On 11 Aug 2010, at 19:16, Dale wrote:
Stroller wrote:
On 10 Aug 2010, at 20:22, Hazen Valliant-Saunders wrote:
...
Good Luck getting people to change them frequently and haveing
your techs and it departments meeting complexity and length policy.
I'm pretty sure that's a trivial setting
On 11 Aug 2010, at 21:30, Alan McKinnon wrote:
...
My users pick their own passwords - I present a list of 5 from apg
and let
them pick one
apg's results seem awfully unmemorable by default.
I tend to prefer random password generators that create pronounceable
nonsense words, by
On Thursday 12 August 2010 15:01:12 Stroller wrote:
On 11 Aug 2010, at 21:30, Alan McKinnon wrote:
...
My users pick their own passwords - I present a list of 5 from apg
and let
them pick one
apg's results seem awfully unmemorable by default.
I tend to prefer random password
On Thursday 12 August 2010 20:21:23 Alan McKinnon wrote:
The command I use is:
$ apg -m8 -x8 -MCNL
Badnack9
VeOsFid5
JucWeac9
EowtUzt1
SceybEf8
ByejCys1
After following this thread I emerged apg, thinking it looked useful.
But according to the man page and apg --help, the only
On Thursday 12 August 2010 21:43:17 Peter Humphrey wrote:
On Thursday 12 August 2010 20:21:23 Alan McKinnon wrote:
The command I use is:
$ apg -m8 -x8 -MCNL
Badnack9
VeOsFid5
JucWeac9
EowtUzt1
SceybEf8
ByejCys1
After following this thread I emerged apg, thinking it looked
Stroller wrote:
On 11 Aug 2010, at 19:16, Dale wrote:
Stroller wrote:
On 10 Aug 2010, at 20:22, Hazen Valliant-Saunders wrote:
...
Good Luck getting people to change them frequently and haveing your
techs and it departments meeting complexity and length policy.
I'm pretty sure that's a
Walter Dnes wrote:
On Tue, Aug 10, 2010 at 09:16:20PM -0500, Dale wrote
I used to use wvdial as well as pon and I don't recall having to be
root. I added myself the dial-up group if I recall correctly. It just
worked for me.
I also don't use sudo here either. ;-)
As I
On 10 Aug 2010, at 20:22, Hazen Valliant-Saunders wrote:
...
Good Luck getting people to change them frequently and haveing your
techs and it departments meeting complexity and length policy.
I'm pretty sure that's a trivial setting for expiration policy and a
PAM plugin or option to
On 10 Aug 2010, at 19:50, Alan McKinnon wrote:
... The major threat by analysis on a workstation is stepping away
for a
leak and forgetting to lock the screen. sudo is adequate protection
against
this as long as more than 5 minutes have elapsed since the last sudo
was run - ...
And I
Stroller wrote:
On 10 Aug 2010, at 20:22, Hazen Valliant-Saunders wrote:
...
Good Luck getting people to change them frequently and haveing your
techs and it departments meeting complexity and length policy.
I'm pretty sure that's a trivial setting for expiration policy and a
PAM plugin or
On Wednesday 11 August 2010 18:58:02 Stroller wrote:
On 10 Aug 2010, at 19:50, Alan McKinnon wrote:
... The major threat by analysis on a workstation is stepping away
for a
leak and forgetting to lock the screen. sudo is adequate protection
against
this as long as more than 5 minutes
On Wednesday 11 August 2010 20:16:42 Dale wrote:
Stroller wrote:
On 10 Aug 2010, at 20:22, Hazen Valliant-Saunders wrote:
...
Good Luck getting people to change them frequently and haveing your
techs and it departments meeting complexity and length policy.
I'm pretty sure that's a
On 08/11/2010 01:30 PM, Alan McKinnon wrote:
I refuse to implement password expiration policies and have a vast array of
literature to back me up when some dimwit damager gets on his expiration high
horse.
My users pick their own passwords - I present a list of 5 from apg and let
them
On Thursday 12 August 2010 00:11:12 Bill Longman wrote:
On 08/11/2010 01:30 PM, Alan McKinnon wrote:
I refuse to implement password expiration policies and have a vast array
of literature to back me up when some dimwit damager gets on his
expiration high horse.
My users pick their own
On Wed, Aug 11, 2010 at 4:09 PM, Alan McKinnon alan.mckin...@gmail.comwrote:
On Thursday 12 August 2010 00:11:12 Bill Longman wrote:
On 08/11/2010 01:30 PM, Alan McKinnon wrote:
I refuse to implement password expiration policies and have a vast
array
of literature to back me up when
On Tuesday 10 August 2010 03:18:05 William Hubbs wrote:
On Mon, Aug 09, 2010 at 05:30:40PM -0700, Kevin O'Gorman wrote:
On Mon, Aug 9, 2010 at 1:20 PM, Bill Longman bill.long...@gmail.com
wrote:
On 08/09/2010 01:08 PM, Robert Bridge wrote:
On Mon, Aug 9, 2010 at 8:09 PM, Mick
On Mon, Aug 9, 2010 at 6:18 PM, William Hubbs willi...@gentoo.org wrote:
On Mon, Aug 09, 2010 at 05:30:40PM -0700, Kevin O'Gorman wrote:
On Mon, Aug 9, 2010 at 1:20 PM, Bill Longman bill.long...@gmail.com
wrote:
I actually prefer sudo su - -- as long as I'm giving it away! :o)
Afaik,
On Tue, Aug 10, 2010 at 2:50 PM, Alan McKinnon alan.mckin...@gmail.comwrote:
On Tuesday 10 August 2010 15:03:19 Kevin O'Gorman wrote:
On Mon, Aug 9, 2010 at 6:18 PM, William Hubbs willi...@gentoo.org
wrote:
On Mon, Aug 09, 2010 at 05:30:40PM -0700, Kevin O'Gorman wrote:
On Mon, Aug 9,
On Tuesday 10 August 2010 20:22:13 Hazen Valliant-Saunders wrote:
Good Luck getting people to change them frequently and haveing your
techs and it departments meeting complexity and length policy.
Remeber the only secure system is off and disconnected.
I hope you know whom you're talking to
Walter Dnes wrote:
On Tue, Aug 10, 2010 at 04:14:41AM +0200, Frank Steinmetzger wrote
Am Dienstag, 10. August 2010 schrieb Paul Hartman:
Typing that long password into sudo every time I ran a command was a
hassle
I???ve never used sudo, and never really liked the idea of
On Tue, Aug 10, 2010 at 09:16:20PM -0500, Dale wrote
I used to use wvdial as well as pon and I don't recall having to be
root. I added myself the dial-up group if I recall correctly. It just
worked for me.
I also don't use sudo here either. ;-)
As I mentioned, I also have to copy a
Hi, today when working remotely I ran nethogs and noticed suspicious
network traffic coming from my home gentoo box. It was very low
traffic (less than 1KB/sec bandwidth usage) but according to nethogs
it was between a root user process and various suspicious-looking
ports on outside hosts in
On Monday 09 August 2010 18:25:56 Paul Hartman wrote:
Hi, today when working remotely I ran nethogs and noticed suspicious
network traffic coming from my home gentoo box. It was very low
traffic (less than 1KB/sec bandwidth usage) but according to nethogs
it was between a root user process and
On Mon, Aug 9, 2010 at 11:48 AM, Alan McKinnon alan.mckin...@gmail.com wrote:
On Monday 09 August 2010 18:25:56 Paul Hartman wrote:
Hi, today when working remotely I ran nethogs and noticed suspicious
network traffic coming from my home gentoo box. It was very low
traffic (less than 1KB/sec
On Monday 09 August 2010 17:25:56 Paul Hartman wrote:
My user account has sudo-without-password rights to any command.
Ouch!
There have been discussions on this list why sudo is a bad idea and sudo on
*any* command is an even worse idea. You might as well be running everything
as root, right?
On Mon, Aug 9, 2010 at 8:09 PM, Mick michaelkintz...@gmail.com wrote:
There have been discussions on this list why sudo is a bad idea and sudo on
*any* command is an even worse idea. You might as well be running everything
as root, right?
sudo normally logs the command executed, and the
On 08/09/2010 01:08 PM, Robert Bridge wrote:
On Mon, Aug 9, 2010 at 8:09 PM, Mick michaelkintz...@gmail.com wrote:
There have been discussions on this list why sudo is a bad idea and sudo on
*any* command is an even worse idea. You might as well be running everything
as root, right?
sudo
Robert Bridge wrote:
On Mon, Aug 9, 2010 at 8:09 PM, Mickmichaelkintz...@gmail.com wrote:
There have been discussions on this list why sudo is a bad idea and sudo on
*any* command is an even worse idea. You might as well be running everything
as root, right?
sudo normally logs the
100809 Robert Bridge wrote:
On Mon, Aug 9, 2010 at 8:09 PM, Mick michaelkintz...@gmail.com wrote:
There have been discussions on this list why sudo is a bad idea
and sudo on *any* command is an even worse idea.
You might as well be running everything as root, right?
sudo normally logs the
On Monday 09 August 2010 21:25:37 Dale wrote:
Robert Bridge wrote:
On Mon, Aug 9, 2010 at 8:09 PM, Mickmichaelkintz...@gmail.com wrote:
There have been discussions on this list why sudo is a bad idea and sudo
on *any* command is an even worse idea. You might as well be running
everything
Mick wrote:
On Monday 09 August 2010 21:25:37 Dale wrote:
Robert Bridge wrote:
On Mon, Aug 9, 2010 at 8:09 PM, Mickmichaelkintz...@gmail.com wrote:
There have been discussions on this list why sudo is a bad idea and sudo
on *any* command is an even worse idea. You might as
On Mon, Aug 9, 2010 at 2:09 PM, Mick michaelkintz...@gmail.com wrote:
On Monday 09 August 2010 17:25:56 Paul Hartman wrote:
My user account has sudo-without-password rights to any command.
Ouch!
Having still not physically touched the machine yet, I don't know if
sudo had anything to do with
On Mon, Aug 9, 2010 at 1:20 PM, Bill Longman bill.long...@gmail.com wrote:
On 08/09/2010 01:08 PM, Robert Bridge wrote:
On Mon, Aug 9, 2010 at 8:09 PM, Mick michaelkintz...@gmail.com wrote:
There have been discussions on this list why sudo is a bad idea and sudo
on
*any* command is an
On Mon, Aug 09, 2010 at 05:30:40PM -0700, Kevin O'Gorman wrote:
On Mon, Aug 9, 2010 at 1:20 PM, Bill Longman bill.long...@gmail.com wrote:
On 08/09/2010 01:08 PM, Robert Bridge wrote:
On Mon, Aug 9, 2010 at 8:09 PM, Mick michaelkintz...@gmail.com wrote:
There have been discussions on
Am Dienstag, 10. August 2010 schrieb Paul Hartman:
Typing that long password into sudo every time I ran a command was a
hassle
I’ve never used sudo, and never really liked the idea of it. In fact I’m
always amused and slightly annoyed by the sheer amount of sudo one can find in
your typical
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/08/2010, at 11:44 AM, Frank Steinmetzger wrote:
Am Dienstag, 10. August 2010 schrieb Paul Hartman:
Typing that long password into sudo every time I ran a command was a
hassle
I’ve never used sudo, and never really liked the idea of it.
On Mon, 9 Aug 2010 18:07:15 -0500
Paul Hartman paul.hartman+gen...@gmail.com wrote:
I do hope I can find some evidence that leads me to the point of
entry. It would set my mind at ease.
Please let us know. I'm really curious about this also. I hope it
wasn't a trojaned package in portage.
--
Alternatively I was running vulnerable/compromised software. My box
has sshd running, root login in ssh is not allowed, and pubkey only
logins (no passwords). It is behind a wireless router but port 22 is
open and pointing to this box, and a few others needed by other
applications. So I will
38 matches
Mail list logo