Re: How do you guys handle PNG/JPG binary files with potential payloads for all the image viewers?

2022-06-18 Thread Davide Prina
Corey H wrote: > how do you guys test all of the potential PNG/JPG potential malware payloads   to check any file for potential malware you can use: chkrootkit rkhunter but you can also try with: binwalk <- detect/extract binary data in files string <- to detect strings in the image/audio file

Re: How to securely verify that package-installed files match originals?

2021-01-14 Thread Davide Prina
On 14/01/21 11:56, Erik Poupaert wrote: dpkg -V The reason why I am carrying out this audit is, however, because I somehow suspect that the system could be compromised. as suggested you can use debsums you can also use * to detect missing or unexplained files cruft Note: the output can

Re: Scripts that run insecurely-downloaded code

2020-05-02 Thread Davide Prina
On 01/05/20 22:00, Rebecca N. Palmer wrote: On 01/05/2020 20:31, Elmar Stellnberger wrote: https isn´t any more secure than http as long as you do not have a verifiably trustworthy server certificate that you can check for. As we know the certification authority system is totally broken.

Re: Why no security support for binutils? What to do about it?

2020-01-01 Thread Davide Prina
On 01/01/20 10:29, Elmar Stellnberger wrote:   Up to now I did not see any notable effort to support malware reverse engineering under Linux. The only program I knew was boomerang for decompiling malware but it seems to be unsupported since long. probably here you can find some useful:

Re: network-manager applet disappeared

2019-12-16 Thread Davide Prina
On 15/12/19 19:06, Pegro wrote: I was just unable to recieve an IP address --- the router does NOT allow me to use static IP addresses If I don't mistake, router always allow you to use a static IP address... if you select the IP address in the authorized range. First you need to know a

Re: Have I caught a firmware attack in the act? Or am I just paranoid?

2019-08-16 Thread Davide Prina
On 15/08/19 22:57, Rebecca N. Palmer wrote: I have only seen intelligence visiting my home when I left an offline computer around with HDD. If you feel safe answering: what country was this in?  Your name and time zone suggest Germany/Austria/Switzerland, which I wouldn't have thought of as

Re: Intel Microcode updates

2019-06-24 Thread Davide Prina
On 24/06/19 01:57, Lou Poppler wrote: I am only guessing, but I think a possible explanation which resolves this conundrum might be this: The latest release page is saying that the latest microcode package contains the latest microcode for this Core2 processor, which is the version last updated

Re: Intel Microcode updates

2019-06-24 Thread Davide Prina
On 23/06/19 22:28, Henrique de Moraes Holschuh wrote: The README already tells you how to do it yourself, and people won't read it, why would them find about an example downloader script? $ zless /usr/share/doc/intel-microcode/README.Debian.gz [...] Custom Linux kernels must be built with

Re: Intel Microcode updates

2019-06-23 Thread Davide Prina
On 11/06/19 04:19, Henrique de Moraes Holschuh wrote: On Mon, 10 Jun 2019, Russell Coker wrote: model name : Intel(R) Core(TM)2 Quad CPUQ9505 @ 2.83GHz Intel upstream decided to not distribute it, for whatever reason. The Core2 will not get any fixes for MDS either (nor will

Re: Intel Microcode updates

2019-06-10 Thread Davide Prina
On 10/06/19 13:16, Michael Stone wrote: On Mon, Jun 10, 2019 at 02:01:25PM +1000, Russell Coker wrote: I just discovered the spectre-meltdown-checker package model name  : Intel(R) Core(TM)2 Quad CPU    Q9505  @ 2.83GHz Your CPU is not supported my Intel, so you either accept the risk

Re: Call for testing: Testers needed for ghostscript update

2018-11-06 Thread Davide Prina
On 06/11/2018 16:16, Salvatore Bonaccorso wrote: We plan to rebase ghostscript via stretch-security to 9.25 plus cherry picked security fixes which happened after that release. Packages are at https://people.debian.org/~carnil/tmp/ghostscript/ I'm using Buster, but I have download

Re: Gaps in security coverage?

2018-11-06 Thread Davide Prina
On 06/11/2018 02:34, Paul Wise wrote: On Mon, Nov 5, 2018 at 10:29 PM John Goerzen wrote: So I recently started running debsecan on one of my boxes. It's a fairly barebones server install, uses unattended-upgrades and is fully up-to-date. I expected a clean bill of health, but didn't get

Re: [SECURITY] [DSA 4187-1] linux security update

2018-05-04 Thread Davide Prina
On 04/05/2018 04:06, Paul Wise wrote: On Thu, May 3, 2018 at 4:53 PM, richard lucassen wrote: There is also an big increase in time before random is initialized: ... One of the consequences is that openntpd (or a program like rdate) hangs until the crng is initialized. What do these two

Re: retpoline-enabled GCC build for jessie

2018-02-19 Thread Davide Prina
On 18/02/2018 10:44, who.are.you wrote: On Sat, Feb 17, 2018 at 07:03:00PM +, Holger Levsen wrote: is this gcc only useful for rebuilding the kernel or would it "in theory" (and practice) be better to rebuild everything with it? (of course the latter is probably not really practical for

haveibeenpwned -> sub...@bugs.debian.org and others

2018-01-06 Thread Davide Prina
I have try this site: https://haveibeenpwned.com/ that inform you if your credential have been compromised in data brench (only for public compromised data). I have try it with sub...@bugs.debian.org and this account result compromised!! for: Email addresses, Passwords, Device usage

Is packages build without verifying the source package signatures?

2017-12-02 Thread Davide Prina
If I don't mistake the automatic package build system don't require that the source signature is verified correctly. In here: https://buildd.debian.org/status/fetch.php?pkg=gnome-shell=amd64=3.26.2-1=1509919343=0 I have found this: Unpack source - gpgv: unknown type of key

Re: What patches/packages to install for specific bugs.

2017-11-29 Thread Davide Prina
On 29/11/2017 17:09, Jonathan Hutchins wrote: When doing an in-release upgrade it's usually not necessary to do "upgrade" first, then "full-upgrade" (equivalent to dist-upgrade). that is true, but I prefer to do an "upgrade" first because it is "safer" (it don't remove other packages) and

Re: What patches/packages to install for specific bugs.

2017-11-28 Thread Davide Prina
On 28/11/2017 21:40, P P wrote: for example https://www.debian.org/security/2016/dsa-3503 for DSA 3503. But the link doesn't tell which patch to install to fix the bug of DSA 3503. if you look in the CVE link you find if there is a patch and where is it, ... for example if you open the

Re: [SECURITY] [DSA 3576-1] icedove security update

2016-05-13 Thread Davide Prina
please learn how to quote, so all can understand what is the question and what is the answer. Also break your line response to 75 character On 13/05/2016 23:17, Harris Paltrowitz wrote: I use Icedove on Jessie, and immediately after I received this email I ran apt-get update and apt-get

Re: fighting spam

2016-04-25 Thread Davide Prina
On 25/04/2016 10:58, Paul Wise wrote: On Fri, Apr 22, 2016 at 6:14 PM, SZÉPE Viktor wrote: Please consider using http://psky.me/ to keep spam out of the list. The people running the Debian lists can be contacted here: https://www.debian.org/MailingLists/#maintenance I've forwarded your

Re: strange behaviour with konqueror

2016-03-06 Thread Davide Prina
I'm not a security expert. I will try to give you some security information. On 22/02/2016 22:23, Hans wrote: I found a strange behavior with konqueror. $ apt-cache show konqueror [...] Recommends: [...] kpart-webkit [...] $ apt-cache show kpart-webkit [...] Depends: [...] libqtwebkit4 (>=

Re: Security support incomplete?

2016-02-02 Thread Davide Prina
On 02/02/2016 17:21, Wolfgang Jeltsch wrote: • Where is a list of unfixed security issues? You can know security issues of potentially security issues on packages you have installed on your system: 1) you can list installed package with open security issues # apt-get install debsecan $

Re: Security support incomplete?

2016-02-02 Thread Davide Prina
On 02/02/2016 22:29, Davide Prina wrote: On 02/02/2016 17:21, Wolfgang Jeltsch wrote: • Where is a list of unfixed security issues? You can know security issues of potentially security issues on packages you have installed on your system: 1) you can list installed package with open

Re: [SECURITY] [DSA 3451-1] fuse security update

2016-01-21 Thread Davide Prina
On 21/01/2016 22:20, Ricardo Palacios wrote: Unsubscribe You can unsubscribe from this mailing list: 1) with your browser go to this address: https://www.debian.org/MailingLists/unsubscribe 2) check the "debian-security" and the "debian-security-announce" mailing list (note that you must

Re: Debian Desktop Environment

2015-10-27 Thread Davide Prina
Hi Mateusz, I'm not a security expert. And also I'm not an English expert ;-) On 27/10/2015 12:29, Mateusz Kozłowski wrote: Could You tell me which debian desktop environment is the most security and the best privacy and which You recommned for debian users? (KDE, XFCE, GNOME etc.)? I

Re: Argonne Nat'l Lab no longer a public mirror

2015-02-05 Thread Davide Prina
On 05/02/2015 18:58, john wrote: I saw that my updates weren't working, checked into it and found a notice on http://mirror.anl.gov/ saying they no longer host any public mirrors I think it is better to use: http://http.debian.net/ see instruction on http://http.debian.net/ page Ciao Davide

Re: flashplugin-nonfree get-upstream-version.pl security concern

2012-12-16 Thread Davide Prina
On 13/12/2012 20:52, Jordon Bedwell wrote: On Thu, Dec 13, 2012 at 1:47 PM, Davide Prina wrote: su -c USER1 script.sh ... (downloading the file [with ugo+r] in /tmp/RANDOMDIR [with ugo+x] only once). Why does the group and other need access again? for letting other users read the file

Re: flashplugin-nonfree get-upstream-version.pl security concern

2012-12-13 Thread Davide Prina
On 12/12/2012 23:26, Michael Gilbert wrote: Ultimately, for anyone even modestly security-conscious adobe flash should really be avoided at all costs. +1 I'm not an expert, but I think that packages like this must first ask the users list on which you want this plugin installed and than

Re: Command 'su' is not working in virtual console

2011-12-16 Thread Davide Prina
On 16/12/2011 20:57, frederic ollivier wrote: You are sure that the original su ? $ type su /bin/su $ apt-file -x search /bin/su$ login: /bin/su so you can check integrity with: $ debsums -a login Ciao Davide -- Dizionari: http://linguistico.sourceforge.net/wiki Strumenti per l'ufficio:

Re: Command 'su' is not working in virtual console

2011-12-16 Thread Davide Prina
but you use top posting... this is bad! ;-) On 16/12/2011 21:26, Marko Randjelovic wrote: The same as for hdparm. I reinstalled it and all looks OK. so try a disk fsck and also a RAM check I have had problems like these when a RAM was damaged Ciao Davide -- Dizionari:

Re: question regarding verification of a debian installation iso

2011-01-02 Thread Davide Prina
On 02/01/2011 19:32, Naja Melan wrote: Then cd to the location of your download and do : md5sum YourDebian.iso. well preferably one of the other hashing algorithms, since md5 is considered broken what I have read is that you can easy find another DadFile.iso file with the same

Re: Are these scan logs dangerous ?

2009-07-05 Thread Davide Prina
a dehqan wrote: [11:19:43] Warning: The file '/usr/sbin/unhide-linux26' exists on the system, but it is not present in the rkhunter.dat file. $ apt-file search /usr/sbin/unhide-linux26 unhide: /usr/sbin/unhide-linux26 probably you have installed unhide as suggested by rkhunter and you have

Re: Are these scan logs dangerous ?

2009-07-05 Thread Davide Prina
a dehqan wrote: please quote :-) # chkconfig --level 23 identd off identd: unknown service probably you have mistaken inetd with identd But port 113 auth is open ! So which service has opened port 113 ? from root # netstat -putan to see all the service listening to see only 113 port:

Re: Are these scan logs dangerous ?

2009-07-05 Thread Davide Prina
a dehqan wrote: [11:19:43] Warning: The file '/usr/sbin/unhide-linux26' exists on the system, but it is not present in the rkhunter.dat file. $ apt-file search /usr/sbin/unhide-linux26 unhide: /usr/sbin/unhide-linux26 probably you have installed unhide as suggested by rkhunter and you have

Re: Bug#401969: please build using hunspell

2006-12-09 Thread Davide Prina
Rene Engelhard wrote: MySpell is obsolete. Please build against Hunspell, which is an improved version of MySpell retaining full backwards compatibility. That also would make the usage of hunspell-de-* in iceweasel possible. probably not so full backwards compatibility. [ The Problem is

Re: Bug#401969: please build using hunspell

2006-12-09 Thread Davide Prina
Rene Engelhard wrote: Davide Prina wrote: MySpell is obsolete. Please build against Hunspell, which is an improved version of MySpell retaining full backwards compatibility. That also would make the usage of hunspell-de-* in iceweasel possible. probably not so full backwards compatibility

Re: Firefox on testing hijacked by http://www.megago.com/l/?

2006-09-04 Thread Davide Prina
ahi, ahi, ahi ... top quoting! This is bad! ;-) http://en.wikipedia.org/wiki/Netiquette Torsten Sadowski wrote: Unluckily its not that easy. The homepage preference is not altered and points to the right site. It seem to be a search service ... probably have you a Firefox extension of it?

Re: GPG errors from apt update

2006-08-31 Thread Davide Prina
ahi, ahi, ahi ... top posting ... this is bad ;-) Robert Dobbs wrote: I cannot do it because of my company's firewall. you can go to a keyring site and download the key from here Why is the key not in debian-keyring package? key is updated each year ... but next update will be in January

Re: public key problem with mirrors.kernel.org

2006-01-06 Thread Davide Prina
James Miller ha scritto: W: GPG error: http://mirrors.kernel.org testing Release: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 010908312D230C5F there are two solutions: 1) with root user: wget http://ftp-master.debian.org/ziyi_key_2006.asc

Re: hardening checkpoints

2005-12-21 Thread Davide Prina
steve ha scritto: connection time, so she simply refused. Moreover, in Italy you have to give an ID (they do a photocopy of it; she couldn't tell me how long they keep it..) to be able to use a computer in an Internet Café (terrorism you know...). yes. All data (only your person

Re: a compromised machine

2005-07-27 Thread Davide Prina
Nejc Novak ha scritto: So, for now i killed this process, disabled the cronjob and killed web server - there is now way the attacker is capable of coming back into server or is there a chance that there is another backdoor installed somewhere (chkrootkit doesn't find anything). try also

Re: bad md5's on ftp.us.debian.org ?

2004-11-27 Thread Davide Prina
hanasaki wrote: Below are the errors reported by apt-get update. Is this correct? Could someone explain please? Thanks. === 16:35 CST 2004-11-26 Failed to fetch http://ftp.us.debian.org/debian/dists/sarge/main/binary-i386/Packages.gz MD5Sum mismatch I think this is an error on

Re: Spyware / Adware

2004-08-31 Thread Davide Prina
Snyder, Dave (D.F.) wrote: Security, I just purchased Debian Linux for my home PC and waiting for the CD's to arrive this week. I'm looking forward to installing so I can eventually divorce myself from Microsoft Windows. I've had more calls in the last few weeks from friends and relatives

Re: debian and viruses ...

2004-05-19 Thread Davide Prina
Marcin ha scritto: Hello, I am trying to find solution for finding wiruses in my LAN networks. I am administrator of ISP router (generaly Debian of course), and in LAN there are litle storm of wiruses, trojans, spammers, etc shits ... Is any possible method to find them ? Any debian tools ? I was

Re: debian and viruses ...

2004-05-19 Thread Davide Prina
Marcin ha scritto: Hello, I am trying to find solution for finding wiruses in my LAN networks. I am administrator of ISP router (generaly Debian of course), and in LAN there are litle storm of wiruses, trojans, spammers, etc shits ... Is any possible method to find them ? Any debian tools ? I

Re: debian and viruses ...

2004-05-19 Thread Davide Prina
Marcin ha scritto: Hello, have you try: # apt-cache search virus? yes, of course. $ apt-cache search virus gnome-xbill - Fight the infection. mailscanner - An email virus scanner and spam tagger. renattach - Rename attachments on the fly. sanitizer - The Anomy Mail Sanitizer - an email