unsubscribe

2002-04-26 Thread Trancom

unsubscribe


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




problem to translate DSA 125 in french

2002-04-26 Thread Martin Quinson

Hello,

We have an ongoing effort to keep all DSA translated to french. But we have
a problem with the DSA125:

  Yuji Takahashi discovered a bug in analog which allows a cross-site
  scripting type attack. It is easy for an attacker to insert arbitrary
  strings into any web server logfile. If these strings are then analysed by
  analog, they can appear in the report. By this means an attacker can
  introduce arbitrary Javascript code, for example, into an analog report
  produced by someone else and read by a third person. Analog already
  attempted to encode unsafe characters to avoid this type of attack, but
  the conversion was incomplete. 
  
What is a cross-site scripting type attack ?

If there is some french speaking people on this list, could you propose a
translation ? If not, could you explain in english what kind of attack it is?

Thanks for all, Mt.

PS: keep us in CC, since we are not on the ML.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




how to unsubscribe.

2002-04-26 Thread Trancom

how to unsubscribe.

-- 
Best regards.
áÄÍÉÎÉÓÔÒÁÔÏÒ óÅÔÉ ïïï ôÒÁÎËÏÍ ëÏÒÏÂÁÎÏ× óÅÒÇÅÊ é×ÁÎÏ×ÉÞ.
ph (248) 3-96-47
(095) 745-09-50
mailto: [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: how to unsubscribe.

2002-04-26 Thread Mark Janssen

On Fri, 2002-04-26 at 09:58, Trancom wrote:
 how to unsubscribe.

 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Look here 

Or Here \/ \/ \/ \/ \/ \/ \/ \/ \/ \/ \/ \/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




RSA an easy crack?

2002-04-26 Thread DSC Siltec

I hate to say this, but I think I have reason to believe that PGP
 might actually be an easy crack.  Before now, it probably was 
only easy to those with access to specially designed analog computers,
which means that it really wasn't a problem.  But there is 
now in the public domain an algorithm solution method that will
generate a fast numerical solution for most systems of differential
equations, given an initial value.

That means that a digital solution is out there, and I think that
people within the security community need to check this out before
someone outside the security community does.

Specifically, I think that if you have the public key, and the 
encrypted data, and know (or can guess) what the unencrypted data
is, then you can quickly deduce the private key.

That's bad... unless steps are taken to eliminate this hole.

 --- before I go on, for responses please cc: me at [EMAIL PROTECTED]
---

Specifically, imagine a function that has a periodic nature at every
nth integer being 0, but being 1 at all other integers, and is in the
form of a broken triangular function.

__  ___  ___  ___  ___
  \/   \/   \/   \/   

Now, at one location, add in an upside down triangular function to make
the value 1 at that location.

__  ___    ___  ___
  \/   \/\/   \/ 

Also, define that the width of the triangle -- no matter what the
spacing --
is always, say +/- 0.25.

Now, define this function to be F, and define P to be the product of 
a whole bunch of functions F.  Now, define that a function F is to be
centered at any integer location where the value of the function is 1.

If you can do all that, then you can generate a function that will drop
out all the primes and only primes.  That is, the value of the function
will be 1 whereever there is a prime, and zero everywhere else.

Now go research the Parker-Souchacki solution to the Picard iteration. 
It's actually a very simple, fast algorithm that will generate bits in
linear time for any or most systems of equations or differential
equations.  (Developed by Ed Parker and Jim Souchacki of James Madison
University in Harrisonburg, VA USA... some info available on the web,
enough to learn their method.)

I am pretty sure that their method can be used in this way to generate
primes.  More than that, if you link the primes algorithm to the known
input data and the known output data and the public key, then
concievably you could have an algorithm that simply drops the digits of
the private key out one by one in almost no time.

-- Proposed solution:  It may be necessary to shift to white-noise
encryption for truly secure documents such as financial transactions. 
There are combinations of white-noise + PGP that may offer moderate
security for mostly secure documents.  More than that, our attitudes
about the security of RSA and PGP may need to change.

  - Mike


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: disable RPC

2002-04-26 Thread Javier Fernández-Sanguino Peña

On Wed, Apr 24, 2002 at 11:26:16AM -0400, Andrew Kaplan wrote:
 How do I disable RPC. I know the scripts can be removed from init.d But I
 know there's a command similar to apt-get remove ??? or something similar.
 That removes is completely.


Read
http://www.debian.org/doc/manuals/securing-debian-howto/ch-sec-services.en.html#s-rpc


Regards

Javi
PS: If you do not find that informative feel free to bug me :)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Lost root password!!

2002-04-26 Thread Javier Fernández-Sanguino Peña

On Wed, Apr 24, 2002 at 01:23:02AM +0200, Luis Gómez Miralles wrote:
 Hi,
 
 Simple. Do the init=/bin/sh trick. When you're booted, mount / -o
 remount,rw
 Then edit /etc/passwd and add this to /etc/passwd:
 root2::0:0:root:/root:/bin/bash
 
 This should do the trick :)

If you want more detailed info take a look at the Securing
Debian Manual, section 11.1.9
http://www.debian.org/doc/manuals/securing-debian-howto/ch11.en.html#s11.1

Hope that's useful.

Javi


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: RSA not an easy crack

2002-04-26 Thread Michael Robinson

On Fri, Apr 26, 2002 at 11:18:16AM +0200, DSC Siltec wrote:
 Now, define this function to be F, and define P to be the product of 
 a whole bunch of functions F.  Now, define that a function F is to be
 centered at any integer location where the value of the function is 1.

Consider the case of a 512-bit product of two 256-bit primes.  In this 
case, your whole bunch of functions is going to have a cardinality 
(if I read your pseudo-Sieve of Erathostenes idea correctly) on the order
of P * 2^128 (where P is the fraction of integers that are prime), or
P * 340,282,366,920,938,463,463,374,607,431,768,211,456 functions F.

Back to the drawing board, I would say.

-Michael Robinson


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: RSA not an easy crack

2002-04-26 Thread Michael Robinson

On Fri, Apr 26, 2002 at 11:18:16AM +0200, DSC Siltec wrote:
 Specifically, I think that if you have the public key, and the 
 encrypted data, and know (or can guess) what the unencrypted data
 is, then you can quickly deduce the private key.

I forgot to mention: in encryption scenarios with RSA (as opposed to
digital signatures), the unencrypted data is a randomly-generated
session key for a symmetric cipher, which is used to encrypt the actual
unencrypted data.  The session key is encrypted with RSA and then
discarded.

Finding the unencrypted data in this case is equivalent to either
cracking the session key RNG, or cracking the symmetric cipher, the 
ability to do either of which obviates the need to deduce the RSA
private key in the first place.

-Michael Robinson


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: RSA not an easy crack

2002-04-26 Thread Ralf Gerlich

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi all,

Michael Robinson wrote:
[snip]

| Finding the unencrypted data in this case is equivalent to either
| cracking the session key RNG, or cracking the symmetric cipher, the
| ability to do either of which obviates the need to deduce the RSA
| private key in the first place.
No it is not equivalent, as finding the private key would also enable
you to digitally identify yourself as the key's owner, which is of at
least the same importance when we look at how many people use PGP/GPG
for digitally signing documents and mails.

Ralf

- --
Ralf Gerlich[EMAIL PROTECTED]
Passionate programmer   http://home.easylink.de/rgerlich/
~(my GPG signature is here^^)
- -BEGIN GEEK CODE BLOCK-
Version: 3.12
GCS d- s: a-- C++ UL++ P+++ L++ E W++ N+ o-- K- w
O-- M V-- PS PE Y+ PGP+ t+ 5 X+ R- tv++ b+ DI D+
G e h-- r y+
- --END GEEK CODE BLOCK--
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAjzJQ80ACgkQS7bkJa+XO88PywCfdV33Ua6RqWFaNdj++1FEuN13
RKkAnigx96Tems1sxSK9SPeAPhkCxWEm
=9Z8H
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: problem to translate DSA 125 in french

2002-04-26 Thread Andrew Pimlott

On Fri, Apr 26, 2002 at 08:59:50AM +0200, Martin Quinson wrote:
 What is a cross-site scripting type attack ?

One of the first analyses was published by Marc Slemko of the Apache
Group at http://httpd.apache.org/info/css-security/ .  You'll
probably have to read the CERT links on that page as well.  Marc
deserves most of the credit for the current spate of cross-site
scripting reports: He was reiterating the severity of the problem
before most people understood it.

If you're going to publish a translated explanation, I humbly
suggest you read the material two or three times, to make sure you
really get it.  It's subtle.

As for a translated term:  Marc's article admits that cross-site
scripting isn't all that great a name to begin with, so I'd say
you're on your own.  :-)

Andrew


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: A more secure form of .htaccess?

2002-04-26 Thread eim

Hallo Brane,

I'm actually a K-13 student, and so in my 'strategic'
position I'm on both sides, admin of debian box and 3v1l cracker :)

No, well.. I was just kidding, I have really better things to
do than actually cracking Debian boxes in pubblic environments,
but anyway I what do you think about using https for .htaccess
authentication ?

With https data will be encripted and it's impossible to
find out login and password because they're not sent over
the net in a clear way.

Consider using https.

Good work and protect your boxes !

 - Ivo

On Thu, Apr 25, 2002 at 09:09:03PM -0600, Schusselig Brane wrote:
 Tom Dominico wrote:
  
  Hello all,
  
  I have written some php-based internal systems for our users.  Users are
  required to authenticate to access this system, and their login
  determines what they are allowed to do within the system.  I am
  concerned that their logging in with cleartext passwords is a security
  risk.  I work in a K-12 school enviroment, and many of these students
  are rather devious and resourceful (as I was at that age :) ).  My fear
  is some bright student setting a sniffer up on my network and gleaning
  passwords from it.
  
  I am wondering if any of you have had similar problems.  What is a more
  secure way for people to login?  Is SSL an option, and if so, how do I
  go about using it?  Do I have to purchase a certificate?  Or is there
  some other option?  Finally, should I be using .htaccess at all, or is
  there a better way?  Thank you in advance for your advice.
 
 Another option would be to run switches instead of normal hub or bus
 topology. Switches tend not to allow other nodes on a network to see
 data that is passing over it. However, it will more than likely prove to
 be a PITA to convince budget makers to allow the expense of the new
 equipment.
 
 Useless input, I know. But, I didn't see anyone else mention this. As a
 side note, if your installation is new enough, switches may already be
 in place, and you don't have much to worry about as far as stuff getting
 sniffed off the network. That is, of course, if the network was designed
 with that in mind.
 
 -Will Wesley, CCNA
 To make tax forms true they should read Income Owed Us and Incommode
 You.
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: A more secure form of .htaccess?

2002-04-26 Thread Dan Faerch


Htaccess:
---
You should be aware, that when you use normal .htaccess protection, browser
never logout..With eg. Internet Explorer, all intances of IE have to be
closed to make the browser forget the login..

There are several tricks to make the browser forget the login, but none
really secure.. One is to make a logout link that links to eg.
https://logout:[EMAIL PROTECTED]/logout

In the logout folder you make a new htaccess file that uses another
htpassword file which contains a user called logout with a password called
logout, but keeping the same REALM.. (the realm is importent)..

This rewrite's the browser credentials for your realm with username and
password logout.. (Make sure users in /logout have no vital access
offcourse)

The hard part is to get ppl to use the logout link and not just closing the
instance of the browser..

Second more, if your users are allowed to have pages on the same address as
the login system, the browser can, without much effort, be tricked into
giving away your systems username and password to a personal user page...


Switches:

The subject on switches.. It is a general misunderstanding that switches
provide security.. There are several easy tricks to make a switch spill its
guts.. They were designed for performance and no one ever promised security
:)


SSL:
---

No you do not need to purchase a certificate.. Simply generate your own..

Yet, in an enviroment where users share the same pc, security is hard to
achive (i am assuming that youre runnig a windows enviroment), since varios
keyloggers can be installed on the clients, you have access to the cache and
the cookies. On this i have no wonderous advise :)..


(i didnt follow the thread, only the content of this mail, so i hope im not
repeating anything already said)

- Dan Faerch
A/S ScanNet
(Denmark)




- Original Message -
From: eim [EMAIL PROTECTED]
To: Schusselig Brane [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Friday, April 26, 2002 5:57 PM
Subject: Re: A more secure form of .htaccess?


 Hallo Brane,

 I'm actually a K-13 student, and so in my 'strategic'
 position I'm on both sides, admin of debian box and 3v1l cracker :)

 No, well.. I was just kidding, I have really better things to
 do than actually cracking Debian boxes in pubblic environments,
 but anyway I what do you think about using https for .htaccess
 authentication ?

 With https data will be encripted and it's impossible to
 find out login and password because they're not sent over
 the net in a clear way.

 Consider using https.

 Good work and protect your boxes !

  - Ivo

 On Thu, Apr 25, 2002 at 09:09:03PM -0600, Schusselig Brane wrote:
  Tom Dominico wrote:
  
   Hello all,
  
   I have written some php-based internal systems for our users.  Users
are
   required to authenticate to access this system, and their login
   determines what they are allowed to do within the system.  I am
   concerned that their logging in with cleartext passwords is a security
   risk.  I work in a K-12 school enviroment, and many of these students
   are rather devious and resourceful (as I was at that age :) ).  My
fear
   is some bright student setting a sniffer up on my network and gleaning
   passwords from it.
  
   I am wondering if any of you have had similar problems.  What is a
more
   secure way for people to login?  Is SSL an option, and if so, how do I
   go about using it?  Do I have to purchase a certificate?  Or is there
   some other option?  Finally, should I be using .htaccess at all, or is
   there a better way?  Thank you in advance for your advice.
 
  Another option would be to run switches instead of normal hub or bus
  topology. Switches tend not to allow other nodes on a network to see
  data that is passing over it. However, it will more than likely prove to
  be a PITA to convince budget makers to allow the expense of the new
  equipment.
 
  Useless input, I know. But, I didn't see anyone else mention this. As a
  side note, if your installation is new enough, switches may already be
  in place, and you don't have much to worry about as far as stuff getting
  sniffed off the network. That is, of course, if the network was designed
  with that in mind.
 
  -Will Wesley, CCNA
  To make tax forms true they should read Income Owed Us and Incommode
  You.
 
 
  --
  To UNSUBSCRIBE, email to [EMAIL PROTECTED]
  with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]
 


 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: RSA not an easy crack

2002-04-26 Thread DSC Siltec

Michael Robinson wrote:
 
 On Fri, Apr 26, 2002 at 11:18:16AM +0200, DSC Siltec wrote:
  Now, define this function to be F, and define P to be the product of
  a whole bunch of functions F.  Now, define that a function F is to be
  centered at any integer location where the value of the function is 1.
 
 Consider the case of a 512-bit product of two 256-bit primes.  In this
 case, your whole bunch of functions is going to have a cardinality
 (if I read your pseudo-Sieve of Erathostenes idea correctly) on the order
 of P * 2^128 (where P is the fraction of integers that are prime), or
 P * 340,282,366,920,938,463,463,374,607,431,768,211,456 functions F.
 
 Back to the drawing board, I would say.
 
 -Michael Robinson

Actually, the beauty of the Parker Souchacki method is that it would 
allow the simultaneous solution of a system of equations that has one
functional solution.  Which means that you only need one set of
equations,
and it solves for all values at once, 

Which means you might have only about 40 equations to solve, and when
you add the RSA algorithm, perhaps another 10-20.  The algorithm then
starts with a single known point (for example, the value at x=2 is y=1)
and then performs a simple operation on each function, cranking out one
term of the MacLauren series of one function for each simple operation. 
One of those output functions will be a function that is 1 at every
prime, and zero everywhere else.  If done correctly, though, another one
of the functions is y=[Solution key] that means that after 60 simple
math operations you get 1 bit of the solution.  Another 60 operations
yields two more bits.  Another 60 operations yields another 4 bits.  
*Again -- that is if you know the raw data.*

It's that bad.  



However, the double-layered encryption, which always takes a randomly
generated number as its raw data, does sound secure, because the RNGs
are going to be practically unbreakable (we hope -- and that can be
improved with white-noise CDs recorded from your local waterfall.).  

The thing, then, would be to upgrade all security to double-layer, or
let it be understood that single-layer encryption is fragile -- if
indeed this algorithm works out.

 - Mike


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: connection refuse by tcp_wrapper

2002-04-26 Thread Gleydson Mazioli da Silva

First check if your reverse DNS is working, after that, try to put the line:

sshd: 192.168.1.10 192.168.1.11

In your /etc/hosts.allow. 

Regards

[EMAIL PROTECTED] escreveu em Wed, 24 Apr 2002 22:18:14 +0700 (JAVT):

 Dear all,
 
 I am a beginner in linux os,
 
 I try to configure tcp_wrapper in myconfiguration like this :
 
 hosts.deny
 ALL : ALL
 
 hosts.allow
 ALL : 192.168.1.10
 ALL : 192.168.1.11
 
 but when i try to connect from 192.168.1.10 and 11 my server is allways
 give a message :
 ssh_exchange_identification: Connection closed by remote host
 
 What is the problem with my tcp_wrapper ? anyone can help ?
 
 
 Thank all,
 
 Akoe Rymond
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 
 
 


---
Gleydson Mazioli da Silva
[EMAIL PROTECTED]
[EMAIL PROTECTED]

Errar é humano, mas para se fazer uma monstruosa cagada é preciso um
computador. (autor desconhecido)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: A more secure form of .htaccess?

2002-04-26 Thread martin f krafft

also sprach eim [EMAIL PROTECTED] [2002.04.26.1757 +0200]:
 With https data will be encripted and it's impossible to
 find out login and password because they're not sent over
 the net in a clear way.

never say impossible.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^.*|tr * mailto:; net@madduck
  
crying is the refuge of plain women but the ruin of pretty ones.
-- oscar wilde



msg06507/pgp0.pgp
Description: PGP signature


Re: RSA not an easy crack

2002-04-26 Thread Hubert Chan

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 DSC == DSC Siltec [EMAIL PROTECTED] writes:

DSC Actually, the beauty of the Parker Souchacki method is that it
DSC would allow the simultaneous solution of a system of equations that
DSC has one functional solution.  Which means that you only need one
DSC set of equations, and it solves for all values at once,

DSC Which means you might have only about 40 equations to solve, and
DSC when you add the RSA algorithm, perhaps another 10-20.  The

I think that Michael's point was that you'd need
P * 340,282,366,920,938,463,463,374,607,431,768,211,456 equations; not
10-20.

BTW, why are you discussing this on debian-security, and not with some
real mathematicians?  (Not that there aren't any real mathematicians on
this list, but d-s is populated mostly with admins.)  Someone like
Schneier would be in a much better position than pretty much anyone on
this list to tell you whether or not you're right.  Even a professor
from a local University would probably know better.

DSC However, the double-layered encryption, which always takes a
DSC randomly generated number as its raw data, does sound secure,
DSC because the RNGs are going to be practically unbreakable (we hope
DSC -- and that can be improved with white-noise CDs recorded from your
DSC local waterfall.).

???  According to your proposal, an attacker only needs the public key,
the plaintext, and the ciphertext, all of which are easy to obtain.  The
public key is know due to it being public.  He can generate his own
plaintext, and generate a ciphertext by hand, so the fact that every
PGP implementation uses a double layer encryption doesn't help.

Whether or not the digital signature on this message has been forged is
up to you to guess.  ;-)

- -- 
Hubert Chan [EMAIL PROTECTED] - http://www.geocities.com/hubertchan/
PGP/GnuPG key: 1024D/71FDA37F
Fingerprint: 6CC5 822D 2E55 494C 81DD  6F2C 6518 54DF 71FD A37F
Key available at wwwkeys.pgp.net.   Encrypted e-mail preferred.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE8yfEjZRhU33H9o38RAvUYAKCSTa1fPORg7ebHrwU6+m38RpzCYQCgw2Mb
aQOPRN6JLnYzenpnpMlvBOI=
=aHSP
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: A more secure form of .htaccess?

2002-04-26 Thread martin f krafft

also sprach Dan Faerch [EMAIL PROTECTED] [2002.04.26.1955 +0200]:
 Second more, if your users are allowed to have pages on the same
 address as the login system, the browser can, without much effort,
 be tricked into giving away your systems username and password to
 a personal user page...

how?

 The subject on switches.. It is a general misunderstanding that
 switches provide security.. There are several easy tricks to make
 a switch spill its guts.. They were designed for performance and no
 one ever promised security

true, and i love this one because it's the first thing everyone says
in response to hearing something said on 'sniffing'. uhm, every
previously not so exposed person as we are, i mean.

but have you tried your luck on one of the better cisco and
hewlett-packard switches? you know their algorithm against MAC table
overflow? if yes, then just think about it, and about how good it is.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^.*|tr * mailto:; net@madduck
  
micro$oft productivity software
  - see reductio ad absurdum, conclusions.



msg06509/pgp0.pgp
Description: PGP signature


Re: A more secure form of .htaccess?

2002-04-26 Thread Steve Mickeler

Trust not in switches.

They too can be easily manipulated unless you have locked them down at a
mac address and port level.

'apt-get install dsniff' ; 'man arpspoof'


 Another option would be to run switches instead of normal hub or bus
 topology. Switches tend not to allow other nodes on a network to see
 data that is passing over it. However, it will more than likely prove to
 be a PITA to convince budget makers to allow the expense of the new
 equipment.

 Useless input, I know. But, I didn't see anyone else mention this. As a
 side note, if your installation is new enough, switches may already be
 in place, and you don't have much to worry about as far as stuff getting
 sniffed off the network. That is, of course, if the network was designed
 with that in mind.

 -Will Wesley, CCNA
 To make tax forms true they should read Income Owed Us and Incommode
 You.


 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




[-] Steve Mickeler [ [EMAIL PROTECTED] ]

[|] Todays root password is brought to you by /dev/random

[+] 1024D/ACB58D4F = 0227 164B D680 9E13 9168  AE28 843F 57D7 ACB5 8D4F


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



unsubscribe

2002-04-26 Thread Trancom
unsubscribe


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



problem to translate DSA 125 in french

2002-04-26 Thread Martin Quinson
Hello,

We have an ongoing effort to keep all DSA translated to french. But we have
a problem with the DSA125:

  Yuji Takahashi discovered a bug in analog which allows a cross-site
  scripting type attack. It is easy for an attacker to insert arbitrary
  strings into any web server logfile. If these strings are then analysed by
  analog, they can appear in the report. By this means an attacker can
  introduce arbitrary Javascript code, for example, into an analog report
  produced by someone else and read by a third person. Analog already
  attempted to encode unsafe characters to avoid this type of attack, but
  the conversion was incomplete. 
  
What is a cross-site scripting type attack ?

If there is some french speaking people on this list, could you propose a
translation ? If not, could you explain in english what kind of attack it is?

Thanks for all, Mt.

PS: keep us in CC, since we are not on the ML.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



how to unsubscribe.

2002-04-26 Thread Trancom
how to unsubscribe.

-- 
Best regards.
Администратор Сети ООО Транком Коробанов Сергей Иванович.
ph (248) 3-96-47
(095) 745-09-50
mailto: [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: how to unsubscribe.

2002-04-26 Thread Mark Janssen
On Fri, 2002-04-26 at 09:58, Trancom wrote:
 how to unsubscribe.

 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Look here 

Or Here \/ \/ \/ \/ \/ \/ \/ \/ \/ \/ \/ \/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



RSA an easy crack?

2002-04-26 Thread DSC Siltec
I hate to say this, but I think I have reason to believe that PGP
 might actually be an easy crack.  Before now, it probably was 
only easy to those with access to specially designed analog computers,
which means that it really wasn't a problem.  But there is 
now in the public domain an algorithm solution method that will
generate a fast numerical solution for most systems of differential
equations, given an initial value.

That means that a digital solution is out there, and I think that
people within the security community need to check this out before
someone outside the security community does.

Specifically, I think that if you have the public key, and the 
encrypted data, and know (or can guess) what the unencrypted data
is, then you can quickly deduce the private key.

That's bad... unless steps are taken to eliminate this hole.

 --- before I go on, for responses please cc: me at [EMAIL PROTECTED]
---

Specifically, imagine a function that has a periodic nature at every
nth integer being 0, but being 1 at all other integers, and is in the
form of a broken triangular function.

__  ___  ___  ___  ___
  \/   \/   \/   \/   

Now, at one location, add in an upside down triangular function to make
the value 1 at that location.

__  ___    ___  ___
  \/   \/\/   \/ 

Also, define that the width of the triangle -- no matter what the
spacing --
is always, say +/- 0.25.

Now, define this function to be F, and define P to be the product of 
a whole bunch of functions F.  Now, define that a function F is to be
centered at any integer location where the value of the function is 1.

If you can do all that, then you can generate a function that will drop
out all the primes and only primes.  That is, the value of the function
will be 1 whereever there is a prime, and zero everywhere else.

Now go research the Parker-Souchacki solution to the Picard iteration. 
It's actually a very simple, fast algorithm that will generate bits in
linear time for any or most systems of equations or differential
equations.  (Developed by Ed Parker and Jim Souchacki of James Madison
University in Harrisonburg, VA USA... some info available on the web,
enough to learn their method.)

I am pretty sure that their method can be used in this way to generate
primes.  More than that, if you link the primes algorithm to the known
input data and the known output data and the public key, then
concievably you could have an algorithm that simply drops the digits of
the private key out one by one in almost no time.

-- Proposed solution:  It may be necessary to shift to white-noise
encryption for truly secure documents such as financial transactions. 
There are combinations of white-noise + PGP that may offer moderate
security for mostly secure documents.  More than that, our attitudes
about the security of RSA and PGP may need to change.

  - Mike


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Lost root password!!

2002-04-26 Thread Javier Fernández-Sanguino Peña
On Wed, Apr 24, 2002 at 01:23:02AM +0200, Luis Gómez Miralles wrote:
 Hi,
 
 Simple. Do the init=/bin/sh trick. When you're booted, mount / -o
 remount,rw
 Then edit /etc/passwd and add this to /etc/passwd:
 root2::0:0:root:/root:/bin/bash
 
 This should do the trick :)

If you want more detailed info take a look at the Securing
Debian Manual, section 11.1.9
http://www.debian.org/doc/manuals/securing-debian-howto/ch11.en.html#s11.1

Hope that's useful.

Javi


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: RSA not an easy crack

2002-04-26 Thread Michael Robinson
On Fri, Apr 26, 2002 at 11:18:16AM +0200, DSC Siltec wrote:
 Now, define this function to be F, and define P to be the product of 
 a whole bunch of functions F.  Now, define that a function F is to be
 centered at any integer location where the value of the function is 1.

Consider the case of a 512-bit product of two 256-bit primes.  In this 
case, your whole bunch of functions is going to have a cardinality 
(if I read your pseudo-Sieve of Erathostenes idea correctly) on the order
of P * 2^128 (where P is the fraction of integers that are prime), or
P * 340,282,366,920,938,463,463,374,607,431,768,211,456 functions F.

Back to the drawing board, I would say.

-Michael Robinson


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: RSA not an easy crack

2002-04-26 Thread Michael Robinson
On Fri, Apr 26, 2002 at 11:18:16AM +0200, DSC Siltec wrote:
 Specifically, I think that if you have the public key, and the 
 encrypted data, and know (or can guess) what the unencrypted data
 is, then you can quickly deduce the private key.

I forgot to mention: in encryption scenarios with RSA (as opposed to
digital signatures), the unencrypted data is a randomly-generated
session key for a symmetric cipher, which is used to encrypt the actual
unencrypted data.  The session key is encrypted with RSA and then
discarded.

Finding the unencrypted data in this case is equivalent to either
cracking the session key RNG, or cracking the symmetric cipher, the 
ability to do either of which obviates the need to deduce the RSA
private key in the first place.

-Michael Robinson


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



IPtables and Connection Tracking

2002-04-26 Thread Thorsten Kruschel
Hi,

today I saw something mysterious with IPtables. I had a little mistake
in my script. To test the funktionality. i pinged a host in the www and
changed then the wrong entries in my script. I looked with tcpdump if
the ping becomes a reply. But erverything i've done, no reply came back.

Then i pinged from another maschine in the same subnet and i've become a
reply.

Does the connection tracking hold the connections even if the firewall
was flushed?

If it is so, is it a bug or a feature?

Thanks to all

Thorsten




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: RSA not an easy crack

2002-04-26 Thread Ralf Gerlich

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi all,

Michael Robinson wrote:
[snip]

| Finding the unencrypted data in this case is equivalent to either
| cracking the session key RNG, or cracking the symmetric cipher, the
| ability to do either of which obviates the need to deduce the RSA
| private key in the first place.
No it is not equivalent, as finding the private key would also enable
you to digitally identify yourself as the key's owner, which is of at
least the same importance when we look at how many people use PGP/GPG
for digitally signing documents and mails.

Ralf

- --
Ralf Gerlich[EMAIL PROTECTED]
Passionate programmer   http://home.easylink.de/rgerlich/
~(my GPG signature is here^^)
- -BEGIN GEEK CODE BLOCK-
Version: 3.12
GCS d- s: a-- C++ UL++ P+++ L++ E W++ N+ o-- K- w
O-- M V-- PS PE Y+ PGP+ t+ 5 X+ R- tv++ b+ DI D+
G e h-- r y+
- --END GEEK CODE BLOCK--
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAjzJQ80ACgkQS7bkJa+XO88PywCfdV33Ua6RqWFaNdj++1FEuN13
RKkAnigx96Tems1sxSK9SPeAPhkCxWEm
=9Z8H
-END PGP SIGNATURE-


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: problem to translate DSA 125 in french

2002-04-26 Thread Andrew Pimlott
On Fri, Apr 26, 2002 at 08:59:50AM +0200, Martin Quinson wrote:
 What is a cross-site scripting type attack ?

One of the first analyses was published by Marc Slemko of the Apache
Group at http://httpd.apache.org/info/css-security/ .  You'll
probably have to read the CERT links on that page as well.  Marc
deserves most of the credit for the current spate of cross-site
scripting reports: He was reiterating the severity of the problem
before most people understood it.

If you're going to publish a translated explanation, I humbly
suggest you read the material two or three times, to make sure you
really get it.  It's subtle.

As for a translated term:  Marc's article admits that cross-site
scripting isn't all that great a name to begin with, so I'd say
you're on your own.  :-)

Andrew


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: A more secure form of .htaccess?

2002-04-26 Thread eim
Hallo Brane,

I'm actually a K-13 student, and so in my 'strategic'
position I'm on both sides, admin of debian box and 3v1l cracker :)

No, well.. I was just kidding, I have really better things to
do than actually cracking Debian boxes in pubblic environments,
but anyway I what do you think about using https for .htaccess
authentication ?

With https data will be encripted and it's impossible to
find out login and password because they're not sent over
the net in a clear way.

Consider using https.

Good work and protect your boxes !

 - Ivo

On Thu, Apr 25, 2002 at 09:09:03PM -0600, Schusselig Brane wrote:
 Tom Dominico wrote:
  
  Hello all,
  
  I have written some php-based internal systems for our users.  Users are
  required to authenticate to access this system, and their login
  determines what they are allowed to do within the system.  I am
  concerned that their logging in with cleartext passwords is a security
  risk.  I work in a K-12 school enviroment, and many of these students
  are rather devious and resourceful (as I was at that age :) ).  My fear
  is some bright student setting a sniffer up on my network and gleaning
  passwords from it.
  
  I am wondering if any of you have had similar problems.  What is a more
  secure way for people to login?  Is SSL an option, and if so, how do I
  go about using it?  Do I have to purchase a certificate?  Or is there
  some other option?  Finally, should I be using .htaccess at all, or is
  there a better way?  Thank you in advance for your advice.
 
 Another option would be to run switches instead of normal hub or bus
 topology. Switches tend not to allow other nodes on a network to see
 data that is passing over it. However, it will more than likely prove to
 be a PITA to convince budget makers to allow the expense of the new
 equipment.
 
 Useless input, I know. But, I didn't see anyone else mention this. As a
 side note, if your installation is new enough, switches may already be
 in place, and you don't have much to worry about as far as stuff getting
 sniffed off the network. That is, of course, if the network was designed
 with that in mind.
 
 -Will Wesley, CCNA
 To make tax forms true they should read Income Owed Us and Incommode
 You.
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: A more secure form of .htaccess?

2002-04-26 Thread Dan Faerch

Htaccess:
---
You should be aware, that when you use normal .htaccess protection, browser
never logout..With eg. Internet Explorer, all intances of IE have to be
closed to make the browser forget the login..

There are several tricks to make the browser forget the login, but none
really secure.. One is to make a logout link that links to eg.
https://logout:[EMAIL PROTECTED]/logout

In the logout folder you make a new htaccess file that uses another
htpassword file which contains a user called logout with a password called
logout, but keeping the same REALM.. (the realm is importent)..

This rewrite's the browser credentials for your realm with username and
password logout.. (Make sure users in /logout have no vital access
offcourse)

The hard part is to get ppl to use the logout link and not just closing the
instance of the browser..

Second more, if your users are allowed to have pages on the same address as
the login system, the browser can, without much effort, be tricked into
giving away your systems username and password to a personal user page...


Switches:

The subject on switches.. It is a general misunderstanding that switches
provide security.. There are several easy tricks to make a switch spill its
guts.. They were designed for performance and no one ever promised security
:)


SSL:
---

No you do not need to purchase a certificate.. Simply generate your own..

Yet, in an enviroment where users share the same pc, security is hard to
achive (i am assuming that youre runnig a windows enviroment), since varios
keyloggers can be installed on the clients, you have access to the cache and
the cookies. On this i have no wonderous advise :)..


(i didnt follow the thread, only the content of this mail, so i hope im not
repeating anything already said)

- Dan Faerch
A/S ScanNet
(Denmark)




- Original Message -
From: eim [EMAIL PROTECTED]
To: Schusselig Brane [EMAIL PROTECTED]
Cc: debian-security@lists.debian.org
Sent: Friday, April 26, 2002 5:57 PM
Subject: Re: A more secure form of .htaccess?


 Hallo Brane,

 I'm actually a K-13 student, and so in my 'strategic'
 position I'm on both sides, admin of debian box and 3v1l cracker :)

 No, well.. I was just kidding, I have really better things to
 do than actually cracking Debian boxes in pubblic environments,
 but anyway I what do you think about using https for .htaccess
 authentication ?

 With https data will be encripted and it's impossible to
 find out login and password because they're not sent over
 the net in a clear way.

 Consider using https.

 Good work and protect your boxes !

  - Ivo

 On Thu, Apr 25, 2002 at 09:09:03PM -0600, Schusselig Brane wrote:
  Tom Dominico wrote:
  
   Hello all,
  
   I have written some php-based internal systems for our users.  Users
are
   required to authenticate to access this system, and their login
   determines what they are allowed to do within the system.  I am
   concerned that their logging in with cleartext passwords is a security
   risk.  I work in a K-12 school enviroment, and many of these students
   are rather devious and resourceful (as I was at that age :) ).  My
fear
   is some bright student setting a sniffer up on my network and gleaning
   passwords from it.
  
   I am wondering if any of you have had similar problems.  What is a
more
   secure way for people to login?  Is SSL an option, and if so, how do I
   go about using it?  Do I have to purchase a certificate?  Or is there
   some other option?  Finally, should I be using .htaccess at all, or is
   there a better way?  Thank you in advance for your advice.
 
  Another option would be to run switches instead of normal hub or bus
  topology. Switches tend not to allow other nodes on a network to see
  data that is passing over it. However, it will more than likely prove to
  be a PITA to convince budget makers to allow the expense of the new
  equipment.
 
  Useless input, I know. But, I didn't see anyone else mention this. As a
  side note, if your installation is new enough, switches may already be
  in place, and you don't have much to worry about as far as stuff getting
  sniffed off the network. That is, of course, if the network was designed
  with that in mind.
 
  -Will Wesley, CCNA
  To make tax forms true they should read Income Owed Us and Incommode
  You.
 
 
  --
  To UNSUBSCRIBE, email to [EMAIL PROTECTED]
  with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]
 


 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: RSA not an easy crack

2002-04-26 Thread DSC Siltec
Michael Robinson wrote:
 
 On Fri, Apr 26, 2002 at 11:18:16AM +0200, DSC Siltec wrote:
  Now, define this function to be F, and define P to be the product of
  a whole bunch of functions F.  Now, define that a function F is to be
  centered at any integer location where the value of the function is 1.
 
 Consider the case of a 512-bit product of two 256-bit primes.  In this
 case, your whole bunch of functions is going to have a cardinality
 (if I read your pseudo-Sieve of Erathostenes idea correctly) on the order
 of P * 2^128 (where P is the fraction of integers that are prime), or
 P * 340,282,366,920,938,463,463,374,607,431,768,211,456 functions F.
 
 Back to the drawing board, I would say.
 
 -Michael Robinson

Actually, the beauty of the Parker Souchacki method is that it would 
allow the simultaneous solution of a system of equations that has one
functional solution.  Which means that you only need one set of
equations,
and it solves for all values at once, 

Which means you might have only about 40 equations to solve, and when
you add the RSA algorithm, perhaps another 10-20.  The algorithm then
starts with a single known point (for example, the value at x=2 is y=1)
and then performs a simple operation on each function, cranking out one
term of the MacLauren series of one function for each simple operation. 
One of those output functions will be a function that is 1 at every
prime, and zero everywhere else.  If done correctly, though, another one
of the functions is y=[Solution key] that means that after 60 simple
math operations you get 1 bit of the solution.  Another 60 operations
yields two more bits.  Another 60 operations yields another 4 bits.  
*Again -- that is if you know the raw data.*

It's that bad.  



However, the double-layered encryption, which always takes a randomly
generated number as its raw data, does sound secure, because the RNGs
are going to be practically unbreakable (we hope -- and that can be
improved with white-noise CDs recorded from your local waterfall.).  

The thing, then, would be to upgrade all security to double-layer, or
let it be understood that single-layer encryption is fragile -- if
indeed this algorithm works out.

 - Mike


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: A more secure form of .htaccess?

2002-04-26 Thread Mike Renfro
On Fri, Apr 26, 2002 at 07:55:06PM +0200, Dan Faerch wrote:

 You should be aware, that when you use normal .htaccess protection,
 browser never logout..With eg. Internet Explorer, all intances of IE
 have to be closed to make the browser forget the login..

Actually, I think instances of IE that were each run from the desktop
or quicklaunch bar don't share authentication info. At least this has
been my experience with IE4 and 5.x. However, if you use File / New to
start a new window, that window will share authentication info with
the parent.

-- 
Mike Renfro  / RD Engineer, Center for Manufacturing Research,
931 372-3601 / Tennessee Technological University -- [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: connection refuse by tcp_wrapper

2002-04-26 Thread Gleydson Mazioli da Silva
First check if your reverse DNS is working, after that, try to put the line:

sshd: 192.168.1.10 192.168.1.11

In your /etc/hosts.allow. 

Regards

[EMAIL PROTECTED] escreveu em Wed, 24 Apr 2002 22:18:14 +0700 (JAVT):

 Dear all,
 
 I am a beginner in linux os,
 
 I try to configure tcp_wrapper in myconfiguration like this :
 
 hosts.deny
 ALL : ALL
 
 hosts.allow
 ALL : 192.168.1.10
 ALL : 192.168.1.11
 
 but when i try to connect from 192.168.1.10 and 11 my server is allways
 give a message :
 ssh_exchange_identification: Connection closed by remote host
 
 What is the problem with my tcp_wrapper ? anyone can help ?
 
 
 Thank all,
 
 Akoe Rymond
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 
 
 


---
Gleydson Mazioli da Silva
[EMAIL PROTECTED]
[EMAIL PROTECTED]

Errar é humano, mas para se fazer uma monstruosa cagada é preciso um
computador. (autor desconhecido)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: A more secure form of .htaccess?

2002-04-26 Thread martin f krafft
also sprach eim [EMAIL PROTECTED] [2002.04.26.1757 +0200]:
 With https data will be encripted and it's impossible to
 find out login and password because they're not sent over
 the net in a clear way.

never say impossible.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^.*|tr * mailto:; [EMAIL PROTECTED]
  
crying is the refuge of plain women but the ruin of pretty ones.
-- oscar wilde


pgpayMVTHVbHF.pgp
Description: PGP signature


Re: RSA not an easy crack

2002-04-26 Thread Hubert Chan
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 DSC == DSC Siltec [EMAIL PROTECTED] writes:

DSC Actually, the beauty of the Parker Souchacki method is that it
DSC would allow the simultaneous solution of a system of equations that
DSC has one functional solution.  Which means that you only need one
DSC set of equations, and it solves for all values at once,

DSC Which means you might have only about 40 equations to solve, and
DSC when you add the RSA algorithm, perhaps another 10-20.  The

I think that Michael's point was that you'd need
P * 340,282,366,920,938,463,463,374,607,431,768,211,456 equations; not
10-20.

BTW, why are you discussing this on debian-security, and not with some
real mathematicians?  (Not that there aren't any real mathematicians on
this list, but d-s is populated mostly with admins.)  Someone like
Schneier would be in a much better position than pretty much anyone on
this list to tell you whether or not you're right.  Even a professor
from a local University would probably know better.

DSC However, the double-layered encryption, which always takes a
DSC randomly generated number as its raw data, does sound secure,
DSC because the RNGs are going to be practically unbreakable (we hope
DSC -- and that can be improved with white-noise CDs recorded from your
DSC local waterfall.).

???  According to your proposal, an attacker only needs the public key,
the plaintext, and the ciphertext, all of which are easy to obtain.  The
public key is know due to it being public.  He can generate his own
plaintext, and generate a ciphertext by hand, so the fact that every
PGP implementation uses a double layer encryption doesn't help.

Whether or not the digital signature on this message has been forged is
up to you to guess.  ;-)

- -- 
Hubert Chan [EMAIL PROTECTED] - http://www.geocities.com/hubertchan/
PGP/GnuPG key: 1024D/71FDA37F
Fingerprint: 6CC5 822D 2E55 494C 81DD  6F2C 6518 54DF 71FD A37F
Key available at wwwkeys.pgp.net.   Encrypted e-mail preferred.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE8yfEjZRhU33H9o38RAvUYAKCSTa1fPORg7ebHrwU6+m38RpzCYQCgw2Mb
aQOPRN6JLnYzenpnpMlvBOI=
=aHSP
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: A more secure form of .htaccess?

2002-04-26 Thread martin f krafft
also sprach Dan Faerch [EMAIL PROTECTED] [2002.04.26.1955 +0200]:
 Second more, if your users are allowed to have pages on the same
 address as the login system, the browser can, without much effort,
 be tricked into giving away your systems username and password to
 a personal user page...

how?

 The subject on switches.. It is a general misunderstanding that
 switches provide security.. There are several easy tricks to make
 a switch spill its guts.. They were designed for performance and no
 one ever promised security

true, and i love this one because it's the first thing everyone says
in response to hearing something said on 'sniffing'. uhm, every
previously not so exposed person as we are, i mean.

but have you tried your luck on one of the better cisco and
hewlett-packard switches? you know their algorithm against MAC table
overflow? if yes, then just think about it, and about how good it is.

-- 
martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^.*|tr * mailto:; [EMAIL PROTECTED]
  
micro$oft productivity software
  - see reductio ad absurdum, conclusions.


pgpO7L5yHkmrY.pgp
Description: PGP signature