Re: ptrace vulnerability?

2003-03-19 Thread Gustavo Franco
associated function wasn't found in kernel-source-2.4.20. [1] = deb http://legolas.alternex.com.br/~stratus/debian/ ./ Cheers, -- Gustavo Franco <[EMAIL PROTECTED]>

Re: ptrace vulnerability?

2003-03-19 Thread Gustavo Franco
associated function wasn't found in kernel-source-2.4.20. [1] = deb http://legolas.alternex.com.br/~stratus/debian/ ./ Cheers, -- Gustavo Franco <[EMAIL PROTECTED]> -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Nessus 2.0.0 packages available

2003-03-06 Thread Gustavo Franco
apt line: > deb http://people.debian.org/~jfs/nessus 2.0.0/ > [1] http://www.nessus.org/nessus_2_0.html Hi jfs, What's the relationship between these nessus 2.0 packages and the nessus 2.0.1 packages[1] of Josip Rodin at the experimental release? [1] = http://packages.debian.org/e

Re: Nessus 2.0.0 packages available

2003-03-06 Thread Gustavo Franco
apt line: > deb http://people.debian.org/~jfs/nessus 2.0.0/ > [1] http://www.nessus.org/nessus_2_0.html Hi jfs, What's the relationship between these nessus 2.0 packages and the nessus 2.0.1 packages[1] of Josip Rodin at the experimental release? [1] = http://packages.debian.org/e

Re: Updating Snort Signatures In Stable ?

2002-12-11 Thread Gustavo Franco
On Tue, 2002-12-10 at 16:52, Matt Zimmerman wrote: > On Tue, Dec 10, 2002 at 04:36:08PM -0200, Gustavo Franco wrote: > > > No, you can't rebuild snort version from unstable. > > Who can't? You can't? I just did, and it was not only possible, but easy. Nick B

Re: Updating Snort Signatures In Stable ?

2002-12-11 Thread Gustavo Franco
On Tue, 2002-12-10 at 16:52, Matt Zimmerman wrote: > On Tue, Dec 10, 2002 at 04:36:08PM -0200, Gustavo Franco wrote: > > > No, you can't rebuild snort version from unstable. > > Who can't? You can't? I just did, and it was not only possible, but easy. Nick B

Re: File system integrity checkers - comparison?

2002-12-10 Thread Gustavo Franco
y main argument ageinst tripwire is it's pseudo-commercial source. > A online database with md5sums of systems: http://www.knowngoods.org/index.php The bad thing that they still have only Debian 2.2r5 md5sums. You can try the file integrity checker of them at: http://osiris.shmoo.com/ cya, Gustavo Franco -- <[EMAIL PROTECTED]>

Re: Stack-smashing protection

2002-12-10 Thread Gustavo Franco
Woody for i386 with propolice, stackguard or anything like, good too! I guess that Debian can support one more kernel flavor, it's so easy.You can see the previous commented patch called grsecurity, it has PaX and more interesting features to enhance security without rebuild the entire system.Comments here? cya, Gustavo Franco -- <[EMAIL PROTECTED]>

Re: Updating Snort Signatures In Stable ?

2002-12-10 Thread Gustavo Franco
for you is apt-pinning feature, you can read more about it at apt-howto[1]. With the tips you will keep a stable system plus snort from unstable system and obviously the depends.More easy to keep updated. [1] = http://www.debian.org/doc/manuals/apt-howto/ch-apt-get.en.html#s-default-version This is the section 3.8, check the 3.9 below too. cya, Gustavo Franco -- <[EMAIL PROTECTED]>

Re: File system integrity checkers - comparison?

2002-12-10 Thread Gustavo Franco
ain argument ageinst tripwire is it's pseudo-commercial source. > A online database with md5sums of systems: http://www.knowngoods.org/index.php The bad thing that they still have only Debian 2.2r5 md5sums. You can try the file integrity checker of them at: http://osiris.shmoo.com/

Re: Stack-smashing protection

2002-12-10 Thread Gustavo Franco
Woody for i386 with propolice, stackguard or anything like, good too! I guess that Debian can support one more kernel flavor, it's so easy.You can see the previous commented patch called grsecurity, it has PaX and more interesting features to enhance security without rebuild the entire system

Re: Updating Snort Signatures In Stable ?

2002-12-10 Thread Gustavo Franco
for you is apt-pinning feature, you can read more about it at apt-howto[1]. With the tips you will keep a stable system plus snort from unstable system and obviously the depends.More easy to keep updated. [1] = http://www.debian.org/doc/manuals/apt-howto/ch-apt-get.en.html#s-default-version

Re: grsecurity patch (woody kernel 2.4.18)

2002-10-18 Thread Gustavo Franco
gressive to set by default.One "harden" flavor to sarge with grsecurity patch can be good.Any feedback of d-boot guys? Thanks, -- Gustavo Franco -- <[EMAIL PROTECTED]> GNUpg id: 0x37155778 (try: wwwkeys.eu.pgp.net) I prefer encrypted and signed e-mail.

Re: Automatic Debian security updates, an Implementation

2002-10-18 Thread Gustavo Franco
elve servers running Debian GNU/Linux and i'm using one apt-proxy[3] and aptwatcher(like cron-apt). [1] = http://packages.debian.org/cron-apt/ [2] = http://people.debian.org/~ajt/ [3] = http://apt-proxy.sourceforge.net/ Talking about secpack, is it non-free? I can't see in your mail(Clemens) the

Re: grsecurity patch (woody kernel 2.4.18)

2002-10-18 Thread Gustavo Franco
gressive to set by default.One "harden" flavor to sarge with grsecurity patch can be good.Any feedback of d-boot guys? Thanks, -- Gustavo Franco -- <[EMAIL PROTECTED]> GNUpg id: 0x37155778 (try: wwwkeys.eu.pgp.net) I prefer encrypted and signed e-mail. -- To UNSUBSCRIBE, em

Re: Automatic Debian security updates, an Implementation

2002-10-18 Thread Gustavo Franco
elve servers running Debian GNU/Linux and i'm using one apt-proxy[3] and aptwatcher(like cron-apt). [1] = http://packages.debian.org/cron-apt/ [2] = http://people.debian.org/~ajt/ [3] = http://apt-proxy.sourceforge.net/ Talking about secpack, is it non-free? I can't see in your mail(Clemens) the

Re: Problems using the grsecurity kernel source patch package in woody.

2002-08-07 Thread Gustavo Franco
002 00:23:47 +0100 The phrase "The changelog says we are creating 2.4.18, but I thought the version is 2.4.18-grsec-1.9.4" occurs because your kernel-patch-2.4-grsecurity is adding in EXTRAVERSION on Makefile: -grsec-1.9.4.For more information ch

Re: Rootkit Detection

2002-03-28 Thread Gustavo Franco
On Thu, 28 Mar 2002 18:29:22 JST [EMAIL PROTECTED] (NOKUBI Takatsugu) wrote: > In article <[EMAIL PROTECTED]> > [EMAIL PROTECTED] writes: > > >> > I could made potato package easily from sid's source. It requires > >> > build-essential and debhelper to do it. > >> > >> Ok guy, but apt pin is so

Re: Rootkit Detection

2002-03-28 Thread Gustavo Franco
On Thu, 28 Mar 2002 18:29:22 JST [EMAIL PROTECTED] (NOKUBI Takatsugu) wrote: > In article <[EMAIL PROTECTED]> > [EMAIL PROTECTED] writes: > > >> > I could made potato package easily from sid's source. It requires > >> > build-essential and debhelper to do it. > >> > >> Ok guy, but apt pin is so

Re: DoS in debian (potato) proftpd

2002-03-27 Thread Gustavo Franco
On Wed, 27 Mar 2002 00:37:59 +0100 martin f krafft <[EMAIL PROTECTED]> wrote: >> [...] > > (please fix your line wraps!) > > security.debian.org has proftpd_1.2.0pre10-2.0potato1 which does not > contain this bug, at least not on i386 systems: > > fishbowl:~> ncftp lapse.home.madduck.net > NcFT

Re: Rootkit Detection

2002-03-27 Thread Gustavo Franco
On Wed, 27 Mar 2002 09:11:58 JST [EMAIL PROTECTED] (NOKUBI Takatsugu) wrote: > [...] > I could made potato package easily from sid's source. It requires > build-essential and debhelper to do it. Ok guy, but apt pin is so easy =) See: - Add in your sources.list something like: deb http://http.us.

Re: DoS in debian (potato) proftpd

2002-03-27 Thread Gustavo Franco
On Wed, 27 Mar 2002 00:37:59 +0100 martin f krafft <[EMAIL PROTECTED]> wrote: >> [...] > > (please fix your line wraps!) > > security.debian.org has proftpd_1.2.0pre10-2.0potato1 which does not > contain this bug, at least not on i386 systems: > > fishbowl:~> ncftp lapse.home.madduck.net > NcF

Re: Rootkit Detection

2002-03-27 Thread Gustavo Franco
On Wed, 27 Mar 2002 09:11:58 JST [EMAIL PROTECTED] (NOKUBI Takatsugu) wrote: > [...] > I could made potato package easily from sid's source. It requires > build-essential and debhelper to do it. Ok guy, but apt pin is so easy =) See: - Add in your sources.list something like: deb http://http.us

Re: Rootkit Detection

2002-03-26 Thread Gustavo Franco
On Tue, 26 Mar 2002 16:15:05 + Simon Young <[EMAIL PROTECTED]> wrote: > > Hi, > > [...] > Is there any way of detecting rootkits on potato? See: http://packages.debian.org/chkrootkit Try apt pin and get chkrootkit from sid. bye, -- _

Re: Rootkit Detection

2002-03-26 Thread Gustavo Franco
On Tue, 26 Mar 2002 16:15:05 + Simon Young <[EMAIL PROTECTED]> wrote: > > Hi, > > [...] > Is there any way of detecting rootkits on potato? See: http://packages.debian.org/chkrootkit Try apt pin and get chkrootkit from sid. bye, -- _

Re: (A little OT) Introduction to cryptography

2002-03-25 Thread Gustavo Franco
On Fri, 23 Mar 2001 13:50:54 +0100 "Philippe Seidel" <[EMAIL PROTECTED]> wrote: > Hi all, > > As you are the only security-related list I'm subscribed to and > cryptography has something to do with security, I'm directing this > question to this list. > [...] Hi Philippe, I'm reading 'Cryptograp

Re: (A little OT) Introduction to cryptography

2002-03-25 Thread Gustavo Franco
On Fri, 23 Mar 2001 13:50:54 +0100 "Philippe Seidel" <[EMAIL PROTECTED]> wrote: > Hi all, > > As you are the only security-related list I'm subscribed to and > cryptography has something to do with security, I'm directing this > question to this list. > [...] Hi Philippe, I'm reading 'Cryptogra

Re: Netsaint

2002-03-01 Thread Gustavo Franco
On Thu, 28 Feb 2002 15:55:13 +0100 Johan Jacobsson <[EMAIL PROTECTED]> wrote: Hi! Try stunnel (p.d.o/stunnel) for ssl encryption. > Hello! > I am using netsaint_statd on a debian machine and I would like to know > what I am doing, eg what security holes may this create? > As I understand it, the

Re: Netsaint

2002-03-01 Thread Gustavo Franco
On Thu, 28 Feb 2002 15:55:13 +0100 Johan Jacobsson <[EMAIL PROTECTED]> wrote: Hi! Try stunnel (p.d.o/stunnel) for ssl encryption. > Hello! > I am using netsaint_statd on a debian machine and I would like to know > what I am doing, eg what security holes may this create? > As I understand it, th