squirrelmail issues

2002-11-11 Thread Brad B
I've recently updated the squirrelmail package, due to the recent DSA security 
announce, and now am unable to login with any user accounts.  I receive the 
error "Unknown user or password incorrect."

I've restarted all pertinent applications including courier-imap, postfix, 
mysqld, and apache.  I've also attempted to debug by 'tail -f 
/var/log/mysql.log', and everything seems to be in order.  The queries issued 
to the db all return the proper information.  
So I'm pretty much stumped. :/

Can anyone shed some light onto what's going on here?

thanks
-Brad Beck

"There are truths you are unable to grasp because you are filled with desire 
for illusions.
Empty yourself of illusions and see the great mystery of things."



Re: spam

2002-11-11 Thread Vasarhelyi asd Daniel
On Tue, Nov 12, 2002 at 12:07:11PM +1030, Tom Cook wrote:
> On  0, Hanasaki JiJi <[EMAIL PROTECTED]> wrote:
> > Sure are.. I am just getting going with SA.  Anyone able to help me 
> > update exim4.conf to do the follow?
> > - bounce the spam back like it failed to deliver
> > - send a copy to the target user
> > - send a copy to some other address, in additionto the above
I'm not sure what you want to do, but if you want to filter spam, you
shouldn't multiply it. Notifying target user and sending a copy to other
ppl is quite unnecessary and waste of bandwidth.
Trying to notify the sender may be unnecessary too: spammers use 
non-existing mailbox names and if you generate an automaticed reply,
your mailbox get's filled with Mail Deliverity Errors. In the other
side, in this case sender gets a report message, lowering the risk
you miss something important.


Daniel

-- 
Daniel "asd" Vasarhelyi
PGP key avaible at http://asd.musichello.com/gpg-pub.key and public keyservers
Key fingerprint = EA00 AF4D A83C 1122 0967  DDF5 27BC 390F 181F 9954


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




unsubscribe

2002-11-11 Thread Elvedin T
unsubscribe


signature.asc
Description: This is a digitally signed message part


squirrelmail issues

2002-11-11 Thread Brad B
I've recently updated the squirrelmail package, due to the recent DSA security 
announce, and now am unable to login with any user accounts.  I receive the error 
"Unknown user or password incorrect."

I've restarted all pertinent applications including courier-imap, postfix, mysqld, and 
apache.  I've also attempted to debug by 'tail -f /var/log/mysql.log', and everything 
seems to be in order.  The queries issued to the db all return the proper information. 
 
So I'm pretty much stumped. :/

Can anyone shed some light onto what's going on here?

thanks
-Brad Beck

"There are truths you are unable to grasp because you are filled with desire for 
illusions.
Empty yourself of illusions and see the great mystery of things."


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




unsubscribe

2002-11-11 Thread Elvedin T
unsubscribe



signature.asc
Description: This is a digitally signed message part


Re: [SECURITY] [DSA 193-1] New klisa packages fix buffer overflow

2002-11-11 Thread Daniel Stone
On Mon, Nov 11, 2002 at 06:07:40PM +0100, Martin Schulze scrawled:
> iDEFENSE reports a security vulnerability in the klisa package, that
> provides a LAN information service similar to "Network Neighbourhood",
> which was discovered by Texonet.  It is possible for a local attacker
> to exploit a buffer overflow condition in resLISa, a restricted
> version of KLISa.  The vulnerability exists in the parsing of the
> LOGNAME environment variable, an overly long value will overwrite the
> instruction pointer thereby allowing an attacker to seize control of
> the executable.
> 
> This problem has been fixed in version 2.2.2-14.2 the current stable
> distribution (woody) and in version 2.2.2-14.3 for the unstable
> distribution (sid).  The old stable distribution (potato) is not
> affected since it doesn't contain a kdenetwork package

KDE 3.0.5 packages, including the fixed kdenetwork (and, by extension,
klisa) packages, will start appearing on kde.org roughly Thursday
evening AEST (UTC+10). I've got exams until Thursday, so no sooner.

-d

-- 
Daniel Stone <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>
Developer - http://kopete.kde.org, http://www.kde.org


pgpIQyPbrgw9G.pgp
Description: PGP signature


Re: spam

2002-11-11 Thread Tom Cook
On  0, Hanasaki JiJi <[EMAIL PROTECTED]> wrote:
> Sure are.. I am just getting going with SA.  Anyone able to help me 
> update exim4.conf to do the follow?
>   - bounce the spam back like it failed to deliver
>   - send a copy to the target user
>   - send a copy to some other address, in additionto the above

Deliver your mail via procmail (exim's default configuration is to do
this if you have a file ~/.procmailrc).  Then get procmail to to do
the bounce and forwards based on the X-Spam-Status header.

Tom
-- 
Tom Cook
Information Technology Services, The University of Adelaide

"If your  company is not involved in something called "ISO 9000" you
probably have no idea what it is.  If your company _is_ involved in ISO
9000 then you definitely have no idea what it is."
- Scott Adams - The Dilbert principle

Get my GPG public key: 
https://pinky.its.adelaide.edu.au/~tkcook/tom.cook-at-adelaide.edu.au


pgpFm9GL9Z6Rw.pgp
Description: PGP signature


Re: [SECURITY] [DSA 193-1] New klisa packages fix buffer overflow

2002-11-11 Thread Daniel Stone
On Mon, Nov 11, 2002 at 06:07:40PM +0100, Martin Schulze scrawled:
> iDEFENSE reports a security vulnerability in the klisa package, that
> provides a LAN information service similar to "Network Neighbourhood",
> which was discovered by Texonet.  It is possible for a local attacker
> to exploit a buffer overflow condition in resLISa, a restricted
> version of KLISa.  The vulnerability exists in the parsing of the
> LOGNAME environment variable, an overly long value will overwrite the
> instruction pointer thereby allowing an attacker to seize control of
> the executable.
> 
> This problem has been fixed in version 2.2.2-14.2 the current stable
> distribution (woody) and in version 2.2.2-14.3 for the unstable
> distribution (sid).  The old stable distribution (potato) is not
> affected since it doesn't contain a kdenetwork package

KDE 3.0.5 packages, including the fixed kdenetwork (and, by extension,
klisa) packages, will start appearing on kde.org roughly Thursday
evening AEST (UTC+10). I've got exams until Thursday, so no sooner.

-d

-- 
Daniel Stone <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>
Developer - http://kopete.kde.org, http://www.kde.org



msg07685/pgp0.pgp
Description: PGP signature


Re: spam

2002-11-11 Thread Tom Cook
On  0, Hanasaki JiJi <[EMAIL PROTECTED]> wrote:
> Sure are.. I am just getting going with SA.  Anyone able to help me 
> update exim4.conf to do the follow?
>   - bounce the spam back like it failed to deliver
>   - send a copy to the target user
>   - send a copy to some other address, in additionto the above

Deliver your mail via procmail (exim's default configuration is to do
this if you have a file ~/.procmailrc).  Then get procmail to to do
the bounce and forwards based on the X-Spam-Status header.

Tom
-- 
Tom Cook
Information Technology Services, The University of Adelaide

"If your  company is not involved in something called "ISO 9000" you
probably have no idea what it is.  If your company _is_ involved in ISO
9000 then you definitely have no idea what it is."
- Scott Adams - The Dilbert principle

Get my GPG public key: 
https://pinky.its.adelaide.edu.au/~tkcook/tom.cook-at-adelaide.edu.au



msg07684/pgp0.pgp
Description: PGP signature


Re: XFree86 4.2 bug in Debian Testing

2002-11-11 Thread Peter Cordes
On Fri, Nov 08, 2002 at 05:28:52PM +0100, Ivan Brezina wrote:
> 
> 
> On Fri, 8 Nov 2002, Joseph Pingenot wrote:
> 
> > >From Norbert Preining on Friday, 08 November, 2002:
> > >I think that vim-gtk tries to open a window, recognizes that this
> > >doesn't work (authorization) and starts normal text mode vi.
> > 
> > Probably the easiest way to do this is, instead of using su/sudo, run
> >   ssh -X localhost.  It'll tunnel your X apps back over the tunnel.  Not
> >   as efficient,  but it'll solve permissions problems.  Or, you
> >   can have root snag your user .Xauthority file to steal the user cookies.
> >   Then you can just set display:0.0.
> > 
> Another possibility is:
> su -c vim-gtk 
> 
> you can also use xhost +username for allowing users to connect to our
> Xserver. But this does not work for me on Debian.

 xhost is _host_ based access control, so of course xhost +username doesn't
work!  Debian by default starts X servers with -nolisten tcp, so doing xhost +
(to allow all connections) is the same as xhost +localhost, and is ok if
(and _only_ if) there are no local users you don't absolutely trust
(including trusting them not to get their accounts cracked with bad
passwords).

 I emphatically do not recommend using ssh running X stuff as root.  That is
_huge_ overhead compared to unix sockets and shared memory!  (If it's
working fine for you, then whatever, do what's easiest for you, but if
you're going to go to the trouble of learning how to jump through a hoop to
get X working, pick the right hoop!)

-- 
#define X(x,y) x##y
Peter Cordes ;  e-mail: X([EMAIL PROTECTED] , ns.ca)

"The gods confound the man who first found out how to distinguish the hours!
 Confound him, too, who in this place set up a sundial, to cut and hack
 my day so wretchedly into small pieces!" -- Plautus, 200 BC



Re: spam

2002-11-11 Thread Rich Rudnick
On Mon, 2002-11-11 at 11:04, Edward Guldemond wrote:
> On Mon, Nov 11, 2002 at 12:40:18PM -0500, Joey Hess wrote:
> > Thomas Horsten wrote:
> > > Set your mail server up to filter all Korean mail (that is, if you don't
> > > have any friends or relatives in Korea).
> > 
> > You might also want to make sure that you'll never be using any Debian
> > packages maintained by any of our South Korean Debian developers before
> > you do this. Developers tend to get annoyed if they try to help someone
> > and have their mail blocked by some over-broad generalization (I know I
> > would be..).
> 
> Or, if you're into whitelists and other crazy things, make sure that
> their email addresses can get past your blocking scheme.

I try to block on character sets: ie., 

^Content-Type.*charset.*[gG][bB]2312

This catches quite a few spams I can't read.

-- 
First Impressions are Bunk.



Re: XFree86 4.2 bug in Debian Testing

2002-11-11 Thread Peter Cordes
On Fri, Nov 08, 2002 at 05:28:52PM +0100, Ivan Brezina wrote:
> 
> 
> On Fri, 8 Nov 2002, Joseph Pingenot wrote:
> 
> > >From Norbert Preining on Friday, 08 November, 2002:
> > >I think that vim-gtk tries to open a window, recognizes that this
> > >doesn't work (authorization) and starts normal text mode vi.
> > 
> > Probably the easiest way to do this is, instead of using su/sudo, run
> >   ssh -X localhost.  It'll tunnel your X apps back over the tunnel.  Not
> >   as efficient,  but it'll solve permissions problems.  Or, you
> >   can have root snag your user .Xauthority file to steal the user cookies.
> >   Then you can just set display:0.0.
> > 
> Another possibility is:
> su -c vim-gtk 
> 
> you can also use xhost +username for allowing users to connect to our
> Xserver. But this does not work for me on Debian.

 xhost is _host_ based access control, so of course xhost +username doesn't
work!  Debian by default starts X servers with -nolisten tcp, so doing xhost +
(to allow all connections) is the same as xhost +localhost, and is ok if
(and _only_ if) there are no local users you don't absolutely trust
(including trusting them not to get their accounts cracked with bad
passwords).

 I emphatically do not recommend using ssh running X stuff as root.  That is
_huge_ overhead compared to unix sockets and shared memory!  (If it's
working fine for you, then whatever, do what's easiest for you, but if
you're going to go to the trouble of learning how to jump through a hoop to
get X working, pick the right hoop!)

-- 
#define X(x,y) x##y
Peter Cordes ;  e-mail: X([EMAIL PROTECTED] , ns.ca)

"The gods confound the man who first found out how to distinguish the hours!
 Confound him, too, who in this place set up a sundial, to cut and hack
 my day so wretchedly into small pieces!" -- Plautus, 200 BC


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: spam

2002-11-11 Thread Edward Guldemond
On Mon, Nov 11, 2002 at 12:40:18PM -0500, Joey Hess wrote:
> Thomas Horsten wrote:
> > Set your mail server up to filter all Korean mail (that is, if you don't
> > have any friends or relatives in Korea).
> 
> You might also want to make sure that you'll never be using any Debian
> packages maintained by any of our South Korean Debian developers before
> you do this. Developers tend to get annoyed if they try to help someone
> and have their mail blocked by some over-broad generalization (I know I
> would be..).

Or, if you're into whitelists and other crazy things, make sure that
their email addresses can get past your blocking scheme.

-- 
--
Edward Guldemond

GPG Key: 0x4E505B0F
Key fingerprint:  4CAC 6740 C1CD 3CE4 6CA0
  34E9 B3B7 18EC 4E50 5B0F


pgpLLvfffc5Op.pgp
Description: PGP signature


Re: spam

2002-11-11 Thread Joey Hess
Thomas Horsten wrote:
> Set your mail server up to filter all Korean mail (that is, if you don't
> have any friends or relatives in Korea).

You might also want to make sure that you'll never be using any Debian
packages maintained by any of our South Korean Debian developers before
you do this. Developers tend to get annoyed if they try to help someone
and have their mail blocked by some over-broad generalization (I know I
would be..).

-- 
see shy jo


pgpRAow1GeC31.pgp
Description: PGP signature


Re: spam

2002-11-11 Thread Rich Rudnick
On Mon, 2002-11-11 at 11:04, Edward Guldemond wrote:
> On Mon, Nov 11, 2002 at 12:40:18PM -0500, Joey Hess wrote:
> > Thomas Horsten wrote:
> > > Set your mail server up to filter all Korean mail (that is, if you don't
> > > have any friends or relatives in Korea).
> > 
> > You might also want to make sure that you'll never be using any Debian
> > packages maintained by any of our South Korean Debian developers before
> > you do this. Developers tend to get annoyed if they try to help someone
> > and have their mail blocked by some over-broad generalization (I know I
> > would be..).
> 
> Or, if you're into whitelists and other crazy things, make sure that
> their email addresses can get past your blocking scheme.

I try to block on character sets: ie., 

^Content-Type.*charset.*[gG][bB]2312

This catches quite a few spams I can't read.

-- 
First Impressions are Bunk.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: spam

2002-11-11 Thread Edward Guldemond
On Mon, Nov 11, 2002 at 12:40:18PM -0500, Joey Hess wrote:
> Thomas Horsten wrote:
> > Set your mail server up to filter all Korean mail (that is, if you don't
> > have any friends or relatives in Korea).
> 
> You might also want to make sure that you'll never be using any Debian
> packages maintained by any of our South Korean Debian developers before
> you do this. Developers tend to get annoyed if they try to help someone
> and have their mail blocked by some over-broad generalization (I know I
> would be..).

Or, if you're into whitelists and other crazy things, make sure that
their email addresses can get past your blocking scheme.

-- 
--
Edward Guldemond

GPG Key: 0x4E505B0F
Key fingerprint:  4CAC 6740 C1CD 3CE4 6CA0
  34E9 B3B7 18EC 4E50 5B0F



msg07681/pgp0.pgp
Description: PGP signature


Re: spam

2002-11-11 Thread Joey Hess
Thomas Horsten wrote:
> Set your mail server up to filter all Korean mail (that is, if you don't
> have any friends or relatives in Korea).

You might also want to make sure that you'll never be using any Debian
packages maintained by any of our South Korean Debian developers before
you do this. Developers tend to get annoyed if they try to help someone
and have their mail blocked by some over-broad generalization (I know I
would be..).

-- 
see shy jo



msg07680/pgp0.pgp
Description: PGP signature


Re: Unsuscribe

2002-11-11 Thread belg
Lovley! :P

On Mon, 11 Nov 2002, Gelokatil Registred Trademark wrote:

>
>
>
>
>
> 
> ?nete al mayor servicio mundial de correo electr?nico: Haz clic aqu? --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a
> subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
>



Re: Unsuscribe

2002-11-11 Thread belg
Lovley! :P

On Mon, 11 Nov 2002, Gelokatil Registred Trademark wrote:

>
>
>
>
>
> 
> Únete al mayor servicio mundial de correo electrónico: Haz clic aquí --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a
> subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
>


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Unsuscribe

2002-11-11 Thread Gelokatil Registred Trademark

 Únete al mayor servicio mundial de correo electrónico: Haz clic aquí 



Re: spam

2002-11-11 Thread Thomas Horsten
On Sun, 10 Nov 2002 [EMAIL PROTECTED] wrote:

> how can i block these bastards from korea from spaming me 10 times per day?

Set your mail server up to filter all Korean mail (that is, if you don't
have any friends or relatives in Korea).

There is a site, http://www.blackholes.us which has a number of zones for
filtering against specific countries or ISPs. It works the same way as the
other realtime blacklists, using a DNS system. Their zones are freely
available and you might want to install the Korea one on your own server
to make the lookups faster.

// Thomas



Unsuscribe

2002-11-11 Thread Gelokatil Registred Trademark

 Únete al mayor servicio mundial de correo electrónico: Haz clic aquí 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: spam

2002-11-11 Thread Thomas Horsten
On Sun, 10 Nov 2002 [EMAIL PROTECTED] wrote:

> how can i block these bastards from korea from spaming me 10 times per day?

Set your mail server up to filter all Korean mail (that is, if you don't
have any friends or relatives in Korea).

There is a site, http://www.blackholes.us which has a number of zones for
filtering against specific countries or ISPs. It works the same way as the
other realtime blacklists, using a DNS system. Their zones are freely
available and you might want to install the Korea one on your own server
to make the lookups faster.

// Thomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]