Re: [OT] Google security

2019-12-09 Thread Charles Curley
On Mon, 09 Dec 2019 11:16:32 -0600 John Hasler wrote: > The data trawling activities of my > government[2] angers me but when I think about it objectively I > realize that it does me no actual harm: How do you know that? Mr. Snowden, among others, has made it abundantly clear that the US

Re: dropbox security situation

2019-12-09 Thread Brian
On Mon 09 Dec 2019 at 16:31:35 +0100, Jonas Smedegaard wrote: > Quoting Charles Curley (2019-12-09 15:56:26) > > On Sun, 8 Dec 2019 18:55:12 +0100 (CET) > > wrote: > > > > > Usual advice : use strong passwords (i.e. long enough with high > > > entropy => generated in a dedicated password

Re: [OT] Google security

2019-12-09 Thread Nicholas Geovanis
On Mon, Dec 9, 2019 at 11:17 AM John Hasler wrote: > The data trawling activities of my > government[2] angers me but when I think about it objectively I realize > that it does me no actual harm: I'm simply not someone they care about. > You are safe (now) so others' freedoms need not be

Re: [OT] Google security

2019-12-09 Thread John Hasler
Charlie writes: > Over many years, although, I may not ever be in possession of anything > of interest to anyone? There are two distinct "security" condsiderations here that are often munged together: 1) Our ethical/moral/political objections to being tracked and snooped on

Re: dropbox security situation

2019-12-09 Thread Jonas Smedegaard
Quoting Charles Curley (2019-12-09 15:56:26) > On Sun, 8 Dec 2019 18:55:12 +0100 (CET) > wrote: > > > Usual advice : use strong passwords (i.e. long enough with high > > entropy => generated in a dedicated password manager) AND 1 > > different per service, never the same. > > There is a handy

Re: dropbox security situation

2019-12-09 Thread Jude DaShiell
On Mon, 9 Dec 2019, Charles Curley wrote: > Date: Mon, 9 Dec 2019 09:56:26 > From: Charles Curley > To: debian-user@lists.debian.org > Subject: Re: dropbox security situation > Resent-Date: Mon, 9 Dec 2019 14:57:02 + (UTC) > Resent-From: debian-user@lists.debian.org >

Re: dropbox security situation

2019-12-09 Thread Charles Curley
On Sun, 8 Dec 2019 18:55:12 +0100 (CET) wrote: > Usual advice : use strong passwords (i.e. long enough with high > entropy => generated in a dedicated password manager) AND 1 > different per service, never the same. There is a handy password generator available on Debian, called APG (Automated

Re: [OT] Google security

2019-12-08 Thread Charlie
Received from Curt on Sun, 8 Dec 2019 14:54:15 - (UTC) Re: [OT] Google security > I am waiting to be convinced, though I do infer from a certain number > of factors, including my personal experience and the experience of > those around me, that the claim

Re: dropbox security situation

2019-12-08 Thread Brian
On Sun 08 Dec 2019 at 13:09:10 -0500, Jude DaShiell wrote: > No google now has a unique one now but didn't when the incidents > happened. I wish I understood what you mean. A "unique" what? With the strong password that uou have (and the protections Google provides) the balance of probability

Re: dropbox security situation

2019-12-08 Thread Jude DaShiell
No google now has a unique one now but didn't when the incidents happened. On Sun, 8 Dec 2019, l0f...@tuta.io wrote: > Date: Sun, 8 Dec 2019 12:55:12 > From: l0f...@tuta.io > To: John Hasler > Cc: Debian User > Subject: Re: dropbox security situation > Resent-Date: Sun, 8

Re: dropbox security situation

2019-12-08 Thread l0f4r0
Hi, 8 déc. 2019 à 14:47 de jhas...@newsguy.com: > Do you use the same username everywhere? It's common for criminals to > collect lists of usernames and try them in combination with guessed > passwords on as many services as possible. The yield is low but it's > cost-effective for them because

Re: [OT] Google security

2019-12-08 Thread Curt
On 2019-12-08, John Hasler wrote: > Curt writes: >> Yet the confirmation bias of certain ideologues will get them to >> believing... > > Confirmation bias of *all* ideologues and ideologies. Including yours. How devastatingly clever. But you inverse the roles. I made no unsubstantiated claim,

Re: [OT] Google security

2019-12-08 Thread John Hasler
Curt writes: > Yet the confirmation bias of certain ideologues will get them to > believing... Confirmation bias of *all* ideologues and ideologies. Including yours. -- John Hasler jhas...@newsguy.com Elmwood, WI USA

Re: dropbox security situation

2019-12-08 Thread John Hasler
Do you use the same username everywhere? It's common for criminals to collect lists of usernames and try them in combination with guessed passwords on as many services as possible. The yield is low but it's cost-effective for them because the process is fully automated using thousands of bots

Re: [OT] Google security (was: dropbox security situation)

2019-12-08 Thread tomas
On Sun, Dec 08, 2019 at 10:33:42AM -, Curt wrote: > Also my understanding and experience. Yet the confirmation bias of > certain ideologues [... ] Ideologue. Noun. Anyone with views differing from Curt's > [...] being trigger-happy fanatics) any and all FUD Fanatic. Noun. Anyone whose

Re: [OT] Google security (was: dropbox security situation)

2019-12-08 Thread Curt
On 2019-12-08, wrote: > Hi, > > 7 déc. 2019 à 18:06 de jdash...@panix.com: > >> [...] google accounts whether two-step or not are routinely hacked >> > You are probably mixing up different notions here: cracking VS privacy > VS social engineering (phishing).

[OT] Google security (was: dropbox security situation)

2019-12-08 Thread l0f4r0
Hi, 7 déc. 2019 à 18:06 de jdash...@panix.com: > [...] google accounts whether two-step or not are routinely hacked > You are probably mixing up different notions here: cracking VS privacy VS social engineering (phishing). AFAIK, Google account security policy has very high standards t

Re: dropbox security situation

2019-12-07 Thread tomas
On Sat, Dec 07, 2019 at 04:24:33PM -0700, Charles Curley wrote: > On Sat, 07 Dec 2019 19:20:09 +0100 > Hans wrote: > > > maybe owncloud or nextcloud are interesting options for you. As the > > name says: Your own cloud. > > Thank you for recommending those before I did. I run nextcloud here, >

Re: dropbox security situation

2019-12-07 Thread tomas
On Sat, Dec 07, 2019 at 11:39:42PM +, Brian wrote: > On Sat 07 Dec 2019 at 18:23:27 -0500, Jude DaShiell wrote: [Account of break in which we can't either prove or disprove, yet] > There was no break-in. That there was no break-in is a myth. You never provided any evidence. That is enough

Re: dropbox security situation

2019-12-07 Thread Celejar
On Sat, 7 Dec 2019 16:24:33 -0700 Charles Curley wrote: > On Sat, 07 Dec 2019 19:20:09 +0100 > Hans wrote: ... > > But in the debian repo I only found the client stuff, however I might > > to remember, the server site were also available in debian (I might > > be wrong). > > I don't see the

Re: dropbox security situation

2019-12-07 Thread Charles Curley
On Sat, 07 Dec 2019 19:20:09 +0100 Hans wrote: > maybe owncloud or nextcloud are interesting options for you. As the > name says: Your own cloud. Thank you for recommending those before I did. I run nextcloud here, and prefer it over owncloud. It seems to have advanced considerably over

Re: dropbox security situation

2019-12-07 Thread Brian
> lesser security account. > It's possible the break in happened since at the time I enabled two-step > authentication I didn't know about setting up app-passwords for mua's > used to connect to the account, but I don't know for sure on that one. There was no break-in. -- Brian.

Re: dropbox security situation

2019-12-07 Thread Jude DaShiell
I had to close my original account as a result of the break in, and you know what was really interesting? The account compromise happened after I set the account to two-step authentication. For a while it had been a lesser security account. It's possible the break in happened since at the time I

Re: dropbox security situation

2019-12-07 Thread Brian
On Sat 07 Dec 2019 at 16:45:34 -0500, Jude DaShiell wrote: > One first-hand experience on google account hacking and contacting > others who were not surprised when I described my situation in earlier > email. Widespread breaking into Google accounts is a myth. You and your correspondents never

Re: dropbox security situation

2019-12-07 Thread Jude DaShiell
:28 > From: Brian > To: debian-user@lists.debian.org > Subject: Re: dropbox security situation > Resent-Date: Sat, 7 Dec 2019 20:56:43 + (UTC) > Resent-From: debian-user@lists.debian.org > > On Sat 07 Dec 2019 at 12:06:37 -0500, Jude DaShiell wrote: > > > Recently I

Re: dropbox security situation

2019-12-07 Thread Brian
On Sat 07 Dec 2019 at 12:06:37 -0500, Jude DaShiell wrote: > Recently I created a dropbox account with my gmail account. Very shortly > after creation I was refused access since dropbox claimed someone tried > to change the password on my account and they weren't sure it was me so > got prompted

Re: dropbox security situation

2019-12-07 Thread Hans
Hi Jude, maybe owncloud or nextcloud are interesting options for you. As the name says: Your own cloud. But in the debian repo I only found the client stuff, however I might to remember, the server site were also available in debian (I might be wrong). Best Hans signature.asc Description:

Re: dropbox security situation

2019-12-07 Thread Jude DaShiell
On Sat, 7 Dec 2019, Hans wrote: > Date: Sat, 7 Dec 2019 12:49:17 > From: Hans > To: debian-user@lists.debian.org > Subject: Re: dropbox security situation > > Am Samstag, 7. Dezember 2019, 18:06:37 CET schrieb Jude DaShiell: > Hi Jude, > > I know, there were several s

Re: dropbox security situation

2019-12-07 Thread Hans
Am Samstag, 7. Dezember 2019, 18:06:37 CET schrieb Jude DaShiell: Hi Jude, I know, there were several security issues with dropbox in the past, that frightened me. So dropbox would not be my first choice, although it is most used by people. (Windows is also most used by people, think of your

dropbox security situation

2019-12-07 Thread Jude DaShiell
Recently I created a dropbox account with my gmail account. Very shortly after creation I was refused access since dropbox claimed someone tried to change the password on my account and they weren't sure it was me so got prompted to change my password. What I don't know is if high probability

Re: Security Issue with sssd / AD authentication?

2019-11-08 Thread Dan Purgert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Kent West wrote: > Probably not the best place to put this information, but I figure here > is better than no where... > > I'm tinkering with authentication a Debian (10.1) box via Active > Directory, so that an AD user can log into the Debian

Re: Security Issue with sssd / AD authentication?

2019-11-08 Thread Kent West
nt person, upon login, becomes the local account person, with full access as that person. Advice? Suggestions? Questions? It seems like you have two options: 1. change the use_fully_qualified_names setting 2. eliminate the westk local account While the situation has security implications, those impli

Re: Security Issue with sssd / AD authentication?

2019-11-08 Thread Roberto C . Sánchez
of the same name, the > domain account person, upon login, becomes the local account person, with > full access as that person. > > Advice? Suggestions? Questions? > It seems like you have two options: 1. change the use_fully_qualified_names setting 2. eliminate the westk local account

Security Issue with sssd / AD authentication?

2019-11-08 Thread Kent West
Probably not the best place to put this information, but I figure here is better than no where... I'm tinkering with authentication a Debian (10.1) box via Active Directory, so that an AD user can log into the Debian box. The relevant /etc/sssd/sssd.conf file has the following modification:

Re: testing security updates

2019-10-04 Thread Brad Rogers
On Fri, 4 Oct 2019 08:45:27 -0400 Greg Wooledge wrote: Hello Greg, >Yeah, I gave the (overly) simplified set of warnings. I'm sure we can all come up with so many different scenarios that this could run and run if we let it. Suffice to say, there are always exceptions that prove the rule.

Re: testing security updates

2019-10-04 Thread Greg Wooledge
On Fri, Oct 04, 2019 at 10:52:16AM +0100, Brad Rogers wrote: > Also, currently, digikam is not in testing. No big deal, I have it > installed and working. *However* if I had just installed testing, I > would get digikam from stable, because I use it daily, and can't do > certain things without

Re: testing security updates

2019-10-04 Thread Sven Hartge
Greg Wooledge wrote: > YOU DO NOT MIX TESTING WITH UNSTABLE. > If you use one of these, you use that one only. No mixing. > No Frankendebians. But you *can* mix Unstable with Testing. (Not the order here.) Normally no package from Testing will get pulled in, but sometimes this is the only

Re: testing security updates

2019-10-04 Thread Thomas Schmitt
Hi, Brad Rogers wrote: > > > If one uses sites such as spotify or amazon video to...@tuxteam.de wrote: > >...but why on earth would you want to do THAT? Eeeek... ;-) Brad Rogers wrote: > *I* don't; It's the kids. I wonder whether there is a Debian Developer willing to create a package which

Re: testing security updates

2019-10-04 Thread Brad Rogers
On Fri, 4 Oct 2019 12:14:00 +0200 wrote: Hello to...@tuxteam.de, >...but why on earth would you want to do THAT? Eeeek... ;-) *I* don't; It's the kids. Honest. :-) -- Regards _ / ) "The blindingly obvious is / _)radnever immediately apparent" Where

Re: testing security updates

2019-10-04 Thread tomas
On Fri, Oct 04, 2019 at 10:52:16AM +0100, Brad Rogers wrote: > On Thu, 3 Oct 2019 15:40:53 -0400 > Greg Wooledge wrote: > > Hello Greg, > > >YOU DO NOT MIX STABLE WITH TESTING. > > > >YOU DO NOT MIX STABLE WITH UNSTABLE. > > > >YOU DO NOT MIX TESTING WITH UNSTABLE. > > By and large, I agree. >

Re: testing security updates

2019-10-04 Thread Brad Rogers
On Thu, 3 Oct 2019 15:40:53 -0400 Greg Wooledge wrote: Hello Greg, >YOU DO NOT MIX STABLE WITH TESTING. > >YOU DO NOT MIX STABLE WITH UNSTABLE. > >YOU DO NOT MIX TESTING WITH UNSTABLE. By and large, I agree. I would add a few caveats, though. If one uses sites such as spotify or amazon

Re: testing security updates

2019-10-04 Thread tomas
On Thu, Oct 03, 2019 at 03:40:53PM -0400, Greg Wooledge wrote: [...] > YOU DO NOT MIX STABLE WITH TESTING. > > YOU DO NOT MIX STABLE WITH UNSTABLE. > > YOU DO NOT MIX TESTING WITH UNSTABLE. Wow. I'd rather say: you do not "do not". Know the downsides, know what can break, and then, when it's

Re: testing security updates

2019-10-03 Thread Joe
On Thu, 3 Oct 2019 15:40:53 -0400 Greg Wooledge wrote: > On Thu, Oct 03, 2019 at 08:35:32PM +0100, mick crane wrote: > > Debian web page about testing is saying that testing gets infrequent > > security updates > > It's more accurate to say that testing does not get A

Re: testing security updates

2019-10-03 Thread Greg Wooledge
On Thu, Oct 03, 2019 at 08:54:37PM +0100, mick crane wrote: > yes sorry, I realized I made an error and should have typed > bullseye for main and unstable for security updates just after pressing > send. > but you say not to do that ? Correct. If you want to run unstable, just run unstable.

Re: testing security updates

2019-10-03 Thread mick crane
realized I made an error and should have typed bullseye for main and unstable for security updates just after pressing send. but you say not to do that ? mick -- Key ID4BFEBB31

Re: testing security updates

2019-10-03 Thread Greg Wooledge
On Thu, Oct 03, 2019 at 08:35:32PM +0100, mick crane wrote: > Debian web page about testing is saying that testing gets infrequent > security updates It's more accurate to say that testing does not get ANY security updates. Not in any realistic sense. Packages migrate from unstable into t

testing security updates

2019-10-03 Thread mick crane
I didn't type previous correctly did I. that would be bullseye for main and unstable for security updates in sources.lists. Is that what people do ? mick -- Key ID4BFEBB31

testing security updates

2019-10-03 Thread mick crane
hello, Debian web page about testing is saying that testing gets infrequent security updates and that you can get more frequent security updates from unstable. Is that what people do ? have buster for main and bullseye for security updates in sources.list ? mick -- Key ID4BFEBB31

Re: Does Debian have a yum security equivalent

2019-10-02 Thread Greg Wooledge
there a way I can get that information on the Debian > server itself through the command-line? lynx -dump https://security-tracker.debian.org/tracker/DSA-4535-1 This also works with a CVE number. For example, lynx -dump https://security-tracker.debian.org/tracker/CVE-2019-5094 Or with a sour

Does Debian have a yum security equivalent

2019-10-02 Thread Wilkinson, Matthew
Hello Debian Community, I've been unable to find information about how to use apt, apt-get, or aptitude to get security erratum information on a Debian 10 server. Is there a yum security equivalent in Debian? Specifically I am looking to query the Debian repos for DSA advisory information

Re: revise the /etc/security/limits.conf doesn't take effect for normal user.

2019-08-13 Thread Greg Wooledge
ct within this environment. I don't either. First thing you can do is look for a file like /etc/pam.d/gdm3 (or possibly /etc/pam.d/gdm), and see if it contains the pam_limits.so line. If it doesn't, then you know it isn't reading /etc/security/limits.conf file, and your first step would be to ad

Re: revise the /etc/security/limits.conf doesn't take effect for normal user.

2019-08-12 Thread Hongyi Zhao
On Mon, 12 Aug 2019 15:40:03 +0200, Greg Wooledge wrote: > You > could start by telling us which DM it is (lightdm, gdm3, sddm, etc.). gdm3 And I don't know to let the limits take effect within this environment. Regards

Re: revise the /etc/security/limits.conf doesn't take effect for normal user.

2019-08-12 Thread Hongyi Zhao
On Mon, 12 Aug 2019 15:40:03 +0200, Greg Wooledge wrote: > You > could start by telling us which DM it is (lightdm, gdm3, sddm, etc.). gdm3 And I don't know to let the limits take effect within this environment. Regards -- .: Hongyi Zhao [ hongyi.zhao AT gmail.com ] Free as in Freedom :.

Re: revise the /etc/security/limits.conf doesn't take effect for normal user.

2019-08-12 Thread Hongyi Zhao
On Mon, 12 Aug 2019 15:40:03 +0200, Greg Wooledge wrote: > You > could start by telling us which DM it is (lightdm, gdm3, sddm, etc.). gdm3 And I don't know to let the limits take effect within this environment. Regards -- .: Hongyi Zhao [ hongyi.zhao AT gmail.com ] Free as in Freedom :.

Re: revise the /etc/security/limits.conf doesn't take effect for normal user.

2019-08-12 Thread Greg Wooledge
> Il giorno dom 11 ago 2019 alle ore 05:30 Hongyi Zhao > ha scritto: > > > Hi, > > > > I added the following lines into /etc/security/limits.conf: > > > > * - nofile 65535 > > root - nofile 65535 > > > > > > But it still not take ef

Re: revise the /etc/security/limits.conf doesn't take effect for normal user.

2019-08-11 Thread Emmanuel Gelati
check if you are using pam_limits module grep -i limit /etc/pam.d/* Il giorno dom 11 ago 2019 alle ore 05:30 Hongyi Zhao ha scritto: > Hi, > > I added the following lines into /etc/security/limits.conf: > > * - nofile 65535 > root - nofile 65535 > > > B

revise the /etc/security/limits.conf doesn't take effect for normal user.

2019-08-10 Thread Hongyi Zhao
Hi, I added the following lines into /etc/security/limits.conf: * - nofile 65535 root - nofile 65535 But it still not take effect for the normal user. Any hints? -- .: Hongyi Zhao [ hongyi.zhao AT gmail.com ] Free as in Freedom :.

Re: Repositório Security no Testing

2019-07-10 Thread Francisco M Neto
O repositório security só existe para a stable, porque ele contém as atualizações de segurança. A Testing não conta com isso, porque ela recebe updates normalmente. Em resumo, ele não existe nem vai existir. -- Francisco On Wed, 2019-07-10 at 16:08 -0300, Diego Rabatone Oliveira wrote

Re: Repositório Security no Testing

2019-07-10 Thread Diego Rabatone Oliveira
Provavelmente ainda não, mas vai passar a existir em algum momento em breve, imagino. Em qua, 10 de jul de 2019 15:18, Jack Jr. escreveu: > Uma dúvida. Esse repositório não existe mais? > > deb http://security.debian.org/ testing/updates main > > -- > > Jack Pogorelsky Jr. > Engenheiro Mecânico

Repositório Security no Testing

2019-07-10 Thread Jack Jr.
Uma dúvida. Esse repositório não existe mais? deb http://security.debian.org/ testing/updates main -- Jack Pogorelsky Jr. Engenheiro Mecânico Tel/WhatsApp: +55 (51) 982017877 E-mail: j...@sulmail.com Website: sulmail.com/pogorelsky

Re: Print-problemen door security update

2019-05-14 Thread Paul van der Vlis
Op 13-05-19 om 12:13 schreef Paul van der Vlis: > Hoi, > > Afgelopen nacht was er een security update voor Ghostscript, en ik hoor > dat verscyhillende printers niet meer werken. Het lijkt er op dat > PCL6-printers het niet meer doen, en Postscript printers wel. Maar > m

Print-problemen door security update

2019-05-13 Thread Paul van der Vlis
Hoi, Afgelopen nacht was er een security update voor Ghostscript, en ik hoor dat verscyhillende printers niet meer werken. Het lijkt er op dat PCL6-printers het niet meer doen, en Postscript printers wel. Maar misschien is dit te algemeen. Downgraden lijkt het probleem op te lossen: apt install

Re: "missing pubkey" for buster-security

2019-05-07 Thread Harald Dunkel
Hi Ansgar, I highly appreciate your detailed response. I had not expected that the keyserver is restricted to developer keys. Thanx very much Harri

Re: "missing pubkey" for buster-security

2019-05-06 Thread Ansgar Burchardt
nd for remote repository > buster-security (http://security.debian.org buster/updates)! > There have been errors! These keys are already in the debian-archive-keyring package (in testing/unstable): +--- | $ gpg --no-default-keyring --keyring /usr/share/keyrings/debian-archive-k

"missing pubkey" for buster-security

2019-05-06 Thread Harald Dunkel
%2Fupdates_InRelease'. Signatures in '/var/www/official/lists/buster-security_buster%2Fupdates_InRelease': '9D6D8F6BC857C906' (signed 2019-05-03): missing pubkey 'AA8E81B4331F7F50' (signed 2019-05-03): missing pubkey Error: Not enough signatures found for remote repository buster-security (http

Re: Fwd: Security Installation Method

2019-04-10 Thread Dan Ritter
Arun Vasudevan wrote: > HI Could you please help on this > > On Wed, Apr 10, 2019 at 7:37 PM Dan Ritter wrote: > > > Arun Vasudevan wrote: > > > Hi > > > > > > > Please address replies to the group, so that other people can > > assist and can be helped in future. > > > > -dsr-

Re: Fwd: Security Installation Method

2019-04-10 Thread der.hans
Am 10. Apr, 2019 schwätzte Cindy Sue Causey so: moin moin, On 4/10/19, Dan Ritter wrote: Arun Vasudevan wrote: Could you please help me to install the Security patches only to one of my Debian servers. The usual method is: sudo apt update apt list --upgradable # inspect the packages

Re: Fwd: Security Installation Method

2019-04-10 Thread Cindy Sue Causey
On 4/10/19, Dan Ritter wrote: > Arun Vasudevan wrote: >> > >> > Could you please help me to install the Security patches only to one of >> > my >> > Debian servers. >> > > The usual method is: > > sudo apt update > apt list --upgradable

Re: Fwd: Security Installation Method

2019-04-10 Thread Dan Ritter
Arun Vasudevan wrote: > Hello Team, > > Any one help me here > > -- Forwarded message - > From: Moritz Muehlenhoff > Date: Wed, Apr 10, 2019 at 6:15 PM > Subject: Re: Security Installation Method > To: Arun Vasudevan > Cc: > > > O

Fwd: Security Installation Method

2019-04-10 Thread Arun Vasudevan
Hello Team, Any one help me here -- Forwarded message - From: Moritz Muehlenhoff Date: Wed, Apr 10, 2019 at 6:15 PM Subject: Re: Security Installation Method To: Arun Vasudevan Cc: On Wed, Apr 10, 2019 at 05:55:09PM +0530, Arun Vasudevan wrote: > Team, > > Could y

Re: At the risk of stoning -- has anyone USED tiger for checking security?

2019-03-13 Thread Greg Wooledge
On Tue, Mar 12, 2019 at 06:35:34PM -0400, deb wrote: > I see this with an apt-cache search but I drew back when > I saw that it wants to include "john-data" to crack passwords. > > > *`tiger *- checks system security but uses john-data, which cracks > passw

At the risk of stoning -- has anyone USED tiger for checking security?

2019-03-12 Thread deb
I see this with an apt-cache search but I drew back when I saw that it wants to include "john-data" to crack passwords. *`tiger *- checks system security but uses john-data, which cracks passwords` I look forward to comments from those who have used either or want t

Re: it's very foolish to force user to install security update

2019-01-06 Thread David Wright
gt; file size is 34.1M, it may take more than 2 hours > > > jessie installer has just downloaded kernel from a mirror i choose, it's > > > fast, but security.debian.org is slow > > > early debian installer allow user to choose whether to install security > &g

Re: it's very foolish to force user to install security update

2019-01-04 Thread David Wright
y.debian.org is slow > early debian installer allow user to choose whether to install security update > i hope debian developer can read this message Two things. 1. You can choose whether you want security updates at install time. (There may be a default value unless you use expert mode

Re: Security Updates

2018-12-31 Thread Nazar Zhuk
On Sun, Dec 30, 2018 at 08:00:51PM +0100, Marek Gráfel wrote: > I also tried the command via the apt-get update terminal, telling me that > the operation is declined. Make sure you run apt-get as root or with sudo: sudo apt-get update Then: sudo apt-get upgrade -- Nazar

Re: Security Updates

2018-12-30 Thread David Christensen
On 12/30/18 11:00 AM, Marek Gráfel wrote: I do not know English well, but I hope that the translation through Google Is there a Debian mailing list in your native language? https://lists.debian.org/completeindex.html David

Re: Security Updates

2018-12-30 Thread songbird
Marek Gráfel wrote: ... > I do not know English well, but I hope that the translation through Google > will be enough to lead me to write a procedure how to install security > updates, and please explain why your Debian freezes despite Linux Mintu? I > think Debian is higher than Linux

Security Updates

2018-12-30 Thread Marek Gráfel
Good day. Please help. I have the Debian9.6 operating system installed from Cinnamon. Can I help you find and install security updates on my system? I looked at the Synaptic package manager, the apt package is installed there. I also tried the command via the apt-get update terminal, telling me

Re: Why doesn't new linux kernel appear from security two days after release?

2018-10-03 Thread Greg Wooledge
On Wed, Oct 03, 2018 at 11:16:36AM -0300, francis picabia wrote: > I hate it when the kernel file isn't changed from the old uname. Keeping the same ABI is *helpful*, because people don't have to rebuild their third-party (dkms) modules. Bumping the ABI for security updates is awful, and

Re: Why doesn't new linux kernel appear from security two days after release?

2018-10-03 Thread Ulf Volmer
On 03/10/2018 15:58, francis picabia wrote: > When I do apt-get update && apt-get upgrade to get > the new kernel which is part of DSA-4308-1 (released Oct 1), > I get nothing available. what says apt-cache policy linux-image-amd64 ? best regards Ulf

Re: Why doesn't new linux kernel appear from security two days after release?

2018-10-03 Thread francis picabia
, > I get nothing available. > > I have in sources.list: > > deb http://mirror.csclub.uwaterloo.ca/debian/ stretch main contrib > non-free > deb-src http://mirror.csclub.uwaterloo.ca/debian/ stretch main contrib > non-free > > deb http://security.debian.org/debian-securit

Why doesn't new linux kernel appear from security two days after release?

2018-10-03 Thread francis picabia
stretch main contrib non-free deb http://security.debian.org/debian-security stretch/updates main contrib non-free deb-src http://security.debian.org/debian-security stretch/updates main contrib non-free I've tried apt-get clean and even apt-get dist-upgrade Nothing makes any difference and no

Re: root "login" xterm to increase security?

2018-09-14 Thread Dan Ritter
On Fri, Sep 14, 2018 at 11:16:56AM +1000, Zenaan Harkness wrote: > Anyone know if it's possible to get xterm (or xfce4-terminal or any > other terminal for that matter) to be a "native/ clean login > terminal", to increase security when running root commands? >

root "login" xterm to increase security?

2018-09-13 Thread Zenaan Harkness
Anyone know if it's possible to get xterm (or xfce4-terminal or any other terminal for that matter) to be a "native/ clean login terminal", to increase security when running root commands? To: CypherPunks On Thu, Sep 13, 2018 at 04:48:58PM +1000, Zenaan Harkness wrote: > So som

Re: Why does my system download directly from security-cdn.debian.org?

2018-08-23 Thread Michael Stone
On Thu, Aug 23, 2018 at 01:16:26PM -0400, Roberto C. Sánchez wrote: deb http://apt-cache.localdomain:3142/security/ stretch/updates main contrib non-free deb http://apt-cache.localdomain:3142/debian/ stretch main non-free contrib apt-cacher would typically be used by putting something like

Re: Why does my system download directly from security-cdn.debian.org?

2018-08-23 Thread Markus Schönhaber
Roberto C. Sánchez, Do 23 Aug 2018 19:16:26 CEST: > The corresponding configurations for apt-cacher-ng are: > > backends_debian_sec: > http://security.debian.org > > deb_sec_mirrors: > http://security.debian.org > However, recent kernel updates have instead been r

Why does my system download directly from security-cdn.debian.org?

2018-08-23 Thread Roberto C . Sánchez
I have started noticing something odd with the way apt on my systems downloads some security updates. First, I run an instance of apt-cacher-ng on my local network and I have backends configured for both the normal archive and also the security archive. My sources.list looks like this: deb http

Re: Monitoring copy file security

2018-08-14 Thread Ilyass Kaouam
Thank's Le mar. 14 août 2018 à 18:03, Reco a écrit : > > > apt install auditd > > auditctl -a always,exit -F dir=/home/backup -F perm=war > > md5sum /home/backup/* # any reading/writing command will do > > tail /var/log/audit/audit.log > > Reco > > -- *Ilyass kaouam* *Systems administrator* *

Re: Monitoring copy file security

2018-08-14 Thread Reco
Hi. On Mon, Aug 13, 2018 at 08:52:35PM +0200, Ilyass Kaouam wrote: > Hi, > > I have a database server in which I save the database (dump) > let say > /home/backup directory. > I would like to monitor this directory and find out if anyone is doing a cp > or mv or. apt install auditd

Re: Monitoring copy file security

2018-08-13 Thread Zenaan Harkness
(Please bottom post.) I'd have the program creating a file, either change file permissions after writing, or call/trigger some other/ "external" script (which you write) to do the tidy ups. Good luck, On Mon, Aug 13, 2018 at 11:34:40PM +0200, Ilyass Kaouam wrote: > Thank you for you all, > I

Re: Monitoring copy file security

2018-08-13 Thread Ilyass Kaouam
Thank you for you all, I will all this. For other friends, if you have other suggestions please do not hesitate :) Le lun. 13 août 2018 à 22:57, Roberto C. Sánchez a écrit : > On Mon, Aug 13, 2018 at 10:30:02PM +0200, Martin wrote: > > > > Oh, yes! How simple. Unfortunately, 'apt-cache search

Re: Monitoring copy file security

2018-08-13 Thread Roberto C . Sánchez
On Mon, Aug 13, 2018 at 10:30:02PM +0200, Martin wrote: > > Oh, yes! How simple. Unfortunately, 'apt-cache search fam' returns 578 hits. > 'apt-cache search famd' gives zero. Not that smart naming I guess. > Try 'apt-cache pkgnames fam' instead. 'pkgnames' considers only package names, where

Re: Monitoring copy file security

2018-08-13 Thread Martin
Am 13.08.2018 um 22:16 schrieb Thomas Schmitt: > Hi, > > Martin wrote: >> There is -or was, quite some time ago I've last seen this- a software called >> famd (File Alteration Monitor -> >> https://en.wikipedia.org/wiki/File_Alteration_Monitor). Looks like there is >> no .deb in a current repo,

Re: Monitoring copy file security

2018-08-13 Thread Thomas Schmitt
Hi, Martin wrote: > There is -or was, quite some time ago I've last seen this- a software called > famd (File Alteration Monitor -> > https://en.wikipedia.org/wiki/File_Alteration_Monitor). Looks like there is > no .deb in a current repo, but may be the name has changes. Maybe this ?

Re: Monitoring copy file security

2018-08-13 Thread Martin
Am 13.08.2018 um 20:52 schrieb Ilyass Kaouam: > Hi, > > I have a database server in which I save the database (dump) > let say > /home/backup directory. > I would like to monitor this directory and find out if anyone is doing a cp > or mv or. > Any idea? > Thank you very much > There is

Re: Monitoring copy file security

2018-08-13 Thread Roberto C . Sánchez
On Mon, Aug 13, 2018 at 08:52:35PM +0200, Ilyass Kaouam wrote: >Hi, >I have a database server in which I save the database (dump) >let say /home/backup directory. >I would like to monitor this directory and find out if anyone is doing a >cp or mv or. >Any idea? >

Re: Monitoring copy file security

2018-08-13 Thread Greg Wooledge
On Mon, Aug 13, 2018 at 08:52:35PM +0200, Ilyass Kaouam wrote: > I have a database server in which I save the database (dump) > let say > /home/backup directory. > I would like to monitor this directory and find out if anyone is doing a cp > or mv or. 1) Set the permissions correctly, so you

Monitoring copy file security

2018-08-13 Thread Ilyass Kaouam
Hi, I have a database server in which I save the database (dump) let say /home/backup directory. I would like to monitor this directory and find out if anyone is doing a cp or mv or. Any idea? Thank you very much

Re: (finished)Re: how to prevent security update installation during stretch installation

2018-08-04 Thread err404
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 08/04/2018 07:39 PM, David Christensen wrote: > I do keep optical drives in the older machines because their BIOS can be > incompatible with bootable USB flash drives. these machines need to be trashed, they are generaly not so efficient

Re: (finished)Re: how to prevent security update installation during stretch installation

2018-08-04 Thread David Christensen
question i may have to put up with security update It is best to keep your systems up-to-date with respect to security patches. hopefully this time debian 9.5 will not cause trouble (debian 9.4 with security update has problem) i'm not interested in spending any more energy on such trivial iss

<    1   2   3   4   5   6   7   8   9   10   >