Agreed. I don't even label as idiots the idiots who post here, asking us
to tell them how to do the job they were hired for, without any indication
that they've read man pages, or googled for an answer.
Last time I checked you *were* in this list therefore you are calling yourself
an idiot.
On 12/31/2011 11:45 PM, Timothy Murphy wrote:
Les Mikesell wrote:
Yes, I'm more worried about attacks through port 80.
Can anyone point me to documentation on protecting a web-server?
You should check http://www.snort.org, IDS system. ClearOS has them
integrated.
I can not remember if can
On 01/01/2012 09:14 PM, Ljubomir Ljubojevic wrote:
On 12/31/2011 11:45 PM, Timothy Murphy wrote:
Les Mikesell wrote:
Yes, I'm more worried about attacks through port 80.
Can anyone point me to documentation on protecting a web-server?
You should check http://www.snort.org, IDS system.
On 12/30/2011 09:02 PM, Alex Milojkovic wrote:
Scenario of botnet with 1000 PCs making attempts to crack are password ain't
gonna happen.
On one system that I run, for a fairly popular domain, I see botnet
attacks trying to break in to the pop and ftp ports as well as botnet
spam and SASL
Does ipset work with the existing kernel under CentOS 5 and if so is there an
RPM available?
I've goggled around a bit, but haven't found anything. From
http://ipset.netfilter.org/ I'm led
to believe that the current kernel should support it.
Well, you have modules on your system, and if
to other NICs and look for this info
-Alex
-Original Message-
From: centos-boun...@centos.org [mailto:centos-boun...@centos.org] On Behalf
Of Nataraj
Sent: Sunday, January 01, 2012 3:26 PM
To: centos@centos.org
Subject: Re: [CentOS] what percent of time are there unpatched exploits
It's been an interesting if somewhat heated discussion. Figures the
fun ones come up when I'm away. ;)
The discussion of using Certs(PKI) vs Passwords to secure SSH seem to
be missing an important piece of the puzzle, and that to my mind is
attack vectors target value.
The argument I saw
Drew wrote:
In my case, the primary attack vector for hackers getting at my
servers is via the web. Because I host primarily personal websites on
my servers, the hackers motivation for breaking into my server (aside
from 'it's there') is to turn the machine into a bot-net or host some
viagra
On 12/30/2011 11:02 PM, Alex Milojkovic wrote:
I think the best password policy is the one you've never told anyone and
never posted on a public mailing list.
How many of you out there know of cases where administrators' passwords were
compromised by brute force?
Can we take a count of
On Sat, Dec 31, 2011 at 05:43:54AM -0800, Drew wrote:
The argument I saw against PKI is that's it's no more secure then
regular passwords because your certificates are password protected
anyways and stored on external media so they can be stolen and used to
access the system.
Typical security
I'm in much the same situation,
and would like to protect myself to a minimal extent.
But I don't understand how a usb token (below) would help.
The 'token' in this case (a standard usb thumbdrive) is merely a
portable container for my ssh certificates and a copy of putty (when
I'm on a
Hello Johnny,
On Sat, 2011-12-31 at 08:13 -0600, Johnny Hughes wrote:
Here are a couple of articles for you to read:
http://www.gtri.gatech.edu/casestudy/Teraflop-Troubles-Power-Graphics-Processing-Units-GPUs-Password-Security-System
On 12/31/2011 03:13 PM, Johnny Hughes wrote:
On 12/30/2011 11:02 PM, Alex Milojkovic wrote:
I think the best password policy is the one you've never told anyone and
never posted on a public mailing list.
How many of you out there know of cases where administrators' passwords were
On Sat, Dec 31, 2011 at 8:13 AM, Johnny Hughes joh...@centos.org wrote:
Scenario of botnet with 1000 PCs making attempts to crack are password ain't
gonna happen.
You don't need a botnet of 1000 PCs ... you only need a couple of
graphics cards.
If you have a stolen passphrase-protected
-boun...@centos.org] On Behalf Of
Johnny Hughes
Sent: Saturday, December 31, 2011 6:14 AM
To: centos@centos.org
Subject: Re: [CentOS] what percent of time are there unpatched exploits against
default config?
On 12/30/2011 11:02 PM, Alex Milojkovic wrote:
I think the best password policy is the one
] On Behalf
Of Stephen Harris
Sent: Saturday, December 31, 2011 6:41 AM
To: CentOS mailing list
Subject: Re: [CentOS] what percent of time are there unpatched exploits
against default config?
On Sat, Dec 31, 2011 at 05:43:54AM -0800, Drew wrote:
The argument I saw against PKI is that's it's no more
On Sat, Dec 31, 2011 at 1:50 PM, Alex Milojkovic
cen...@businessforce.ca wrote:
Ok let me rephrase myself.
How many people have had their passwords cracked on Internet servers by means
available to them?
In other words gained root access by way of a TCP service.
Someone cracked my gmail
IP address allocation needs to be done smarter so that geographical regions
can be isolated easier. And at some point it probably will be.
There already is that capability to some extent. Between geoip and the
RIR's, one can get a pretty good handle on which /8 or /16 blocks need
to be blocked
IP address allocation needs to be done smarter so that geographical
regions can be isolated easier. And at some point it probably will
be.
There already is that capability to some extent. Between geoip and
the RIR's, one can get a pretty good handle on which /8 or /16 blocks
need to be
On Sat, 2011-12-31 at 15:17 -0700, Ken godee wrote:
IP address allocation needs to be done smarter so that geographical
regions can be isolated easier. And at some point it probably will
be.
There already is that capability to some extent. Between geoip and
the RIR's, one can get a
On 12/31/11 2:17 PM, Ken godee wrote:
We've been thinking of using the MaxMind GeoIP Country database with
Apache mod_geoip API to limit certain countries visiting our websites.
Has anyone used this or have any input on it's usefulness?
the virus/worm folks will just move to open relays that
On 12/31/11 2:17 PM, Ken godee wrote:
We've been thinking of using the MaxMind GeoIP Country database with
Apache mod_geoip API to limit certain countries visiting our websites.
Has anyone used this or have any input on it's usefulness?
the virus/worm folks will just move to open relays
Les Mikesell wrote:
Someone cracked my gmail password and sent what seemed like an oddly
small amount of spam from it.
gmail and hotmail must be very easy to crack,
or is there some check apart from the password?
That doesn't work for web services open to the public. You need
firewalls
On Sun, Jan 1, 2012 at 11:45 AM, Timothy Murphy gayle...@alice.it wrote:
Les Mikesell wrote:
Someone cracked my gmail password and sent what seemed like an oddly
small amount of spam from it.
gmail and hotmail must be very easy to crack,
or is there some check apart from the password?
are there unpatched exploits
against default config?
IP address allocation needs to be done smarter so that geographical
regions can be isolated easier. And at some point it probably will be.
There already is that capability to some extent. Between geoip and the
RIR's, one can get a pretty good
On 12/31/11 5:06 PM, Alex Milojkovic wrote:
I think some of these changes are coming.
careful what you wish for, it may come true...
...those changes ARE coming, but they are coming at the request of the
movie and music industries who are trying to legislate the ability to
demand domain
There is a concept called dynamic firewall i am working on that should
eliminate any brute force attempts. If you think about it, if you know someone
is trying to break in there is no need to give them access to the server any
more. So after a hundred wrong passwords you cut them off.
Reindl
On 12/30/2011 03:55 AM, Alex Milojkovic wrote:
There is a concept called dynamic firewall i am working on that should
eliminate any brute force attempts. If you think about it, if you know
someone is trying to break in there is no need to give them access to the
server any more. So after a
On 12/30/2011 02:33 AM, Ljubomir Ljubojevic wrote:
I like to use serial numbers from MB, HDD, etc., as passwords. I never
use normal words for my passwords, and few other users (with ssh/cli
access) are carefully checked for their passwords.
If this formula is true (1/2 . 2 ^ 54 . 1s / 10)
On Wednesday, December 28, 2011 10:38:30 PM Craig White wrote:
the top priority was to get the machine back online?
Seems to me that you threw away the only opportunity to find out what
you did wrong and to correct that so it doesn't happen again. You are
left to endlessly suffer the endless
On 12/30/2011 09:15 AM, Lamar Owen wrote:
On Wednesday, December 28, 2011 10:38:30 PM Craig White wrote:
the top priority was to get the machine back online?
Seems to me that you threw away the only opportunity to find out what
you did wrong and to correct that so it doesn't happen again. You
On Tuesday, December 27, 2011 10:13:12 PM Bennett Haselton wrote:
Roughly what percent of the time is there such an unpatched exploit in the
wild, so that the machine can be hacked by someone keeping up with the
exploits?
While I did reply elsewhere in the thread, I want to address this
On Thursday, December 29, 2011 12:33:41 PM Ljubomir Ljubojevic wrote:
If you use denyhosts or fail2ban, attacker needs 10,000 attack PC's that
never attacked any denyhosts or fail2ban server in recent time.
That would be a very small botnet.
And with gamers out there with CUDA-capable GPU's
On Friday, December 30, 2011 10:24:15 AM Johnny Hughes wrote:
Agree with this. At the very least, some kind of image (dd) of the
original disk for further study even if you have to get the machine back
on line and you don't have a failover machine.
Speaking of dd, ddrescue in my experience is
Lamar Owen wrote:
On Thursday, December 29, 2011 12:33:41 PM Ljubomir Ljubojevic wrote:
If you use denyhosts or fail2ban, attacker needs 10,000 attack PC's that
never attacked any denyhosts or fail2ban server in recent time.
That would be a very small botnet.
And with gamers out there with
On Friday 30 December 2011 19:40:55 夜神 岩男 wrote:
[snip]
We can start a 10,000 computer botnet (or, more realistically, a 10m
computer botnet these days, and this is a technique used right now)
working on the problem of assembling a new index table that orders and
assigns every possible valid
On Dec 30, 2011, at 8:24 AM, Lamar Owen wrote:
On Tuesday, December 27, 2011 10:13:12 PM Bennett Haselton wrote:
Roughly what percent of the time is there such an unpatched exploit in the
wild, so that the machine can be hacked by someone keeping up with the
exploits?
While I did reply
On Friday, December 30, 2011 11:19:46 AM Marko Vojinovic wrote:
You are basically saying that, given enough resources, you can precalculate
all hashes for all possible passwords in advance.
Can the same be said for keys? Given enough resources, you could precalculate
all possible
On 12/31/2011 01:19 AM, Marko Vojinovic wrote:
On Friday 30 December 2011 19:40:55 夜神 岩男 wrote:
[snip]
We can start a 10,000 computer botnet (or, more realistically, a 10m
computer botnet these days, and this is a technique used right now)
working on the problem of assembling a new index
Reinl,
On Thu, 2011-12-29 at 15:28 +0100, Reindl Harald wrote:
why do you not tell this the idiot who is argumentating against kyes
and thinks using password-login is smart?
I don't like your tone. I'm not sure if it's me or Bennett you are
calling an idiot or both, but in any case you should
Leonard den Ottolander wrote:
Reinl,
On Thu, 2011-12-29 at 15:28 +0100, Reindl Harald wrote:
why do you not tell this the idiot who is argumentating against kyes
and thinks using password-login is smart?
I don't like your tone. I'm not sure if it's me or Bennett you are
calling an idiot or
On 12/30/2011 05:47 PM, Craig White wrote:
to reiterate my thoughts... I still don't understand the logic of the list
indulging the OP's rampant speculation of various causes when his first
action was to eliminate all possibility to find out what actually happened.
An apt analogy is to
] On Behalf Of
?? ??
Sent: Friday, December 30, 2011 9:07 AM
To: centos@centos.org
Subject: Re: [CentOS] what percent of time are there unpatched exploits against
default config?
On 12/31/2011 01:19 AM, Marko Vojinovic wrote:
On Friday 30 December 2011 19:40:55 夜神 岩男 wrote:
[snip]
We can start
On 12/30/11 9:02 PM, Alex Milojkovic wrote:
I believe in passwords. I don't believe in PKI.
It's a lot more likely that I will forget my laptop somewhere, or that
someone will steal my usb key than that someone will guess my password and
have opportunities to try it.
you're supposed to
On Wed, Dec 28, 2011 at 6:10 AM, Johnny Hughes joh...@centos.org wrote:
On 12/27/2011 10:42 PM, Bennett Haselton wrote:
Everything installed on the machine had been installed with yum. So I
assumed that meant that it would also be updated by yum if an update
was
available from the
å¤ç¥ãå²©ç· wrote:
On 12/30/2011 12:00 AM, m.r...@5-cent.us wrote:
å¤Å神ãâ¬â¬Ã¥Â²Â©Ã§â· wrote:
On 12/29/2011 10:21 PM, Marko Vojinovic wrote:
On Thursday 29 December 2011 13:07:56 Reindl Harald wrote:
Am 29.12.2011 12:56, schrieb Leonard den Ottolander:
On Thu, 2011-12-29 at
Hi Marko,
Using the ssh key can be problematic because it is too long and too random to
be memorized --- you have to carry it on a usb stick (or whereever). This
provides an additional point of failure should your stick get lost or stolen.
this is only correct when you use SSH keys without
Reindl Harald wrote:
Am 29.12.2011 14:21, schrieb Marko Vojinovic:
so explain me why discuss to use or not to use the best
currently availbale method in context of security?
Using the ssh key can be problematic because it is too long and too
random to be memorized --- you have to carry it on
On 29/12/11 03:38, Craig White wrote:
On Wed, 2011-12-28 at 00:40 -0700, Bennett Haselton wrote:
On Tue, Dec 27, 2011 at 10:17 PM, Rilindo Fosterrili...@me.com wrote:
What was the nature of the break-in, if I may ask?
I don't know how they did it, only that the hosting company had to take
On 12/30/2011 12:41 AM, Marc Deop wrote:
On Thursday 29 December 2011 14:59:14 Reindl Harald wrote:
the hughe difference is: while having the same password (for the key)
it can not be used directly for brute-force und you need the password
and at least one time access to the key file
Explain
On 12/30/2011 01:33 AM, m.r...@5-cent.us wrote:
Marko Vojinovic wrote:
On Thursday 29 December 2011 14:59:14 Reindl Harald wrote:
Am 29.12.2011 14:21, schrieb Marko Vojinovic:
so explain me why discuss to use or not to use the best
currently availbale method in context of security?
Using
On 12/29/2011 05:17 PM, Bennett Haselton wrote:
On Wed, Dec 28, 2011 at 6:10 AM, Johnny Hughesjoh...@centos.org wrote:
On 12/27/2011 10:42 PM, Bennett Haselton wrote:
2. Why have password logins at all? Using a secure ssh key only for
logins makes the most sense.
Well that's something
On Thursday 29 December 2011 14:59:14 Reindl Harald wrote:
Am 29.12.2011 14:21, schrieb Marko Vojinovic:
so explain me why discuss to use or not to use the best
currently availbale method in context of security?
Using the ssh key can be problematic because it is too long and too
random
On 12/29/2011 08:06 AM, Reindl Harald wrote:
Am 29.12.2011 14:59, schrieb Johnny Hughes:
That flaw as absolutely no access component. It allows a DDOS attack,
not provide remote access to a machine.
From the bug:
A flaw was found in the way the Apache HTTP Server handled Range HTTP
On 12/29/2011 03:53 PM, 夜神 岩男 wrote:
On 12/29/2011 10:21 PM, Marko Vojinovic wrote:
On Thursday 29 December 2011 13:07:56 Reindl Harald wrote:
Am 29.12.2011 12:56, schrieb Leonard den Ottolander:
Hello Reindl,
On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote:
Am 29.12.2011 09:17,
On 12/28/2011 08:57 PM, Craig White wrote:
On Wed, 2011-12-28 at 07:43 -0600, Johnny Hughes wrote:
There have been NO critical kernel updates. A critical update is one
where someone can remotely execute items at the root users.
Almost all critical updates are Firefox, Thunderbird, telnetd
Ljubomir Ljubojevic wrote:
snip
I like to use serial numbers from MB, HDD, etc., as passwords. I never
The one problem with this is that *if* the attacker has the slightest idea
of the hardware, their task is vastly smaller. I trust, for example, that
you don't use Dell's s/n/express code;
Am 29.12.2011 09:17, schrieb Bennett Haselton:
2. Why have password logins at all? Using a secure ssh key only for
logins makes the most sense.
Well that's something that I'm curious about the reasoning behind -- if
you're already using a completely random 12-character password, why would
On 12/29/2011 07:21 AM, Marko Vojinovic wrote:
On Thursday 29 December 2011 13:07:56 Reindl Harald wrote:
Am 29.12.2011 12:56, schrieb Leonard den Ottolander:
Hello Reindl,
On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote:
Am 29.12.2011 09:17, schrieb Bennett Haselton:
Even though the
Hello Reindl,
On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote:
Am 29.12.2011 09:17, schrieb Bennett Haselton:
Even though the ssh key is more
random, they're both sufficiently random that it would take at least
hundreds of years to get in by trial and error.
if you really think
Am 29.12.2011 14:21, schrieb Marko Vojinovic:
so explain me why discuss to use or not to use the best
currently availbale method in context of security?
Using the ssh key can be problematic because it is too long and too random to
be memorized --- you have to carry it on a usb stick (or
Am 29.12.2011 14:59, schrieb Johnny Hughes:
That flaw as absolutely no access component. It allows a DDOS attack,
not provide remote access to a machine.
From the bug:
A flaw was found in the way the Apache HTTP Server handled Range HTTP
headers. A remote attacker could use this flaw
å¤ç¥ãå²©ç· wrote:
On 12/29/2011 10:21 PM, Marko Vojinovic wrote:
On Thursday 29 December 2011 13:07:56 Reindl Harald wrote:
Am 29.12.2011 12:56, schrieb Leonard den Ottolander:
On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote:
Am 29.12.2011 09:17, schrieb Bennett Haselton:
Even
On 12/29/2011 06:45 PM, m.r...@5-cent.us wrote:
Ljubomir Ljubojevic wrote:
snip
I like to use serial numbers from MB, HDD, etc., as passwords. I never
The one problem with this is that *if* the attacker has the slightest idea
of the hardware, their task is vastly smaller. I trust, for
On Thursday 29 December 2011 13:07:56 Reindl Harald wrote:
Am 29.12.2011 12:56, schrieb Leonard den Ottolander:
Hello Reindl,
On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote:
Am 29.12.2011 09:17, schrieb Bennett Haselton:
Even though the ssh key is more
random, they're both
Am 29.12.2011 15:24, schrieb m.r...@5-cent.us:
Reindl Harald wrote:
Am 29.12.2011 14:21, schrieb Marko Vojinovic:
so explain me why discuss to use or not to use the best
currently availbale method in context of security?
Using the ssh key can be problematic because it is too long and too
On 12/30/2011 12:00 AM, m.r...@5-cent.us wrote:
夜神 岩男 wrote:
On 12/29/2011 10:21 PM, Marko Vojinovic wrote:
On Thursday 29 December 2011 13:07:56 Reindl Harald wrote:
Am 29.12.2011 12:56, schrieb Leonard den Ottolander:
On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote:
Am
Am 29.12.2011 12:56, schrieb Leonard den Ottolander:
Hello Reindl,
On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote:
Am 29.12.2011 09:17, schrieb Bennett Haselton:
Even though the ssh key is more
random, they're both sufficiently random that it would take at least
hundreds of years
On 12/29/2011 10:21 PM, Marko Vojinovic wrote:
On Thursday 29 December 2011 13:07:56 Reindl Harald wrote:
Am 29.12.2011 12:56, schrieb Leonard den Ottolander:
Hello Reindl,
On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote:
Am 29.12.2011 09:17, schrieb Bennett Haselton:
Even though the
Marko Vojinovic wrote:
On Thursday 29 December 2011 14:59:14 Reindl Harald wrote:
Am 29.12.2011 14:21, schrieb Marko Vojinovic:
so explain me why discuss to use or not to use the best
currently availbale method in context of security?
Using the ssh key can be problematic because it is
On Thursday 29 December 2011 14:59:14 Reindl Harald wrote:
the hughe difference is: while having the same password (for the key)
it can not be used directly for brute-force und you need the password
and at least one time access to the key file
Explain me how having a key protected by a
On Fri, Dec 30, 2011 at 4:00 AM, m.r...@5-cent.us wrote:
夜神 岩男 wrote:
On 12/29/2011 10:21 PM, Marko Vojinovic wrote:
On Thursday 29 December 2011 13:07:56 Reindl Harald wrote:
Am 29.12.2011 12:56, schrieb Leonard den Ottolander:
On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald
On 12/28/2011 02:01 PM, Bennett Haselton wrote:
Yeah I know that most break-ins do happen using third-party web apps;
fortunately the servers I'm running don't have or need any of those.
But then what about what my friend said:
For example, there was a while back ( ~march ) a kernel exploit
On 12/28/2011 04:40 PM, Bennett Haselton wrote:
On Tue, Dec 27, 2011 at 10:17 PM, Rilindo Fosterrili...@me.com wrote:
On Dec 27, 2011, at 11:29 PM, Bennett Haseltonbenn...@peacefire.org
What was the nature of the break-in, if I may ask?
I don't know how they did it, only that the hosting
On 12/27/2011 10:42 PM, Bennett Haselton wrote:
Everything installed on the machine had been installed with yum. So I
assumed that meant that it would also be updated by yum if an update was
available from the distro.
1. Are you running PHP apps on the web server? Perl apps? Bad code in
On 12/28/2011 01:44 AM, Bennett Haselton wrote:
On Tue, Dec 27, 2011 at 10:08 PM, Ken godee k...@perfect-image.com wrote:
password? That's what I'm talking about -- how often does this sort of
thing happen, where you need to be subscribed to be a security mailing
list
in order to know what
On 12/28/2011 07:55 AM, Johnny Hughes wrote:
On 12/28/2011 01:40 AM, Bennett Haselton wrote:
On Tue, Dec 27, 2011 at 10:17 PM, Rilindo Foster rili...@me.com wrote:
On Dec 27, 2011, at 11:29 PM, Bennett Haselton benn...@peacefire.org
wrote:
On Tue, Dec 27, 2011 at 8:33 PM, Gilbert
http://www.awe.com/mark/blog/20110727.html
--
Eero
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
Johnny Hughes wrote:
System Administration is a time consuming and complicated thing. That
is why there are System Administrators. That is why there are
certifications like RHCT, RHCE, CISSP. There are a whole slew of things
that people who want to run secure server need to know, and
On Wed, 2011-12-28 at 13:47 +0900, 夜神 岩男 wrote:
With the vast majority of web applications being developed on frameworks
like Drupal, Django and Plone, the overwhelming majority of server
hacks with regard to the web have to do with attacking these structures
(at least initially), not the
On Wed, Dec 28, 2011 at 5:01 PM, Timothy Murphy gayle...@alice.it wrote:
Running your own server is not like using a toaster. It requires
someone with a detailed level of knowledge to install and maintain it.
What about home servers?
Are they exposed to inbound internet traffic? If so,
On Wed, 2011-12-28 at 07:43 -0600, Johnny Hughes wrote:
There have been NO critical kernel updates. A critical update is one
where someone can remotely execute items at the root users.
Almost all critical updates are Firefox, Thunderbird, telnetd (does
anyone still allow telnet?), or samba
On Wed, 2011-12-28 at 00:40 -0700, Bennett Haselton wrote:
On Tue, Dec 27, 2011 at 10:17 PM, Rilindo Foster rili...@me.com wrote:
What was the nature of the break-in, if I may ask?
I don't know how they did it, only that the hosting company had to take the
server offline because they
Suppose I have a CentOS 5.7 machine running the default Apache with no
extra modules enabled, and with the yum-updatesd service running to pull
down and install updates as soon as they become available from the
repository. (Assume further the password is strong, etc.) On the other
hand, suppose
On 12/28/2011 03:13 AM, Bennett Haselton wrote:
Roughly what percent of the time is there such an unpatched exploit in the
wild, so that the machine can be hacked by someone keeping up with the
exploits? 5%? 50%? 95%?
there is no way to tell, and there is no metric to work against unless
On Tue, 27 Dec 2011, Bennett Haselton wrote:
Suppose I have a CentOS 5.7 machine running the default Apache with no
extra modules enabled, and with the yum-updatesd service running to pull
down and install updates as soon as they become available from the
repository.
So the machine can
On Tue, Dec 27, 2011 at 8:33 PM, Gilbert Sebenste
seben...@weather.admin.niu.edu wrote:
On Tue, 27 Dec 2011, Bennett Haselton wrote:
Suppose I have a CentOS 5.7 machine running the default Apache with no
extra modules enabled, and with the yum-updatesd service running to
pull
down and
On 12/28/2011 04:29 AM, Bennett Haselton wrote:
I was asking because I had a server that did get broken into, despite
having yum-updatesd running and a strong password. He said that even if
the software component compromised was a part of the updates being
dished out from the distro ( and
Everything installed on the machine had been installed with yum. So I
assumed that meant that it would also be updated by yum if an update was
available from the distro.
On Tue, Dec 27, 2011 at 9:38 PM, Karanbir Singh mail-li...@karan.orgwrote:
On 12/28/2011 04:29 AM, Bennett Haselton wrote:
On 12/28/2011 01:29 PM, Bennett Haselton wrote:
On Tue, Dec 27, 2011 at 8:33 PM, Gilbert Sebenste
seben...@weather.admin.niu.edu wrote:
On Tue, 27 Dec 2011, Bennett Haselton wrote:
Suppose I have a CentOS 5.7 machine running the default Apache with no
extra modules enabled, and with the
Yeah I know that most break-ins do happen using third-party web apps;
fortunately the servers I'm running don't have or need any of those.
But then what about what my friend said:
For example, there was a while back ( ~march ) a kernel exploit that
affected CentOS / RHEL. The patch came after 1-2
password? That's what I'm talking about -- how often does this sort of
thing happen, where you need to be subscribed to be a security mailing list
in order to know what workaround to make to stay safe, as opposed to simply
running yum-updatesd to install latest patches automatically.
Happens
On Dec 27, 2011, at 11:29 PM, Bennett Haselton benn...@peacefire.org wrote:
On Tue, Dec 27, 2011 at 8:33 PM, Gilbert Sebenste
seben...@weather.admin.niu.edu wrote:
On Tue, 27 Dec 2011, Bennett Haselton wrote:
Suppose I have a CentOS 5.7 machine running the default Apache with no
On Tue, Dec 27, 2011 at 10:17 PM, Rilindo Foster rili...@me.com wrote:
On Dec 27, 2011, at 11:29 PM, Bennett Haselton benn...@peacefire.org
wrote:
On Tue, Dec 27, 2011 at 8:33 PM, Gilbert Sebenste
seben...@weather.admin.niu.edu wrote:
On Tue, 27 Dec 2011, Bennett Haselton wrote:
On Tue, Dec 27, 2011 at 10:08 PM, Ken godee k...@perfect-image.com wrote:
password? That's what I'm talking about -- how often does this sort of
thing happen, where you need to be subscribed to be a security mailing
list
in order to know what workaround to make to stay safe, as opposed to
95 matches
Mail list logo