am packaging ibwebadmin, a web administration tool for firebird
 and interbase databases.

 I ran into a problem with users and groups and wonder how to resolve it.

 The program runs some tools from the firebird packages (eg gbak, isql etc.)
 These tools work locally on database files. All the database related files
 are owned by the firebird user and group.

 The firebird tools run as the www-data user as they are invoked from the
 apache process.

 Adding www-data to the firebird groups seems a security risk for the database
 when it would be hit by a worm. New databases would still be created as the
 www-data users instead of the firebird user.

Yes. This would also allow *any* user who had access to upload a CGI
script to your system to control your database server; not a desirable
state of affairs.

 Must I do something with suid? 

Not necessarily, but it is probably the easiest path to achieve the
result you want.

 Make the firebird tools suid firebird? 

No, not a great idea. This gives anyone who has shell access to your
system control over your database server; again, not really desirable.

 I am not experienced with ins and outs of suid but I understand they
 are often a source of security hazards.

Yes. If you suid an application to another user, and I run it, I
effectively just logged in as the other user to do that.

 How could I set it up secure so ibwebadmin is still able to process
 the database files?

This is the hard bit. To do this, I usually follow this process:

1. write out *exactly* what admin task I need to achieve
2. write out *exactly* what information I need to achieve it
3. work out what security risks exist when that information is hostile
4. write a tool that exposes the smallest interface possible, and that
   actively defends against hostile information
5. try and work out if I can avoid using a suid tool anyway. ;)

For example, for database creation I worked out that I needed:

1. the name of the database
2. the username for the 'admin' user of that specific database

I was then able to write a script that, given that information, verified
that it was all valid, then created the database as appropriate.


That said, the other option is to use the Apache `suexec' functionality
to run your CGI script as the firebird user. That is probably less work,
but is correspondingly less secure.

 If this questions are not basic and more appropriate for
 debian-security tell me and I'll take them there.

 I have been playing around with the firebird packages and have a
 version with some minor bugs fixes sitting on my harddrive. If it
 needs a firebird fix I could do that. (It's orphaned)

The trick is to think of how any action could be exploited by a hostile
user, rather than a friendly one.

For example, the firebird admin tool you were thinking of making suid -
does that allow running shell commands?  If so, making it suid is the
equivalent of granting all users shell access as the firebird user.

   Daniel
-- 
A drug is neither moral nor immoral--it's a chemical compound. The compound
itself is not a menace to society until a human being treats it as if
consumption bestowed a temporary license to act like an asshole.
-- Frank Zappa


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: samba log directory

2004-06-12 Thread Daniel Pittman
On 12 Jun 2004, Christian Christmann wrote:
 I just checked my /var/log/samba and found
 bunch of log files:

 log.shitbanda  log.familj   
 log.mario-t3psqfw32  log.talentoaa 
 log.syb07  log.50163099sp
 log.gustavo  log.momerdadd
 log.rampeiras

 When I understand samba correctly, it creates for each user who is
 trying to use my samba server a separate log file. But why do I have
 all these files from users I don't know?

As far as I know, Samba used the *machine* name, not the *user* name, by
default for those log files.

 Did these guys try to break into my linux box? 

Maybe, but I suspect not. More likely they were either (a) machine names
you really know, or (b) broadcasts from other people on your LAN.

 If so, how can I recognize if they were successfull?

Use tripwire, or the other tools like that which you installed and
configured before anyone could possibly compromise your machine, and for
which you kept secure off-line or read-only databases.

Otherwise, read the logs and hope that you can identify the issue.


Seriously, there really isn't any sure way of determining if someone
broke into your systems successfully other than identifying unusual
behaviour, or having an intrusion detection system in place before the
break-in.


Better to ask where the risks are, remove them, then rebuild the server
from scratch if you are not sure you are safe.

Regards,
Daniel
-- 
Regard all art critics as useless and dangerous.
-- Manifesto of the Futurists


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: rbl's status?

2004-06-13 Thread Daniel Pittman
On 14 Jun 2004, Noah Meyerhans wrote:
 On Sun, Jun 13, 2004 at 07:46:15PM +0300, Vassilii Khachaturov wrote:
 What are the recommended rbl's these days?

 Best thing is ask on NANAE or exim-users or whatever your favourite MTA is.
 Here's what I am using here RBL-wise:

 rbl_domains = bl.spamcop.net/reject : 
 relays.osirusoft.com/reject :spamhaus.relays.osirusoft.com/reject : 
 sbl.spamhaus.org/reject

 You do realize that the osirusoft blacklists are defunct and have been
 for several months, right?  Basing your decision of whether or not to
 accept mail from a given host based on an answer from a defunct
 blacklist is probably not a good idea.

This sort of thing is why I would rather use any RBL within
SpamAssassin, rather than at SMTP delivery time. Even if one of these
services goes completely belly up and blacklists the world, I don't
automatically lose mail from it.

Also, for Vassilii - you use the SpamCop blacklists. That is something
that I would be very nervous of. They have some pretty liberal policies
about what they accept, and their automatic tools are not that great at
filtering out innocent parties...

  Daniel

-- 
You come for me now with a cake that you've made
Ravaged avenger with a clip in your hair
Full of glass and bleach and my old razorblades
Oh, where do we go now but nowhere
-- Nick Cave, _Where Do We Go Now But Nowhere?_


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: rbl's status?

2004-06-14 Thread Daniel Pittman
On 14 Jun 2004, Bernd Eckenfels wrote:
 In article [EMAIL PROTECTED] you wrote:
 This sort of thing is why I would rather use any RBL within
 SpamAssassin, rather than at SMTP delivery time. Even if one of these
 services goes completely belly up and blacklists the world, I don't
 automatically lose mail from it.

 Please dont do this. 

Eh? You seem to have made an incorrect assumption about what I do to
the mail with SpamAssassin.

 You MUST reject mails (by spam scanners, malware scanners or
 blacklists) on the SMTP level, otherwise you become a pretty big
 annoyance to the internet (if you bounce) or will siletnly lose mails
 (if you drop them).

...or, options 3, I deliver them to the end user tagged as likely spam
when they look like spam. Then the end user can filter them out as they
please.

I certainly agree that bouncing SPAM messages, just like reporting
virus infections, is an anti-social behaviour.


If I chose to silently drop mail after accepting it, though, that is a
legitimate and reasonable disposition of the content, as far as I can
see.

Claims that this is anti-social seem spurious to me; can you expand on
your reasoning there?


Anyway, as I said, I don't take either of the options you suggests.
I use RBL tests at the SpamAssassin level because I *don't* trust them
to be one hundred percent accurate.

If I didn't care more about real mail getting through than the
occasional missed spam, then sure, using RBL blocking at the initial
SMTP stage would be ideal...

 Daniel

-- 
... Far down the vault a man was screaming. His fists were tightly clenched
and he was screaming out imprecations against the humming computers. There
was a hopeless rage in his eyes - rage and bitter, savage defiance.
-- Frank Bellknap, _It Was The Day Of The Robot_ (1963)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Hashcash - was re: Spam fights

2004-06-16 Thread Daniel Pittman
On 16 Jun 2004, Hubert Chan wrote:
 Russell == Russell Coker [EMAIL PROTECTED] writes:
 Russell On Fri, 11 Jun 2004 22:34, Patrick Maheral [EMAIL PROTECTED] wrote:

[...]

 SpamAssassin will check for hashcash in the future. Support is already
 present in the development version of SpamAssassin.

...makes you wonder how long it will take before someone does generate
the headers in SPAM, then.  Being in SpamAssassin seems to be a trigger
point for a whole lot of things to be worth avoiding/abusing for
spammers - the silly haiku header thing being one example. 


 Russell Besides, with an army of Windows Zombies you could generate
 Russell those signatures anyway...

 Although eating up gobs of CPU will probably be more easily noticed
 than just sending out lots of traffic.  Then again, some users are
 pretty clueless...

...and Windows does have a meaningful low priority for threads which
will result in this being pretty much unnoticed by most users, even the
observant ones.  Sure, you need more machines to get the same effect,
but it isn't like there is a shortage of them...


OTOH, HashCash sucks a lot less than the other solutions out there, so
I am all for it being more widely used; it would be interesting to see
if it actually managed to take off. :)

Daniel
-- 
Organization and method mean much, but contagious human characters mean more
in a university, where a few undisciplinables ... may be infinitely more
precious than a faculty full of orderly routinists.
-- William James


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: running services in their own little world

2004-07-23 Thread Daniel Pittman
On 24 Jul 2004, [EMAIL PROTECTED] wrote:
 Any package in Debian that will automatically run all /etc/init.d based
 deamons in jail / chroot?

No, because it is not possible to provide a generic solution to running
daemons under a chroot, for a variety of reasons.

Regards,
Daniel
-- 
Nature provides a free lunch, but only if we control our appetites.
-- William Ruckelshaus, _Business Week_, 18 June 1990


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: newbie iptables question

2004-08-14 Thread Daniel Pittman
On 14 Aug 2004, s. keeling wrote:
 Incoming from Bernd Eckenfels:
 In article [EMAIL PROTECTED] you wrote:
 Aug 12 04:36:53 towern kernel: |iptables -- IN=ppp0 OUT= MAC= 
 SRC=201.129.122.85 DST=12.65.24.43 LEN=48 TOS=0x00 PREC=0x00 TTL=115
 ID=40023 DF PROTO=TCP SPT=4346 DPT=445 WINDOW=16384 RES=0x00 SYN URGP=0 
 ...
 It all depends on whether you have services running on your machine
 that listen on DPT (445 in this case). If something is there to pick
 up the phone so to speak, anything can happen.  That service could
 answer on another port altogether.

 Well, you need to check if DST= is a local address, anyway.

 Are you suggesting that I might see stuff in my logs that was destined
 for a foreign IP?  

Not often, but occasionally, depending on how your ISP connects you to
the Internet.  It is most common on a LAN or a cable setup.

 If so, that would make me an open mail relay, no?

No. Being an open mail relay would make you an open mail relay. Your
firewall has pretty much nothing to do with that -- only the
configuration of your mail server really matters.

Have you considered using some sort of friendly setup, such as shorewall
or firehol, to deal with the technical details of firewalling for you?

I sounds like you are pretty unsure on your feet here, and those tools
take a lot of the uncertainty out of building a firewall...

Regards,
Daniel
-- 
We can keep from a child all knowledge of earlier myths, but
we cannot take from him the need for mythology.
-- Carl Jung


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: JavaScript and Cookies enabled in Browser

2004-08-20 Thread Daniel Pittman
On 20 Aug 2004, Don Froien, III wrote:
 I was recently in a meeting where members of the IT group propose to
 use a utility called WebEx to perform remote compiles. Webex offers
 SSL encrypted transfers and the ability to offer only selected members
 to the meeting (remote compile in this case) and offers the transfers
 over https (port 443).

Sounds like a cute idea, but I don't quite see how it manages remote
compiles.

 The issue I see with this approach is that WebEx uses a browser interface that
 requires the browser to have Java Script and Cookies enabled. I have always
 been under the impression that those two items were considerable security
 issues. 

I think you are significantly overestimating the security risks there.
With an up-to-date browser, even IE, they don't pose too much of a risk.

Certainly, cookies are almost no risk. The worst case is that they allow
remote information gathering, or allow someone to steal the cookie and
impersonate you.

In either case there are normally easier ways to take over a machine. :)

 Does anyone know of any URL's or downloadable papers that will
 strengthen my argument against this approach? I believe a VPN solution
 to be more appropriate, but am being told that the WebEx approach is
 more secure. 

This strikes me as a dubious claim. If, as they claim, they use the
browser SSL layer then they could be *as* secure as an IPSec or SSL VPN
system at best, and could be completely insecure.

 If anyone knows a reason that this approach is secure, please advise
 also. 

If this really matters to you, do a real risk analysis of the situation:

Draw up a list of the things you need to protect or prevent.
Draw up a list of ways that people could attack those things.
Draw up a list of ways to ensure those attacks do not succeed.

Then, compare the final list to the various solutions on offer - VPN,
WebEx, etc, and see which one achieves the best practical security.


For what it is worth, though, I wouldn't trust the WebEx system to be
more secure than a VPN in combination with a Firewall, simply because it
trusts weak components (end user systems) for security, and because I
can see no external review of the quality of their implementation.

If you really want them to look bad, grab papers where people have done
a security review of various VPN systems and ask for the same for the
WebEx system...

 Daniel
-- 
Laughter is our safety valve.  It helps us get through Sarajevo and the stupid
things politicians do.
-- Jerry Lewis


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: MD5 collisions found - alternative?

2004-08-24 Thread Daniel Pittman
On 24 Aug 2004, Robert Trebula wrote:
 Maybe you have already noticed - collisions have been found in MD5 
 hashing algorithm:

 http://eprint.iacr.org/2004/199.pdf
 http://www.freedom-to-tinker.com/archives/000664.html
 http://www.unixwiz.net/techtips/iguide-crypto-hashes.html

 My question is: Is there an easy way to make my debian sid installation
 use something else (better) than md5 for various things? Namely SHA-1 
 with some longer output in PAM.

The SHA family have also been found to be weaker than expected also, so
it looks like both common crypto hash sets are on somewhat shaky ground
at the moment.

The best current answer is probably to wait a month or two as the dust
settles and the crypto community, especially through the IETF, move
forward with recommendations about where we go from here.

Jumping half-prepared to some other hash opens the door to a second
costly migration if your hash of choice turns out to be the wrong one. ;)


Also, while there are issues with those hash algorithms, I don't think
they are quite bad enough that there is a significant *immediate* risk
to my systems; the cost of breaking in through the detected collisions
is lower than the risk of a bad password, etc.

   Daniel

-- 
In protocol design, perfection has been reached not when there is nothing left
to add, but when there is nothing left to take away.
-- RFC 1925


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: MD5 collisions found - alternative?

2004-08-24 Thread Daniel Pittman
On 24 Aug 2004, Sam Vilain wrote:
 Robert Trebula wrote:

 Maybe you have already noticed - collisions have been found in MD5
 hashing algorithm:

[...]

 I think cryptanalysts have 'cracked' pretty much all of them, though
 with practically prohibitive costs of cracking them (eg, 2^50 for
 SHA-0).

[...]

 My personal thought is that you could make the hash more secure simply
 by running md5 and SHA1 (maybe pepper on another one for good luck) 
 across a single stream at the same time, and simply xor the resultant 
 hashes together.  You could pretty much add up the cost of the attacks 
 against the keys.

Be aware that this sort of technique multi-encryption technique can
lead to significant exposures when applied to traditional crypto; it can
produce results that allow a vastly simpler attack on the protected
information.

I would not put my name to a recommendation about how to make a
cryptographic product or protocol more secure unless I had sufficient
background in the area to know the full implications of my recommended
actions.

Regards,
Daniel
-- 
If a joke is worth telling, it's worth telling once.
-- Ollie MacNoonan


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: MD5 collisions found - alternative?

2004-08-24 Thread Daniel Pittman
On 25 Aug 2004, Matthew Palmer wrote:
 On Tue, Aug 24, 2004 at 12:20:24PM -0400, Phillip Hofmeister wrote:
 On Tue, 24 Aug 2004 at 10:50:38AM -0400, Daniel Pittman wrote:
 Be aware that this sort of technique multi-encryption technique can
 lead to significant exposures when applied to traditional crypto; it can
 produce results that allow a vastly simpler attack on the protected
 information.

 I would not put my name to a recommendation about how to make a
 cryptographic product or protocol more secure unless I had sufficient
 background in the area to know the full implications of my recommended
 actions.

 If I understand your postulate correctly:

 If I, the user, encrypt a message with algorithm X and the cipher text
 is intercepted by the attacker.  The attacker can make his chances of
 brute forcing the text BETTER by encrypting my cipher text with algorithm
 Y.  This simply does not hold up.

 For random values of X and Y, you are correct, there is no reason to assume
 that you will get an easier time of it.  However, there are plenty of
 examples where (for instance) applying the same algorithm N times
 does not produce N times the security, or even the same level of security. 
 The same adverse interaction occurs when you mix different algorithms.

[...]

 It's those sorts of tricky interactions (which aren't immediately obvious)
 which I'm sure led Daniel to warn of the dangers of simplistic security
 upgrades.

Matt is entirely correct in his statements - this is *precisely* the
issue that I am concerned with.

I cannot say that SHA1(f) xor MD5(f) is weaker or stronger than either
of those two on their own, because I don't know cryptographic algorithm
design well enough.

It is very hard to design a good cryptographic algorithm, though, and
even harder to build a useful cryptographic system around a good
algorithm.

To quote from memory, unless you happen to be Bruce Schneier you
probably can't design a secure cryptographic system on the back of a
napkin, and you are almost certainly better off not trying. :)

Regards,
Daniel
-- 
Crying loud, you're crawling on the floor
Just a beautiful baby, You're nothing more
-- Switchblade Symphony, _Clown_


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Spyware / Adware

2004-08-31 Thread Daniel Pittman
On 1 Sep 2004, Jim Richardson wrote:
 On Tue, 31 Aug 2004 16:50:09 +0200,
 Adrian 'Dagurashibanipal' von Bidder [EMAIL PROTECTED] wrote:
 On Tuesday 31 August 2004 13.30, Volker Tanger wrote:

 [spyware/adware/trojans/...:]

 Yes and no. When surfing as normal user *ware programs cannot install
 themselves as system services or overwrite programs simply as you/they
 do not have the (file) permissions to do so.

 Technically, for most purposes, malware installing itself into an
 unprivileged user account and automatically starting itself through
 /.bashrc or whatever is entirely possible, especially since most
 malware these days seems to be used only as a base for DDOS attacks
 (including sending spam), so no special privileges are necessary
 here. (And KDE and Gnome are currently catching up nicely in the
 number of little useful (?) daemons that are started on a desktop
 machine.)

 There is no click the attachement and install the malware without your
 knowing it, in Linux.

Nonsense.  The 'Gnus' mailer was modified a while back so that it would
not automatically execute a MIME part containing elisp code; that is
*precisely* the sort of issue you claimed was impossible.

*Most* mail clients under Unix are better written than to do that, but
between remotely exploitable issues with image rendering and the push
toward user friendly defaults there is no reason why this could not
happen.

Regards,
Daniel
-- 
Anyone who stops learning is old, whether at twenty or eighty. Anyone who keeps
learning stays young. The greatest thing in life is to keep your mind young.
-- Henry Ford


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Spyware / Adware

2004-08-31 Thread Daniel Pittman
On 1 Sep 2004, s. keeling wrote:
 Incoming from Daniel Pittman:

 *Most* mail clients under Unix are better written than to do that, but

 Even mutt (a terrific MUA) _can be told_ to automatically handle
 MIME types for you, if you want.  It just depends what's in your
 /.mailcap, and that can contain any sort of command you can imagine.

*nod*  Very true. Certain other mail viewing tools, including metamail,
will just invoke whatever command happens to be in mailcap for a MIME
type.

 If you want it to mangle your user data when it runs across a
 malicious png, it can do that.  That doesn't mean it has to.  It only
 means you have that option.  There's nothing inherently wrong with an
 MUA being able to do this.

I don't mean to suggest there is.  I also don't agree with the OP who
claimed that Linux was immune to this sort of error;  automatic code
execution can cause Linux as much pain as Windows, but usually doesn't
due to better security practices.

Daniel
-- 
We should forget about small efficiencies, say about 97% of the time:
premature optimization is the root of all evil.
-- Donald E. Knuth, _Structured Programming with go to Statements_
   (Computing Surveys, Vol. 6, No. 4, December 1974)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



  1   2   3   4   5   >