Inquiry on Bullseye and https://security-tracker.debian.org/tracker/CVE-2019-8457

2022-08-26 Thread Chris Penalver

Hi Debian Security Team,

I am inquiring on Debian Bullseye as it relates to:

https://security-tracker.debian.org/tracker/CVE-2019-8457

Specifically, it is noted the team has put in a good faith effort in 
analyzing the feasibility of backporting relevant patches to Bullseye, 
and classifying the urgency of such effort. My read of this so far is 
that it's a debug mode only exposure, normally disabled in production 
(by default).


With that said, for those environment who are using Bullseye, outside of 
the amount of changes required for the backport, is there any technical 
'gotchas' or further advice the team could provide for those who are 
considering a self-maintain of relevant patches from bookworm / sid into 
Bullseye while the discussion continues on this?


Thanks!

- Chris Peñalver

christopher.m.penal...@gmail.com



Re: rssh security update breaks rsync via Synology's "hyper backup"

2019-02-19 Thread Chris Lamb
Hi Russ,

> I've not done an LTS security upload before, but it looks from the wiki
> that it uses the same security-master process as stable security updates.
> Please let me know if that's wrong.

This is mostly correct, yep! I made the following the changes to
your jessie diff:

  -  * The fix for the scp security vulneraability in 2.3.4-5+deb9u1
  +  * The fix for the scp security vulnerability in 2.3.4-4+deb8u2

.. and released this as a DLA-1660-2 "regression" update. I will leave
the stable update to the security team.


Best wishes,

-- 
  ,''`.
     : :'  : Chris Lamb
 `. `'`  la...@debian.org  chris-lamb.co.uk
   `-



Re: rssh security update breaks rsync via Synology's "hyper backup"

2019-02-18 Thread Chris Lamb
Antoine Beaupré wrote:

> > Does this plan sound good to everyone?  I'll follow up with the proposed
> > diffs for stable and oldstable.
> 
> Works for me (LTS), although I won't be the one performing the upgrade
> (I've unclaimed the package for other reasons).

Works for me too and happy to take this. Claimed package in:

  
https://salsa.debian.org/security-tracker-team/security-tracker/commit/dd5c546e66da71f4029f09337a84aadaa527dcce

Looking forward to receiving your debdiffs. :)


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org  chris-lamb.co.uk
   `-



Re: rssh security update breaks rsync via Synology's "hyper backup"

2019-02-14 Thread Chris Lamb
[debian-security@lists.debian.org → Bcc]

Holger Levsen wrote:

> > I applied recent rssh security updates to Debian 8 (jessie) and I
> > noticed that it breaks Synology's "Hyper backup" tool (with rsync method).
> > 
> > Feb 10 03:28:21 roman rssh[19985]: cmd 'rsync' approved
> > Feb 10 03:28:21 roman rssh[19985]: insecure rsync options in rsync
> > command line!
> > Feb 10 03:28:21 roman rssh[19985]: user synology attempted to execute
> > forbidden commands
> > Feb 10 03:28:21 roman rssh[19985]: command: rsync --server --daemon .
> > 
> > Is it really unsafe to issue a "rsync --server --daemon ." command so it
> > deserves to be blocked?`

FYI this is the patch in question:

https://sources.debian.org/src/rssh/2.3.4-11/debian/patches/0007-Verify-rsync-command-options.patch/#L15-L20


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org  chris-lamb.co.uk
   `-



squid3 security update in oldstable

2018-11-26 Thread Chris Boot
Hi LTS, security folks,

I notice that squid3 was updated[1] in oldstable a few days ago (on the
23rd) but no DLA was issued and the security tracker[2] has not been
updated:

1.
https://tracker.debian.org/news/1005422/accepted-squid3-348-6deb8u6-source-all-amd64-into-oldstable/

2. https://security-tracker.debian.org/tracker/CVE-2018-19132

Could I please have some clarification about this, as I'm reticent to
install updates that haven't followed the full due process.

Best regards,
Chris

-- 
Chris Boot
bo...@debian.org

GPG: 8467 53CB 1921 3142 C56D  C918 F5C8 3C05 D9CE 



signature.asc
Description: OpenPGP digital signature


Re: [buildd-tools-devel] Some Debian package upgrades are corrupting rsync "quick check" backups

2017-05-13 Thread Chris Lamb
Hi all,

Just following up on this thread. As it's been a while, here's the
thread index:

 https://lists.debian.org/debian-security/2017/01/threads.html#00014

... but AIUI, the issue is as follows. Naturally, let me know if this
a poor or inaccurate summary:

 * binNMUs do not bump debian/changelog.

 * This causes mtimes to to not be bumped in the (actually modified!)
   package.

 * Backup programs (eg. rsync) will therefore not believe a binary has
   changed and thus will be skipped over.

 * A binary restored from such a backup may not execute correctly.

 * Asking users to change anything at all is always problematic, but
   to ask them to switch to using (for example) --checksum with its
   non-trivial performance penalty is a very difficult ask indeed.
   Some backup programs may not even support such a mode anyway…

My questions are as follows:

 a) Has anything changed in the meantime?

 b) Will this affect stretch? If so, what do we need to do now?


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-



Re: [SECURITY] [DSA 3817-1] jbig2dec security update

2017-03-27 Thread Chris Boot
On 24/03/17 22:32, Moritz Muehlenhoff wrote:
> -
> Debian Security Advisory DSA-3817-1   secur...@debian.org
> https://www.debian.org/security/   Moritz Muehlenhoff
> March 24, 2017https://www.debian.org/security/faq
> -
> 
> Package: jbig2dec
> CVE ID : CVE-2016-9601
> 
> Multiple security issues have been found in the JBIG2 decoder library,
> which may lead to lead to denial of service or the execution of arbitrary
> code if a malformed image file (usually embedded in a PDF document) is
> opened.
> 
> For the stable distribution (jessie), this problem has been fixed in
> version 0.13-4~deb8u1.

Hi Security, Release folks,

This security update is in the form of a new upstream release, going
from 0.11+20120125-1 in stable to 0.13-4~deb8u1. I was rather alarmed to
find the following entry in the NEWS.Debian file that appears to pertain
to this update:

> jbig2dec (0.12-1) unstable; urgency=medium
> 
>   * Licensing has changed to GNU Affero General Public License (AGPL).
> Please ensure that all use complies with this new license.
> 
>  -- Jonas Smedegaard <d...@jones.dk>  Fri, 31 Jul 2015 11:45:03 +0200

Was this expected? Has any thought been paid to people who use
libjbig2dec in jessie currently that may fall foul of this license change?

Thanks,
Chris

-- 
Chris Boot
bo...@debian.org
GPG: 8467 53CB 1921 3142 C56D  C918 F5C8 3C05 D9CE 



Re: [qubes-devel] Re: not getting compromised while applying apt-get upgrade for CVE-2016-1252

2016-12-19 Thread Chris Laprise

On 12/19/2016 06:26 PM, Patrick Schleizer wrote:

What about Debian graphical installer security?

Isn't that in meanwhile the ideal target for exploitation for targeted
attacks? Because it will take a while until the Debian point release
with fixed apt.

And during the gui installer, the output of apt-get is not visible. And
stuff during installer taking a long time is something users have been
trained to expect. So I don't think it would raise much suspicion. If
exploitation works, fine, if not, nothing was lost.

Also Debian gui installer may be distinguishable over the network from
already installed systems? Because first it's using debootstrap (perhaps
with special options), then apt-get. The timing or something else could
make it distinguishable over the network.

Best regards,
Patrick


Probably so. But an attacker can be opportunistic--try and maybe 
fail/succeed--whether or not the user is installing or merely updating.


The only solid solution to this issue is to alert users out-of-band, and 
have them also obtain *new media out-of-band* so they can re-install. In 
our case on Qubes, dom0 updates can fill the need for obtaining new 
media. But going forward, the best practice would include issuing new 
ISOs as well, since users installing Debian alongside Qubes will perform 
normal updates as a matter of course--they may review new CVEs or QSBs 
but not from several months prior.


BTW, I think Debian's idea expecting users to validate detailed metadata 
with their eyeballs is crazy.


Chris



Re: Call for testing: upcoming samba security update

2016-04-14 Thread Chris Boot
On 14/04/16 10:02, Chris Boot wrote:
> Firstly:
> 
>> Finally, two important configuration options should be considered,
>> that we were unable to silently change defaults for:
>> - smb signing = required
>> - ntlm auth = no
>>
>> Without smb signing = required, Man in the Middle attacks are
>> still possible against our file server and classic/NT4-like/Samba3
>> Domain controller.  (It is now enforced on our AD DC.)
> 
> There is no parameter named "smb signing" in smb.conf, and Samba rightly
> complains:
> 
>> [2016/04/14 09:43:53,  0] ../lib/param/loadparm.c:743(lpcfg_map_parameter)
>>   Unknown parameter encountered: "smb signing"
>> [2016/04/14 09:43:53,  0] 
>> ../lib/param/loadparm.c:1626(lpcfg_do_global_parameter)
>>   Ignoring unknown parameter "smb signing"
> 
> I suspect you meant one/several of "client ipc signing", "client
> signing" and/or "server signing" instead. Can you please clarify?

Someone has pointed out to me by private mail that this has been fixed
in an updated NEWS entry, and there is a bug open about it:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820983

https://anonscm.debian.org/cgit/pkg-samba/samba.git/commit/?h=stable-update=cbcad2a543a28926ee712cf299dbdc03da351cb0

Please can we make sure that this makes it into the inevitable deb8u3
update?

I'm filing a bug about the AD DC winbind issue now.

Cheers,
Chris

-- 
Chris Boot

Tiger Computing Ltd
ISO27001:2013 Certified

Tel: 01600 483 484
Web: https://www.tiger-computing.co.uk

Registered in England. Company number: 3389961
Registered address: Wyastone Business Park,
 Wyastone Leys, Monmouth, NP25 3SR



Re: Call for testing: upcoming samba security update

2016-04-14 Thread Chris Boot
On 12/04/16 21:27, Salvatore Bonaccorso wrote:
> Hi
> 
> The upcoming Samba update is bigger than usual since for Jessie an
> update is needed to 4.2. We want to expose the package a bit more for
> additional testing. Please test the packages found on

[snip]

Hi folks,

So I missed the testing window and the updates are now out. There are a
few problems, mostly with the NEWS.Debian file, which may lead to
confusion and/or further issues.

Firstly:

> Finally, two important configuration options should be considered,
> that we were unable to silently change defaults for:
> - smb signing = required
> - ntlm auth = no
> 
> Without smb signing = required, Man in the Middle attacks are
> still possible against our file server and classic/NT4-like/Samba3
> Domain controller.  (It is now enforced on our AD DC.)

There is no parameter named "smb signing" in smb.conf, and Samba rightly
complains:

> [2016/04/14 09:43:53,  0] ../lib/param/loadparm.c:743(lpcfg_map_parameter)
>   Unknown parameter encountered: "smb signing"
> [2016/04/14 09:43:53,  0] 
> ../lib/param/loadparm.c:1626(lpcfg_do_global_parameter)
>   Ignoring unknown parameter "smb signing"

I suspect you meant one/several of "client ipc signing", "client
signing" and/or "server signing" instead. Can you please clarify?

Secondly:

When running a Samba 4 DC, the shift from 4.1 to 4.2 brings some major
changes with it and people's smb.conf will need changing. The "server
services" line needs "winbind" replacing with "winbindd", and the user
must ensure the winbind package is installed. Otherwise, Samba will
silently fail to provide a working DC.

I will report these bugs on the samba package once I finish putting out
some fires caused by all of this...

HTH,
Chris

-- 
Chris Boot

Tiger Computing Ltd
ISO27001:2013 Certified

Tel: 01600 483 484
Web: https://www.tiger-computing.co.uk

Registered in England. Company number: 3389961
Registered address: Wyastone Business Park,
 Wyastone Leys, Monmouth, NP25 3SR



Re: Bug#810799: libcgi-session-perl: Perl DSA-3441-1 exposes taint bug in CGI::Session::Driver::file

2016-01-12 Thread Chris Boot
Control: tag -1 security

On 12/01/16 12:28, Chris Boot wrote:
[snip]
> Forwarded: https://rt.cpan.org/Public/Bug/Display.html?id=80346
> 
> Dear Maintainer,
> 
> With Perl upgraded from 5.20.2-3+deb8u1 to 5.20.2-3+deb8u2, our
> installation of TWiki (http://twiki.org/) no longer functions. This
> happens due to CGI::Session::Driver::file complaining about taint.

I'm bringing this bug to the attention of the security team, as it has
only come to light since the Jessie DSA of Perl (DSA-3441-1), so it's a
stable security regression.

Regards,
Chris

-- 
Chris Boot

Tiger Computing Ltd
IS27001:2013 Certified

Tel: 01600 483 484
Web: https://www.tiger-computing.co.uk

Registered in England. Company number: 3389961
Registered address: Wyastone Business Park,
 Wyastone Leys, Monmouth, NP25 3SR



Re: Bug#810799: libcgi-session-perl: Perl DSA-3441-1 exposes taint bug in CGI::Session::Driver::file

2016-01-12 Thread Chris Boot
On 12/01/16 15:27, Salvatore Bonaccorso wrote:
> My gut feeling about this: Since the issue was already present before,
> uncovered indirectly by the perl DSA, and currently affects twiki (not
> packaged in Debian), I would tend to ask the SRM to have the fix for
> libcgi-session-perl to be scheduled via the next Jessie point release
> rather than a DSA.
> 
> Do you feel strong about having it the fix earlier via a DSA?

I don't feel particularly strongly about it being fixed by a DSA as we
have a workaround (though the patch I included previously is incorrect
and broken; the patch in RT appears to work).

That being said, ikiwiki (packaged) appears to use CGI::Session so I
would be surprised if it was not affected, assuming it uses the same
session storage driver.

HTH,
Chris

-- 
Chris Boot

Tiger Computing Ltd
IS27001:2013 Certified

Tel: 01600 483 484
Web: https://www.tiger-computing.co.uk

Registered in England. Company number: 3389961
Registered address: Wyastone Business Park,
 Wyastone Leys, Monmouth, NP25 3SR



Re: [SECURITY] [DSA 3148-1] chromium-browser end of life

2015-01-31 Thread Chris Frey
Hi,

Can someone please point me to the upstream announcement for
dropping gcc 4.7 support?  I can't seem to find it, and I'd like
to read up on the details why.

Thanks,
- Chris



On Sat, Jan 31, 2015 at 05:13:26PM -0500, Michael Gilbert wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA512
 
 - -
 Debian Security Advisory DSA-3148-1   secur...@debian.org
 http://www.debian.org/security/   Michael Gilbert
 January 31, 2015   http://www.debian.org/security/faq
 - -
 
 Package: chromium-browser
 
 Security support for the chromium web browser is now discontinued
 for the stable distribution (wheezy).  Chromium upstream stopped
 supporting wheezy's build environment (gcc 4.7, make, etc.), so
 there is no longer any practical way to continue building security
 updates.
 
 Chromium users that desire continued security updates are encouraged
 to upgrade early to the upcoming stable release (jessie), Debian 8.
 
 An alternative is to switch to the iceweasel web browser, which will
 continue to recieve security updates in wheezy for some time.
 
 Note that until the official release happens, chromium package updates
 for jessie may have a larger than usual delay due to possible bugs and
 testing migration rules.
 
 Also, there will be no more DSAs announcing chromium package updates
 until jessie becomes officially released.
 
 Instructions for upgrading from Debian 7 to 8 are available at:
 https://www.debian.org/releases/jessie/amd64/release-notes/ch-upgrading.en.html
 
 Media for installing Debian 8 from scratch are also available
 (the release candidate media, jessie_di_rc1, are recommended):
 http://www.debian.org/devel/debian-installer
 http://cdimage.debian.org/cdimage/jessie_di_rc1
 
 Further information about Debian Security Advisories, how to apply
 these updates to your system and frequently asked questions can be
 found at: https://www.debian.org/security/
 
 Mailing list: debian-security-annou...@lists.debian.org
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1
 
 iQQcBAEBCgAGBQJUzVNbAAoJELjWss0C1vRzeJ4f/jOV3x1a3ygWo5ZeLsh4yX2b
 IyEvuSzEQJMlwo8gZLNkCDg/6fdwbmatCy/AiSWSIoeQPHBGJ1CRUAoTsxvdPrRd
 FYryH5R6L6bO5ADmQxirQb/mTHvvw228EBRhbCjVbjUe+dstRhkwIDz0I39cRd13
 7UY0KS+GusmviocafghxjTjtsFOVv6HsqzYRCYB2DYTvumiJa/egJHuGqtFTU216
 jUlPzMMvWopI6Gm4rc+L2Q2RZrK03AVr8xygRlYDUoNhOHUxVACtjrrjQJ3UJb5N
 1HJ+A7j6MdHKOvTuHpMDYtxS9d+uwkiAb23VSeb4LxnH3idsQEsMrzXQf6KU1A5p
 KBkjwg1G6ZQ2EXG/PLjuYj0O/n7Xyrs0RwyRSWSU3rRqa3pTy4MTvDgFTYcTY7Vj
 6T1kZZZBfBFtOAReFFtDcu9/5LL4qmtC0eGn0Fh3X86V4/gKcOnJ2iRNok0u5d7k
 nF4HNcHGIdgQ0tjAW0DMNWfLq9AucAH6rZswnF1XpM5TOZze3M61lE6Y46bT1IHx
 LXYeQxf0wY0Dw5StT1zMbyCMNpsFrvts6fcs3STdAdF3+smJ4uys08L+AiTbzTbO
 izo07eJylVQJzm31YXdV/M4LAsHZpPtXLntEsfAB5jwMqH+lGhKjy9OwhFhvhDKE
 8FZ4YRXii/RN6ofjcyuzYRfVZx+6rQcgreAFNKGp9XCY3qWdUIIXcGMp9DP7npoA
 YXwnJo4AgweGgwUBvk6Ak8J7Pd5ubpMF4DwLT35yE/GgPOMn0Y+159Uzh7gA0LXR
 PLL6GbcbfmamkOK3c7/5ulEUUmZ8XNFxBBKPfEN93K3wnep61qjEPeDtiOdeAsiM
 yoz6oGYF9PLG5A7N0BK9suTtwESUB7DH7JHW61rZw2sFnnpYvo7dQGvoEUYezICv
 5o/kI+/4EXASCi1hBQBC3auSGPz/Sat9j+mMPHIDo/9g/LrOhB3X2q0C4YaG6Aja
 HVKCOW377RYwa8aCmw4XouXeAnlliUzUKUVBrss74Pze0BHbkHQAwhNUYhVsOojb
 4JV5sE/7ooOCduxWuhCG77tKIBxzjGebzz9AllzdcJ6JBcix9v8p1HoVRp8vaDrP
 o/hEzjxuU0Y5h+fjoJ9w60t1NkVrYRQA0qoFGK7uvQZfvKLi84aKu9KBmxaXyzvX
 3SCTVAjJ5pOA7Fy1FszLG908rBzrUOBouX2zImw05JnaqZXyxqcCVxGcYlNg5LUf
 4qWPA/BVSY2ZEvP1ZSq5bqvKGi/k8HmBiJ9/ZwJGecGZzn+jVaYrYfZW+n0ZvIdR
 +W1u3meH1H+lEqrTmAhK4c/qJAVFXSBSdOuVISYnX5CNixm3uPHOiev0KsSGJtw=
 =s8I8
 -END PGP SIGNATURE-
 
 
 -- 
 To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
 Archive: https://lists.debian.org/e1yhgia-0002ro...@alpha.psidef.org


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150201051501.ga30...@foursquare.net



Patch / update for znc to disable weak ciphers and SSLv2/SSLv3 protocols

2014-10-27 Thread Chris
Hi,

the ZNC IRC Bouncer (https://packages.debian.org/wheezy/znc) finally allows to 
choose own ciphers and to disable SSLv2/SSLv3 protocols with this pull requests:

https://github.com/znc/znc/pull/716
https://github.com/znc/znc/pull/717

Not sure if those are easy to apply to the older version 0.206-2 in Wheezy but 
want to report this anyway.


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/trinity-29ef7d37-1c9a-47bd-9e19-29fdca43f13b-1414392521343@3capp-gmx-bs64



Re: Patch / update for znc to disable weak ciphers and SSLv2/SSLv3 protocols

2014-10-27 Thread Chris
Hi,

Would you be so kind to file this as a bug against the znc package?

and thanks for the hint. Just created a new bugreport against the znc package:

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766957


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/d6775728-6802-4c27-83df-b1399a972...@gmx.de



Re: Debian mirrors and MITM

2014-05-30 Thread Chris Boot
On 30/05/14 13:43, Alfie John wrote:
 On Fri, May 30, 2014, at 10:24 PM, Michael Stone wrote:
 On Fri, May 30, 2014 at 10:15:01PM +1000, Alfie John wrote:
 The public Debian mirrors seem like an obvious target for governments to
 MITM. I know that the MD5s are also published, but unless you're
 verifying them with third parties, what's stopping the MD5s being
 compromised too?

 The cryptographic signatures that are validated automatically by apt. 
 
 What's stopping the attacker from serving a compromised apt?

Oh god not this again.

How exactly does using HTTPS solve this particular problem, anyway? If
we assume a compromised APT then surely it can pass invalid SSL
certificates as perfectly valid, too. It's not like sponsored attackers
don't have access to all the SSL certificates they might ever want anyway.

-- 
Chris Boot
bo...@bootc.net


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53887e4b.90...@bootc.net



Re: Debian mirrors and MITM

2014-05-30 Thread Chris


On 30/05/2014 8:52 PM, Michael Stone wrote:

On Fri, May 30, 2014 at 10:43:56PM +1000, Alfie John wrote:

What's stopping the attacker from serving a compromised apt?


https://www.debian.org/CD/verify


That will cover the installer, for the packages see: 
https://wiki.debian.org/SecureApt



--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53887f7a.2050...@shthead.com



Re: [SECURITY] [DSA 2819-1] End-of-life announcement for iceape

2013-12-16 Thread Chris Frey
Where can I find more information on this?
Is this for old-stable?  Or for the latest 7.3 Debian?

Was support dropped due to lack of manpower?  And what were the main
differences between upstream Seamonkey and the Debian-branded version?
If Seamonkey is still supported, why not just package that one?

Thanks,
- Chris


On Mon, Dec 16, 2013 at 05:03:01PM +0100, Moritz Muehlenhoff wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 - -
 Debian Security Advisory DSA-2819-1   secur...@debian.org
 http://www.debian.org/security/Moritz Muehlenhoff
 December 16, 2013  http://www.debian.org/security/faq
 - -
 
 Package: iceape
 
 Security support for Iceape, the Debian-branded version of the Seamonkey
 suite needed to be stopped before the end of the regular security
 maintenance life cycle.
 
 We recommend to migrate to Iceweasel for the web browser functionality
 and to Icedove for the e-mail bits. Iceweasel and Icedove are based
 on the same codebase and will continue to be supported with security
 updates. Alternatively you can switch to the binaries provided by
 Mozilla available at http://www.seamonkey-project.org/releases/
 
 Further information about Debian Security Advisories, how to apply
 these updates to your system and frequently asked questions can be
 found at: http://www.debian.org/security/
 
 Mailing list: debian-security-annou...@lists.debian.org
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.15 (GNU/Linux)
 
 iEYEARECAAYFAlKvJBMACgkQXm3vHE4uyloALgCfU5PPVJ7Ajg4g1MestH4cEcxl
 +0cAn3cqG8HvyUNp4ACD9/96gZG5HigR
 =AbYs
 -END PGP SIGNATURE-
 
 
 -- 
 To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
 Archive: http://lists.debian.org/20131216160301.GA4732@pisco.westfalen.local


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20131216164400.ga31...@foursquare.net



Re: Daemon umask

2012-08-09 Thread Chris Davies
Mike Mestnik cheako+debian-secur...@mikemestnik.net wrote:
 Actually I'm unsure if a shell would be invoked in most cases.  For
 example Apache starts as root and drops privs after opening up log
 files(I wish someone would fix this) and port 80(I wish this could be
 done with an ACL).

Sorry, it's not clear to me what it is that you want fixed. Can you
elaborate?

Chris


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/rj1df9xmr7@news.roaima.co.uk



Re: php5: many of the open unimportant issues would seem to be fixed?

2012-04-24 Thread Chris Butler
On Tue, Apr 24, 2012 at 05:06:26AM +0200, Nico Golde wrote:
 * Chris Butler chr...@debian.org [2012-04-23 14:51]:
  From a quick scan, it seems that CVE-2010-3064 is a likely cut-off point, 
  as
  it seems to be the last one listed as affecting PHP 5.3 through 5.3.2.
  Although I'm a little bit busy right at the moment, I can probably have a
  more detailed look through the list later today when I have a bit more spare
  time, if that would help.
 
 What is this exactly based on? Cause the CVE id description is unfortunately 
 not very reliable.

Ah, I wasn't aware of that, thanks for the heads-up. It was mostly based on
looking at the description, although a couple of the ones I picked at random
were also listed as fixed in the PHP changelog pre-5.3.3..

It was just a quick scan of the list at the time, as I didn't have time to
go into detail. I started having a closer look through the list last night,
and will let the list know once I've got some more useful/accurate data...

-- 
Chris Butler chr...@debian.org
  GnuPG Key ID: 4096R/49E3ACD3


-- 
To UNSUBSCRIBE, email to debian-security-tracker-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120424100717.gn20...@crustynet.org.uk



Re: [SECURITY] [DSA 2422-1] file security update

2012-03-03 Thread Chris Frey
On Sat, Mar 03, 2012 at 09:34:18AM +0100, Thijs Kinkhorst wrote:
 On Sat, March 3, 2012 02:52, Chris Frey wrote:
  I've done the latest update, but apt-cache show file still shows
  version 5.04-5 available, instead of 5.04-5+squeeze1.
 
 You are probably using one of the following archs:
 armel i386 ia64 kfreebsd-amd64 kfreebsd-i386 mips
 Unfortunately these builds are not uploaded yet. I'll ask the appropriate
 team to help in getting this resolved.

Yes, I'm using i386.  Thanks very much for looking into this.

- Chris


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120303083618.ga20...@foursquare.net



Re: [SECURITY] [DSA 2422-1] file security update

2012-03-02 Thread Chris Frey
Hi,

I've done the latest update, but apt-cache show file still shows
version 5.04-5 available, instead of 5.04-5+squeeze1.

My sources.list contains:

deb http://ftp.us.debian.org/debian/ squeeze main contrib non-free
deb-src http://ftp.us.debian.org/debian/ squeeze main contrib non-free
deb http://ftp.us.debian.org/debian/ squeeze-updates main contrib non-free
deb-src http://ftp.us.debian.org/debian/ squeeze-updates main contrib non-free
deb http://security.debian.org/ squeeze/updates main contrib non-free
deb-src http://security.debian.org/ squeeze/updates main contrib non-free

Thanks,
- Chris



On Wed, Feb 29, 2012 at 09:54:44PM +0100, Florian Weimer wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 - -
 Debian Security Advisory DSA-2422-1   secur...@debian.org
 http://www.debian.org/security/Florian Weimer
 February 29, 2012  http://www.debian.org/security/faq
 - -
 
 Package: file
 Vulnerability  : missing bounds checks
 Problem type   : remote
 Debian-specific: no
 
 The file type identification tool, file, and its associated library,
 libmagic, do not properly process malformed files in the Composite
 Document File (CDF) format, leading to crashes.
 
 Note that after this update, file may return different detection
 results for CDF files (well-formed or not).  The new detections are
 believed to be more accurate.
 
 For the stable distribution (squeeze), this problem has been fixed in
 version 5.04-5+squeeze1.
 
 We recommend that you upgrade your file packages.
 
 Further information about Debian Security Advisories, how to apply
 these updates to your system and frequently asked questions can be
 found at: http://www.debian.org/security/
 
 Mailing list: debian-security-annou...@lists.debian.org
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.10 (GNU/Linux)
 
 iQEcBAEBAgAGBQJPTpUrAAoJEL97/wQC1SS+xjIH/RKCNTX9XDy9RmKnLubx5gME
 e3MOWFZHk0ZOaNAuorRmyrxygbRkLPVMNECTKenv2eE1CORYIHBvzFDZXNn0Yl+9
 +NS2KkmwpigU33Tu/8NfuG/xsoLl9fS1a3iJU+yVeEC14gdr0Nw5OtLzSP5C6HUS
 KcXZRXQZoHs21SrdotBm0Lx86tmoluZ1QtWmlacJcFnGwMLi3sRBwkE57UufEgCj
 dd8BD79tdVWm2YlPjnnfpG8Pe+ikq4tIxDHEKHfsFudUxgeSDAZaHjBvF/2xXrxn
 nEjOjbCpaQT9hUaaBzAxFh10qPiKKV4oA3ueR1RZt/T8XMbTXJAM54NYutF2b7Q=
 =kRH8
 -END PGP SIGNATURE-
 
 
 -- 
 To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
 Archive: http://lists.debian.org/87aa41e4x7@mid.deneb.enyo.de


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120303015214.ga1...@foursquare.net



Re: how to fix rootkit?

2012-02-09 Thread Chris Davies

On Wed, 2012-02-08 at 22:56, Chris Davies wrote:
 You can no longer trust the kernel [...]

Milan P. Stanic m...@arvanta.net wrote:
 Of course, you are right here. But then I don't trust the CPU's. How we
 know that the manufacturer od CPU, Ethernet card or anything, didn't put
 some secret code into device [...]

You don't. But since your scenario applies whether or not someone's
system has been rooted, it should probably remain outside the scope of
the discussion.

Chris


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/2p4d09xej3@news.roaima.co.uk



Re: how to fix rootkit?

2012-02-08 Thread Chris Davies
Milan P. Stanic m...@arvanta.net wrote:
 What about statically linked binaries on the external media (CD, DVD,
 USB ...) which is write protected with 'execute in place' mode?

You can no longer trust the kernel. Therefore you cannot trust
ANY application that runs under that kernel, either directly or
indirectly. Period.

Chris


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/g5bb09xbl5@news.roaima.co.uk



Re: Default valid shells and home dir permissions

2012-01-12 Thread Chris Davies
Davit Avsharyan avshar...@gmail.com wrote:
 1/  I'm wondering why most of the system users have valid shells by 
 default ?
 /cat /etc/passwd | grep -E '(sh|bash)' | wc -l
 *21*/

That's not necessarily sufficient to determine valid shells: the absence
of a shell definition implies the use of /bin/sh, so you need to check
that, too.

Something like this should probably give you a definitive list -

SS=$(grep '^/' /etc/shells | xargs)
for S in $SS ''; do
getent passwd | awk -F: -v S=$S '{if ($7 == S) print $1, $7}'
done

Chris


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/djs2u8xfrv@news.roaima.co.uk



Re: Default valid shells and home dir permissions

2012-01-12 Thread Chris Davies
Poison Bit poison...@gmail.com wrote:
 Why filter to those in /etc/shells ? I mean... the filter should be
 applied by the system :)

Mainly because it's a convenient list of real shells, and some of the
remote service applications require a shell to be in that list. FTP is
one such that springs to mind. As a counter example, /bin/false is a
possible shell but it doesn't provide a particularly useful environment
for the user. You could change the scriptlet to check for the 7th column
being either empty or an executable file if you preferred.


 But neither of both codes take in mind if there is sudo in the system,
 and what is gained in its config.

I don't recall the OP mentioning access via sudo. (BICBW.)


 Also, neither of both codes think about ForceCommand in ssh... So I
 maybe listed as /bin/bash, but I me be able only of run /usr/bin/cal
 once as my shell and get kicked.

ForceCommand requires an interactive shell-like login on the target,
so I don't believe that's relevant here.

Chris


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/uad3u8x037@news.roaima.co.uk



Re: [SECURITY] [DSA 2341-1] iceweasel security update

2011-11-10 Thread Chris Frey
Hi,

I think one of the security.debian.org mirrors is lagging fairly badly.
I just did an update, and this update from yesterday was not available.
I did it again (presumably getting a different IP) and it was available.

Just a FYI.

Thanks,
- Chris


On Wed, Nov 09, 2011 at 05:45:01PM +0100, Moritz Muehlenhoff wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 - -
 Debian Security Advisory DSA-2341-1   secur...@debian.org
 http://www.debian.org/security/Moritz Muehlenhoff
 November 09, 2011  http://www.debian.org/security/faq
 - -
 
 Package: iceweasel
 Vulnerability  : several
 Problem type   : remote
 Debian-specific: no
 CVE ID : CVE-2011-3647 CVE-2011-3648 CVE-2011-3650 
 
 Several vulnerabilities have been discovered in Iceweasel, a web browser
 based on Firefox. The included XULRunner library provides rendering
 services for several other applications included in Debian.
 
 CVE-2011-3647
 
moz_bug_r_a4 discovered a privilege escalation vulnerability in
addon handling.
 
 CVE-2011-3648
 
Yosuke Hasegawa discovered that incorrect handling of Shift-JIS 
encodings could lead to cross-site scripting.
 
 CVE-2011-3650
 
Marc Schoenefeld discovered that profiling the Javascript code
could lead to memory corruption.
 
 For the oldstable distribution (lenny), this problem has been fixed in
 version 1.9.0.19-15 of the xulrunner source package.
 
 For the stable distribution (squeeze), this problem has been fixed in
 version 3.5.16-11.
 
 For the unstable distribution (sid), this problem has been fixed in
 version 8.0-1.
 
 We recommend that you upgrade your iceweasel packages.
 
 Further information about Debian Security Advisories, how to apply
 these updates to your system and frequently asked questions can be
 found at: http://www.debian.org/security/
 
 Mailing list: debian-security-annou...@lists.debian.org
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.11 (GNU/Linux)
 
 iEYEARECAAYFAk66rcYACgkQXm3vHE4uylqo9QCgsdGqCrDS99Eqo1QHA3G/LyMP
 /aQAoMGeYFbcebA+ulmKJi94hEYrnLql
 =H/MJ
 -END PGP SIGNATURE-
 
 
 
 
 
 
 -- 
 To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
 Archive: http://lists.debian.org/2009164501.GA4188@pisco.westfalen.local


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/2010221149.ga16...@foursquare.net



Re: [SECURITY] [DSA 2315-1] openoffice.org security update

2011-10-05 Thread Chris Swenson
I assume this would include LibreOffice?

– Chris




On Wed, Oct 5, 2011 at 9:14 AM, Giuseppe Iuculano iucul...@debian.orgwrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 - -
 Debian Security Advisory DSA-2315-1   secur...@debian.org
 http://www.debian.org/security/ Giuseppe Iuculano
 October 05, 2011   http://www.debian.org/security/faq
 - -

 Package: openoffice.org
 Vulnerability  : multiple vulnerabilities
 Problem type   : remote
 Debian-specific: no
 CVE ID : CVE-2011-2713

 Red Hat, Inc. security researcher Huzaifa Sidhpurwala reported multiple
 vulnerabilities in the binary Microsoft Word (doc) file format importer
 of OpenOffice.org, a full-featured office productivity suite that
 provides a near drop-in replacement for Microsoft(R) Office.

 For the oldstable distribution (lenny), this problem has been fixed in
 version 1:2.4.1+dfsg-1+lenny12.

 For the stable distribution (squeeze), this problem has been fixed in
 version 1:3.2.1-11+squeeze4.

 For the testing distribution (wheezy), and the unstable distribution (sid),
 this problem will be fixed soon.
 We recommend that you upgrade your openoffice.org packages.

 Further information about Debian Security Advisories, how to apply
 these updates to your system and frequently asked questions can be
 found at: http://www.debian.org/security/

 Mailing list: debian-security-annou...@lists.debian.org

 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.11 (GNU/Linux)

 iEYEARECAAYFAk6MZloACgkQNxpp46476aquFACePG1/V0rwdm5fHcCD/1Z6JwdM
 9HkAnicN4tRFTNJlamHHe7TnBnFZmQS0
 =vJkV
 -END PGP SIGNATURE-


 --
 To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact
 listmas...@lists.debian.org
 Archive:
 http://lists.debian.org/20111005141450.ga25...@sd6-casa.iuculano.it




Re: Lenny version info

2010-12-13 Thread Chris Wadge
Well, you have my apologies, for whatever that's worth. I hate seeing 
exchanges like this. In the time it takes to tell somebody to Google 
it, one could have simply replied with the correct answer. It's also 
worth noting that while search engines sometimes seem magical, they're 
simply indexing lots of possible answers -- some correct, some not. This 
mailing list and others do get archived and indexed eventually, so 
adding correct answers to the mix will only improve Google's signal to 
noise ratio in the long run.


If anybody'd like to flame me for this email, that's fine. All I ask is 
that you do so to my personal email address and not to the list.


Best regards,
-Chris

On 12/13/2010 05:12 PM, Ash Narayanan wrote:

Wow, what has this thread turned into!?

It started off as a simple question that could have been answered with 
one of two possible replies, namely, the solution itself or a 
suggestion to move this query to a more appropriate mailing list. 
Thank you to all of you whose replies fell in either of these two 
categories.


To the rest of youwhat is wrong with you?
If you don't want to help, don't. Stop wasting time. Did it ever ocur 
to you that not everyone out there likes using a search engine? I was 
directed to debian-security by an ex-colleague since one of our 
servers uses debian. So I used it to ask a question that wasn't 
exactly related to security (although if you must know, it stemmed 
from another discussion on debian-security that did relate to security 
and one of my concerns was the version number of my system). So what? 
The responses I've received from you make me feel like I've committed 
a crime against humanity!


Can you imagine stepping in to a pet store with a question about your 
pets symptoms to be abused by the store attendant for not going to a 
vet instead?



Ash

PS: I've solved my problem. Thanks to those that actually helped.



--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d06ce46.9050...@gmail.com



Re: Linux infected ?

2009-02-05 Thread Chris Davies
Ralph Jenkin ralph.jen...@empoweredcomms.com.au wrote:
 Am I the only one thinking; Wine can actually manage to get infected by 
 malware now? Cool.

I've seen a fair number of discussions about this on usenet, so it's
not new, no.

Chris


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: [SECURITY] [DSA 1712-1] New rt2400 packages fix arbitrary code execution

2009-01-28 Thread Chris Lamb
Moritz Muehlenhoff wrote:

 - 
 Debian Security Advisory DSA-1712-1  secur...@debian.org
 http://www.debian.org/security/   Moritz Muehlenhoff
 January 28, 2009  http://www.debian.org/security/faq
 - 
 
 Package: rt2400
 Vulnerability  : integer overflow
 Problem type   : remote
 Debian-specific: no
 CVE Id(s)  : CVE-2009-0282
 
 It was discovered that an integer overflow in the Probe Request packet
 parser of the Ralinktech wireless drivers might lead to remote denial of
 service or the execution of arbitrary code.

Not for us.


Regards,

-- 
Chris Lamb, www.playfire.com/lambyGPG: 0x634F9A20


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: [SECURITY] [DSA 1713-1] New rt2500 packages fix arbitrary code execution

2009-01-28 Thread Chris Lamb
Moritz Muehlenhoff wrote:

 - 
 Debian Security Advisory DSA-1713-1  secur...@debian.org
 http://www.debian.org/security/   Moritz Muehlenhoff
 January 28, 2009  http://www.debian.org/security/faq
 - 
 
 Package: rt2500
 Vulnerability  : integer overflow
 Problem type   : remote
 Debian-specific: no
 CVE Id(s)  : CVE-2009-0282
 
 It was discovered that an integer overflow in the Probe Request
 packet parser of the Ralinktech wireless drivers might lead to
 remote denial of service or the execution of arbitrary code.

Not for us.


Regards,

-- 
Chris Lamb, www.playfire.com/lambyGPG: 0x634F9A20


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Re: Rainbow tables on Linux?

2008-10-24 Thread Chris Davies
Johan 'yosh' Marklund [EMAIL PROTECTED] wrote:
 the open source rainbow tables are about 121GB (if my memory
 serves me correctly) and are only available via bittorrent.
 I think it took me about 2 months to download them.
 http://www.antsight.com/zsl/rainbowcrack/

Out of interest, how long do you estimate it would have taken you to
generate them locally?

Chris


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: ssh-vulnkey and authorized_keys

2008-05-15 Thread Chris Adams


On May 15, 2008, at 6:25 PM, Alex Samad wrote:

is there away to check x509 certs with these tools ?


Yes - the wiki has one (http://wiki.debian.org/SSLkeys) but you might  
prefer the openssl-blacklist package which Ubuntu prepared:


https://launchpad.net/ubuntu/+source/openssl-blacklist/

It runs out of the box on Debian and if you edit debian/control to  
change the openssl dependency from the Ubuntu version  
(0.9.8g-4ubuntu3.1) to the Debian version (0.9.8c-4etch3) you can dpkg- 
buildpackage it and deploy it to multiple systems. I used it like this  
to flush out Apache keys:


sudo find /etc/ -xdev -type f -name \*.key -exec openssl-vulnkey {} \;

Chris

smime.p7s
Description: S/MIME cryptographic signature


Re: Why not have firewall rules by default?

2008-01-30 Thread Chris Ferguson
 Am 2008-01-23 09:19:01, schrieb William Twomey:
  It's my understanding (and experience) that a Debian system by default
  is vulnerable to SYN flooding (at least when running services) and other
  such mischeif. I was curious as to why tcp_syncookies (and similar
  things) are not enabled by default.

 Hmm, in three month I am using Debian GNU/linux since 9 years and was
 never synflooded or hacked and currenly I am maintaining a world wide
 network of 280 Servers and over 900 Workstations...

 Ind I have services running, but at least only those, which are REALY
 required and not more.

  Many distros (RPM-based mostly from my experience) ask you during the
  install if you'd like to enable firewall protection. I was curious if
  debian was every going to have this as an option?

 Sorry, but Debian is NOT a install and do not ask questions distri.
 Here, the $USER has the choice of a couple of different firewall
 solutions and some $USER may use only an $EDITOR and hack some ipt
 lines down.

  One solution could be to have a folder called /etc/security/iptables
  that contains files that get passed to iptables at startup (in the same
  way /etc/rc2.d gets read in numeric order). So you could have files like
  22ssh, 23ftp, etc. with iptable rules in each file. You could also have
  an 'ENABLED' variable like some files in /etc/default have (so that
  ports wouldn't be opened by default; the user would have to manually
  enable them for the port to be opened).
 
  Then they'd just run /etc/init.d/iptables restart and the port would be
  opened (flush the rules, reapply).

 Nice idea, but not flexible enough since it CAN conflict with most
 firewall solutions.

  Even a central iptables-save format file that gets passed to iptables at
  startup would be nice. It's easy enough to do manually, but would be
  nice to see integrated with debian itself (packages managing their own
  rules, etc.).

 But for most firewall solutions not usable...

 I have already tried the ipt-save/restor stuff on my routers but it let
 me drive crazy...

  Is debian every going to introduce a better way of having iptables rules
  be run at startup and easily saved/managed, or will this always be a
  manual process?

 I think not.

 Thanks, Greetings and nice Day
Michelle Konzack
Systemadministrator
Tamay Dogan Network
Debian GNU/Linux Consultant


 --


What about Firestarter? (www.fs-security.com). Is it a good solution to a
personal use firewall?

-Ferg @ www.FergSoft.com
USMC
Linux User #463470 at counter.li.org


Re: spooky windows script

2007-05-08 Thread Chris Adams


On May 8, 2007, at 9:17 AM, Jan Outhuis wrote:
The script gets typed in any window that's active at the moment the  
cursor is being taken over: it may be the Firefox 'find'-field or a  
terminal window for that matter.


Do you have a VNC server installed? If so you really want to either  
remove it or configure it to only listen on localhost so you can  
access it over an SSH tunnel but remote attackers can't get in. I'd  
also strongly recommend that you configure the built-in firewall  
since it you may have other exposed services - unfortunately I don't  
have a package recommendation as I just configure iptables directly.


I've seen this happen a couple of times on Macs where people  
inadvertently left VNC open w/o a password with very similar  
behaviour, which suggests people are scanning for vulnerable VNC  
installs but the automated stuff currently only has Windows exploits.


Chris



smime.p7s
Description: S/MIME cryptographic signature


Re: Problems after sendmail security upgrade

2006-03-24 Thread Chris Hilts
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Emmanuel Halbwachs wrote:
 We are experiencing problems after the sendmail security upgrade on
 our mailhost.

What sort of problems, exactly?

 - is there a way to downgrade the sendmail packages to the previous
   version before the security fix ? (i. e. something with apt-pinning)

If you can find a .deb of the package version you want, something like:

dpkg --force-downgrade --install sendmail-whatever.deb

should do the trick.  Be aware that forcing a downgrade doesn't check
for dependencies on the newer, replaced version of the package.

- --
Chris Hilts
[EMAIL PROTECTED]
Say it with flowers -- Send them a triffid!
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (MingW32)

iD8DBQFEJC6g98ixrK2vMtARAoQzAKCJppzEOmLupmqX5UPhlU+b93EXAwCgk25D
dZWT1UyV8F/OVYomGj51m7M=
=JayI
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Using multicast for security updates

2006-02-23 Thread Chris Evans


On Feb 23, 2006, at 4:22 PM, Edward Faulkner wrote:


On Fri, Feb 24, 2006 at 11:13:35AM +1100, Geoff Crompton wrote:
When you say The server runs a tracker, are you explaining  
bittorrent,
or do the security.debian.org servers actually run a tracker at  
the moment?


I was just explaining bittorrent.  Sorry for the confusion.

How well does bittorrent work for smaller files? I was always  
under the
(possibly mistaken) impression that it worked really well for iso  
sized

images (and larger) because the size allowed plenty of time for the
chunks to get distributed well through out the network.


You're probably right.  If the files are too small, the overhead
dominates.


FYI, there is an apt-torrent program, googled and located at http:// 
sianka.free.fr/


Since we are talking of writing new software anyways, either for  
bittorrent or multicast, instead of a torrent for each individual  
package, there could be a torrent file for the entire current  
archive.  Perhaps in addition to the Packages and Release files, a  
torrent file could be that mentions the entire archive.



The question becomes, is this system used to install software, or  
mirror it.  Mirrors would enjoy this, but would mean changing the  
debian mirroring infrastructure. For installations, in becomes more  
difficult I believe.


The way I see apt-get work, is it queries a server for a copy of a  
file, waits for it to arrive, and then get the next.  This would be  
bad download performance in a bittorrent environment.  If apt could  
request the local daemon for all the files it wants, and get them in  
any order.



*Idea*
If the bittorrent source of the apt was the first to be queried, if  
it did not have the package yet, it would 404, allowing apt to go  
onto the next source.  BUT, it would then note the name of the  
package requested, and start to always try and have the most recent  
copy of that package around.  Therefore if the following week, and  
update was released, the bittorrent source would notice a new version  
of the package available, and download it.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: On Mozilla-* updates

2005-07-30 Thread Chris Adams


On 2005-07-29, at 9:43 AM, Martin Schulze wrote:

Using new upstream versions are bound to cause new problems.  Maybe
not at the moment with only going from 1.0.4 to 1.0.6 but more
probably they will do later.

...

I guess in the long term we're on a lost track and it seems this
situation has already started.


I'm inclined to say that it'd be better to ship the current release  
(or the earliest Mozilla-supported version for major releases) until  
these problems actually do become more work than the backports. The  
rationale is basically that the usual concerns apply less to browsers  
since they're less mission critical, people are more used to frequent  
updates (and tend to have fewer dependencies on specific versions),  
and new features are more useful because websites which use them are  
widely deployed independently of whatever Debian or the sysadmin do.


Given the threat exposure I think it makes more sense to stick with  
what the rest of the world is using (especially in cases where the  
fixes are not well localized), particularly since there are areas  
where the new features in point upgrades can add almost as much value  
as the pure security updates - when things like spam filters or anti- 
spoofing technology improve it's frequently in response to changes in  
the attackers' behavior, which a pure back-port model can't account  
for, and that generally means that even if the old software works  
perfectly the users are going to be complaining because they're  
seeing more successful attacks. We saw this in the past with  
SpamAssassin; it pushed us to rush newer versions into production  
because the tradeoff was between the certainty of My spam filter  
isn't working! complaints versus a relatively low-probability chance  
of finding a backwards-compatibility bug - not a decision I'm  
entirely happy about but it's definitely proven to be the better  
course so far.


Chris

smime.p7s
Description: S/MIME cryptographic signature


Re: Darn skiddies (ssh login attempts)

2005-04-04 Thread Chris Adams
Michael Stone wrote:
Depending on the attack. That's the point I'm making--rsa keys protect
against certain attacks but do absolutely nothing about other attacks
and shouldn't be seen as a magic bullet.
They were also never portrayed as such - merely an additional layer of 
protection which has the side benefit of completely blocking some very 
widespread attacks.

Central distribution is also quite easy and allows you to decide how 
much control you want over the process - simply change the authorized 
key path to a directory which isn't user-writable and use your 
existing management tools to synchronize changed keys.
Dude, that does *nothing* to manage the private key.
It allows you to step in the middle of the process - it's not simply a 
question of dropping a file in ~/.ssh/ with no checks. Since the user 
can't use any key they want this allows you have, say, a process of 
requiring a decent password, stashing the public key somewhere else, 
making the private key file immutable to prevent password changes or 
removal, and record an audit log entry (all of which could be done by an 
ssh-keygen wrapper).

Only if the key wasn't protected with a password - sure, it's possible 
for an attacker to brute-force the key but that's a lot more work than 
they'd have to do if you're using password authentication and it gives 
you more time to detect the intrusion and get users to change their keys.
Huh? You do realize that the passphrase on the private key can be brute
forced, and that it's possible to do so without connecting to the target
system at all?
All of which is irrelevent - we're comparing it to plaintext 
authentication, where our hypothetical attacker already has their 
password without having to brute force anything. It also requires you to 
have a copy of the keyfile in the first place, which is harder than 
firing up an ssh brute-force bot.

More importantly, good policy also tells users to use ssh-agent 
instead of copying private keys all over the place - sure, not 
everyone will do it but the same is true of password policies 
No, password policies are enforceable--you control what the user can set
the password to. Key management policies are not enforceable. 
Right, but in the real world password policies don't work so well 
because normal humans don't handle high-entropy passwords well and 
they're going to find an algorithm which your policy doesn't catch, 
generate helpdesk traffic due to lost passwords and store it insecurely 
because they don't always remember it.

The details aren't equivalent but the underlying problem is: you're 
going to have to depend on your users cooperating with your policy; if 
it's too onerous they'll find some way around it.

ssh-agent also intruduces another vulnerability in that new sessions
can be started using the secret key for authentication without the
user being aware that it's happening.
That's not actually true for all ssh-agent implementations but in any 
case, it's simply restating a point which was never in question: if the 
attacker has compromised the user's client they can already do anything 
they want. If they can violate host security to abuse your ssh-agent 
they can also capture everything else you do.

The easiest way is simply to replace ssh-keygen with a wrapper which 
calls cracklib before passing the password to the real ssh-keygen. 
This also has the advantage of reusing any existing cracklib policy.
Interesting. Now how do you keep the user from resetting their password
on any system where you aren't controlling the ssh-keygen?
The system I outlined above means that they can't simply use any random 
ssh key but, frankly, if your users are actively trying to subvert your 
security system you have bigger problems than script kiddies. You also 
can't prevent them from writing their password down, giving it to their 
office-mates, hard-coding it in a configuration file or storing it in 
some app's weak password store.

Chris
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread Chris Adams
On Mar 31, 2005, at 11:40 PM, Robert Lemmen wrote:
On Thu, Mar 31, 2005 at 10:44:53PM -0600, Brad Sims wrote:
`less /var/log/auth.log|grep Failed|wc -l` shows 185 attempts to 
compromise
my machine since March 27th...
of course the only thing that really helps is good passwords,
Or no passwords - if requiring public key authentication is feasible 
for a system you can disable password authentication entirely:

PubkeyAuthentication yes
PasswordAuthentication no
ChallengeResponseAuthentication no
PAMAuthenticationViaKbdInt no
If you have systems which for various reasons need to be accessible 
from many locations this is an excellent way to sleep a little easier. 
Given that many utilities exist to simplify ssh-agent use it's starting 
to be feasible to switch user-visible machines over to this 
configuration in many environments - ease of use is a big carrot.

Chris

smime.p7s
Description: S/MIME cryptographic signature


Apache-SSL and DSA-532

2004-07-26 Thread Chris Morris
DSA-532 contained:
Package: libapache-mod-ssl
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE Ids: CAN-2004-0488 CAN-2004-0700
Is apache-ssl also vulnerable to these?
Thanks
--
Chris
No candidate achieved quota: | Candidates elected:
Action: Eliminate 150 students and|  Yes 
transfer their votes. - DEVote (11/3/04) |   - Beremiz (13/3/04)

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]


subscribe

2004-07-19 Thread Chris James
-- 
  Chris James
  http://www.chrisjames.me.uk


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Chris Luton/CBR/IPAustralia is out of the office.

2004-06-10 Thread Chris . Luton
I will be out of the office starting  09/06/2004 and will not return until
27/06/2004.

I will respond to your message when I return.




Re: name based virtual host and apache-ssl - thanx

2004-03-25 Thread Chris Morris
At 18:14 on Wed, 24 Mar 2004, Elmar S. Heeb wrote:
 Well, actually there is a solution: use wild cards in the name of the
 keys.  You can make the certificate for *.mycompany.com for several web
 sites within mycompany.com, or you can go so far as to use * for any host
 name.  Most modern browsers will accept such a certificate, some will
 complain and still accept it.

In my experience, *.mycompany.com would match foo.mycompany.com but not
foo.bar.mycompany.com - which may be sufficient if you can get into
people's heads that the domains are www.mycompany.com and
sales.mycompany.com and definitely not www.sales.mycompany.com

So I have a feeling that * would match 'com' or 'org' but nothing more
useful.  Though it may vary from browser to browser.

-- 
Chris
No candidate achieved quota: | Candidates elected:
Action: Eliminate 150 students and|  Yes
transfer their votes. - DEVote (11/3/04) |   - Beremiz (13/3/04)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: name based virtual host and apache-ssl - thanx

2004-03-25 Thread Chris Morris
At 18:14 on Wed, 24 Mar 2004, Elmar S. Heeb wrote:
 Well, actually there is a solution: use wild cards in the name of the
 keys.  You can make the certificate for *.mycompany.com for several web
 sites within mycompany.com, or you can go so far as to use * for any host
 name.  Most modern browsers will accept such a certificate, some will
 complain and still accept it.

In my experience, *.mycompany.com would match foo.mycompany.com but not
foo.bar.mycompany.com - which may be sufficient if you can get into
people's heads that the domains are www.mycompany.com and
sales.mycompany.com and definitely not www.sales.mycompany.com

So I have a feeling that * would match 'com' or 'org' but nothing more
useful.  Though it may vary from browser to browser.

-- 
Chris
No candidate achieved quota: | Candidates elected:
Action: Eliminate 150 students and|  Yes
transfer their votes. - DEVote (11/3/04) |   - Beremiz (13/3/04)



Re: (php?) bug exploit report

2004-01-20 Thread Chris Morris
At 10:00 on Tue, 20 Jan 2004, Oliver Hitz wrote:
 On 19 Jan 2004, Csan wrote:
  The URL is part of a postnuke site and they could start up the telnetd
  binary with invoking an URL similar to the above URL! Is this a known
  sechole?

 I think you should be able to avoid such exploits by using PHP's safe
 mode. It allow you, among other things, to specify that only files in
 a particular directory may be executed. This way, even if someone
 succeeds uploading an exploit onto your server, he won't be able to run
 it.

Safe mode would certainly have reduced the impact from that script, and
I'd definitely recommend turning it on unless you're very confident of
the quality of all your scripts.

However, some of the things in the exploit script were designed to let an
attacker look at safe mode systems and possibly find another
vulnerability.  Certainly they'd have been able to get at any database/etc
passwords used by the exploited website, possibly, depending on file
system permissions, at most files belonging to the same user, even with
safe mode on.  This might then have let them find another way of
attacking.

-- 
Chris
Those who do not remember the past are condemned to repeat it.
Those who *do* remember the past don't get much choice either.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: (php?) bug exploit report

2004-01-20 Thread Chris Morris
At 10:00 on Tue, 20 Jan 2004, Oliver Hitz wrote:
 On 19 Jan 2004, Csan wrote:
  The URL is part of a postnuke site and they could start up the telnetd
  binary with invoking an URL similar to the above URL! Is this a known
  sechole?

 I think you should be able to avoid such exploits by using PHP's safe
 mode. It allow you, among other things, to specify that only files in
 a particular directory may be executed. This way, even if someone
 succeeds uploading an exploit onto your server, he won't be able to run
 it.

Safe mode would certainly have reduced the impact from that script, and
I'd definitely recommend turning it on unless you're very confident of
the quality of all your scripts.

However, some of the things in the exploit script were designed to let an
attacker look at safe mode systems and possibly find another
vulnerability.  Certainly they'd have been able to get at any database/etc
passwords used by the exploited website, possibly, depending on file
system permissions, at most files belonging to the same user, even with
safe mode on.  This might then have let them find another way of
attacking.

-- 
Chris
Those who do not remember the past are condemned to repeat it.
Those who *do* remember the past don't get much choice either.



Re: crontab failure for daylight savings

2003-10-07 Thread Chris Niekel
On Tue, Oct 07, 2003 at 03:52:01PM +1300, Billy Naylor wrote:
 Thanks, i can confirm that /etc/default/rcS does have UTC=yes
 
 our hwclocks all show the same time as date..
 
 fly:~# /sbin/hwclock 
 Tue Oct  7 15:44:28 2003  -0.622797 seconds
 fly:~# date
 Tue Oct  7 15:44:30 NZDT 2003
 
 Can other people take a look at their systems?

Same here, doing a TZ=GMT hwclock gives the hardwareclock in GMT.
Apparently, hwclock looks at your timezone and displays the clock in
your timezone. 

Greetings,
Chris Niekel

-- 
I've been down so long, if I'd cheer up, I'd still be depressed.
- Lisa Simpson, Moanin' Lisa Blues.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: crontab failure for daylight savings

2003-10-07 Thread Chris Niekel
On Tue, Oct 07, 2003 at 03:52:01PM +1300, Billy Naylor wrote:
 Thanks, i can confirm that /etc/default/rcS does have UTC=yes
 
 our hwclocks all show the same time as date..
 
 fly:~# /sbin/hwclock 
 Tue Oct  7 15:44:28 2003  -0.622797 seconds
 fly:~# date
 Tue Oct  7 15:44:30 NZDT 2003
 
 Can other people take a look at their systems?

Same here, doing a TZ=GMT hwclock gives the hardwareclock in GMT.
Apparently, hwclock looks at your timezone and displays the clock in
your timezone. 

Greetings,
Chris Niekel

-- 
I've been down so long, if I'd cheer up, I'd still be depressed.
- Lisa Simpson, Moanin' Lisa Blues.



Bug#198560: uw-imapd: uw-imapd operates on any file in the filesytem, not just mailboxes

2003-06-23 Thread Chris Ruvolo
Package: uw-imapd
Version: 4:2001adebian-6
Severity: grave
Tags: security, woody

uw-imapd and uw-imapd-ssl are insecure by default.  They allow a logged in
user to retrieve or manipulate any file on the filesystem.  This was
discovered as a squirrelmail bug, but is actually a UW-IMAP bug.  The
exploits do not work on other IMAP servers.

Note: This is only relevant on systems where users are not supposed to have
shell access (ie email-only users).  Other users would be able to access
these files anyway.

More information is here:

  http://www.securityfocus.com/bid/7952/exploit/

See this Squirrelmail-devel thread:

  http://sourceforge.net/mailarchive/forum.php?thread_id=2641998forum_id=7139

The UW-IMAP FAQ says that this is a known issue and reccomends a
compile-time option to env_unix.c, setting restrictBox to prevent allowing
users to access / and .. :

  http://www.washington.edu/imap/IMAP-FAQs/index.html#5.1

Please change this option for uw-imapd and uw-imapd-ssl.

Thank you,
-Chris



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#198560: uw-imapd: uw-imapd operates on any file in the filesytem, not just mailboxes

2003-06-23 Thread Chris Ruvolo
Package: uw-imapd
Version: 4:2001adebian-6
Severity: grave
Tags: security, woody

uw-imapd and uw-imapd-ssl are insecure by default.  They allow a logged in
user to retrieve or manipulate any file on the filesystem.  This was
discovered as a squirrelmail bug, but is actually a UW-IMAP bug.  The
exploits do not work on other IMAP servers.

Note: This is only relevant on systems where users are not supposed to have
shell access (ie email-only users).  Other users would be able to access
these files anyway.

More information is here:

  http://www.securityfocus.com/bid/7952/exploit/

See this Squirrelmail-devel thread:

  http://sourceforge.net/mailarchive/forum.php?thread_id=2641998forum_id=7139

The UW-IMAP FAQ says that this is a known issue and reccomends a
compile-time option to env_unix.c, setting restrictBox to prevent allowing
users to access / and .. :

  http://www.washington.edu/imap/IMAP-FAQs/index.html#5.1

Please change this option for uw-imapd and uw-imapd-ssl.

Thank you,
-Chris




Re: recommendations for FTP server

2003-06-20 Thread Chris Caldwell
Stephen Gran sent the following message Today:

SG  Hello all,
SG
SG  I'd like the FTP server to not allow anonymous logins (which I assume
SG  most can do), chroot users to their home directories, and have some sort
SG  of encrypted connections (over SSL would be nice).  I have thought about
SG  just using sftp, but currently ssh connections are rerouted to another
SG  box on the LAN, and I'd like to leave that set up as is, if possible.
SG
SG  I see that proftpd is the example used in the 'securing Debian' manual,
SG  but it doesn't appear to be able to use SSL.  OTOH, ftpd-ssl doesn't
SG  appear to do chroot'ing, at least not at a quick glance.  Anybody know
SG  of one that combines these features?  I suppose there is always stunnel,
SG  although I have never tried to use it for FTP.

Install SSH and give your friends shell accounts. SFTP is a
drop-in replacement for FTP. Generally, I never use FTP except to
make anonymous downloads available. There have been too many
problems with many FTP servers in the past. Adding SSL to a
standard FTP session also presents the problem that many standard
FTP clients (at least on Windows) do not support this
configuration.

-- 
Chris Caldwell

Information Systems Coordinator, Enterprise Systems
Information Systems and Services, The George Washington University
caldwell @ gwu . edu | +1 202.994.4674 (w) | +1 202.409.0878 (c)
http://asclepius.tops.gwu.edu | GPG key ID: 0xE52D0BE8

Formal education can rarely improve the character of a scoundrel.
- Derek Bok, Harvard University


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: nautilus and portmapper port 111

2003-06-10 Thread Chris Caldwell
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Andreas Wüst sent the following message Today:

AW  No matter if I try netstat -apn or netstat -atunp as someone pointed out
AW  in private, it gives the same result as netstat -tu -l -ee -p, apart
AW  from the established connections, namely there is nothing listening in
AW  port 111.

Have you tried rpcinfo -p localhost to see if Nautilus is
registering a connection to portmap? The newer Gnome installs
(gnomevfs) depend on fam, which depends on portmap. I don't
believe there is a direct dependency from core Nautilus to
portmap, but possibly some of the Nautilus extras or vfs extrase
are causing the dependency.

- -- 
Chris Caldwell

Information Systems Coordinator, Enterprise Systems
Information Systems and Services, The George Washington University
caldwell @ gwu . edu | +1 202.994.4674 (w) | +1 202.409.0878 (c)
http://asclepius.tops.gwu.edu | GPG key ID: 0xE52D0BE8

Formal education can rarely improve the character of a scoundrel.
- Derek Bok, Harvard University

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE+5kId1YKAfuUtC+gRAiWJAJ9Cpr8WyWV061ppN9m6O1OXRmW9jwCfQHcl
AWB5FF7DcvK7wMCroRqdn5M=
=iqMD
-END PGP SIGNATURE-



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: VPN gateway

2003-05-29 Thread Chris Caldwell

Daniel Kobras sent the following message Today:

DK  It's definitely not compatible on its own.  I asked Cisco support, and
DK  they told me that it _might_ work when running freeswan on top of l2tp.
DK  Didn't get me much further, though. If someone else manages to figure it
DK  out, please let me know. :)
DK

Haven't had time to try this out with our VPN concentrator yet,
but I did find this:

http://www.cloudchaser.net/linux/Freeswan_Cisco_howto.txt


-- 
Chris Caldwell

Information Systems Coordinator, Enterprise Systems
Information Systems and Services, The George Washington University
caldwell @ gwu . edu | +1 202.994.4674 (w) | +1 202.409.0878 (c)
http://asclepius.tops.gwu.edu | GPG key ID: 0xE52D0BE8

Formal education can rarely improve the character of a scoundrel.
- Derek Bok, Harvard University



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: VPN gateway

2003-05-28 Thread Chris Caldwell

Daniel Kobras sent the following message Today:

DK  It's definitely not compatible on its own.  I asked Cisco support, and
DK  they told me that it _might_ work when running freeswan on top of l2tp.
DK  Didn't get me much further, though. If someone else manages to figure it
DK  out, please let me know. :)
DK

Haven't had time to try this out with our VPN concentrator yet,
but I did find this:

http://www.cloudchaser.net/linux/Freeswan_Cisco_howto.txt


-- 
Chris Caldwell

Information Systems Coordinator, Enterprise Systems
Information Systems and Services, The George Washington University
caldwell @ gwu . edu | +1 202.994.4674 (w) | +1 202.409.0878 (c)
http://asclepius.tops.gwu.edu | GPG key ID: 0xE52D0BE8

Formal education can rarely improve the character of a scoundrel.
- Derek Bok, Harvard University




Re: Why PHP is parsing not only .php

2003-04-03 Thread Chris Francy

This is expected behaviour...  Please see the secion about files with
multiple extensions on the page
http://httpd.apache.org/docs/mod/mod_mime.html#addencoding

---
If more than one extension is given which maps onto the same type of
meta-information, then the one to the right will be used. For example,
if .gif maps to the MIME-type image/gif and .html maps to the
MIME-type text/html, then the file welcome.gif.html will be associated
with the MIME-type text/html.
---

You should probably be using the phps extension with the 
AddType application/x-httpd-php-source .phps instead of renameing them
to have a .txt extension.

Chris



--- Yoss [EMAIL PROTECTED] wrote:
 Hello.
 Please, take a look at this:
 http://www.milc.com.pl/aa.php.txt
 
 Why PHP is parsing file with .php.txt extension? I think that is a
 security hole, because in easy way we can imagine that thereis php
 script that should allow to upload only .txt files. 99% of coders
 will
 check this with /.+?\.txt$/ because this is logic, that php script is
 everything what ends with .php. 
 Is there any way to prevent such a situation that not only /.+?\.php/
 is
 parsed by PHP?
 If you need any additional informations (config files, or something)
 let
 me know, I will send it with pleasure.
 
 -- 
 Bart³omiej Butyn aka Yoss
 Nie ma tego z³ego co by na gorsze nie wysz³o.
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact
 [EMAIL PROTECTED]
 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Why PHP is parsing not only .php

2003-04-03 Thread Chris Francy

This is expected behaviour...  Please see the secion about files with
multiple extensions on the page
http://httpd.apache.org/docs/mod/mod_mime.html#addencoding

---
If more than one extension is given which maps onto the same type of
meta-information, then the one to the right will be used. For example,
if .gif maps to the MIME-type image/gif and .html maps to the
MIME-type text/html, then the file welcome.gif.html will be associated
with the MIME-type text/html.
---

You should probably be using the phps extension with the 
AddType application/x-httpd-php-source .phps instead of renameing them
to have a .txt extension.

Chris



--- Yoss [EMAIL PROTECTED] wrote:
 Hello.
 Please, take a look at this:
 http://www.milc.com.pl/aa.php.txt
 
 Why PHP is parsing file with .php.txt extension? I think that is a
 security hole, because in easy way we can imagine that thereis php
 script that should allow to upload only .txt files. 99% of coders
 will
 check this with /.+?\.txt$/ because this is logic, that php script is
 everything what ends with .php. 
 Is there any way to prevent such a situation that not only /.+?\.php/
 is
 parsed by PHP?
 If you need any additional informations (config files, or something)
 let
 me know, I will send it with pleasure.
 
 -- 
 Bart³omiej Butyn aka Yoss
 Nie ma tego z³ego co by na gorsze nie wysz³o.
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact
 [EMAIL PROTECTED]
 



Re: OT: Consensus

2003-03-11 Thread Chris Spencer
I am someone who rarely (if ever) posts to this list.  

What Ted and Thomas have said is reasonable.

It's not a major problem to anyone here to filter an email if they don't
want to see off topic messages.  

Just make it clear it's off topic.

I suggest the [OT] tag is appropriate.  

It's better than ignoring it and just posting any old topic.  It's also
better than having a moderated list.

I dislike filtering on OT: because I think some real messages might
get filtered.

-Chris

-- 
They that can give up essential liberty to obtain a little temporary 
safety deserve neither liberty nor safety. 
- Benjamin Franklin, Historical Review of Pennsylvania, 1759 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: OT: Consensus

2003-03-11 Thread Chris Spencer
I am someone who rarely (if ever) posts to this list.  

What Ted and Thomas have said is reasonable.

It's not a major problem to anyone here to filter an email if they don't
want to see off topic messages.  

Just make it clear it's off topic.

I suggest the [OT] tag is appropriate.  

It's better than ignoring it and just posting any old topic.  It's also
better than having a moderated list.

I dislike filtering on OT: because I think some real messages might
get filtered.

-Chris

-- 
They that can give up essential liberty to obtain a little temporary 
safety deserve neither liberty nor safety. 
- Benjamin Franklin, Historical Review of Pennsylvania, 1759 



Re: Report to Recipient(s)

2003-02-26 Thread Chris Shafer
On  0, SCVBNOTES/SCVB/[EMAIL PROTECTED] wrote:
 Incident Information:-
---SNIP A BUNCH OF NAMES---
 
 Message from Paul [EMAIL PROTECTED] was quarantined
 because it contained banned content.

I would like to personally thank you for saving my soul from the banned content.

Thanks,
Chris



pgpq4t99Uy6Y8.pgp
Description: PGP signature


Re: Report to Recipient(s)

2003-02-25 Thread Chris Shafer
On  0, SCVBNOTES/SCVB/[EMAIL PROTECTED] wrote:
 Incident Information:-
---SNIP A BUNCH OF NAMES---
 
 Message from Paul [EMAIL PROTECTED] was quarantined
 because it contained banned content.

I would like to personally thank you for saving my soul from the banned content.

Thanks,
Chris



pgp0.pgp
Description: PGP signature


Re: how to identify the superuser in C

2002-12-11 Thread Chris Shafer
Well what happened is I secrued up and sent it to just Oohara and not to
the list. Well I tried but sent it to [EMAIL PROTECTED]
So that not working I opened it out of my sent items and just forwarded
it to the list but the singing got screwed up.

Chirs

On Wed, 2002-12-11 at 06:14, Adrian 'Dagurashibanipal' von Bidder wrote:
 On Wed, 2002-12-11 at 03:58, Chris Shafer wrote:
  Hello,
  Some documentation I found helpful when I was doing something similar in
 [...]
 
 Just wondering...
 
 Content-Type: multipart/mixed instead of multipart/signed. Your mailer
 buggy?
 
 cheers
 -- vbi
 
 -- 
 featured link: http://fortytwo.ch/smtp




signature.asc
Description: This is a digitally signed message part


Re: how to identify the superuser in C

2002-12-11 Thread Chris Shafer
Well what happened is I secrued up and sent it to just Oohara and not to
the list. Well I tried but sent it to [EMAIL PROTECTED]
So that not working I opened it out of my sent items and just forwarded
it to the list but the singing got screwed up.

Chirs

On Wed, 2002-12-11 at 06:14, Adrian 'Dagurashibanipal' von Bidder wrote:
 On Wed, 2002-12-11 at 03:58, Chris Shafer wrote:
  Hello,
  Some documentation I found helpful when I was doing something similar in
 [...]
 
 Just wondering...
 
 Content-Type: multipart/mixed instead of multipart/signed. Your mailer
 buggy?
 
 cheers
 -- vbi
 
 -- 
 featured link: http://fortytwo.ch/smtp



signature.asc
Description: This is a digitally signed message part


Re: how to identify the superuser in C

2002-12-10 Thread Chris Shafer
Hello,
Some documentation I found helpful when I was doing something similar in
a little game I was making.


http://www.cs.utah.edu/dept/old/texinfo/glibc-manual-0.02/library_25.html#SEC429

Chris Shafer
Live Slow. Sail Fast


On Tue, 2002-12-10 at 21:07, Oohara Yuuma wrote:
 I am working on adding a high score list to a game written in C.
 (It's already packaged.)  The high score list will be 664 root:games
 and the game binary will be sgid games --- nothing special here.
 I want to dump and undump the list.  Allowing everyone to undump
 the list will lead to cheating or even security problems, so I want to
 make sure that only the superuser may undump.  Since the binary is
 sgid, some check is necessary before trying to write the list.
 
 The problem is that there is fakeroot. getuid() == 0 or
 geteuid() == 0 is not enough.  PAM is an overkill.
 I think seteuid(0) == 0 is the best approach.
 Any opinion?
 
 -- 
 Oohara Yuuma [EMAIL PROTECTED]
 Debian developer
 PGP key (key ID F464A695) http://www.interq.or.jp/libra/oohara/pub-key.txt
 Key fingerprint = 6142 8D07 9C5B 159B C170  1F4A 40D6 F42E F464 A695
 
 smile to answer
 --- Treasure, Radiant Silvergun, attitude #3 for SBS-130
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 
 




signature.asc
Description: This is a digitally signed message part


Re: how to identify the superuser in C

2002-12-10 Thread Chris Shafer
Hello,
Some documentation I found helpful when I was doing something similar in
a little game I was making.


http://www.cs.utah.edu/dept/old/texinfo/glibc-manual-0.02/library_25.html#SEC429

Chris Shafer
Live Slow. Sail Fast


On Tue, 2002-12-10 at 21:07, Oohara Yuuma wrote:
 I am working on adding a high score list to a game written in C.
 (It's already packaged.)  The high score list will be 664 root:games
 and the game binary will be sgid games --- nothing special here.
 I want to dump and undump the list.  Allowing everyone to undump
 the list will lead to cheating or even security problems, so I want to
 make sure that only the superuser may undump.  Since the binary is
 sgid, some check is necessary before trying to write the list.
 
 The problem is that there is fakeroot. getuid() == 0 or
 geteuid() == 0 is not enough.  PAM is an overkill.
 I think seteuid(0) == 0 is the best approach.
 Any opinion?
 
 -- 
 Oohara Yuuma [EMAIL PROTECTED]
 Debian developer
 PGP key (key ID F464A695) http://www.interq.or.jp/libra/oohara/pub-key.txt
 Key fingerprint = 6142 8D07 9C5B 159B C170  1F4A 40D6 F42E F464 A695
 
 smile to answer
 --- Treasure, Radiant Silvergun, attitude #3 for SBS-130
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 
 



signature.asc
Description: This is a digitally signed message part


[OT] secure, minimal Debian installation for linux-based thin clients?

2002-10-18 Thread Chris Majewski
This  is   unrelated  to  any  security  patches   /  exploits,  hence
off-topic. I'm  posting here  mostly because it  seems like  the right
crowd for this  sort of problem. If this offends you,  let me know and
I'll find a different venue in the future. 

OK.   We're a  large network  running  lots (~100)  thin clients,  and
expecting  to run more  of them  in the  future. Currently,  these are
NeoWare  Eon's (mobile  x86  cpu) running  Linux  (an old  scaled-down
RedHat),  with  an  NFS-mounted  root  fs.  They  run  almost  nothing
locally: currently an  X server,  sshd, and  possibly some  music forwarding
daemon  in the  future, so  users can  listen to  tunes on  their thin
clients using  software on the server  (we don't give  users access to
the local software).

Now, we're looking  to upgrade the Linux on these  thin clients. I like
Debian,  so that's  one  obvious choice.  However,  a standard  Debian
install (e.g.  what I run  on my machine)  gives us much more  than we
need. This isn't fatal, since  the filesystem is NFS-mounted, but it's
not clean, either. Is  there a Debian-derived minimal distribution? Or
should we just install the base Debian system, add X via tasksel, and
add/remove remaining items with dselect or apt-get? 

There is  obviously more  than one solution  here, so I'm  looking for
recommendations.  We  care about  security; we don't  want to  run any
services  we don't  need, etc.  Reliability  is key,  so your  uncle's
friend's brother's alpha software might not be for us.  

Any other comments (relevant to  Debian on thin clients / X terminals)
welcome. 

-chris




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: [OT] secure, minimal Debian installation for linux-based thin clients?

2002-10-18 Thread Chris Majewski
OK, thanks.  BTW, how  does that differ  from running tasksel  and not
selecting any tasks? Or is that even possible? 

-chris

Noah L. Meyerhans [EMAIL PROTECTED] writes:

 On Fri, Oct 18, 2002 at 12:41:37PM -0700, Chris Majewski wrote:
  Now, we're looking  to upgrade the Linux on these  thin clients. I like
  Debian,  so that's  one  obvious choice.  However,  a standard  Debian
  install (e.g.  what I run  on my machine)  gives us much more  than we
  need. 
 
 Towards the end of the Debian installation process, when you're asked
 whether you want to run tasksel or dselect, you can choose dselect and
 exit it before installing any packages.  If you do that, you're left
 with a really minimal install.  You might be able to base your work on
 this.
 
 noah
 
 -- 
  ___
 | Web: http://web.morgul.net/~frodo/
 | PGP Public Key: http://web.morgul.net/~frodo/mail.html 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




[OT] secure, minimal Debian installation for linux-based thin clients?

2002-10-18 Thread Chris Majewski
This  is   unrelated  to  any  security  patches   /  exploits,  hence
off-topic. I'm  posting here  mostly because it  seems like  the right
crowd for this  sort of problem. If this offends you,  let me know and
I'll find a different venue in the future. 

OK.   We're a  large network  running  lots (~100)  thin clients,  and
expecting  to run more  of them  in the  future. Currently,  these are
NeoWare  Eon's (mobile  x86  cpu) running  Linux  (an old  scaled-down
RedHat),  with  an  NFS-mounted  root  fs.  They  run  almost  nothing
locally: currently an  X server,  sshd, and  possibly some  music forwarding
daemon  in the  future, so  users can  listen to  tunes on  their thin
clients using  software on the server  (we don't give  users access to
the local software).

Now, we're looking  to upgrade the Linux on these  thin clients. I like
Debian,  so that's  one  obvious choice.  However,  a standard  Debian
install (e.g.  what I run  on my machine)  gives us much more  than we
need. This isn't fatal, since  the filesystem is NFS-mounted, but it's
not clean, either. Is  there a Debian-derived minimal distribution? Or
should we just install the base Debian system, add X via tasksel, and
add/remove remaining items with dselect or apt-get? 

There is  obviously more  than one solution  here, so I'm  looking for
recommendations.  We  care about  security; we don't  want to  run any
services  we don't  need, etc.  Reliability  is key,  so your  uncle's
friend's brother's alpha software might not be for us.  

Any other comments (relevant to  Debian on thin clients / X terminals)
welcome. 

-chris





Re: [OT] secure, minimal Debian installation for linux-based thin clients?

2002-10-18 Thread Chris Majewski
OK, thanks.  BTW, how  does that differ  from running tasksel  and not
selecting any tasks? Or is that even possible? 

-chris

Noah L. Meyerhans [EMAIL PROTECTED] writes:

 On Fri, Oct 18, 2002 at 12:41:37PM -0700, Chris Majewski wrote:
  Now, we're looking  to upgrade the Linux on these  thin clients. I like
  Debian,  so that's  one  obvious choice.  However,  a standard  Debian
  install (e.g.  what I run  on my machine)  gives us much more  than we
  need. 
 
 Towards the end of the Debian installation process, when you're asked
 whether you want to run tasksel or dselect, you can choose dselect and
 exit it before installing any packages.  If you do that, you're left
 with a really minimal install.  You might be able to base your work on
 this.
 
 noah
 
 -- 
  ___
 | Web: http://web.morgul.net/~frodo/
 | PGP Public Key: http://web.morgul.net/~frodo/mail.html 



Re: AW: export problems on security updates?

2002-10-10 Thread Chris Caldwell

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Actually, I was not trying to make any specific statement about
non-US cryptography law - I have no details on any specifics. I was
just making a generalized statement that local law should apply
rather than US law.

BTW, What ever happened to the EU urging citizens to use
cryptography because of ECHELON?


Chris Caldwell

Information Systems Coordinator, Enterprise Systems
Information Systems and Services, The George Washington University
[EMAIL PROTECTED] | +1 202.994.4674 (w) | +1 202.409.0878 (c)
http://hippocrates.tops.gwu.edu | GPG key ID: 0xE52D0BE8

 --

Programming today is a race between software engineers
striving to build bigger and better idiot-proof programs
and the universe trying to produce bigger and better idiots.
So far, the universe is winning.
- Richard Cook

On Thu, 10 Oct 2002, Marcel Weber wrote:

 I think he meant France with the limitation of 56 bit encription.

 Marcel

 

 PGP / GPG Key:http://www.ncpro.com/GPG/mmweber-at-ncpro-com.asc

  -Ursprungliche Nachricht-
  Von: Javier Fernandez-Sanguino Pena [mailto:[EMAIL PROTECTED]]
  Gesendet: Donnerstag, 10. Oktober 2002 15:24
  An: Chris Caldwell
  Cc: Debian Security
  Betreff: Re: export problems on security updates?
 
 
  
   What might concern you is Spanish law regarding the use/import of
   cryptography.
  
  Which law might that be? Last I checked there was none.
 
  Javi
 
 
  --
  To UNSUBSCRIBE, email to [EMAIL PROTECTED]
  with a subject of unsubscribe. Trouble? Contact
  [EMAIL PROTECTED]
 
 
 


 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.0 (GNU/Linux)

iD8DBQE9pYsa1YKAfuUtC+gRAui8AKDZGj4YiyhJ9V7akgh5a4NCpFrK0QCfT/FM
exobQ9+iK7uwu79Pc7qYK94=
=grGq
-END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: AW: export problems on security updates?

2002-10-10 Thread Chris Caldwell
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Actually, I was not trying to make any specific statement about
non-US cryptography law - I have no details on any specifics. I was
just making a generalized statement that local law should apply
rather than US law.

BTW, What ever happened to the EU urging citizens to use
cryptography because of ECHELON?


Chris Caldwell

Information Systems Coordinator, Enterprise Systems
Information Systems and Services, The George Washington University
[EMAIL PROTECTED] | +1 202.994.4674 (w) | +1 202.409.0878 (c)
http://hippocrates.tops.gwu.edu | GPG key ID: 0xE52D0BE8

 --

Programming today is a race between software engineers
striving to build bigger and better idiot-proof programs
and the universe trying to produce bigger and better idiots.
So far, the universe is winning.
- Richard Cook

On Thu, 10 Oct 2002, Marcel Weber wrote:

 I think he meant France with the limitation of 56 bit encription.

 Marcel

 

 PGP / GPG Key:http://www.ncpro.com/GPG/mmweber-at-ncpro-com.asc

  -Ursprungliche Nachricht-
  Von: Javier Fernandez-Sanguino Pena [mailto:[EMAIL PROTECTED]
  Gesendet: Donnerstag, 10. Oktober 2002 15:24
  An: Chris Caldwell
  Cc: Debian Security
  Betreff: Re: export problems on security updates?
 
 
  
   What might concern you is Spanish law regarding the use/import of
   cryptography.
  
  Which law might that be? Last I checked there was none.
 
  Javi
 
 
  --
  To UNSUBSCRIBE, email to [EMAIL PROTECTED]
  with a subject of unsubscribe. Trouble? Contact
  [EMAIL PROTECTED]
 
 
 


 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.0 (GNU/Linux)

iD8DBQE9pYsa1YKAfuUtC+gRAui8AKDZGj4YiyhJ9V7akgh5a4NCpFrK0QCfT/FM
exobQ9+iK7uwu79Pc7qYK94=
=grGq
-END PGP SIGNATURE-




Re: export problems on security updates?

2002-10-09 Thread Chris Caldwell

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


My understanding is that the law restricts U.S. citizens from
exporting certain types of cryptographic software. As a non-US
national, I believe you have a moral responsibility to thumb your
nose at US law.

What might concern you is Spanish law regarding the use/import of
cryptography.

In any case, security updates are usually bug-fixes, not security
software, per se.


Chris Caldwell

Information Systems Coordinator, Enterprise Systems
Information Systems and Services, The George Washington University
[EMAIL PROTECTED] | +1 202.994.4674 (w) | +1 202.409.0878 (c)
http://hippocrates.tops.gwu.edu | GPG key ID: 0xE52D0BE8

 --

Programming today is a race between software engineers
striving to build bigger and better idiot-proof programs
and the universe trying to produce bigger and better idiots.
So far, the universe is winning.
- Richard Cook

On Wed, 9 Oct 2002, Alberto Cortés wrote:

 On http://security.debian.org/ it can be read:

   You can use apt to easily get the latest security updates. This
   requires a line such as
  
deb http://security.debian.org/ woody/updates main contrib non-free

 Since I am not living in the US, and some security updates deals with
 cryptographic software, I understand that it will be illegal for me
 downloading these updates from outside of the USA.

 In other words, is http://security.debian.org/ located outside the
 US?.



 --
 Alberto Cortés Martín | Ing. en Telecomunicación
 email: [EMAIL PROTECTED]  | Universidad Carlos III
 Jabber y MSN: alcortes43  | Madrid
 ICQ#: 101088159   | Spain
 url: http://montoya.aig.uc3m.es/~acortes/index.html

   1A8B 0FE6 2094 8E48 38A2  7785 03CD 07CD 6CA4 E242


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.0 (GNU/Linux)

iD8DBQE9pKGo1YKAfuUtC+gRAtvwAJ46YE1v7dMqPqGnOGEmQ+WRG3gwcQCgm+nQ
+/WmVX/hmQbV/xBR9MA8xM8=
=je9M
-END PGP SIGNATURE-



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: export problems on security updates?

2002-10-09 Thread Chris Caldwell
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


My understanding is that the law restricts U.S. citizens from
exporting certain types of cryptographic software. As a non-US
national, I believe you have a moral responsibility to thumb your
nose at US law.

What might concern you is Spanish law regarding the use/import of
cryptography.

In any case, security updates are usually bug-fixes, not security
software, per se.


Chris Caldwell

Information Systems Coordinator, Enterprise Systems
Information Systems and Services, The George Washington University
[EMAIL PROTECTED] | +1 202.994.4674 (w) | +1 202.409.0878 (c)
http://hippocrates.tops.gwu.edu | GPG key ID: 0xE52D0BE8

 --

Programming today is a race between software engineers
striving to build bigger and better idiot-proof programs
and the universe trying to produce bigger and better idiots.
So far, the universe is winning.
- Richard Cook

On Wed, 9 Oct 2002, Alberto Cortés wrote:

 On http://security.debian.org/ it can be read:

   You can use apt to easily get the latest security updates. This
   requires a line such as
  
deb http://security.debian.org/ woody/updates main contrib non-free

 Since I am not living in the US, and some security updates deals with
 cryptographic software, I understand that it will be illegal for me
 downloading these updates from outside of the USA.

 In other words, is http://security.debian.org/ located outside the
 US?.



 --
 Alberto Cortés Martín | Ing. en Telecomunicación
 email: [EMAIL PROTECTED]  | Universidad Carlos III
 Jabber y MSN: alcortes43  | Madrid
 ICQ#: 101088159   | Spain
 url: http://montoya.aig.uc3m.es/~acortes/index.html

   1A8B 0FE6 2094 8E48 38A2  7785 03CD 07CD 6CA4 E242


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.0 (GNU/Linux)

iD8DBQE9pKGo1YKAfuUtC+gRAtvwAJ46YE1v7dMqPqGnOGEmQ+WRG3gwcQCgm+nQ
+/WmVX/hmQbV/xBR9MA8xM8=
=je9M
-END PGP SIGNATURE-




Re: Debian (Unstable) problem with SSH and PAM

2002-10-04 Thread Chris Halls
On Thu, Oct 03, 2002 at 09:32:30PM +0200, Statu Nascendi wrote:
 btw... does anyone have a conf file for apt-proxy? a working one for woody -
 full option: main. contrib, non-free, non-US, security... i tried to make
 one, but didn't work like i expected and time is an issue for me here.

Grab the latest version from sarge (it'll install on Woody), which contains
a full apt-proxy.conf with lots of examples.   Or go to the CVS link at
http://apt-proxy.sf.net and look at apt-proxy.conf there.

Chris


pgpPD4uEHtI0M.pgp
Description: PGP signature


Re: Debian (Unstable) problem with SSH and PAM

2002-10-03 Thread Chris Halls

On Thu, Oct 03, 2002 at 09:32:30PM +0200, Statu Nascendi wrote:
 btw... does anyone have a conf file for apt-proxy? a working one for woody -
 full option: main. contrib, non-free, non-US, security... i tried to make
 one, but didn't work like i expected and time is an issue for me here.

Grab the latest version from sarge (it'll install on Woody), which contains
a full apt-proxy.conf with lots of examples.   Or go to the CVS link at
http://apt-proxy.sf.net and look at apt-proxy.conf there.

Chris



msg07196/pgp0.pgp
Description: PGP signature


apache access log

2002-09-25 Thread Chris Martin

hi,

i have a woody-box here with apache 1.3.26 (.deb-package)
today i discovered some strange log-entries in access.log
that look like this:

80.142.57.69 - - [25/Sep/2002:04:57:59 +0200] \xe3N 302 0 - -
...
217.83.69.31 - - [25/Sep/2002:05:21:50 +0200] \xe3L 302 0 - -
...
80.144.33.142 - - [25/Sep/2002:11:05:44 +0200] \xe3D 302 0 - -
80.142.57.69 - - [25/Sep/2002:11:23:00 +0200] \xe3N 302 0 - -

i'm no pro when it comes to apache, but is this something
i should worry about? or just another script-kid?

thx,

.chris


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




apache access log

2002-09-25 Thread Chris Martin

hi,

i have a woody-box here with apache 1.3.26 (.deb-package)
today i discovered some strange log-entries in access.log
that look like this:

80.142.57.69 - - [25/Sep/2002:04:57:59 +0200] \xe3N 302 0 - -
...
217.83.69.31 - - [25/Sep/2002:05:21:50 +0200] \xe3L 302 0 - -
...
80.144.33.142 - - [25/Sep/2002:11:05:44 +0200] \xe3D 302 0 - -
80.142.57.69 - - [25/Sep/2002:11:23:00 +0200] \xe3N 302 0 - -

i'm no pro when it comes to apache, but is this something
i should worry about? or just another script-kid?

thx,

.chris



Problems using the grsecurity kernel source patch package in woody.

2002-08-07 Thread Chris
Hello all,

I'm trying to update the kernel on my woody box with the grsecurity
patch package.  I installed the 2.4.18 source package and the
grsecurity patch package and untared the kernel source.  After
configuring it to my taste and setting patch_the_kernel := true in
/etc/kernel-pkg.conf, make-kpkg buildpackage fails with the errors
included at the end of this email, near what looks like the end of the
process.  Neither google nor the mailing list archives yielded any
useful information.  Has anyone seen this behavior before?

-- 
--Chris

 Practice allows me to receive information like faxes.
  Pharoahe Monch


chmod -R og=rX debian/tmp-source
chown -R root.root debian/tmp-source
(cd debian/tmp-source/usr/src/; \
   tar --bzip2 -cf kernel-source-2.4.18-grsec-1.9.4.tar.bz2 
kernel-source-2.4.18-grsec-1.9.4;\
 rm -rf kernel-source-2.4.18-grsec-1.9.4;)
dpkg-gencontrol -isp -pkernel-source-2.4.18-grsec-1.9.4 -Pdebian/tmp-source/
dpkg-gencontrol: error: package kernel-source-2.4.18-grsec-1.9.4 not in control 
info
make[2]: *** [real_stamp_source] Error 29
make[2]: Leaving directory `/usr/src/kernel-source-2.4.18'
make[2]: Entering directory `/usr/src/kernel-source-2.4.18'
The changelog says we are creating 2.4.18, but I thought the version is 
2.4.18-grsec-1.9.4
make[2]: *** [real_stamp_doc] Error 1
make[2]: Leaving directory `/usr/src/kernel-source-2.4.18'
make[2]: Entering directory `/usr/src/kernel-source-2.4.18'
The changelog says we are creating 2.4.18, but I thought the version is 
2.4.18-grsec-1.9.4
make[2]: *** [real_stamp_image] Error 1
make[2]: Leaving directory `/usr/src/kernel-source-2.4.18'
make[2]: Entering directory `/usr/src/kernel-source-2.4.18'
The changelog says we are creating 2.4.18, but I thought the version is 
2.4.18-grsec-1.9.4
make[2]: *** [real_stamp_headers] Error 1
make[2]: Leaving directory `/usr/src/kernel-source-2.4.18'
make[1]: Leaving directory `/usr/src/kernel-source-2.4.18'
 dpkg-genchanges -mUnknown Kernel Package Maintainer [EMAIL PROTECTED]
dpkg-genchanges: failure: cannot read files list file: No such file or directory
make: *** [stamp-buildpackage] Error 2



[translation] NIS and propagation of groups

2002-06-20 Thread Chris Boyle
On Thu, 2002-06-20 at 08:28, Sebastien Picard wrote:
 Hi all,
 
 I'm using NIS 3.9-6 on woody (kernel 2.4.18).
 
 I'd like to know how to make the gids  1000 propagate, and not those
  1000.
 
 The problem appeared after an update with an upgrade from potato to
 woody.
 
 Thank you in advance to any and all who reply.
 
 Have a nice evening
 
 :-)

-- 
Chris Boyle - Winchester College -
http://archives.wincoll.ac.uk/~chrisb/
GPG: B7D86E0F, MSN: [EMAIL PROTECTED], ICQ: 24151961,
AIM: kerneloops, Yahoo: kerneloops, IRC: cmb on openprojects.net


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: [translation] NIS and propagation of groups

2002-06-20 Thread Chris Boyle
This should probably have gone to the lists and the poster, not me.

On Thu, 2002-06-20 at 15:02, Bertrand Orvoine wrote:
 see in /var/yp/Makefile :
 
 # We do not put password entries with lower UIDs (the root and system
 # entries) in the NIS password database, for security. MINUID is the
 # lowest uid that will be included in the password maps.
 # MINGID is the lowest gid that will be included in the group maps.
 MINUID=1000
 MINGID=1000
 
 
 it was 100 in potato.

-- 
Chris Boyle - Debian Developer - aewm++, sapphire, xmmsarts
GPG: B7D86E0F, MSN: [EMAIL PROTECTED], ICQ: 24151961,
AIM: kerneloops, Yahoo: kerneloops, IRC: cmb on openprojects.net


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: ROUTEUR ET IDENTD

2002-06-08 Thread Chris Lewis
I have been reading this thread as it comes into my mail and
suddenly I have an idea...

I don't mean this to be sarcastic.
.. it may have been attempted or may already exist - I am
internationally ignorant, though wish I were not so
.. why do we not have an RFC that documents the Official
(Written/Typed) Language of Communications for the World - On the
Internet?

Would we have an internet if we had not found a way to formalize the
way we communicate?
Ignore me if you think I am silly - but I would learn a new language
.. like Latin it would largly be a written language, but in time it
could be spoken.

If you know that this already exists I would love to know what the
number is.  :-{}
Chris Lewis

- Original Message -
From: Gerd Koslowski [EMAIL PROTECTED]
To: 'Risto Jouhki' [EMAIL PROTECTED]; 'VERBEEK, Francois'
[EMAIL PROTECTED]
Cc: debian-security@lists.debian.org; 'suardi aurelien'
[EMAIL PROTECTED]
Sent: Saturday, June 08, 2002 7:51 AM
Subject: RE: ROUTEUR ET IDENTD


Hi,
Please allow me some additional remarks:
In the middle age and before the universal language was Latin, then
the
language of the diplomats was French. Now we live in a world where
English seems to be the language of science and economics. In Africa
there are still other languages that are used for trading and I
think
the majority of the humans have Chinese as the mother language.
It is not easy to find a common language, but it simplifies a lot in
our
global community to be able to communicate with each other. My
mother
language is German. Shall I ask that we speak German on
international
lists because I know this language best? By the way, I could have
also
written this mail in French. It is so many misunderstanding and
problems
between the peoples of the world besides different interests. We
should
adopt some language as the common denominator and our world will
become
a lot more peaceful. It is not important which language, but because
most people in the western world speak at least some English it is
good
that we agree on English. As it was with Latin, it does not mean and
is
not intended to suppress somebody's culture to demand to communicate
in
a different language than the mother language on international
lists.
---
Mit freundlichen Gruessen,
with kind regards,

Gerd Koslowski

-Original Message-
From: Risto Jouhki [mailto:[EMAIL PROTECTED]
Sent: Friday, June 07, 2002 11:01 PM
To: VERBEEK, Francois
Cc: 'debian-security@lists.debian.org'; 'suardi aurelien'
Subject: RE: ROUTEUR ET IDENTD


Hei
Voisitko kääntää tuon Ranskan Englanniksi, siksi kun tämän pitäisi
olla
Englannin kielinen internationillinen sähköposti-lista ?

Gætirðu vinsamlegast þýtt spurninguna á Ensku þar sem þetta á að
heita
enkumælandi e-mail listi?

= Could you please translate Your question to english, because this
is/should be an english speaking list.

Point is: Just to be able to communicate betveen many countries and
peoble
who don´t speak othervise the same language.
I could go to finnish or icelandic speking lists but ended here,
this is
just a kind of work-language for me.

Maybe we switch to japanese or chinese some day, who knows   :)))

Kveðja / Regards

Risto Jouhki
Íslandssími GSM
Sóltúni 26
105 Reykjavík
Iceland
Mobile: +354 820 0275
Fax:  +354 595 5199




  VERBEEK,

  FrancoisTo:   'suardi
aurelien' [EMAIL PROTECTED],
  Francois.VERBEEK
'debian-security@lists.debian.org'
debian-security@lists.debian.org

  @BBL.BE cc:

   Subject:  RE: ROUTEUR
ET
IDENTD
  07.06.2002 13:51









1ere remarque : ça ne se fait pas d'envoyer une question pareille
sur
autant de mailing-lists à la fois.
2eme remarque : sur les listes internationales, on parle anglais,
sous
peine de ne pas se faire comprendre (et de ne pas recevoir de
réponse)
3eme remarque : l'orthographe ne doit pas être parfaite mais parfois
ça
sert à être mieux compris, et son absence totale peut déranger.

Cela dit, le routeur fait-il du NAT? (Masquerade) Auquel cas c'est
normal
que le squid fasse la requete ident sur le routeur : c'est cette
addresse
IP-là qu'il voit venir.
Je conseille une identification simple (user/pass) ou NTLM (voir
site de
squid) si les machines sont toutes sous window$.


 -Original Message-
 From: suardi aurelien
[SMTP:[EMAIL PROTECTED]
 Sent: vendredi 7 juin 2002 15:07
 To: debian-www-cvs@lists.debian.org;
debian-www@lists.debian.org; debian-user-french@lists.debian.org;
debian-user@lists.debian.org; debian-toolchain@lists.debian.org;
[EMAIL PROTECTED]; [EMAIL PROTECTED];
debian-security@lists.debian.org; debian-perl@lists.debian.org;
debian-news@lists.debian.org; debian-l10n-french@lists.debian.org;
debian-kde

Re: ROUTEUR ET IDENTD

2002-06-08 Thread Chris Lewis
It would be convenient for me to agree to US English as a standard
since that is what I know.  Though a Canadian I prefer the American
spelling of words. I think it would be cumbersom, but I am fluent in
'c', as suggested by another note.

While I did not articulate it well, I was suggesting a language
devised from usage, agreement, consensus reality - sharing.  A kind
of mix of languages -- formalized in a standard that was viewable,
readable by everyone.  There are too many different languages to
learn them all and so I learn none other than my own.

I would have to say yes, partially, to all of the other languages
suggested, especially Esperanto but since we are not using them
something must obviously be missing.  I am not very familiar with
these languages either -- I have been lazy.

I suppose the reason that I questioned it at all is that I do not
know how to justify English as the standard.  I have noticed
recently that language is more deeply bound to thought than I had
realized.  ... sorry sounds a little too much like 1984.

There is a part of me that likes to invent new words -- currently
they are only my words because no one else knows what they mean.

Chris Lewis
Thanks for the info.


- Original Message -
From: Thomas Thurman [EMAIL PROTECTED]
To: Chris Lewis [EMAIL PROTECTED]
Cc: debian-security@lists.debian.org
Sent: Saturday, June 08, 2002 3:26 PM
Subject: Re: ROUTEUR ET IDENTD


 On Sat, 8 Jun 2002, Chris Lewis wrote:
  I don't mean this to be sarcastic. .. it may have been attempted
or
  may already exist - I am internationally ignorant, though wish I
were
  not so .. why do we not have an RFC that documents the Official
  (Written/Typed) Language of Communications for the World - On
the
  Internet?

 Are you suggesting an RFC that says Unless otherwise stated, all
 communication on the Internet should be in US English, or
something? Or
 do you mean that the RFC would propose the use of an auxlang such
as
 Interlingua, Glosa, Ido or Esperanto? Or do you propose an RFC
describing
 a new auxlang designed specially for the purpose?

 The IETF has said that English is the language used for RFCs[1],
 incidentally, though that's a long way from any of the
interpretations
 of your question given above.

 T

 [1] http://www.rfc-editor.org/overview.html




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



GPG subkeys and keyservers

2002-05-09 Thread Chris Flipse


My gpg encryption subkey expired recently; I created a new subkey; it's
signed, expires in a few months, etc.  The key imports fine when I pull
it in from the ascii armored export version ... but exporting it to the
keyserver via --send-key fails miserably.  I get a report of success,
but when I --recv-key, I don't get the new subkey.



(below:  my public/private keypair resides on meteu.  fury is another 
host, which does not have either key.)



  meteu:~ 2% gpg --send-key flip  
  gpg: success sending to `wwwkeys.us.pgp.net' (status=200)
  meteu:~ 3% gpg --export -a flip  /var/www/public.asc
  meteu:~ 4% gpg --list-key flip
  pub  1024D/17984F07 2001-10-06 Chris Flipse [EMAIL PROTECTED]
  uidChris Flipse [EMAIL PROTECTED]
  uidChris Flipse [EMAIL PROTECTED]
  sub  1024g/B03178DE 2001-10-06 [expires: 2002-04-04]
  sub  1024g/BCA91458 2002-05-09 [expires: 2002-11-05]
  
  pub  1024D/17984F07 2001-10-06 Chris Flipse [EMAIL PROTECTED]
  uidChris Flipse [EMAIL PROTECTED]
  uidChris Flipse [EMAIL PROTECTED]
  sub  1024g/B03178DE 2001-10-06 [expires: 2002-04-04]
  sub  1024g/BCA91458 2002-05-09 [expires: 2002-11-05]
  
  meteu:~ 5% 



New subkey exists, supposedly got exported to wwwkeys.us.pgp.net
alright.  However.


  fury:~ 40% gpg --list-key flip
  gpg: Warning: using insecure memory!
  gpg: error reading key: public key not found
  fury:~ 41% wget http://meteu.octoraro.org/public.asc
  --11:46:10--  http://meteu.octoraro.org/public.asc
 = `public.asc'
  Connecting to meteu.octoraro.org:80... connected!
  HTTP request sent, awaiting response... 200 OK
  Length: 2,265 [text/plain]
  
  0K ..  100% @  44.24 KB/s
  
  11:46:10 (44.24 KB/s) - `public.asc' saved [2265/2265]
  
  fury:~ 42% gpg --import public.asc
  gpg: Warning: using insecure memory!
  gpg: key 17984F07: public key imported
  gpg: Total number processed: 1
  gpg:   imported: 1

  fury:~ 43% gpg --list-key flip
  gpg: Warning: using insecure memory!
  pub  1024D/17984F07 2001-10-06 Chris Flipse [EMAIL PROTECTED]
  uidChris Flipse [EMAIL PROTECTED]
  uidChris Flipse [EMAIL PROTECTED]
  sub  1024g/B03178DE 2001-10-06 [expires: 2002-04-04]
  sub  1024g/BCA91458 2002-05-09 [expires: 2002-11-05]
  
  fury:~ 44% 



Key is imported just fine from the ascii armored export.  No problems.



  fury:~ 44% gpg --delete-key flip
  gpg: Warning: using insecure memory!
  pub  1024D/17984F07 2001-10-06   Chris Flipse [EMAIL PROTECTED]
  
  Delete this key from the keyring? yes
  fury:~ 45% gpg --list-key flip   
  gpg: Warning: using insecure memory!
  gpg: error reading key: public key not found
  
  fury:~ 46% gpg --recv-key 17984F07
  gpg: Warning: using insecure memory!
  gpg: requesting key 17984F07 from wwwkeys.us.pgp.net ...
  gpg: key 17984F07: public key imported
  gpg: Total number processed: 1
  gpg:   imported: 1
  
  fury:~ 47% gpg --list-key flip
  gpg: Warning: using insecure memory!
  pub  1024D/17984F07 2001-10-06 Chris Flipse [EMAIL PROTECTED]
  uidChris Flipse [EMAIL PROTECTED]
  uidChris Flipse [EMAIL PROTECTED]
  sub  1024g/B03178DE 2001-10-06 [expires: 2002-04-04]
  
  fury:~ 48% 



Apparently, the version of the key up on the PGP server doesn't have the
new subkey.  So, what am I missing?

-- 
//[pgp] 1024D/17984F07  [http] meteu.octoraro.org
Nice, selfless people don't restore my faith in humanity -- they restore
my faith in randomness.



msg06658/pgp0.pgp
Description: PGP signature


GPG subkeys and keyservers

2002-05-09 Thread Chris Flipse

My gpg encryption subkey expired recently; I created a new subkey; it's
signed, expires in a few months, etc.  The key imports fine when I pull
it in from the ascii armored export version ... but exporting it to the
keyserver via --send-key fails miserably.  I get a report of success,
but when I --recv-key, I don't get the new subkey.



(below:  my public/private keypair resides on meteu.  fury is another 
host, which does not have either key.)



  meteu:~ 2% gpg --send-key flip  
  gpg: success sending to `wwwkeys.us.pgp.net' (status=200)
  meteu:~ 3% gpg --export -a flip  /var/www/public.asc
  meteu:~ 4% gpg --list-key flip
  pub  1024D/17984F07 2001-10-06 Chris Flipse [EMAIL PROTECTED]
  uidChris Flipse [EMAIL PROTECTED]
  uidChris Flipse [EMAIL PROTECTED]
  sub  1024g/B03178DE 2001-10-06 [expires: 2002-04-04]
  sub  1024g/BCA91458 2002-05-09 [expires: 2002-11-05]
  
  pub  1024D/17984F07 2001-10-06 Chris Flipse [EMAIL PROTECTED]
  uidChris Flipse [EMAIL PROTECTED]
  uidChris Flipse [EMAIL PROTECTED]
  sub  1024g/B03178DE 2001-10-06 [expires: 2002-04-04]
  sub  1024g/BCA91458 2002-05-09 [expires: 2002-11-05]
  
  meteu:~ 5% 



New subkey exists, supposedly got exported to wwwkeys.us.pgp.net
alright.  However.


  fury:~ 40% gpg --list-key flip
  gpg: Warning: using insecure memory!
  gpg: error reading key: public key not found
  fury:~ 41% wget http://meteu.octoraro.org/public.asc
  --11:46:10--  http://meteu.octoraro.org/public.asc
 = `public.asc'
  Connecting to meteu.octoraro.org:80... connected!
  HTTP request sent, awaiting response... 200 OK
  Length: 2,265 [text/plain]
  
  0K ..  100% @  44.24 KB/s
  
  11:46:10 (44.24 KB/s) - `public.asc' saved [2265/2265]
  
  fury:~ 42% gpg --import public.asc
  gpg: Warning: using insecure memory!
  gpg: key 17984F07: public key imported
  gpg: Total number processed: 1
  gpg:   imported: 1

  fury:~ 43% gpg --list-key flip
  gpg: Warning: using insecure memory!
  pub  1024D/17984F07 2001-10-06 Chris Flipse [EMAIL PROTECTED]
  uidChris Flipse [EMAIL PROTECTED]
  uidChris Flipse [EMAIL PROTECTED]
  sub  1024g/B03178DE 2001-10-06 [expires: 2002-04-04]
  sub  1024g/BCA91458 2002-05-09 [expires: 2002-11-05]
  
  fury:~ 44% 



Key is imported just fine from the ascii armored export.  No problems.



  fury:~ 44% gpg --delete-key flip
  gpg: Warning: using insecure memory!
  pub  1024D/17984F07 2001-10-06   Chris Flipse [EMAIL PROTECTED]
  
  Delete this key from the keyring? yes
  fury:~ 45% gpg --list-key flip   
  gpg: Warning: using insecure memory!
  gpg: error reading key: public key not found
  
  fury:~ 46% gpg --recv-key 17984F07
  gpg: Warning: using insecure memory!
  gpg: requesting key 17984F07 from wwwkeys.us.pgp.net ...
  gpg: key 17984F07: public key imported
  gpg: Total number processed: 1
  gpg:   imported: 1
  
  fury:~ 47% gpg --list-key flip
  gpg: Warning: using insecure memory!
  pub  1024D/17984F07 2001-10-06 Chris Flipse [EMAIL PROTECTED]
  uidChris Flipse [EMAIL PROTECTED]
  uidChris Flipse [EMAIL PROTECTED]
  sub  1024g/B03178DE 2001-10-06 [expires: 2002-04-04]
  
  fury:~ 48% 



Apparently, the version of the key up on the PGP server doesn't have the
new subkey.  So, what am I missing?

-- 
//[pgp] 1024D/17984F07  [http] meteu.octoraro.org
Nice, selfless people don't restore my faith in humanity -- they restore
my faith in randomness.


pgpBnn3rAbpLc.pgp
Description: PGP signature


Re: Allow root to telnet

2002-04-18 Thread Chris Hilts

On Thu, Apr 18, 2002 at 11:28:28AM +0800, Michael Watts wrote:
 Hi,
 
 I am having trouble with a few services and want to allow root to telnet
 to a Debian 2.2r5 system for testing purposes, but can not find the way
 to allow this to happen.

You really really really do not want to do this.  You don't mention if
the machine in question is on the internet, but regardless it's a bad
idea.  If you really must enable remote access, please consider using
ssh instead. Generally speaking you never want to enable remote root
logins, you should instead have a regular user account log in and then
use su.

 I have had a look through the man pages, and looked into /etc/securetty
 but get stuck there. Do I have to add an entry for telnet to securetty
 to allow root to login that way?

Yes, that is correct. By default /etc/securetty on most distributions
only permits root logins from the console. I don't believe sshd observes
/etc/securetty though, so if you decide to use ssh you'll want to take a
look at the PermitRootLogin parameter. (And preferably set it to no)
 
 Also, how would I allow telnet to accessed on more than one port at a
 time. I may need to allow it on port 23 and (omniback backup
 software port), but can only seem to allow one or the other, not both.
 How can I allow both 23 and  to accept telnet?

A port can only be used by one application at a time. You can't have
telnet and omniback listening to port  together.  There are a lot of
unused ports available, is having telnet listen to, for example,  an
option?

I hope this helps.

Chris Hilts
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Allow root to telnet

2002-04-18 Thread Chris Hilts
On Thu, Apr 18, 2002 at 11:28:28AM +0800, Michael Watts wrote:
 Hi,
 
 I am having trouble with a few services and want to allow root to telnet
 to a Debian 2.2r5 system for testing purposes, but can not find the way
 to allow this to happen.

You really really really do not want to do this.  You don't mention if
the machine in question is on the internet, but regardless it's a bad
idea.  If you really must enable remote access, please consider using
ssh instead. Generally speaking you never want to enable remote root
logins, you should instead have a regular user account log in and then
use su.

 I have had a look through the man pages, and looked into /etc/securetty
 but get stuck there. Do I have to add an entry for telnet to securetty
 to allow root to login that way?

Yes, that is correct. By default /etc/securetty on most distributions
only permits root logins from the console. I don't believe sshd observes
/etc/securetty though, so if you decide to use ssh you'll want to take a
look at the PermitRootLogin parameter. (And preferably set it to no)
 
 Also, how would I allow telnet to accessed on more than one port at a
 time. I may need to allow it on port 23 and (omniback backup
 software port), but can only seem to allow one or the other, not both.
 How can I allow both 23 and  to accept telnet?

A port can only be used by one application at a time. You can't have
telnet and omniback listening to port  together.  There are a lot of
unused ports available, is having telnet listen to, for example,  an
option?

I hope this helps.

Chris Hilts
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



security updates for hppa

2002-04-10 Thread Chris Gray

I'm new to debian linux, and I am having trouble finding the security
updates for the HPPA system.  I have looked all through
http://security.debian.org/dists/  I found the updates for the other
ports, but not hppa.  Any thoughts on where I might find them or what to
put in the sources.list file?  I think I installed 'woody' from the
0.9.3 CD.  I am also using the 32bit kernel.

TIA,
Chris.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




security updates for hppa

2002-04-10 Thread Chris Gray
I'm new to debian linux, and I am having trouble finding the security
updates for the HPPA system.  I have looked all through
http://security.debian.org/dists/  I found the updates for the other
ports, but not hppa.  Any thoughts on where I might find them or what to
put in the sources.list file?  I think I installed 'woody' from the
0.9.3 CD.  I am also using the 32bit kernel.

TIA,
Chris.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: scp and sftp

2002-04-01 Thread Chris Reeves

On Mon, Apr 01, 2002 at 10:35:35AM -0500, Jon McCain wrote:
 All of this has gotten me to thinking about another flaw in the way I
 have things set up.  I'm preventing users from getting to a $ by running
 a menu from their profile.
 
 exec /usr/bin/menu
 
 This works fine since the exec causes menu to become their shell
 process.
 
 But some smart user could get around this by using pscp to upload their
 own .bash_profile.  Even if I fix it so I have them chroot'd on their
 home would not prevent this since this file is in their home.
 
 But changing permissions on the .bash_profile so they don't own it (and
 not in their group) should take care of that problem.  They can read it
 all they want, just not change it.

Why not change the users' shell to /usr/bin/menu? 

Bye,
Chris
-- 
http://www.tuxedo.org/~esr/faqs/smart-questions.html
  __   _
  -o)/ /  (_)__  __   __  Chris Reeves
  /\\ /__/ / _ \/ // /\ \/ /  ICQ# 22219005
 _\_v __/_/_//_/\_,_/ /_/\_\


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: scp and sftp

2002-04-01 Thread Chris Reeves
On Mon, Apr 01, 2002 at 10:35:35AM -0500, Jon McCain wrote:
 All of this has gotten me to thinking about another flaw in the way I
 have things set up.  I'm preventing users from getting to a $ by running
 a menu from their profile.
 
 exec /usr/bin/menu
 
 This works fine since the exec causes menu to become their shell
 process.
 
 But some smart user could get around this by using pscp to upload their
 own .bash_profile.  Even if I fix it so I have them chroot'd on their
 home would not prevent this since this file is in their home.
 
 But changing permissions on the .bash_profile so they don't own it (and
 not in their group) should take care of that problem.  They can read it
 all they want, just not change it.

Why not change the users' shell to /usr/bin/menu? 

Bye,
Chris
-- 
http://www.tuxedo.org/~esr/faqs/smart-questions.html
  __   _
  -o)/ /  (_)__  __   __  Chris Reeves
  /\\ /__/ / _ \/ // /\ \/ /  ICQ# 22219005
 _\_v __/_/_//_/\_,_/ /_/\_\


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: root's home world readable

2002-01-21 Thread Chris Francy


At 11:03 AM 1/21/2002, you wrote:
On Mon, Jan 21, 2002 at 07:54:03PM +0100, eim wrote:
 
  Why has Debian choosen to let users access root's home ?

Why not?  Debian doesn't put any sensitive files there.  In fact, it
doesn't put anything notable there at all.

There is at least one package in Debian that requires you to put sensitive 
information in /root.  The mysql server package needs you to have a .my.cnf 
in the /root if you want the logs to rotate.  The my.cnf contains the clear 
text version of the root password to the database.


Cut from /etc/logrotate.d/mysql-server
# If the root user has a password you have to create a
# /root/.my.cnf configuration file with the following
# content:


  Let me say I chmod 0700 /root, will I encounter any
  problems through some anacrom jobs or anything else ?
Since nothing important is installed in /root, there should be no
problems with denying access.

I have changed /root to 0700 on all my installations because I am running 
mysql server.  It hasn't broken anything.


Chris


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: root's home world readable

2002-01-21 Thread Chris Francy


At 11:03 AM 1/21/2002, you wrote:

On Mon, Jan 21, 2002 at 07:54:03PM +0100, eim wrote:

 Why has Debian choosen to let users access root's home ?

Why not?  Debian doesn't put any sensitive files there.  In fact, it
doesn't put anything notable there at all.


There is at least one package in Debian that requires you to put sensitive 
information in /root.  The mysql server package needs you to have a .my.cnf 
in the /root if you want the logs to rotate.  The my.cnf contains the clear 
text version of the root password to the database.



Cut from /etc/logrotate.d/mysql-server
# If the root user has a password you have to create a
# /root/.my.cnf configuration file with the following
# content:



 Let me say I chmod 0700 /root, will I encounter any
 problems through some anacrom jobs or anything else ?
Since nothing important is installed in /root, there should be no
problems with denying access.


I have changed /root to 0700 on all my installations because I am running 
mysql server.  It hasn't broken anything.



Chris



Re: Re: How do I disable (close) ports?

2002-01-16 Thread Chris Hilts

 On Wed, Dec 05, 2001 at 01:24:54PM +0100, J. Paul Bruns-Bielkowicz
 wrote:
 It seems to. The above ports were closed just by commenting them out
 of /etc/services  and then rebooting.
 An init 1, init 3 would have worked as well.

Correct me if I'm wrong here, but why would you comment things out of
/etc/services?  Try /etc/inetd.conf or /etc/xinetd.conf

/etc/services just maps ports to service names.

Chris





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Re: How do I disable (close) ports?

2002-01-16 Thread Chris Hilts
 On Wed, Dec 05, 2001 at 01:24:54PM +0100, J. Paul Bruns-Bielkowicz
 wrote:
 It seems to. The above ports were closed just by commenting them out
 of /etc/services  and then rebooting.
 An init 1, init 3 would have worked as well.

Correct me if I'm wrong here, but why would you comment things out of
/etc/services?  Try /etc/inetd.conf or /etc/xinetd.conf

/etc/services just maps ports to service names.

Chris






Re: Re: How do I disable (close) ports?

2002-01-16 Thread Chris Hilts
 On Wed, Dec 05, 2001 at 01:24:54PM +0100, J. Paul Bruns-Bielkowicz
 wrote:
 It seems to. The above ports were closed just by commenting them out
 of /etc/services  and then rebooting.
 An init 1, init 3 would have worked as well.

Correct me if I'm wrong here, but why would you comment things out of
/etc/services?  Try /etc/inetd.conf or /etc/xinetd.conf

/etc/services just maps ports to service names.

Chris






RE: Squid security

2001-12-04 Thread Chris Massam

ACL's are avalible in squid, what you can do is setup an ACL to allow only
your networks IP's to connect to squid, and deny everything else.

like this:

acl all src 0.0.0.0/0.0.0.0
acl private_networks0 src xxx.xxx.xxx.xxx/xxx.xxx.xxx.xxx
acl private_networks1 src xxx.xxx.xxx.xxx/xxx.xxx.xxx.xxx

and then,

http_access allow private_networks0
http_access allow private_networks1
http_access deny all

Pretty similar to a firewall rule setup, another security measure you can
take is, if your squid proxy has multiple interfaces, like one public and
one private, you can set the tcp_incoming_address and tcp_outgoing_address -
this means squid won't actually listen on the external address, but will use
it for external connections.

Hope this is off assistance.

Regards
Chris

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, 5 December 2001 17:21
To: Debian Security
Subject: Squid security


Recently, I had someone trying to browse the web from one of our servers
via squid.  Luckily, I didn't need squid for this machine, so I took it
off and emailed the hostmaster of the domain the person was doing it
from..luckily the IP address was the same.  i also managed to get the
IP address blocked by our ISP.

On another server, which I have squid running and want running, I keep
getting accesses from http://service.bfast.com/bfast/serve and someone
seems to be accessing web pages late at night when everyone has gone
home.  Trouble is, the IP addresses that access squid don't have host
names (ie. they don't exist) and they keep changing.  Is there any way
to block access to this and is there a good FAQ, etc.

It seems strange though, as the access is every few minutes and the
pages accessed have ads involved,while the first person (above) was
accessing squid regularly in spurts.


Thanks

Robert..





--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: How do I disable (close) ports?

2001-12-04 Thread chris

Hi Paul,

On Tue, Dec 04, 2001 at 09:18:09PM +0100, J. Paul Bruns-Bielkowicz wrote:
 Hi,
 I disabled all but a few ports in /etc/services, but I have
 tcp0  0 pa237.olsztyn.sdi.t:111 80.116.215.37:1064
 ESTABLISHED
 when I netstat my machine. What exactly does this mean? I just want
 25/tcp opensmtp
 37/tcp opentime
 66/tcp opensql*net
 80/tcp openhttp
 110/tcpopenpop-3
 443/tcpopenhttps
 3306/tcp   openmysql
 open. How can I close ports 111 and 859? They are not enabled in
 /etc/services

may you take a look at the corresponding man pages:
services, inetd.conf and inetd:
   (services...)
   services is a plain ASCII file providing a mapping between
   friendly textual names for internet  services,  and  their
   underlying assigned port numbers and protocol types.
   ...
   The  presence  of  an  entry for a service in the services
   file does not necessarily mean that the  service  is  cur-
   rently  running  on the machine. See inetd.conf(5) for the
   configuration of Internet services offered. Note that  not
   all  networking  services  are started by inetd(8), and so
   won't appear in inetd.conf(5).  In particular, news (NNTP)
   and  mail  (SMTP)  servers  are often initialised from the
   system boot scripts.
   ...

A port is open if there is a programm listening on it and answering 
incomming requests. It has nothing to do whether it is mentioned in
/etc/services or not.

Hope this helps and fit your needs
regards
chris


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




RE: Squid security

2001-12-04 Thread Chris Massam
ACL's are avalible in squid, what you can do is setup an ACL to allow only
your networks IP's to connect to squid, and deny everything else.

like this:

acl all src 0.0.0.0/0.0.0.0
acl private_networks0 src xxx.xxx.xxx.xxx/xxx.xxx.xxx.xxx
acl private_networks1 src xxx.xxx.xxx.xxx/xxx.xxx.xxx.xxx

and then,

http_access allow private_networks0
http_access allow private_networks1
http_access deny all

Pretty similar to a firewall rule setup, another security measure you can
take is, if your squid proxy has multiple interfaces, like one public and
one private, you can set the tcp_incoming_address and tcp_outgoing_address -
this means squid won't actually listen on the external address, but will use
it for external connections.

Hope this is off assistance.

Regards
Chris

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Wednesday, 5 December 2001 17:21
To: Debian Security
Subject: Squid security


Recently, I had someone trying to browse the web from one of our servers
via squid.  Luckily, I didn't need squid for this machine, so I took it
off and emailed the hostmaster of the domain the person was doing it
from..luckily the IP address was the same.  i also managed to get the
IP address blocked by our ISP.

On another server, which I have squid running and want running, I keep
getting accesses from http://service.bfast.com/bfast/serve and someone
seems to be accessing web pages late at night when everyone has gone
home.  Trouble is, the IP addresses that access squid don't have host
names (ie. they don't exist) and they keep changing.  Is there any way
to block access to this and is there a good FAQ, etc.

It seems strange though, as the access is every few minutes and the
pages accessed have ads involved,while the first person (above) was
accessing squid regularly in spurts.


Thanks

Robert..





--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]





Re: How do I disable (close) ports?

2001-12-04 Thread chris
Hi Paul,

On Tue, Dec 04, 2001 at 09:18:09PM +0100, J. Paul Bruns-Bielkowicz wrote:
 Hi,
 I disabled all but a few ports in /etc/services, but I have
 tcp0  0 pa237.olsztyn.sdi.t:111 80.116.215.37:1064
 ESTABLISHED
 when I netstat my machine. What exactly does this mean? I just want
 25/tcp opensmtp
 37/tcp opentime
 66/tcp opensql*net
 80/tcp openhttp
 110/tcpopenpop-3
 443/tcpopenhttps
 3306/tcp   openmysql
 open. How can I close ports 111 and 859? They are not enabled in
 /etc/services

may you take a look at the corresponding man pages:
services, inetd.conf and inetd:
   (services...)
   services is a plain ASCII file providing a mapping between
   friendly textual names for internet  services,  and  their
   underlying assigned port numbers and protocol types.
   ...
   The  presence  of  an  entry for a service in the services
   file does not necessarily mean that the  service  is  cur-
   rently  running  on the machine. See inetd.conf(5) for the
   configuration of Internet services offered. Note that  not
   all  networking  services  are started by inetd(8), and so
   won't appear in inetd.conf(5).  In particular, news (NNTP)
   and  mail  (SMTP)  servers  are often initialised from the
   system boot scripts.
   ...

A port is open if there is a programm listening on it and answering 
incomming requests. It has nothing to do whether it is mentioned in
/etc/services or not.

Hope this helps and fit your needs
regards
chris



  1   2   >