Re: non-executable stack (via PT_GNU_STACK) not being enforced

2010-10-12 Thread Sysadmin - The Well @ Poway

 On 10/12/2010 03:10 AM, Marcin Owsiany wrote:

On Mon, Oct 11, 2010 at 11:08:04PM -0500, Boyd Stephen Smith Jr. wrote:

On Monday, October 11, 2010 17:18:34 you wrote:

On 10/11/2010 12:21 PM, Boyd Stephen Smith Jr. wrote:

What can be done to not disable page protections in the default
kernel?

Enable PAE.  From what I understand, the features are not separable
in the i386 kernel.  You either suffer under PAE and get NX, or you
suffer without NX and drop PAE.

That's my understanding too. I was really asking about the default.

Most of us would prefer the 1% performance hit over having an
executable stack (and heap).

Then install -bigmem, reboot and be done.

Remember that Debian i386 targets more than beefy servers.  In fact, it
probably has a larger install base on Atom-based router boards, All-in-one
PCs, and netbooks.

And it might be non-obvious, but some CPUs (e.g. the one in my
not-so-old laptop) don't support PAE, so making the default kernel use
PAE would make debian unbootable on them.

This is true. However, I've always wondered why we don't detect whether 
the CPU appears to support PAE and suggest a bigmem kernel at installation.


Re: OT: Server protection strategy from evil doers - how to stop them.

2009-05-30 Thread Sysadmin - The Well @ Poway
I use a combination of suhosin, mod_security and scripts to 
automatically respond to attacks. Something like Fail2Ban 
http://www.fail2ban.org/wiki/index.php/Main_Page or CSF 
http://www.configserver.com/cp/csf.html will automatically take the 
appropriate actions based on your preferences and email you about it.


Hope this helps...
Best regards,
-Chris


sthu.d...@gmail.com wrote:

Good day.


My question is about the strategy practice of stopping the evil doers at my
server - as it is a server I can not turn it off, yet I would not that the
things that some guys try to do will be repeated. Therefore, may, You would
share Your experience/knowledge how to stop them.

The situation: I see evil doing in logs. I know the addresses they did use for
that.

What is the best way (1. Effective; 2. Easy to commit) to stop them?

My own considerations for now: to use iptables to ban those IPs, but here I
have the following problem: if I exclude by IP - it is a lot of IPs. If I
exclude by its ranges - I risk to exclude goo users from our public services
(web, email) others - the same is for the ISP nets - as their users can change
their IPs easily. So... please, any suggestions.


Thank You for Your time and effort.

Best regards,
Sthu Deus.


  



--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org