Glynn, Thanks for the reminder howeever we already implemented ssh in our server before. The bypassing of password via telnet will be done internally and a specific login name has its own .bash_profile to access a specific batch of program that automatically load in their terminal upon login.Also, we only allow a valid terminals to be used by this login name.We would like to do for a purpose because of our program issues.
Bernie -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Wednesday, December 18, 2002 3:49 PM To: [EMAIL PROTECTED] Subject: plug digest, Vol 1 #2048 - 16 msgs Send plug mailing list submissions to [EMAIL PROTECTED] To subscribe or unsubscribe via the World Wide Web, visit http://lists.q-linux.com/mailman/listinfo/plug or, via email, send a message with subject or body 'help' to [EMAIL PROTECTED] You can reach the person managing the list at [EMAIL PROTECTED] When replying, please edit your Subject line so it is more specific than "Re: Contents of plug digest..." Today's Topics: 1. Re: change binary files (Rick Moen) 2. Re: The slicKer project (Orlando Andico) 3. Re: The slicKer project (Ronald Allan B. Henry) 4. Re: The slicKer project (Orlando Andico) 5. Re: The slicKer project (Ronald Allan B. Henry) 6. Adding a Hot Swappable SCSI HD on Linux. (Robert de los Santos) 7. bypassing password in telnet ([EMAIL PROTECTED]) 8. Re: bypassing password in telnet (Glynn S. Condez) 9. Re: bayanihan logo! (neuroticimbecile) 10. Re: bypassing password in telnet (Darwin Carrillo) 11. [plug]Kazaa problem (Darwin Carrillo) 12. Re: bypassing password in telnet ([EMAIL PROTECTED]) 13. Re: On Noise-Makers and the Policing of the PLUG List (was:sachachua) (Daniel O. Escasa) 14. Re: Web Server inside firewall (ian perez) 15. Re: [plug]Kazaa problem (Ariz Jacinto) 16. Re: [plug]Kazaa problem (Glynn S. Condez) --__--__-- Message: 1 Date: Tue, 17 Dec 2002 20:14:09 -0800 To: [EMAIL PROTECTED] Subject: Re: [plug] change binary files From: Rick Moen <[EMAIL PROTECTED]> Reply-To: [EMAIL PROTECTED] Quoting erg ert ([EMAIL PROTECTED]): > The system was hacked and change some binaries like top. how can i > recover my old configuration. If you're reasonably certain of this, then, as we were saying just yesterday, shut down and rebuild. http://lists.q-linux.com/pipermail/plug/2002-December/023835.html http://lists.q-linux.com/pipermail/plug/2002-December/023841.html http://lists.q-linux.com/pipermail/plug/2002-December/023845.html http://lists.q-linux.com/pipermail/plug/2002-December/023853.html -- Cheers, "By reading this sentence, you agree to be bound by the Rick Moen terms of the Internet Protocol, version 4, or, at your [EMAIL PROTECTED] option, any later version." -- Seth David Schoen --__--__-- Message: 2 Date: Wed, 18 Dec 2002 12:46:51 +0800 (PHT) From: Orlando Andico <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Re: [plug] The slicKer project Reply-To: [EMAIL PROTECTED] On Wed, 18 Dec 2002, Ronald Allan B. Henry wrote: .. > Could this be the one that could lure more > desktop users to Linux? > > http://slicker.sourceforge.net/screen.htm there's no code! it's complete vaporware! --- Orlando Andico <[EMAIL PROTECTED]> Mosaic Communications, Inc. --__--__-- Message: 3 Date: Wed, 18 Dec 2002 12:55:35 +0800 From: "Ronald Allan B. Henry" <[EMAIL PROTECTED]> Organization: Tsukiden Software Phils. Inc. To: [EMAIL PROTECTED] Subject: Re: [plug] The slicKer project Reply-To: [EMAIL PROTECTED] Orlando Andico wrote: > there's no code! it's complete vaporware! I did mention that it isn't finished yet, didn't I? :) --Ronnie --__--__-- Message: 4 Date: Wed, 18 Dec 2002 12:55:22 +0800 (PHT) From: Orlando Andico <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Re: [plug] The slicKer project Reply-To: [EMAIL PROTECTED] On Wed, 18 Dec 2002, Ronald Allan B. Henry wrote: .. > > there's no code! it's complete vaporware! > > I did mention that it isn't finished yet, > didn't I? :) Not finished != not existing :) When I hear "not finished" I expect at least some alpha code. Not photoshop'ped (or gimp'ed) screens. --- Orlando Andico <[EMAIL PROTECTED]> Mosaic Communications, Inc. --__--__-- Message: 5 Date: Wed, 18 Dec 2002 13:02:31 +0800 From: "Ronald Allan B. Henry" <[EMAIL PROTECTED]> Organization: Tsukiden Software Phils. Inc. To: [EMAIL PROTECTED] Subject: Re: [plug] The slicKer project Reply-To: [EMAIL PROTECTED] Orlando Andico wrote: > When I hear "not finished" I expect at least some alpha code. Not > photoshop'ped (or gimp'ed) screens. okay... sorry for the mis-information, Orly... :) well at least the idea is there, and at least somebody is thinking of ways to make linux a bit more user- friendly... :) --__--__-- Message: 6 From: "Robert de los Santos" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Date: Wed, 18 Dec 2002 13:01:03 +0800 Subject: [plug] Adding a Hot Swappable SCSI HD on Linux. Reply-To: [EMAIL PROTECTED] I'm having problems in a ASUS AP2300 Server, on how to add a Hot Swappable hard disk.... under Mandrake Linux 8.2 Any body could help me out. Thanks! Roberto R. de los Santos Jr. AGB Philippines, Inc. 1st Level, RCC Center 104 Shaw Blvd., Pasig City 1603 Tel no: 747-3882 to 87 Fax no: 747-3745 URL: http://www.agb.com.ph Be GRabeh! http://www.grabeh.com --__--__-- Message: 7 Date: Wed, 18 Dec 2002 13:02:14 +0800 From: <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Subject: [plug] bypassing password in telnet Reply-To: [EMAIL PROTECTED] This is a multi-part message in MIME format. ------_=_NextPart_001_01C2A652.A1315890 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Is there a way to bypass the password and accept only the login name using a telnet in Linux for a legitimate user? Thank you very much! Bernie ########################################### This message has been scanned by F-Secure Anti-Virus for Microsoft Exchange. For more information, connect to http://www.F-Secure.com/ ------_=_NextPart_001_01C2A652.A1315890 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <HTML><HEAD> <META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; = charset=3Diso-8859-1"> <META content=3D"MSHTML 5.00.3504.2500" name=3DGENERATOR></HEAD> <BODY> <DIV><FONT face=3DArial size=3D2><SPAN class=3D551475704-18122002>Is = there a way to=20 bypass the password and accept only the login name using a telnet in = Linux for a=20 legitimate user? Thank you very much!</SPAN></FONT></DIV> <DIV><FONT face=3DArial size=3D2><SPAN=20 class=3D551475704-18122002></SPAN></FONT> </DIV> <DIV><FONT face=3DArial size=3D2><SPAN=20 class=3D551475704-18122002></SPAN></FONT> </DIV> <DIV><FONT face=3DArial size=3D2><SPAN=20 class=3D551475704-18122002>Bernie</SPAN></FONT></DIV></BODY></HTML> <html><head></head><body>###########################################<br><= br>This message has been scanned by F-Secure Anti-Virus for Microsoft = Exchange.<br>For more information, connect to = http://www.F-Secure.com/</body></html> ------_=_NextPart_001_01C2A652.A1315890-- --__--__-- Message: 8 From: "Glynn S. Condez" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Subject: Re: [plug] bypassing password in telnet Date: Wed, 18 Dec 2002 13:20:16 +0800 Reply-To: [EMAIL PROTECTED] This is a multi-part message in MIME format. ------=_NextPart_000_00A5_01C2A698.34637BD0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable From: [EMAIL PROTECTED]=20 > Is there a way to bypass the password and accept only the login name = using a telnet in Linux for a legitimate user? Thank you very much! I would like to remind you that telnet is an insecure remote shell = logins specially if youre going to expose that server on the internet. I would ssh = instead of telnet, disable telnet, configure ssh with athorized_keys so that people can ssh-in without = using password. hth --- Glynn --- ------=_NextPart_000_00A5_01C2A698.34637BD0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <HTML><HEAD> <META content=3D"text/html; charset=3Diso-8859-1" = http-equiv=3DContent-Type> <META content=3D"MSHTML 5.00.3315.2870" name=3DGENERATOR> <STYLE></STYLE> </HEAD> <BODY bgColor=3D#ffffff> <DIV><FONT face=3DArial size=3D2> <DIV=20 style=3D"BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: = black"><B>From:</B> <A=20 href=3D"mailto:[EMAIL PROTECTED]"=20 [EMAIL PROTECTED]>[EMAIL PROTECTED]</A> = </DIV></FONT></DIV> <DIV><FONT face=3DArial size=3D2> <DIV><FONT face=3DArial size=3D2><SPAN class=3D551475704-18122002>> = Is there a way=20 to bypass the password and accept only the login name using a telnet in = Linux=20 for a legitimate user? Thank you very much!</SPAN></FONT></DIV> <DIV><FONT face=3DArial size=3D2><SPAN=20 class=3D551475704-18122002></SPAN></FONT> </DIV></FONT></DIV> <DIV><FONT face=3DArial size=3D2>I would like to remind you that telnet = is an=20 insecure remote shell logins specially</FONT></DIV> <DIV><FONT face=3DArial size=3D2>if youre going to expose that server on = the=20 internet. I would ssh instead of telnet, disable telnet,</FONT></DIV> <DIV><FONT face=3DArial size=3D2>configure ssh with athorized_keys so = that people=20 can ssh-in without using password.</FONT></DIV> <DIV> </DIV> <DIV><FONT face=3DArial size=3D2></FONT> </DIV> <DIV><FONT face=3DArial size=3D2>hth</FONT></DIV> <DIV>--- Glynn ---</DIV> <BLOCKQUOTE=20 style=3D"BORDER-LEFT: #000000 2px solid; MARGIN-LEFT: 5px; MARGIN-RIGHT: = 0px; PADDING-LEFT: 5px; PADDING-RIGHT: = 0px"> </BLOCKQUOTE></BODY></HTML> ------=_NextPart_000_00A5_01C2A698.34637BD0-- --__--__-- Message: 9 From: neuroticimbecile <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Re: [plug] bayanihan logo! Date: Wed, 18 Dec 2002 13:11:27 +0800 Cc: [EMAIL PROTECTED] Reply-To: [EMAIL PROTECTED] On Wednesday 18 December 2002 11:54, Ariz Jacinto wrote: > Loreto Casala Jr. wrote: > >hmmm.... why not a tarsier instead of a penguin? > > hehe, how about this, a Tux posing as an "Oblation" ? please move this discussion to plug-misc. if you're not a member and want to subscribe, please go here: http://lists.q-linux.com/mailman/listinfo/plug-misc peace! -eric -- .--. Enrique D. Rosel II ( () ) Q Linux Solutions, Inc. `--\\ A Philippine Open Source Solutions Co. http://www.q-linux.com/ --__--__-- Message: 10 From: "Darwin Carrillo" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Subject: Re: [plug] bypassing password in telnet Date: Wed, 18 Dec 2002 15:03:52 +0800 Reply-To: [EMAIL PROTECTED] This is a multi-part message in MIME format. ------=_NextPart_000_0016_01C2A6A6.ADA2BA20 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Try using SSH if you want to exposed that server into the internet world -darwin ----- Original Message -----=20 From: [EMAIL PROTECTED]=20 To: [EMAIL PROTECTED]=20 Sent: Wednesday, December 18, 2002 1:02 PM Subject: [plug] bypassing password in telnet Is there a way to bypass the password and accept only the login name = using a telnet in Linux for a legitimate user? Thank you very much! =20 =20 Bernie ########################################### This message has been scanned by F-Secure Anti-Virus for Microsoft = Exchange. For more information, connect to http://www.F-Secure.com/ ------=_NextPart_000_0016_01C2A6A6.ADA2BA20 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <HTML><HEAD> <META content=3D"text/html; charset=3Diso-8859-1" = http-equiv=3DContent-Type> <META content=3D"MSHTML 5.00.2919.6307" name=3DGENERATOR> <STYLE></STYLE> </HEAD> <BODY bgColor=3D#d8d0c8> <DIV><FONT face=3DArial size=3D2>Try using SSH if you want to exposed = that server=20 into the internet world</FONT></DIV> <DIV> </DIV> <DIV><FONT face=3DArial size=3D2>-darwin</FONT></DIV> <BLOCKQUOTE=20 style=3D"BORDER-LEFT: #000000 2px solid; MARGIN-LEFT: 5px; MARGIN-RIGHT: = 0px; PADDING-LEFT: 5px; PADDING-RIGHT: 0px"> <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV> <DIV=20 style=3D"BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: = black"><B>From:</B>=20 <A href=3D"mailto:[EMAIL PROTECTED]"=20 [EMAIL PROTECTED]>[EMAIL PROTECTED]</A> </DIV> <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A=20 href=3D"mailto:[EMAIL PROTECTED]"=20 [EMAIL PROTECTED]>[EMAIL PROTECTED]</A> </DIV> <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Wednesday, December 18, = 2002 1:02=20 PM</DIV> <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> [plug] bypassing = password in=20 telnet</DIV> <DIV><BR></DIV> <DIV><FONT face=3DArial size=3D2><SPAN class=3D551475704-18122002>Is = there a way to=20 bypass the password and accept only the login name using a telnet in = Linux for=20 a legitimate user? Thank you very much!</SPAN></FONT></DIV> <DIV><FONT face=3DArial size=3D2><SPAN=20 class=3D551475704-18122002></SPAN></FONT> </DIV> <DIV><FONT face=3DArial size=3D2><SPAN=20 class=3D551475704-18122002></SPAN></FONT> </DIV> <DIV><FONT face=3DArial size=3D2><SPAN=20 = class=3D551475704-18122002>Bernie</SPAN></FONT></DIV>####################= #######################<BR><BR>This=20 message has been scanned by F-Secure Anti-Virus for Microsoft = Exchange.<BR>For=20 more information, connect to <A=20 = href=3D"http://www.F-Secure.com/">http://www.F-Secure.com/</A></BLOCKQUOT= E></BODY></HTML> ------=_NextPart_000_0016_01C2A6A6.ADA2BA20-- --__--__-- Message: 11 From: "Darwin Carrillo" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Date: Wed, 18 Dec 2002 15:06:09 +0800 Subject: [plug] [plug]Kazaa problem Reply-To: [EMAIL PROTECTED] This is a multi-part message in MIME format. ------=_NextPart_000_0029_01C2A6A6.FEECA9E0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Hi, What would be the best plan to eliminate Kazaa in a network ? Thanks = .... -darwin ------=_NextPart_000_0029_01C2A6A6.FEECA9E0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <HTML><HEAD> <META content=3D"text/html; charset=3Diso-8859-1" = http-equiv=3DContent-Type> <META content=3D"MSHTML 5.00.2919.6307" name=3DGENERATOR> <STYLE></STYLE> </HEAD> <BODY bgColor=3D#d8d0c8> <DIV><FONT face=3DArial size=3D2>Hi,</FONT></DIV> <DIV><FONT face=3DArial size=3D2>What would be the best plan to = eliminate Kazaa in a=20 network ? Thanks ....</FONT></DIV> <DIV> </DIV> <DIV> </DIV> <DIV><FONT face=3DArial size=3D2>-darwin</FONT></DIV></BODY></HTML> ------=_NextPart_000_0029_01C2A6A6.FEECA9E0-- --__--__-- Message: 12 Date: Wed, 18 Dec 2002 15:04:21 +0800 (PHT) Subject: Re: [plug] bypassing password in telnet From: <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Reply-To: [EMAIL PROTECTED] > From: [EMAIL PROTECTED] >> Is there a way to bypass the password and accept only the login name >> using a telnet in Linux for a legitimate user? Thank you very much! You can use ssh instead and enable "PermitEmptyPasswords" on its sshd_config to login without a password. --__--__-- Message: 13 Date: Wed, 18 Dec 2002 15:48:12 +0800 To: plug <[EMAIL PROTECTED]> From: "Daniel O. Escasa" <[EMAIL PROTECTED]> Subject: Re: [plug] On Noise-Makers and the Policing of the PLUG List (was:sachachua) Reply-To: [EMAIL PROTECTED] ** Sabi ni Chris noong Tue, 17 Dec 2002 15:49:59 +0800 > yes, Mailman can do that. But that would put more pressure on the mail admin > since each post to the plug mailing list has to go through him for approval. I was referring to placing *individual* users, specifically new subscribers, not the entire list, on moderated mode. In effect, placing new subscribers on probation. If they prove to be sensible and real subscribers, and not trolls or spam artists, the mail admin can then un-moderate them. There's something similar on Yahoo groups. Mabuhay. --__--__-- Message: 14 From: "ian perez" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Subject: Re: [plug] Web Server inside firewall Date: Wed, 18 Dec 2002 15:45:22 +0800 Reply-To: [EMAIL PROTECTED] hello Andy; sorry for the late response :( btw, the ff. script is based on iptables, iptables -t nat -A PREROUTING -i eth0 -p TCP --dport 443 -s 0.0.0.0/0 -j DNAT --to $your_web_server_ip:443 iptables -A FORWARD -p TCP -d $your_web_server_ip --dport 443 -s 0.0.0.0/0 -j ACCEPT cheers, ian perez > Goody day. > > I set-up a firewall in our office, it has has 2 NIC. I remove the daemon that I do not need, basically, it's a plain > linux installation. > > The network configuration is, eth0 is facing internet and eth1 is facing secured network. My question is this: > > How do I forward web packe to our secured web server from Fwall using ipchains? --__--__-- Message: 15 Date: Wed, 18 Dec 2002 15:55:43 +0800 From: Ariz Jacinto <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Re: [plug] [plug]Kazaa problem Reply-To: [EMAIL PROTECTED] typically, you'll block the port that kazaa uses. but if kazaa is kinda "pushy" (meaning, it tries to use port 80 or http) you have to block the domain it uses on your proxy server / gateway. Darwin Carrillo wrote: > Hi, > What would be the best plan to eliminate Kazaa in a network ? Thanks .... > > > -darwin --__--__-- Message: 16 From: "Glynn S. Condez" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Subject: Re: [plug] [plug]Kazaa problem Date: Wed, 18 Dec 2002 15:46:47 +0800 Reply-To: [EMAIL PROTECTED] This is a multi-part message in MIME format. ------=_NextPart_000_010E_01C2A6AC.AC1A0F90 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable hi dick, you can block kazaa by using ipchains or iptables. --- Glynn --- ----- Original Message -----=20 From: Darwin Carrillo=20 To: [EMAIL PROTECTED]=20 Sent: Wednesday, December 18, 2002 3:06 PM Subject: [plug] [plug]Kazaa problem Hi, What would be the best plan to eliminate Kazaa in a network ? Thanks = .... -darwin ------=_NextPart_000_010E_01C2A6AC.AC1A0F90 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <HTML><HEAD> <META content=3D"text/html; charset=3Diso-8859-1" = http-equiv=3DContent-Type> <META content=3D"MSHTML 5.00.3315.2870" name=3DGENERATOR> <STYLE></STYLE> </HEAD> <BODY bgColor=3D#d8d0c8> <DIV><FONT face=3DArial size=3D2>hi dick,</FONT></DIV> <DIV> </DIV> <DIV><FONT face=3DArial size=3D2>you can block kazaa by using ipchains = or=20 iptables.</FONT></DIV> <DIV> </DIV> <DIV> </DIV> <DIV>--- Glynn ---</DIV> <BLOCKQUOTE=20 style=3D"BORDER-LEFT: #000000 2px solid; MARGIN-LEFT: 5px; MARGIN-RIGHT: = 0px; PADDING-LEFT: 5px; PADDING-RIGHT: 0px"> <DIV style=3D"FONT: 10pt arial">----- Original Message ----- </DIV> <DIV=20 style=3D"BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: = black"><B>From:</B>=20 <A href=3D"mailto:[EMAIL PROTECTED]" [EMAIL PROTECTED]>Darwin = Carrillo</A> </DIV> <DIV style=3D"FONT: 10pt arial"><B>To:</B> <A=20 href=3D"mailto:[EMAIL PROTECTED]"=20 [EMAIL PROTECTED]>[EMAIL PROTECTED]</A> </DIV> <DIV style=3D"FONT: 10pt arial"><B>Sent:</B> Wednesday, December 18, = 2002 3:06=20 PM</DIV> <DIV style=3D"FONT: 10pt arial"><B>Subject:</B> [plug] [plug]Kazaa = problem</DIV> <DIV><BR></DIV> <DIV><FONT face=3DArial size=3D2>Hi,</FONT></DIV> <DIV><FONT face=3DArial size=3D2>What would be the best plan to = eliminate Kazaa in=20 a network ? Thanks ....</FONT></DIV> <DIV> </DIV> <DIV> </DIV> <DIV><FONT face=3DArial = size=3D2>-darwin</FONT></DIV></BLOCKQUOTE></BODY></HTML> ------=_NextPart_000_010E_01C2A6AC.AC1A0F90-- --__--__-- _______________________________________________ plug mailing list [EMAIL PROTECTED] http://lists.q-linux.com/mailman/listinfo/plug End of plug Digest ########################################### This message has been scanned by F-Secure Anti-Virus for Microsoft Exchange. For more information, connect to http://www.F-Secure.com/ _ Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph To leave: send "unsubscribe" in the body to [EMAIL PROTECTED] Fully Searchable Archives With Friendly Web Interface at http://marc.free.net.ph To subscribe to the Linux Newbies' List: send "subscribe" in the body to [EMAIL PROTECTED]
