Re: [OT] Long threads, Was: Re: Filezilla a security risk

2012-07-10 Thread Andrei POPESCU
On Du, 08 iul 12, 19:31:48, rjc wrote:
 
 I had been on this list [0] on and off for quite a while now and have
 noticed that certain individuals find it hard to simply be wrong [1]
 and will argue their case just to have the final word.
 
 [0] in a minute I will be corrected that it is a Usenet news group ;^)

Nope, it really is a mailing list that can be read via mail-to-news 
gateways (like gmane).

You didn't expect that, did you? :p

Kind regards,
Andrei
-- 
Offtopic discussions among Debian users and developers:
http://lists.alioth.debian.org/mailman/listinfo/d-community-offtopic


signature.asc
Description: Digital signature


Re: Filezilla a security risk

2012-07-09 Thread Camaleón
On Sun, 08 Jul 2012 19:48:44 +0200, Markus Schönhaber wrote:

 08.07.2012 19:10, Camaleón:
 
 On Sun, 08 Jul 2012 18:51:59 +0200, Markus Schönhaber wrote:

(...)

 For some definition of purpose, maybe [1] Stating that 587/tcp was
 smtps is simply wrong, because it implies encryption on the network
 layer.
 
 When you replace a standard with another it would be fair to say that
 both share the same essence and they are aimed to solve the same
 problem.
 
 That doesn't change the fact that one is encrypted on the network layer
 while the other is not.

Which one, exactly?

 Especially - in contrast to what your statement implied - 587/tcp is not
 encrypted on the network layer.

Yes, it is. Or better put, it can be.

 Which makes the new standard something very different.
 
 To my eyes, not that different in the end.
 
 Yeah.
 Your statement that 587/tcp was smtps is simply wrong. I just corrected
 your wrong statement - nothing more. Why you feel the need to go to a
 great length to convince someone (whoever that might be) that your wrong
 statement was somehow right is completely beyond me.

If you are happy in thinking so I'm not going to try to change your mind. 
Sigh.

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jtelt4$sc9$6...@dough.gmane.org



Re: [OT] IANA ports (was: Filezilla a security risk)

2012-07-09 Thread Camaleón
On Sun, 08 Jul 2012 20:09:41 +0200, Slavko wrote:

 Dňa Sun, 8 Jul 2012 16:10:27 + (UTC) Camaleón noela...@gmail.com
 napísal:

(...)
 
 SMTPS (and SMTP over SSL/TLS) is standarized as always has been, what
 happens is that it was updated to use starttls extension and the older
 RFC was deprecated (but still used in some hosts).
 
 As i wrote early, i know difference and major for me is, that SMTP +
 STARTTLS starts as unencrypted, but SMTP over SSL is encrypted from
 start. Then STARTTLS s not exactly the same as SMTP over SSL. But
 credentials and message transfers are encrypted in both circumstances.

The thing is that there are no other replacements... yet. 

So what we have now for sending e-mails is the plain, unencrypted port 
(tcp/25) and smtps (or whatever you prefer to call it, smtp over tls?), 
that is, tcp/587 that can take the role of the deprecated tcp/465 
(encryption using a dedicated port).

 And if i proper understand (quick look into) RFC 6409, then mentioned
 port 587 is not exactly for SMTP over SSL. It is intended to sending
 mails from MUAs and only allows usage of the IPSEC and other encrypted
 and authenticated tunneling techniques (section 3.3) and in real, one
 can select which will be used. Then it is the site/server depended
 solution. I am right?

It's section 7 (Extensions) what makes the difference and, in any case, 
you always depend on the server exposed capabilities for this.

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jteml6$sc9$7...@dough.gmane.org



Re: Filezilla a security risk

2012-07-08 Thread Slavko
Hi,

Dňa Sun, 8 Jul 2012 00:04:33 -0400 Celejar cele...@gmail.com napísal:

  I use POP3, smtp *and* SSL.  They are not mutually exclusive!!
 
 Of course not - SSL just encapsulates the POP3 and SMTP protocols.

on this point i have one question. What about standards in SMTP 
SSL? By mi search, the standard is SMTP + STARTTLS and not SSL + SMTP.

Can someone explain me this, please? 

regards

-- 
Slavko
http://slavino.sk


signature.asc
Description: PGP signature


Re: Filezilla a security risk

2012-07-08 Thread Camaleón
On Sun, 08 Jul 2012 08:55:15 +0200, Slavko wrote:

 Dňa Sun, 8 Jul 2012 00:04:33 -0400 Celejar cele...@gmail.com napísal:
 
  I use POP3, smtp *and* SSL.  They are not mutually exclusive!!
 
 Of course not - SSL just encapsulates the POP3 and SMTP protocols.
 
 on this point i have one question. What about standards in SMTP  SSL?
 By mi search, the standard is SMTP + STARTTLS and not SSL + SMTP.
 
 Can someone explain me this, please?

There are different implementations, all of them standarized:

While imaps (tcp/993), pop3s (tcp/995) and smtps (tcp/587) make use of 
specific computer ports, imap, pop3 and smtp using STARTTLS keep the 
same ports that their non-encrypted counterparts (143/110/25) to transmit 
clear text credentials protected.

When/why using one or another? 

Well, when opening ports is not possible (consider a restricted 
environment) or as Wikipedia¹ explains, independency and transparency 
seen as a plus when using this extension.

¹http://en.wikipedia.org/wiki/STARTTLS
  
Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jtbsnm$s8h$7...@dough.gmane.org



Re: Filezilla a security risk

2012-07-08 Thread Slavko
Ahoj,

Dňa Sun, 8 Jul 2012 11:59:50 + (UTC) Camaleón noela...@gmail.com
napísal:

  By mi search, the standard is SMTP + STARTTLS and not SSL + SMTP.

 There are different implementations, all of them standarized:
 
 While imaps (tcp/993), pop3s (tcp/995) and smtps (tcp/587) make use of 
 specific computer ports, imap, pop3 and smtp using STARTTLS keep the 
 same ports that their non-encrypted counterparts (143/110/25) to
 transmit clear text credentials protected.

if smtps is standardized, then why i see this:

grep 587 /etc/services 
submission  587/tcp # Submission [RFC4409]
submission  587/udp

but:

grep smtps /etc/services 
ssmtp   465/tcp smtps   # SMTP over SSL

can you please tell me the RFC about SMTPS?

 Well, when opening ports is not possible (consider a restricted 
 environment) or as Wikipedia¹ explains, independency and transparency 
 seen as a plus when using this extension.

i know about differences both of the implementations.

regards

-- 
Slavko
http://slavino.sk


signature.asc
Description: PGP signature


Re: Filezilla a security risk

2012-07-08 Thread Markus Schönhaber
08.07.2012 13:59, Camaleón:

 While imaps (tcp/993), pop3s (tcp/995) and smtps (tcp/587) make use of 

smtps was defined as 465/tcp. 587/tcp is message submission which does
not provide encryption on the transport layer.

-- 
Regards
  mks


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4ff99c27.5050...@list-post.mks-mail.de



[OT] IANA ports (was: Filezilla a security risk)

2012-07-08 Thread Camaleón
On Sun, 08 Jul 2012 16:36:20 +0200, Slavko wrote:

 Dňa Sun, 8 Jul 2012 11:59:50 + (UTC) Camaleón noela...@gmail.com
 napísal:
 
  By mi search, the standard is SMTP + STARTTLS and not SSL + SMTP.
 
 There are different implementations, all of them standarized:
 
 While imaps (tcp/993), pop3s (tcp/995) and smtps (tcp/587) make use of
 specific computer ports, imap, pop3 and smtp using STARTTLS keep the
 same ports that their non-encrypted counterparts (143/110/25) to
 transmit clear text credentials protected.
 
 if smtps is standardized, then why i see this:
 
 grep 587 /etc/services
 submission587/tcp # Submission [RFC4409] 
 submission587/udp
 
 but:
 
 grep smtps /etc/services
 ssmtp 465/tcp smtps   # SMTP over SSL

You can query for both in one line:

sm01@stt008:~$ grep -e 587 -e 465 /etc/services
submission  587/tcp # Submission [RFC4409]
submission  587/udp
ssmtp   465/tcp smtps   # SMTP over SSL

What's what you don't like here? The old port could be still there for 
legacy/backward compatibility issues.

 can you please tell me the RFC about SMTPS?

http://en.wikipedia.org/wiki/SMTPS

 Well, when opening ports is not possible (consider a restricted
 environment) or as Wikipedia¹ explains, independency and transparency
 seen as a plus when using this extension.
 
 i know about differences both of the implementations.

Fine, but you asked.

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jtc7dj$s8h$9...@dough.gmane.org



Re: Filezilla a security risk

2012-07-08 Thread Camaleón
On Sun, 08 Jul 2012 16:41:43 +0200, Markus Schönhaber wrote:

 08.07.2012 13:59, Camaleón:
 
 While imaps (tcp/993), pop3s (tcp/995) and smtps (tcp/587) make use of
 
 smtps was defined as 465/tcp. 587/tcp is message submission which does
 not provide encryption on the transport layer.

They are used for the same purpose (secure smtp) but the former is now 
depretacted. What I did not know is that the new standard can be used 
with or without security (starttls) in the same port.

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jtc84a$s8h$1...@dough.gmane.org



Re: Filezilla a security risk

2012-07-08 Thread Erwan David
On 08/07/12 17:14, Camaleón wrote:
 On Sun, 08 Jul 2012 16:41:43 +0200, Markus Schönhaber wrote:

 08.07.2012 13:59, Camaleón:

 While imaps (tcp/993), pop3s (tcp/995) and smtps (tcp/587) make use of
 smtps was defined as 465/tcp. 587/tcp is message submission which does
 not provide encryption on the transport layer.
 They are used for the same purpose (secure smtp) but the former is now 
 depretacted. What I did not know is that the new standard can be used 
 with or without security (starttls) in the same port.

 Greetings,

The ISP Free in France uses smtp-submission, without SSL but with only
CRAM-MD5 and DIGEST-MD5 authentication methods, or smtps with PLAIN/LOGIN

It is another solution (they explained that their architecture was not
well adapted to starttls, since the smtp sessions and the SSL crypto are
not done by the same servers).


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4ff9a597.1010...@rail.eu.org



Re: [OT] IANA ports (was: Filezilla a security risk)

2012-07-08 Thread Slavko
Ahoj,

Dňa Sun, 8 Jul 2012 15:02:11 + (UTC) Camaleón noela...@gmail.com
napísal:

  can you please tell me the RFC about SMTPS?
 
 http://en.wikipedia.org/wiki/SMTPS
 

I never know, that internet standards are controlled by wikipedia. It is
great, now anybody can create the own standard and nobody need the IANA or
another international organization!

regards

-- 
Slavko
http://slavino.sk


signature.asc
Description: PGP signature


Re: [OT] IANA ports (was: Filezilla a security risk)

2012-07-08 Thread Camaleón
On Sun, 08 Jul 2012 17:22:35 +0200, Slavko wrote:

 Dňa Sun, 8 Jul 2012 15:02:11 + (UTC) Camaleón noela...@gmail.com
 napísal:
 
  can you please tell me the RFC about SMTPS?
 
 http://en.wikipedia.org/wiki/SMTPS
 
 
 I never know, that internet standards are controlled by wikipedia. It is
 great, now anybody can create the own standard and nobody need the IANA
 or another international organization!

?

What Wikipedia explains (and you asked why) about the smtps standard 
is not detailed in the RFC (because RFCs are not the place for long 
dissertations...) but feel free to read the article or to ignore it.

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jtc97t$s8h$1...@dough.gmane.org



Re: [OT] IANA ports (was: Filezilla a security risk)

2012-07-08 Thread Slavko
Hi,

Dňa Sun, 8 Jul 2012 15:33:17 + (UTC) Camaleón noela...@gmail.com
napísal:

 What Wikipedia explains (and you asked why) about the smtps standard 

Reread my initial mail, please. I don't ask why in it, but my english is
poor, then perhaps i wrote it in wrong manner.

 is not detailed in the RFC (because RFCs are not the place for long 
 dissertations...) but feel free to read the article or to ignore it.

For me is enough to know that SMTP over SLL was not standardized yet (or
still?). Why and when this happens is not my problem in these days.

regards

-- 
Slavko
http://slavino.sk


signature.asc
Description: PGP signature


Re: [OT] IANA ports (was: Filezilla a security risk)

2012-07-08 Thread Camaleón
On Sun, 08 Jul 2012 17:56:21 +0200, Slavko wrote:

 Dňa Sun, 8 Jul 2012 15:33:17 + (UTC) Camaleón noela...@gmail.com
 napísal:
 
 What Wikipedia explains (and you asked why) about the smtps
 standard
 
 Reread my initial mail, please. I don't ask why in it, but my english
 is poor, then perhaps i wrote it in wrong manner.

The why is not in your first message but in your second post:

if smtps is standardized, then why i see this:
^^^

 is not detailed in the RFC (because RFCs are not the place for long
 dissertations...) but feel free to read the article or to ignore it.
 
 For me is enough to know that SMTP over SLL was not standardized yet (or
 still?). Why and when this happens is not my problem in these days.

SMTPS (and SMTP over SSL/TLS) is standarized as always has been, what 
happens is that it was updated to use starttls extension and the older 
RFC was deprecated (but still used in some hosts).

Should you had read the Wikipedia article...

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jtcbdj$s8h$1...@dough.gmane.org



Re: Filezilla a security risk

2012-07-08 Thread Henrique de Moraes Holschuh
On Sun, 08 Jul 2012, Markus Schönhaber wrote:
 08.07.2012 13:59, Camaleón:
  While imaps (tcp/993), pop3s (tcp/995) and smtps (tcp/587) make use of 
 
 smtps was defined as 465/tcp. 587/tcp is message submission which does
 not provide encryption on the transport layer.

Yeah, and 465/tcp use for SMTP over SSL was dropped in ~1998[1], and
IANA eventually assigned 465/tcp and 465/udp to other services.  465/tcp
is assigned to URD SSM, and 465/udp to igmpv3lite over UDP.

As usual in things like this, it was a bad move in hindsight: giving up
on port 465 became a drawback about five years later, when the world
started moving past the SSL crap and single-domain-constrained X.509
that existed in 1998 [2], to (still broken) TLSv1.0 and RFC3546, and
later to TLS v1.1+ and RFC 4366.

The same reasoning works for imap and imaps.  Fortunately, nobody gave
up on the 993/tcp imaps port, so it remains assigned to imaps by IANA.
pop3s never had any starttls alternative, and 995/tcp remains assigned
to pop3s.

Now, if ops people were more active on the relevant IETF workgroups, we
might have a TLS port for the submission service, which would help
deployments of hardware TLS endpoints (which is probably the only good
reason to still support port 465 for smtps, actually).

[1] http://www.imc.org/ietf-apps-tls/mail-archive/msg00204.html
[2]
http://www.carbonwind.net/blog/post/A-quickie-for-a-Friday-e28093-a-SSLTLS-timeline.aspx

-- 
  One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie. -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120708162646.gb15...@khazad-dum.debian.net



Re: Filezilla a security risk

2012-07-08 Thread Erwan David
Le Sun  8/07/2012, Henrique de Moraes Holschuh disait
 
 The same reasoning works for imap and imaps.  Fortunately, nobody gave
 up on the 993/tcp imaps port, so it remains assigned to imaps by IANA.
 pop3s never had any starttls alternative, and 995/tcp remains assigned
 to pop3s.

STLS extension for pop3 is defined by RFC 2595. (I do not know why pop3 
commands always have 4 characters...)

-- 
Erwan


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120708163336.ga5...@rail.eu.org



Re: [OT] IANA ports (was: Filezilla a security risk)

2012-07-08 Thread Henrique de Moraes Holschuh
On Sun, 08 Jul 2012, Camaleón wrote:
 SMTPS (and SMTP over SSL/TLS) is standarized as always has been, what 

Actually, at least on port 465, it is deprecated with prejudice as it has
been assigned to something else.

 happens is that it was updated to use starttls extension and the older 
 RFC was deprecated (but still used in some hosts).

It is widely used because of some übercrappy MUAs[1] that screw up when told
to do STARTTLS over port 587, AND because something-over-SSL is friendly to
dumb[2] hardware TLS endpoint gateways, while STARTTLS is not (requires an
application-level proxy running on the TLS gateway).

[1] this mostly includes old versions of certain extremely widely used MS
Windows MUAs.

[2] as in cheaper and much faster, dumb isn't a bad thing in this context

-- 
  One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie. -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120708163632.gc15...@khazad-dum.debian.net



Re: [OT] IANA ports (was: Filezilla a security risk)

2012-07-08 Thread Camaleón
On Sun, 08 Jul 2012 13:36:32 -0300, Henrique de Moraes Holschuh wrote:

 On Sun, 08 Jul 2012, Camaleón wrote:
 SMTPS (and SMTP over SSL/TLS) is standarized as always has been, what
 
 Actually, at least on port 465, it is deprecated with prejudice as it
 has been assigned to something else.

Yes, but still needed under to cope with some corner circumstances (e.g., 
to support old MUAs).

 happens is that it was updated to use starttls extension and the older
 RFC was deprecated (but still used in some hosts).
 
 It is widely used because of some übercrappy MUAs[1] that screw up when
 told to do STARTTLS over port 587, AND because something-over-SSL is
 friendly to dumb[2] hardware TLS endpoint gateways, while STARTTLS is
 not (requires an application-level proxy running on the TLS gateway).

Yup, exactly ;-(

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jtcdc9$s8h$1...@dough.gmane.org



Re: Filezilla a security risk

2012-07-08 Thread Markus Schönhaber
08.07.2012 17:14, Camaleón:

 On Sun, 08 Jul 2012 16:41:43 +0200, Markus Schönhaber wrote:
 
 08.07.2012 13:59, Camaleón:

 While imaps (tcp/993), pop3s (tcp/995) and smtps (tcp/587) make use of

 smtps was defined as 465/tcp. 587/tcp is message submission which does
 not provide encryption on the transport layer.
 
 They are used for the same purpose (secure smtp) but the former is now 
 depretacted.

For some definition of purpose, maybe [1]
Stating that 587/tcp was smtps is simply wrong, because it implies
encryption on the network layer.

 What I did not know is that the new standard can be used 
 with or without security (starttls) in the same port.

Which makes the new standard something very different.


[1] For example: MUAs should connect to this port to send outgoing mail.

-- 
Regards
  mks



-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4ff9baaf.5060...@list-post.mks-mail.de



Re: Filezilla a security risk

2012-07-08 Thread Camaleón
On Sun, 08 Jul 2012 18:51:59 +0200, Markus Schönhaber wrote:

 08.07.2012 17:14, Camaleón:
 
 On Sun, 08 Jul 2012 16:41:43 +0200, Markus Schönhaber wrote:
 
 08.07.2012 13:59, Camaleón:

 While imaps (tcp/993), pop3s (tcp/995) and smtps (tcp/587) make use
 of

 smtps was defined as 465/tcp. 587/tcp is message submission which does
 not provide encryption on the transport layer.
 
 They are used for the same purpose (secure smtp) but the former is now
 depretacted.
 
 For some definition of purpose, maybe [1] Stating that 587/tcp was
 smtps is simply wrong, because it implies encryption on the network
 layer.

When you replace a standard with another it would be fair to say that 
both share the same essence and they are aimed to solve the same problem.

Moreover, the fact it can also use encryption is what makes it 
interesting because for non-encrypted communication there's already smtp 
(tcp/25) so the new standard (RFC 6409) can be seen as the succesor of 
the old smtps.

 What I did not know is that the new standard can be used with or
 without security (starttls) in the same port.
 
 Which makes the new standard something very different.

To my eyes, not that different in the end.

 [1] For example: MUAs should connect to this port to send outgoing mail.

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jtcetj$s8h$1...@dough.gmane.org



Re: Filezilla a security risk

2012-07-08 Thread Markus Schönhaber
08.07.2012 19:10, Camaleón:

 On Sun, 08 Jul 2012 18:51:59 +0200, Markus Schönhaber wrote:
 
 08.07.2012 17:14, Camaleón:

 On Sun, 08 Jul 2012 16:41:43 +0200, Markus Schönhaber wrote:

 08.07.2012 13:59, Camaleón:

 While imaps (tcp/993), pop3s (tcp/995) and smtps (tcp/587) make use
 of

 smtps was defined as 465/tcp. 587/tcp is message submission which does
 not provide encryption on the transport layer.

 They are used for the same purpose (secure smtp) but the former is now
 depretacted.

 For some definition of purpose, maybe [1] Stating that 587/tcp was
 smtps is simply wrong, because it implies encryption on the network
 layer.
 
 When you replace a standard with another it would be fair to say that 
 both share the same essence and they are aimed to solve the same problem.

That doesn't change the fact that one is encrypted on the network layer
while the other is not.
Especially - in contrast to what your statement implied - 587/tcp is not
encrypted on the network layer.

 Which makes the new standard something very different.
 
 To my eyes, not that different in the end.

Yeah.
Your statement that 587/tcp was smtps is simply wrong. I just corrected
your wrong statement - nothing more. Why you feel the need to go to a
great length to convince someone (whoever that might be) that your wrong
statement was somehow right is completely beyond me.

-- 
Regards
  mks


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4ff9c7fc.1000...@list-post.mks-mail.de



Re: [OT] IANA ports (was: Filezilla a security risk)

2012-07-08 Thread Slavko
Ahoj,

Dňa Sun, 8 Jul 2012 16:10:27 + (UTC) Camaleón noela...@gmail.com
napísal:

 The why is not in your first message but in your second post:
 
 if smtps is standardized, then why i see this:

Oh, yes. My misunderstand, i am sorry.

  is not detailed in the RFC (because RFCs are not the place for long
  dissertations...) but feel free to read the article or to ignore it.
  
  For me is enough to know that SMTP over SLL was not standardized yet
  (or still?). Why and when this happens is not my problem in these days.
 
 SMTPS (and SMTP over SSL/TLS) is standarized as always has been, what 
 happens is that it was updated to use starttls extension and the older 
 RFC was deprecated (but still used in some hosts).

As i wrote early, i know difference and major for me is, that SMTP +
STARTTLS starts as unencrypted, but SMTP over SSL is encrypted from start.
Then STARTTLS s not exactly the same as SMTP over SSL. But credentials and
message transfers are encrypted in both circumstances.

And if i proper understand (quick look into) RFC 6409, then mentioned port
587 is not exactly for SMTP over SSL. It is intended to sending
mails from MUAs and only allows usage of the IPSEC and other encrypted and
authenticated tunneling techniques (section 3.3) and in real, one can
select which will be used. Then it is the site/server depended solution. I
am right?

regards

-- 
Slavko
http://slavino.sk


signature.asc
Description: PGP signature


[OT] Long threads, Was: Re: Filezilla a security risk

2012-07-08 Thread rjc
On Sun, Jul 08, 2012 at 06:48:44PM BST, Markus Schönhaber wrote:
 Yeah.
 Your statement that 587/tcp was smtps is simply wrong. I just corrected
 your wrong statement - nothing more. Why you feel the need to go to a
 great length to convince someone (whoever that might be) that your wrong
 statement was somehow right is completely beyond me.

I had been on this list [0] on and off for quite a while now and have
noticed that certain individuals find it hard to simply be wrong [1]
and will argue their case just to have the final word.

[0] in a minute I will be corrected that it is a Usenet news group ;^)
[1] or not always be 100% right

Regards,
-- 
rjc


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120708183148.ga2...@linuxstuff.pl



Re: Filezilla a security risk

2012-07-07 Thread Lisi
On Monday 02 July 2012 00:08:52 Celejar wrote:
 On Fri, 29 Jun 2012 15:13:13 + (UTC)

 Camaleón noela...@gmail.com wrote:
  Anyway, aren't most of us still using plain pop3 and smtp connections
  with no message encryption at all? Who are we blaming? ;-)

 We are? I can't speak for anyone else, but all my mail accounts (I
 use Gmail and Lavabit) use SSL (ports 995 / 465) for incoming and
 outgoing mail.

I use POP3, smtp *and* SSL.  They are not mutually exclusive!!

Lisi



--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201207072127.38523.lisi.re...@gmail.com



Re: Filezilla a security risk

2012-07-07 Thread Celejar
On Sat, 7 Jul 2012 21:27:38 +0100
Lisi lisi.re...@gmail.com wrote:

 On Monday 02 July 2012 00:08:52 Celejar wrote:
  On Fri, 29 Jun 2012 15:13:13 + (UTC)
 
  Camaleón noela...@gmail.com wrote:
   Anyway, aren't most of us still using plain pop3 and smtp connections
   with no message encryption at all? Who are we blaming? ;-)
 
  We are? I can't speak for anyone else, but all my mail accounts (I
  use Gmail and Lavabit) use SSL (ports 995 / 465) for incoming and
  outgoing mail.
 
 I use POP3, smtp *and* SSL.  They are not mutually exclusive!!

Of course not - SSL just encapsulates the POP3 and SMTP protocols.

 Lisi

Celejar


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120708000433.372b2be0.cele...@gmail.com



Re: Filezilla a security risk

2012-07-02 Thread Camaleón
On Sun, 01 Jul 2012 19:08:52 -0400, Celejar wrote:

 On Fri, 29 Jun 2012 15:13:13 + (UTC) Camaleón noela...@gmail.com
 wrote:
 
 Anyway, aren't most of us still using plain pop3 and smtp connections
 with no message encryption at all? Who are we blaming? ;-)
 
 We are? I can't speak for anyone else, but all my mail accounts (I use
 Gmail and Lavabit) use SSL (ports 995 / 465) for incoming and outgoing
 mail.

Good boy :-)

I'm also using Gmail (still, yes...) with pop3s/smtps but Gmail is only 
one of the mailboxes I have to command. For the rest of them (99%) 
there's a mix of non-secured/secured in a 3/1 rate.

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jssbgo$4gd$4...@dough.gmane.org



Re: Filezilla a security risk

2012-07-01 Thread Celejar
On Fri, 29 Jun 2012 15:13:13 + (UTC)
Camaleón noela...@gmail.com wrote:

 Anyway, aren't most of us still using plain pop3 and smtp connections 
 with no message encryption at all? Who are we blaming? ;-)

We are? I can't speak for anyone else, but all my mail accounts (I
use Gmail and Lavabit) use SSL (ports 995 / 465) for incoming and
outgoing mail.

Celejar


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120701190852.6ac28c32.cele...@gmail.com



Re: Filezilla a security risk

2012-07-01 Thread Istimsak
I am one of those guilty parties still using the no encryption setting.

Celejar cele...@gmail.com wrote:

On Fri, 29 Jun 2012 15:13:13 + (UTC)
Camaleón noela...@gmail.com wrote:

 Anyway, aren't most of us still using plain pop3 and smtp connections 
 with no message encryption at all? Who are we blaming? ;-)

We are? I can't speak for anyone else, but all my mail accounts (I
use Gmail and Lavabit) use SSL (ports 995 / 465) for incoming and
outgoing mail.

Celejar


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120701190852.6ac28c32.cele...@gmail.com



Re: Filezilla a security risk

2012-06-30 Thread Camaleón
On Fri, 29 Jun 2012 21:03:58 +0200, Denis Witt wrote:

(...)

 and hey, it's open source! You can hire a programmer, make a fork
 (FileZilla-S for secure) and add all the enhancements you want ;-
 
 Forking a program for a single little feature doesn't make a lot of
 sense to me. 

If you value so much that feature and you really like the application, 
why not?

 Either you will have to patch the upstream version every now and then
 or you end up with a Fork that doesn't get any new features, also it
 might confuses some users.

Then move on :-)

But remmember this is very common for another programs. In Windows 
systems, for instance, the login credentials of many applications remain 
stored accessible from the registry so no gain here. In the linux 
ecosphere, as I already mentioned (i.e., mutt, the ssl keys and another 
one I remember is phpmyadmin when using a determined auth type), it 
happens the same.

I wonder if a feasible approach to store credentials in clear text for 
FileZilla would be using something like the gnome-keyring or a similar 
implementation for the different OSes or linux boxes, although of course, 
this would add additional drawbacks.

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jsmga9$djv$3...@dough.gmane.org



Re: Filezilla a security risk

2012-06-30 Thread Denis Witt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Camaleón schrieb:

 and hey, it's open source! You can hire a programmer, make a
 fork (FileZilla-S for secure) and add all the enhancements you
 want ;-
 Forking a program for a single little feature doesn't make a lot
 of sense to me.

 If you value so much that feature and you really like the
 application, why not?

I didn't. It's more that I dislike the attitude of some developers (in
general) saying that they don't have to care about uninformed users who
misconfigure their systems or even don't know how to protect themselves.

At least they should inform the user that saving passwords is insecure.

 I wonder if a feasible approach to store credentials in clear text
 for FileZilla would be using something like the gnome-keyring or a
 similar implementation for the different OSes or linux boxes,
 although of course, this would add additional drawbacks.

I like how MacOS handle this, nearly every application designed for
MacOS is using the built in Keychain. Of course, if the keychain tool
isn't secure this is a big problem.

Bye.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJP7tiwAAoJEGqblLUjc3f4Hk8H/17B60KAn5m5f7kzAKPLKUBb
ke9h/lYtoxMtDOUlmebDGc/S2QMI0eX88fV/kI8cpSfqVJrVtM8B0iLikvCThkhe
aO0MWVSIxdZw0cDdNr4hEwqseBYrSTAN1msgDkPWp9CBAv8W4+9eL1/nQTlqipUA
GoD4fZ7a+IxMuJfSKujfKFVo/8huQSpW3XXDvxXg8W6sW6KsaSOaMfQrZIKRMs8K
/5ZWG9iqyjSbpo17ZhFVTsg9IkpPRVcijYEoAG1qZg17CbupieIEHDou2FzITA5M
pncWwIgwzdfoOL0nb9TuhJYXNjtGxMAdjDQBGRqPyQ3ogD1fMHnHThlcfF4CInQ=
=ZzgY
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4feed8b4.6000...@concepts-and-training.de



Re: Filezilla a security risk

2012-06-30 Thread Camaleón
On Sat, 30 Jun 2012 12:45:08 +0200, Denis Witt wrote:

 Camaleón schrieb:
 
 and hey, it's open source! You can hire a programmer, make a fork
 (FileZilla-S for secure) and add all the enhancements you want ;-
 Forking a program for a single little feature doesn't make a lot of
 sense to me.
 
 If you value so much that feature and you really like the application,
 why not?
 
 I didn't. It's more that I dislike the attitude of some developers (in
 general) saying that they don't have to care about uninformed users who
 misconfigure their systems or even don't know how to protect themselves.
 
 At least they should inform the user that saving passwords is insecure.

If currently there's no indication in their docs about the settings are 
being stored in clear text (login and passsword) you can open a wishlist 
bug report at FileZilla site for that.

It's easy to blame devels (and forget the next day) but users can also 
contribute with this little things.

 I wonder if a feasible approach to store credentials in clear text for
 FileZilla would be using something like the gnome-keyring or a similar
 implementation for the different OSes or linux boxes, although of
 course, this would add additional drawbacks.
 
 I like how MacOS handle this, nearly every application designed for
 MacOS is using the built in Keychain. Of course, if the keychain tool
 isn't secure this is a big problem.

That's similar to what GNOME keyring does and you can also use an 
unsecure keyring by removing the passsord and exposing the stored 
credentials as plain text but of course, that's up to the user and how he/
she wants to manage the login information.

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jsmnpc$djv$8...@dough.gmane.org



Re: Filezilla a security risk

2012-06-30 Thread Claudius Hubig
Hello Camaleón,

Camaleón noela...@gmail.com wrote:
 On Sat, 30 Jun 2012 12:45:08 +0200, Denis Witt wrote:
  I like how MacOS handle this, nearly every application designed for
  MacOS is using the built in Keychain. Of course, if the keychain tool
  isn't secure this is a big problem.
 
 That's similar to what GNOME keyring does and you can also use an 
 unsecure keyring by removing the passsord and exposing the stored 
 credentials as plain text but of course, that's up to the user and how he/
 she wants to manage the login information.

And if FileZilla wanted to make use of this possibility, they had to
(let me check the list of supported platforms):

- Support the Gnome keyring
- Support KWallet (KDE)
- Support this MacOS thingy
- Think about something for Windows

and someone would still decide that their favourite environment™ is
missing and complain about FileZilla being a security problem.

Sure, all that can be done, but it is certainly not the job of an
application to secure user data, that’s the job of the OS.

Best regards,

Claudius


-- 
You should go home.
http://chubig.net  telnet nightfall.org 4242


signature.asc
Description: PGP signature


Re: Filezilla a security risk

2012-06-30 Thread Camaleón
On Sat, 30 Jun 2012 13:46:30 +0200, Claudius Hubig wrote:

 Hello Camaleón,
 
 Camaleón noela...@gmail.com wrote:
 On Sat, 30 Jun 2012 12:45:08 +0200, Denis Witt wrote:
  I like how MacOS handle this, nearly every application designed for
  MacOS is using the built in Keychain. Of course, if the keychain tool
  isn't secure this is a big problem.
 
 That's similar to what GNOME keyring does and you can also use an
 unsecure keyring by removing the passsord and exposing the stored
 credentials as plain text but of course, that's up to the user and how
 he/ she wants to manage the login information.
 
 And if FileZilla wanted to make use of this possibility, they had to
 (let me check the list of supported platforms):
 
 - Support the Gnome keyring
 - Support KWallet (KDE)
 - Support this MacOS thingy
 - Think about something for Windows
 
 and someone would still decide that their favourite environment™ is
 missing and complain about FileZilla being a security problem.

Even more, should FileZilla credentials finally benefit from any of those 
methods, there will be still users that complain because they want to run 
Filezilla client from external USB drive in stand-alone mode.

As I said, the worst computer's enemy is the user :-)

 Sure, all that can be done, but it is certainly not the job of an
 application to secure user data, that’s the job of the OS.

Sure, and when there is no OS in place (e.g., when you remove the hard 
disk and connect it into another system) you have to ensure your data is 
protected and only hard disk encryption can prevent this scenario because 
even the passwords are encrypted can be still cracked.

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jsn3cj$djv$1...@dough.gmane.org



Re: Filezilla a security risk

2012-06-29 Thread Andrei POPESCU
On Vi, 29 iun 12, 13:16:25, Richard Hector wrote:
 On 29/06/12 11:26, Denis Witt wrote:
   If your account is hosed, well, go to their second argument: 2.
   don't get the malware in the first place ;-)
 Great Argument, btw. Oh, I got an Airbag on my car, get rid of the
 brakes please. I don't need them anymore.
 
 That's the wrong way round. I have brakes and drive safely, so an
 airbag isn't essential. Which isn't to say I'd get it removed if I
 had one.

+1

Kind regards,
Andrei
-- 
Offtopic discussions among Debian users and developers:
http://lists.alioth.debian.org/mailman/listinfo/d-community-offtopic


signature.asc
Description: Digital signature


Re: Filezilla a security risk

2012-06-29 Thread Denis Witt

On 29.06.2012 03:16, Richard Hector wrote:


  If your account is hosed, well, go to their second argument: 2.
  don't get the malware in the first place ;-)

Great Argument, btw. Oh, I got an Airbag on my car, get rid of the
brakes please. I don't need them anymore.



That's the wrong way round. I have brakes and drive safely, so an airbag
isn't essential. Which isn't to say I'd get it removed if I had one.


Maybe, seat belts are also not essential, but in many countries the 
usage is mandatory, for a good reason.


So my argument is still valid. It is good to have as many security as 
you can get as long as performance and comfort is still fine.


Bye.


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Archive: http://lists.debian.org/4fed752b.20...@concepts-and-training.de



Re: Filezilla a security risk

2012-06-29 Thread Linux-Fan
On 06/27/2012 09:26 PM, francis picabia wrote:
 I've just learned Filezilla is a security risk.  It stores saved
 passwords and the last used password in a plain text file.
 
 Malware commonly scoops up this info and hacks web sites
 or shell accounts.
 
 The developer refuses to incorporate a solution
 such as master password and encryption into filezilla.
 
 His responses in numerous bug reports and feature requests are:
 
 1. encryption: that's the file system's job
 2. don't get the malware in the first place
 
 In my opinion, people should avoid filezilla.

Thank you for your warning. I immediately switched to gftp because
storing passwords unencrypted violates my security standards.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4fedab92.8080...@web.de



Re: Filezilla a security risk

2012-06-29 Thread francis picabia
The posts about how there are other risks from malware and keyloggers
is true enough.  I never claimed that avoiding filezilla would make the Windows
system secure.  But if you have your doors and windows open, and want
to reduce the chance of theft, then I'd say filezilla is like a patio
door wide open
on the scale of opportunities and the prevalence of the exploit.

The prevalence of a risk and the ease of executing the exploit
is what matters first.  Whether it is possible to do
something else matters, but less.  The greatest risk
is with what is currently happening in high frequency and has
a high likelihood of reoccurring.  Debian Security Advisory
doesn't have this, but Redhat and Malware advisories rank
threats in terms of ease of execution, popularity in the wild
and severity of the damage which could result.

In my work place, people have thanked me for this warning.  Even IT
people who work Information Systems are glad to know of this risk and
did not know of it before.

In the workplace, people use Windows and Unix.  They do not have
the luxury of being as dogmatic as some Linux users.  They are
mostly interested in working practically.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CA+AKB6HRWca7xrB7YRD3i4=fvyhusg74hmcj7ckgtx2wxek...@mail.gmail.com



Re: Filezilla a security risk

2012-06-29 Thread Camaleón
On Fri, 29 Jun 2012 01:26:08 +0200, Denis Witt wrote:

 If your account is hosed, well, go to their second argument: 2. don't
 get the malware in the first place ;-)
 
 Great Argument, btw. Oh, I got an Airbag on my car, get rid of the
 brakes please. I don't need them anymore.

- The engineer has to decide *what* to add and *what* to remove.
- The manufacturer has to decide is it wants to sell *that kind* of car.
- The customer has to decide if he/she wants to buy *that* car.

There are many things to watch in the chain. And yes, brakes -as we know 
today- do become obsolete sooner or later, such is life.

 The ONLY reason why Linux based systems hasn't got such a problem with
 malware is that there are not enough Desktop machines to make this a
 good target. Often enough there are security holes which allow you to
 take control over the entire machine. And that's fine as it is complex
 software.

True, but what's your point here?

Should my Debian system becomes cracked or infected by any kind of treat 
I would worry more about my usual files and not the settings for 
Filezilla. I mean, nothing new here, security is a multi-edged sword.

 But if you can easily add some more security layers without loosing too
 much performance and/or usability you should always do that.

Maybe... but you'll get a false impression of protection that can be even 
more nocive as you'll relax your security notion.

 Storing unhashed and unsalted or unencrypted passwords is simply stupid.
 Ask the guys at last.fm. ;)

Again, there are files in my servers (e.g., ssl keys) and also my Mutt 
configuration file (that holds my e-mail account password) which are 
stored in cleartext. So...? Do you want us to remove the ethernet 
cord? ;-)

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jskc6a$68h$4...@dough.gmane.org



Re: Filezilla a security risk

2012-06-29 Thread Roger B.A. Klorese

On 6/29/12 6:56 AM, Camaleón wrote:
Should my Debian system becomes cracked or infected by any kind of 
treat I would worry more about my usual files and not the settings for 
Filezilla. I mean, nothing new here, security is a multi-edged sword.



Really? I'm far more concerned about my credentials for foreign sites 
than I am for any other information I store locally.



--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Archive: http://lists.debian.org/4fedb501.1080...@queernet.org



Re: Filezilla a security risk

2012-06-29 Thread Lisi
On Friday 29 June 2012 10:28:11 Denis Witt wrote:
 I have brakes and drive safely, so an airbag

  isn't essential.

And do all the speed louts see you coming and say: We mustn't overtake on 
this blind corner.  The driver coming towards me on what is now the same side 
of the road as I am on is a good driver.  I must backtrack in time and not 
overtake because good drivers don't have accidents.?  I consider all the 
modern improvements in safety essential, and with each of them have been an 
early adopter.

Lisi


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201206291502.53486.lisi.re...@gmail.com



Re: Filezilla a security risk

2012-06-29 Thread Camaleón
On Fri, 29 Jun 2012 07:00:33 -0700, Roger B.A. Klorese wrote:

 On 6/29/12 6:56 AM, Camaleón wrote:
 Should my Debian system becomes cracked or infected by any kind of
 treat I would worry more about my usual files and not the settings for
 Filezilla. I mean, nothing new here, security is a multi-edged sword.
 
 
 Really? I'm far more concerned about my credentials for foreign sites
 than I am for any other information I store locally.

Yes, really.

The information I can store in my systems are by far more important than 
the passwords for my FTP sites. In the end, it only affects the FTP 
credentials, nor databases, nor root accounts... because you aren't login 
as root for your FTP sessions, right? ;-)

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jskdhm$68h$7...@dough.gmane.org



Re: Filezilla a security risk

2012-06-29 Thread Roger B.A. Klorese
My root credentials for my local machine aren't stored in plaintext. And if the 
local machine is compromised, the critical threat is its use as a zombie, not 
any info that's on it. There simply isn't any confidential data. 

Sent from my iPhone

On Jun 29, 2012, at 3:19 PM, Camaleón noela...@gmail.com wrote:

 On Fri, 29 Jun 2012 07:00:33 -0700, Roger B.A. Klorese wrote:
 
 On 6/29/12 6:56 AM, Camaleón wrote:
 Should my Debian system becomes cracked or infected by any kind of
 treat I would worry more about my usual files and not the settings for
 Filezilla. I mean, nothing new here, security is a multi-edged sword.
 
 
 Really? I'm far more concerned about my credentials for foreign sites
 than I am for any other information I store locally.
 
 Yes, really.
 
 The information I can store in my systems are by far more important than 
 the passwords for my FTP sites. In the end, it only affects the FTP 
 credentials, nor databases, nor root accounts... because you aren't login 
 as root for your FTP sessions, right? ;-)
 
 Greetings,
 
 -- 
 Camaleón
 
 
 -- 
 To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
 with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
 Archive: http://lists.debian.org/jskdhm$68h$7...@dough.gmane.org
 


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/92fd3e54-d65f-4d68-8d7b-793e6008c...@queernet.org



Re: Filezilla a security risk

2012-06-29 Thread Denis Witt

On 29.06.2012 15:56, Camaleón wrote:


The ONLY reason why Linux based systems hasn't got such a problem with
malware is that there are not enough Desktop machines to make this a
good target. Often enough there are security holes which allow you to
take control over the entire machine. And that's fine as it is complex
software.



True, but what's your point here?


The point is that software can't be 100% secure. So when possible it is 
a good idea to have more than one security layer. A bug in Apache my 
cause someone to get access to you FileZilla-Settings. At the moment 
this would be a big problem, if the file is encrypted the problem is 
still there but you have some additional time to change your passwords. 
Good thing.



Should my Debian system becomes cracked or infected by any kind of treat
I would worry more about my usual files and not the settings for
Filezilla. I mean, nothing new here, security is a multi-edged sword.


Really? I would more worry about the remote servers listed in my 
FileZilla-Config (if there are any), because they might belong to 
customers, friends, etc. I might get worried about my Backups as I want 
to restore my compromised system.



But if you can easily add some more security layers without loosing too
much performance and/or usability you should always do that.



Maybe... but you'll get a false impression of protection that can be even
more nocive as you'll relax your security notion.


Humans are making mistakes, a false impression of protection may lend 
you to such mistakes, this is true. That's one reason why we don't run 
background Virus-Checks on our machines (mails are being scanned and you 
can do on demand checks for USB media, etc.).


But it is easy to tell users that all files from those medias may be 
evil. It's much harder to tell them that their programs might store 
sensible data in a way that isn't secure. At least this is much harder 
than for the FileZilla guys to store passwords encrypted.



Storing unhashed and unsalted or unencrypted passwords is simply stupid.
Ask the guys at last.fm. ;)



Again, there are files in my servers (e.g., ssl keys) and also my Mutt


SSL/SSH Keys should have a password or should be stored in some kind of 
encrypted container.



configuration file (that holds my e-mail account password) which are
stored in cleartext. So...?


Pretty stupid isn't it? ;) An encrypted container wouldn't help a lot 
here, because I assume your MUA is running most of the day, right? So 
the container has to be open all the time and any malware could read the 
file.



Do you want us to remove the ethernet cord? ;-)


Would be a nice thing from a security point of view, that's why I 
mentioned comfort and performance. :)


Bye.


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Archive: http://lists.debian.org/4fedbf4d.6040...@concepts-and-training.de



Re: Filezilla a security risk

2012-06-29 Thread Camaleón
On Fri, 29 Jun 2012 15:36:16 +0100, Roger B.A. Klorese wrote:

 On Jun 29, 2012, at 3:19 PM, Camaleón noela...@gmail.com wrote:
 
 On Fri, 29 Jun 2012 07:00:33 -0700, Roger B.A. Klorese wrote:
 
 On 6/29/12 6:56 AM, Camaleón wrote:
 Should my Debian system becomes cracked or infected by any kind of
 treat I would worry more about my usual files and not the settings
 for Filezilla. I mean, nothing new here, security is a multi-edged
 sword.
 
 
 Really? I'm far more concerned about my credentials for foreign sites
 than I am for any other information I store locally.
 
 Yes, really.
 
 The information I can store in my systems are by far more important
 than the passwords for my FTP sites. In the end, it only affects the
 FTP credentials, nor databases, nor root accounts... because you aren't
 login as root for your FTP sessions, right? ;-)

 My root credentials for my local machine aren't stored in plaintext. 

I did not mean that. I mean login to your FTP server as root (and not 
as plain user) which is different thing and of course should be avoided.

 And if the local machine is compromised, the critical threat is its use
 as a zombie, not any info that's on it. 

You sure? Being a zombie could be even funny, sending spam and infected e-
mails to windows users, kinda justice and divine revenge, he, he... :-)

 There simply isn't any confidential data.

Lucky you that don't have to worry for that.

 Sent from my iPhone
  ^^^

I hope you also care for the data stored in your cell phone :-)

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jskf56$68h$9...@dough.gmane.org



Re: Filezilla a security risk

2012-06-29 Thread Camaleón
On Fri, 29 Jun 2012 16:44:29 +0200, Denis Witt wrote:

 On 29.06.2012 15:56, Camaleón wrote:
 
 The ONLY reason why Linux based systems hasn't got such a problem with
 malware is that there are not enough Desktop machines to make this a
 good target. Often enough there are security holes which allow you to
 take control over the entire machine. And that's fine as it is complex
 software.
 
 True, but what's your point here?
 
 The point is that software can't be 100% secure. So when possible it is
 a good idea to have more than one security layer. 

Even if that extra layer is of no help because you leave your computer 
open and accessible to anyone? Then you're wasting your time and your 
computer resources, security has to sit between useful and effectiveness, 
otherwise you're losing the battle.

 A bug in Apache my cause someone to get access to you FileZilla
 -Settings. 

I wonder how that can happen... 

 At the moment this would be a big problem, if the file is encrypted the
 problem is still there but you have some additional time to change your
 passwords. Good thing.

Good thing for a corner case. But the bad thing here is that someone can 
access your Filezilla settings from you Apache, though.

 Should my Debian system becomes cracked or infected by any kind of
 treat I would worry more about my usual files and not the settings for
 Filezilla. I mean, nothing new here, security is a multi-edged sword.
 
 Really? I would more worry about the remote servers listed in my
 FileZilla-Config (if there are any), because they might belong to
 customers, friends, etc. I might get worried about my Backups as I want
 to restore my compromised system.

You change the password for your FTP user accounts and that's all. Gee, I 
wonder in what way users are using their linux systems that don't store 
any important data on them, only for multimedia playing? :-P

 But if you can easily add some more security layers without loosing
 too much performance and/or usability you should always do that.
 
 Maybe... but you'll get a false impression of protection that can be
 even more nocive as you'll relax your security notion.
 
 Humans are making mistakes, a false impression of protection may lend
 you to such mistakes, this is true. That's one reason why we don't run
 background Virus-Checks on our machines (mails are being scanned and you
 can do on demand checks for USB media, etc.).

I do check the files I donwload from the web, regardless they are going 
to be opened from windows or linux, e-mails are also scanned by means of 
ClamAV and USB keys are not anutomatically mounted thus can be also 
easily analyzed first.

And I do all of the above because I came from Windows first, I have the 
steps burned in fire in my brain :-)

 But it is easy to tell users that all files from those medias may be
 evil. It's much harder to tell them that their programs might store
 sensible data in a way that isn't secure. At least this is much harder
 than for the FileZilla guys to store passwords encrypted.

Curiously enough is not only Filezilla who takes the path for not 
encrypting the user credentials so there has to be a reason in behind for 
that to happen so often...

Anyway, aren't most of us still using plain pop3 and smtp connections 
with no message encryption at all? Who are we blaming? ;-)

 Storing unhashed and unsalted or unencrypted passwords is simply
 stupid. Ask the guys at last.fm. ;)
 
 Again, there are files in my servers (e.g., ssl keys) and also my Mutt
 
 SSL/SSH Keys should have a password or should be stored in some kind of
 encrypted container.

IIRC you have to remove the password so Apache can make use of it so 
finally the security relies on the file perms (only root can read it).

 configuration file (that holds my e-mail account password) which are
 stored in cleartext. So...?
 
 Pretty stupid isn't it? ;) 

You tell me :-)

 An encrypted container wouldn't help a lot here, because I assume your
 MUA is running most of the day, right? So the container has to be open 
all the time and any malware could read
 the file.

In my case it is launched on demand. My main MUA is Thunderbird.

 Do you want us to remove the ethernet cord? ;-)
 
 Would be a nice thing from a security point of view, that's why I
 mentioned comfort and performance. :)

There's still dangerous USB flash drives and the always evil CD/DVD and 
floppy disks... you never know.

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jskgm9$68h$1...@dough.gmane.org



Re: Filezilla a security risk

2012-06-29 Thread Steve Dowe
On 29/06/12 15:36, Roger B.A. Klorese wrote:
 My root credentials for my local machine aren't stored in plaintext.
 And if the local machine is compromised, the critical threat is its
 use as a zombie, not any info that's on it. There simply isn't any
 confidential data.

But the reason for that is that your root password is encrypted using
one-way encryption.  It cannot be decrypted.

But, the result of it being encrypted is compared to the result of the
password you log in with (as root) being encrypted ... if the two match,
that's good enough for PAM, etc.

Obviously, for FZ, you need two-way encryption/decryption.

I know I'm stating the obvious, but I've been told I'm good at that ;)

-- 
Steve Dowe

Warp Universal Limited
http://warp2.me/sd


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4fedc60e.8080...@warpuniversal.co.uk



Re: Filezilla a security risk

2012-06-29 Thread Denis Witt

On 29.06.2012 17:13, Steve Dowe wrote:


Obviously, for FZ, you need two-way encryption/decryption.


But this is also no problem, just create a Master-Password and use 
encryption based on that.


If you start FileZilla you have to enter the Master-Password and then 
you can connect to all available accounts.


This might not be bulletproof but it gave you some time to detect that 
your machine was compromised and change your passwords.


Bye.


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Archive: http://lists.debian.org/4fedc8fc.8000...@concepts-and-training.de



Re: Filezilla a security risk

2012-06-29 Thread Steve Dowe
On 29/06/12 16:25, Denis Witt wrote:

 This might not be bulletproof but it gave you some time to detect that
 your machine was compromised and change your passwords.

Maybe not, but what is? :)

At the same time, with all this talk of passwords stored as plain text
etc, it's not a great hurdle to set up a local, encrypted loopback
device that mounts in your local file system.  You could even mount it
at ~/.filezilla, and then run up FZ for the first time.

Such a device would require a password to unlock/mount, so the window
where unencrypted data is vulnerable could be minimised...

http://www.howtoforge.com/encrypt-your-data-with-encfs-debian-squeeze-ubuntu-11.10

-- 
Steve Dowe

Warp Universal Limited
http://warp2.me/sd


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4fedcbde.8010...@warpuniversal.co.uk



Re: Filezilla a security risk

2012-06-29 Thread Denis Witt

On 29.06.2012 17:13, Camaleón wrote:


The point is that software can't be 100% secure. So when possible it is
a good idea to have more than one security layer.



Even if that extra layer is of no help because you leave your computer
open and accessible to anyone? Then you're wasting your time and your
computer resources, security has to sit between useful and effectiveness,
otherwise you're losing the battle.


FileZilla could use a Master-Password to encrypt the Account-Passwords. 
So if you start FZ you enter the Master-Password (and may define a time 
so that FZ will forgot the Master-PW after some time, when it's still open).



A bug in Apache my cause someone to get access to you FileZilla
-Settings.



I wonder how that can happen...


It was just an example.

Another example, a colleague of yours have SSH-Access on your machine. 
Also you allow some commands he can run with sudo. Did you know that 
chmod is enough so he could start a shell with root credentials? And I 
don't talk about suid.


What I'm trying to say is that our machines are pretty much very complex 
and it is very easy to overlook things.



At the moment this would be a big problem, if the file is encrypted the
problem is still there but you have some additional time to change your
passwords. Good thing.



Good thing for a corner case. But the bad thing here is that someone can
access your Filezilla settings from you Apache, though.


Sure. But if there is a bug (or misconfiguration) it might be possible 
to do so. If it was a misconfiguration it is your own fault, of course.



Really? I would more worry about the remote servers listed in my
FileZilla-Config (if there are any), because they might belong to
customers, friends, etc. I might get worried about my Backups as I want
to restore my compromised system.



You change the password for your FTP user accounts and that's all. Gee, I
wonder in what way users are using their linux systems that don't store
any important data on them, only for multimedia playing? :-P


No, but the really important data is encrypted in a way so even if my 
machine is running all the time the container isn't accessible all the time.



Humans are making mistakes, a false impression of protection may lend
you to such mistakes, this is true. That's one reason why we don't run
background Virus-Checks on our machines (mails are being scanned and you
can do on demand checks for USB media, etc.).



I do check the files I donwload from the web, regardless they are going
to be opened from windows or linux, e-mails are also scanned by means of
ClamAV and USB keys are not anutomatically mounted thus can be also
easily analyzed first.


That's the scenario I tried to point out above.


But it is easy to tell users that all files from those medias may be
evil. It's much harder to tell them that their programs might store
sensible data in a way that isn't secure. At least this is much harder
than for the FileZilla guys to store passwords encrypted.



Curiously enough is not only Filezilla who takes the path for not
encrypting the user credentials so there has to be a reason in behind for
that to happen so often...


Laziness? Why did last.fm stores the passwords of their users as 
MD5-Hash without salting them?



Anyway, aren't most of us still using plain pop3 and smtp connections
with no message encryption at all? Who are we blaming? ;-)


Most of my messages are not encrypted because the receiving end isn't 
capable of that. But my Credentials will only be transmitted when the 
connection is secure (even if the MTA is in the same network).



Again, there are files in my servers (e.g., ssl keys) and also my Mutt



SSL/SSH Keys should have a password or should be stored in some kind of
encrypted container.



IIRC you have to remove the password so Apache can make use of it so
finally the security relies on the file perms (only root can read it).


This is true for Apache SSL but in fact I don't care a lot about my 
HTTPS keyfiles, if they got compromised I revoke them. And if you really 
want to fake a certificate you might can have this easier through 
companies like DigiNotar.


SSL is pretty much snakeoil nowadays, but it's better than nothing.


An encrypted container wouldn't help a lot here, because I assume your
MUA is running most of the day, right? So the container has to be open

all the time and any malware could read

the file.



In my case it is launched on demand. My main MUA is Thunderbird.


Do you use a Master-Password? If so, then guess what? All your passwords 
stored in TB are saved encrypted. Nice feature, isn't it? ;)



Do you want us to remove the ethernet cord? ;-)



Would be a nice thing from a security point of view, that's why I
mentioned comfort and performance. :)



There's still dangerous USB flash drives and the always evil CD/DVD and
floppy disks... you never know.


Of course you have to get rid of those drives as well. Also your USB, 
Firewire and Thunderbolt 

Re: Filezilla a security risk

2012-06-29 Thread Denis Witt

On 29.06.2012 17:38, Steve Dowe wrote:


At the same time, with all this talk of passwords stored as plain text
etc, it's not a great hurdle to set up a local, encrypted loopback
device that mounts in your local file system.  You could even mount it
at ~/.filezilla, and then run up FZ for the first time.


And afterwards I have to unmount the device. This might work rather fine 
on a Linux system but on Windows (and FZ is available for Windows)...


Also you have to know that FZ stores PW unencrypted and you need to know 
where this information has been stored.


It would be nicer if the application does this stuff automatically. And 
I don't care if they encrypt the passwords on their own or using some 
kind of Keychain-Tool like most of the Tools for MacOS do.


But storing plain text passwords is bad behaviour and anyone who do this 
have to be blamed for that.


Bye.


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Archive: http://lists.debian.org/4fedd652.8070...@concepts-and-training.de



Re: Filezilla a security risk

2012-06-29 Thread Steve Dowe
On 29/06/12 17:22, Denis Witt wrote:
 And afterwards I have to unmount the device. This might work rather fine
 on a Linux system but on Windows (and FZ is available for Windows)...

I believe the same thing might be achieved on Windows, using TrueCrypt.

-- 
Steve Dowe

Warp Universal Limited
http://warp2.me/sd


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4fedd9f9.9050...@warpuniversal.co.uk



Re: Filezilla a security risk

2012-06-29 Thread Camaleón
On Fri, 29 Jun 2012 18:13:11 +0200, Denis Witt wrote:

 On 29.06.2012 17:13, Camaleón wrote:
 
 The point is that software can't be 100% secure. So when possible it
 is a good idea to have more than one security layer.
 
 Even if that extra layer is of no help because you leave your computer
 open and accessible to anyone? Then you're wasting your time and your
 computer resources, security has to sit between useful and
 effectiveness, otherwise you're losing the battle.
 
 FileZilla could use a Master-Password to encrypt the Account-Passwords.
 So if you start FZ you enter the Master-Password (and may define a time
 so that FZ will forgot the Master-PW after some time, when it's still
 open).

Yes, they can as well as they can also encrypt the current user settings 
from the XML file but they don't want to. Period and full stop.

There are another solutions out there you can go with if you don't feel 
confident enough on the Filezilla approach :-)
 
(...)

 What I'm trying to say is that our machines are pretty much very complex
 and it is very easy to overlook things.

It has been always so, Filezilla is not inventing nothing anew.

 Good thing for a corner case. But the bad thing here is that someone
 can access your Filezilla settings from you Apache, though.
 
 Sure. But if there is a bug (or misconfiguration) it might be possible
 to do so. If it was a misconfiguration it is your own fault, of course.

What if... or what if...? 

We can spend the remaining day elucubrating about possible case scenarios 
but we all know about them. This is nothing more than a developer and 
user election.

 You change the password for your FTP user accounts and that's all. Gee,
 I wonder in what way users are using their linux systems that don't
 store any important data on them, only for multimedia playing? :-P
 
 No, but the really important data is encrypted in a way so even if my
 machine is running all the time the container isn't accessible all the
 time.

Well done but I'm afraid you fit the 1% of the users that do so. I, by 
the way, store thousand of plain text based e-mail messages (mbox) 
containing passwords for many Internet services. If I were paranoid 
enough, I'd only use hard disk encryption but this is still not in my to-
do list.

 I do check the files I donwload from the web, regardless they are going
 to be opened from windows or linux, e-mails are also scanned by means
 of ClamAV and USB keys are not anutomatically mounted thus can be also
 easily analyzed first.
 
 That's the scenario I tried to point out above.

And despite all the precautions I take, I have no problems with having a 
password stored in clear text ;-)
 
 Curiously enough is not only Filezilla who takes the path for not
 encrypting the user credentials so there has to be a reason in behind
 for that to happen so often...
 
 Laziness? Why did last.fm stores the passwords of their users as
 MD5-Hash without salting them?

No, developers are not lazy but practical: they simply don't want to use 
weak methods to handle this.

 Anyway, aren't most of us still using plain pop3 and smtp connections
 with no message encryption at all? Who are we blaming? ;-)
 
 Most of my messages are not encrypted because the receiving end isn't
 capable of that. But my Credentials will only be transmitted when the
 connection is secure (even if the MTA is in the same network).

Again, you must pertain to the 1% of the users that do that ;-)

Anyway, if the recipient does not use a secure protocol to download the 
data (pop3s/imaps), the security chain is broken and thus useless, you 
see now why devels are not lazy? Because you can't just take control of 
all ;-)

 SSL/SSH Keys should have a password or should be stored in some kind
 of encrypted container.
 
 IIRC you have to remove the password so Apache can make use of it so
 finally the security relies on the file perms (only root can read it).
 
 This is true for Apache SSL but in fact I don't care a lot about my
 HTTPS keyfiles, if they got compromised I revoke them. And if you really
 want to fake a certificate you might can have this easier through
 companies like DigiNotar.
 
 SSL is pretty much snakeoil nowadays, but it's better than nothing.

That's the kind of reasoning software developers do: if there's no 100% 
secure system, why should *I* bother?

 An encrypted container wouldn't help a lot here, because I assume your
 MUA is running most of the day, right? So the container has to be open
 all the time and any malware could read
 the file.
 
 In my case it is launched on demand. My main MUA is Thunderbird.
 
 Do you use a Master-Password? 

Nope. How annoying...

 If so, then guess what? All your passwords stored in TB are saved
 encrypted. Nice feature, isn't it? ;)

I really don't care. If I were in a windows machine, I'd be a bit 
worried ;-)

 There's still dangerous USB flash drives and the always evil CD/DVD and
 floppy disks... you never know.
 
 Of course you have to get rid 

Re: Filezilla a security risk

2012-06-29 Thread Denis Witt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

damn, why can't postbox answer to the list instead of the posters email?

Camaleón schrieb:

 Yes, they can as well as they can also encrypt the current user
 settings from the XML file but they don't want to. Period and full
 stop.

True. Sad, but true.

 What I'm trying to say is that our machines are pretty much very
 complex and it is very easy to overlook things.

 It has been always so, Filezilla is not inventing nothing anew.

Jep, but they could respect this and give the user a little bit of extra
security.

(...)

 No, but the really important data is encrypted in a way so even if
 my machine is running all the time the container isn't accessible
 all the time.

 Well done but I'm afraid you fit the 1% of the users that do so. I,
 by

True. Another reason for FZ to help those 99%. (Hey, cool, I'm the 1%,
where is my money? ;))

 the way, store thousand of plain text based e-mail messages (mbox) 
 containing passwords for many Internet services. If I were paranoid

And so do I, at least on my Phone which I can't encrypt.

 enough, I'd only use hard disk encryption but this is still not in my
 to- do list.

I use HDD encryption for everything that I could loose or what might get
stolen, like our RDX-Backup-Drives I have in my bag anytime. Also all
Notebooks, some USB-Sticks and USB-Drives.

 I do check the files I donwload from the web, regardless they are
 going to be opened from windows or linux, e-mails are also
 scanned by means of ClamAV and USB keys are not anutomatically
 mounted thus can be also easily analyzed first.
 That's the scenario I tried to point out above.

 And despite all the precautions I take, I have no problems with
 having a password stored in clear text ;-)

Just because you are NOT paranoid that doesn't mean that they are not
after you. ;)

 Curiously enough is not only Filezilla who takes the path for
 not encrypting the user credentials so there has to be a reason
 in behind for that to happen so often...
 Laziness? Why did last.fm stores the passwords of their users as 
 MD5-Hash without salting them?

 No, developers are not lazy but practical: they simply don't want to
 use weak methods to handle this.

What's weaker, password encryption, file access rights or both of it
together? For little effort.

But, you're right. Developers are usually not lazy, at least our aren't.
Sometimes they might didn't have enough time to implement the next
security layer, but I don't know if this apply to FZ as well.

 Anyway, aren't most of us still using plain pop3 and smtp
 connections with no message encryption at all? Who are we
 blaming? ;-)
 Most of my messages are not encrypted because the receiving end
 isn't capable of that. But my Credentials will only be transmitted
 when the connection is secure (even if the MTA is in the same
 network).

 Again, you must pertain to the 1% of the users that do that ;-)

 Anyway, if the recipient does not use a secure protocol to download
 the data (pop3s/imaps), the security chain is broken and thus
 useless, you see now why devels are not lazy? Because you can't just
 take control of all ;-)

I don't care about the transport of the content. It's like sending
postcards. But I care about my password. We're using LDAP and my
Mail-Password is also my System-Login. ;)

 SSL is pretty much snakeoil nowadays, but it's better than
 nothing.

 That's the kind of reasoning software developers do: if there's no
 100% secure system, why should *I* bother?

Why are they developing *BSD? Why should I bind some of my Services to
localhost if I have a firewall?

(...)

 Okay... I better return back to my cave, dust my typewritting machine
 and problem solved.

You got a cave? How comfortable. :)

 When you work in a corporate environment, disabling the external
 devices is a must. The biggest hole in a computer system is always
 the user. Always.

I think it depends on the company size and the company culture. We are
23 people at the moment and everybody can bring in his own devices and
connect them to our network and machines (WLAN is separated from the
LAN, only Internet-Access, it's not encrypted but you have to use a
captive portal to log in).

The deal is that if you for example has VPN access within you device you
have to inform me in case of loss, so I could disable the accounts for
that device. Also your device should have a remote delete function and a
password protection is mandatory. My users understand those rules and
take care of them. But yes, I guess I'm lucky.

 Anyway I think we're going pretty much offtopic. My point is that
 it would be a nice feature for FZ (and other tools) to store
 passwords more secure. And I don't like the attitude of the
 developers saying that it's not their problem if someone could read
 the file who isn't allowed to. At least as such a feature is rather
 easy to implement and won't affect the user experience in a bad
 way.

 Nah, developers are made of different 

Re: Filezilla a security risk

2012-06-29 Thread Andrei POPESCU
On Vi, 29 iun 12, 18:13:11, Denis Witt wrote:
 
 Anyway I think we're going pretty much offtopic. My point is that it
 would be a nice feature for FZ (and other tools) to store passwords
 more secure. And I don't like the attitude of the developers saying
 that it's not their problem if someone could read the file who isn't
 allowed to. At least as such a feature is rather easy to implement
 and won't affect the user experience in a bad way.

What happened to do one thing and do it well? As far as I understand 
FileZilla is good FTP client, why should it re-implement a keychain?

Kind regards,
Andrei
-- 
Offtopic discussions among Debian users and developers:
http://lists.alioth.debian.org/mailman/listinfo/d-community-offtopic


signature.asc
Description: Digital signature


Re: Filezilla a security risk

2012-06-29 Thread Richard Hector

On 30/06/12 02:02, Lisi wrote:

On Friday 29 June 2012 10:28:11 Denis Witt wrote:

I have brakes and drive safely, so an airbag


isn't essential.


And do all the speed louts see you coming and say: We mustn't overtake on
this blind corner.  The driver coming towards me on what is now the same side
of the road as I am on is a good driver.  I must backtrack in time and not
overtake because good drivers don't have accidents.?  I consider all the
modern improvements in safety essential, and with each of them have been an
early adopter.


Please get your attributions correct - that was my statement.

I don't have an airbag, and I'm still here, so I stand by it. We haven't 
had airbags for most of the 100ish year history of the car, but we have 
had brakes, and they've generally been regarded as essential. The safety 
record hasn't been perfect, of course, but the tradeoff has been 
considered acceptable, or cars would have been banned.


I also stand by the bit that says I'd keep an airbag if I had one, for 
the reasons you give.


Richard


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Archive: http://lists.debian.org/4fee4a4a.7070...@walnut.gen.nz



Re: Filezilla a security risk

2012-06-29 Thread Richard Hector

On 29/06/12 21:28, Denis Witt wrote:

On 29.06.2012 03:16, Richard Hector wrote:


 If your account is hosed, well, go to their second argument: 2.
 don't get the malware in the first place ;-)

Great Argument, btw. Oh, I got an Airbag on my car, get rid of the
brakes please. I don't need them anymore.



That's the wrong way round. I have brakes and drive safely, so an airbag
isn't essential. Which isn't to say I'd get it removed if I had one.


Maybe, seat belts are also not essential, but in many countries the
usage is mandatory, for a good reason.


Agreed. And airbags may become compulsory too. As long as they're well 
engineered, of course; having explosives go off during a crash needs to 
be managed carefully.


But the question is one of priority. Avoiding crashing (good/adequate 
brakes, tyres, suspension, roads etc etc) should come before saving you 
if you do (seatbelts, airbags, ambulances etc etc). It's always a good 
idea to have both types, of course, because preventative measures are 
unlikely to ever be perfect.


Richard


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Archive: http://lists.debian.org/4fee4cc8.4000...@walnut.gen.nz



Re: Filezilla a security risk

2012-06-28 Thread Claudius Hubig
Hello francis,

francis picabia fpica...@gmail.com wrote:
 On Wed, Jun 27, 2012 at 4:46 PM, Andrei POPESCU
 andreimpope...@gmail.com wrote:
  On Mi, 27 iun 12, 16:26:48, francis picabia wrote:
  I've just learned Filezilla is a security risk.  It stores saved
  passwords and the last used password in a plain text file.
 
  As do many other programs.
 
 Huh.  None that I run.  Perhaps your standards are, uh, different.

Pidgin  OpenSSH if used without passphrases, just to name two
examples. Claws-Mail applies some weird obfuscation that doesn't
really help, except for that I have to store my passwords somewhere
else in plaintext, too.

 the hacker.   In this case we advise users to uninstall Filezilla
 and use something else.  Not all Windows users of FTP tools are IT savvy.
   ^^^
 They need warnings and guidance frequently.  I passed this on so
 others can reduce their threat potential.

Your users, your _Windows_ users, are certainly your problem and not
one that should be discussed on the debian-user ML. However, if you
find it a problem that programmes tend to leave unencrypted, sensible
data in /home rather than employing some more-or-less fake
encryption/obfuscation, feel free to suggest better ways to reach the
following target:

- It is not necessary to enter all passwords of every account upon
  start of the programme.
- There is some sort of authentication, i.e. not every single
  computer on this planet can log in.
- It works even if there is nobody around to enter passphrases/master
  passwords (e.g., rsync over SSH to remote hosts).

Best regards,

Claudius
-- 
Adding sound to movies would be like putting lipstick on the Venus de Milo.
-- actress Mary Pickford, 1925
http://chubig.net  telnet nightfall.org 4242


signature.asc
Description: PGP signature


Re: Filezilla a security risk

2012-06-28 Thread Andrei POPESCU
On Mi, 27 iun 12, 20:58:39, francis picabia wrote:
 
 We have to do what ever possible to reduce the size of the target to
 the hacker.   In this case we advise users to uninstall Filezilla
 and use something else.  Not all Windows users of FTP tools are IT savvy.
 They need warnings and guidance frequently.  I passed this on so
 others can reduce their threat potential.

You are missing the point :)

In a situation where the doors (here Windows :p) are left wide open, 
instead of closing and securing them you are trying to hide the 
valuables under the carpet.

Even if you put them in a safe (encrypt with some master password) the 
villains have it easy to walk into the house and install spy cameras 
everywhere so they can peak at your combination or simply just steal the 
entire safe and brute-force it later.

Kind regards,
Andrei
P.S. this discussion if off-topic on debian-user, kindly follow-up on 
the offtopic list in my sig (Reply-To: set accordingly)
-- 
Offtopic discussions among Debian users and developers:
http://lists.alioth.debian.org/mailman/listinfo/d-community-offtopic


signature.asc
Description: Digital signature


Re: Filezilla a security risk

2012-06-28 Thread Camaleón
On Wed, 27 Jun 2012 16:26:48 -0300, francis picabia wrote:

 I've just learned Filezilla is a security risk.  It stores saved
 passwords and the last used password in a plain text file.

In Mutt, for instance, you can face the same situation.
 
 Malware commonly scoops up this info and hacks web sites or shell
 accounts.
 
 The developer refuses to incorporate a solution such as master password
 and encryption into filezilla.

Yes, it's a well-known feature of the Filezilla FTP client.

 His responses in numerous bug reports and feature requests are:
 
 1. encryption: that's the file system's job 

True.

 2. don't get the malware in the first place

Also true.
 
 In my opinion, people should avoid filezilla.

I use it in my windows box (a plain FTP login sesion is transmitted in 
clear text but despite that, true is that it poses a risk if your 
computer gets infected and your login credentials are stored in clear 
text) but I don't use Filezilla in Debian.

For windows there's another nice application (WinSCP) and for linux 
you're plenty of options :-)

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jshqlo$no$5...@dough.gmane.org



Re: Filezilla a security risk

2012-06-28 Thread francis picabia
On Thu, Jun 28, 2012 at 5:03 AM, Claudius Hubig debian_1...@chubig.net wrote:

 Your users, your _Windows_ users, are certainly your problem and not
 one that should be discussed on the debian-user ML.

I have a Debian system I administer that was compromised this way.

If the hacker uses two mirrors and shaving cream to attack a system,
and it is happening frequently,  it should be of interest to
system administrators.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CA+AKB6G=xr2_gbccvj2ktfeupeegd9tyy7fzbtijhw1f0ny...@mail.gmail.com



Re: Filezilla a security risk

2012-06-28 Thread Curt
On 2012-06-27, francis picabia fpica...@gmail.com wrote:
 I've just learned Filezilla is a security risk.  It stores saved
 passwords and the last used password in a plain text file.


There's an interesting (well, for arbitrary definitions of the word
interesting) discussion of the problem here:

http://unsharptech.com/2008/05/20/filezilla-ftp-passwords-stored-in-plaintext/

(From May, _2008_!, so you're a little _en retard_).

I personally use ncftp, but I suppose it lacks many bells and whistles.
It doesn't save passwords by default, though, and has a responsible man
page:

 save-passwords
 If you set this variable to yes, the program will save passwords along with the
 bookmarks you  save.   While this makes non-anonymous logins more convenient,
 this can be very dangerous since your account information is now sitting in
 the $HOME/.ncftp/bookmarks file.  The  passwords aren't in clear text, but
 it is still trivial to decode them if someone wants to make a modest effort.

Un homme averti en vaut deux.

If the filezilla man page isn't clear on this point, I think that is a
form negligence (although I don't know who's responsible for thei man
page in the end--maybe it's me!).


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/slrnjuot1t.38n.cu...@einstein.electron.org



Re: Filezilla a security risk

2012-06-28 Thread francis picabia
On Thu, Jun 28, 2012 at 5:37 AM, Andrei POPESCU
andreimpope...@gmail.com wrote:
 On Mi, 27 iun 12, 20:58:39, francis picabia wrote:

 We have to do what ever possible to reduce the size of the target to
 the hacker.   In this case we advise users to uninstall Filezilla
 and use something else.  Not all Windows users of FTP tools are IT savvy.
 They need warnings and guidance frequently.  I passed this on so
 others can reduce their threat potential.

 You are missing the point :)

 In a situation where the doors (here Windows :p) are left wide open,
 instead of closing and securing them you are trying to hide the
 valuables under the carpet.

 Even if you put them in a safe (encrypt with some master password) the
 villains have it easy to walk into the house and install spy cameras
 everywhere so they can peak at your combination or simply just steal the
 entire safe and brute-force it later.

For you, there is special advice.  Never communicate with your Windows users.
It can't possibly impact Linux.


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/ca+akb6gsmjpxkyscofk7pn3c7ogpyrpyybrykwpsnqlygdd...@mail.gmail.com



Re: Filezilla a security risk

2012-06-28 Thread Shane Johnson
On Thu, Jun 28, 2012 at 9:13 AM, francis picabia fpica...@gmail.com wrote:
 On Thu, Jun 28, 2012 at 5:37 AM, Andrei POPESCU
 andreimpope...@gmail.com wrote:
 On Mi, 27 iun 12, 20:58:39, francis picabia wrote:

 We have to do what ever possible to reduce the size of the target to
 the hacker.   In this case we advise users to uninstall Filezilla
 and use something else.  Not all Windows users of FTP tools are IT savvy.
 They need warnings and guidance frequently.  I passed this on so
 others can reduce their threat potential.

 You are missing the point :)

 In a situation where the doors (here Windows :p) are left wide open,
 instead of closing and securing them you are trying to hide the
 valuables under the carpet.

 Even if you put them in a safe (encrypt with some master password) the
 villains have it easy to walk into the house and install spy cameras
 everywhere so they can peak at your combination or simply just steal the
 entire safe and brute-force it later.

 For you, there is special advice.  Never communicate with your Windows users.
 It can't possibly impact Linux.


 --
 To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
 with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
 Archive: 
 http://lists.debian.org/ca+akb6gsmjpxkyscofk7pn3c7ogpyrpyybrykwpsnqlygdd...@mail.gmail.com


Please remember that FTP by nature is insecure.  All it would take is
for someone to packet sniff the connection and they would have the
user name and password to the account as they are transmitted in plain
text.

-- 
Shane D. Johnson
IT Administrator
Rasmussen Equipment


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/caplo1l5ckwxe2ucqm43vdhsvssmmorpxf4_fuskbzmfj2tc...@mail.gmail.com



Re: Filezilla a security risk

2012-06-28 Thread Jon Dowland
On Wed, Jun 27, 2012 at 08:58:39PM -0300, francis picabia wrote:
 On Wed, Jun 27, 2012 at 4:46 PM, Andrei POPESCU
 andreimpope...@gmail.com wrote:
  On Mi, 27 iun 12, 16:26:48, francis picabia wrote:
  I've just learned Filezilla is a security risk.  It stores saved
  passwords and the last used password in a plain text file.
 
  As do many other programs.
 
 Huh.  None that I run.  Perhaps your standards are, uh, different.

No need to get ad-hominem. Andrei is correct, there *are* many that
do that, and many *in Debian* that do that. What Andrei runs or does
not run is irrelevant.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120628161707.GD11366@debian



Re: Filezilla a security risk

2012-06-28 Thread Stanisław Findeisen
On 2012-06-28 16:45, Camaleón wrote:
 1. encryption: that's the file system's job 
 
 True.

Hm? You mean partition encryption?

It won't help much if the malware is running with file owner's uid... or
even if the system is booted at all (if you e.g. encrypt just /home).

-- 
http://people.eisenbits.com/~stf/
http://www.eisenbits.com/

OpenPGP: E3D9 C030 88F5 D254 434C  6683 17DD 22A0 8A3B 5CC0


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4feca6fb.7090...@eisenbits.com



Re: Filezilla a security risk

2012-06-28 Thread francis picabia
On Thu, Jun 28, 2012 at 12:35 PM, Shane Johnson
s...@rasmussenequipment.com wrote:


 Please remember that FTP by nature is insecure.  All it would take is
 for someone to packet sniff the connection and they would have the
 user name and password to the account as they are transmitted in plain
 text.

Yes, this is all correct.  However filezilla does sftp as well and
SFTP session passwords are also saved in this plain text file as
a human readable password.  That typically translates to SSH access.

In case this is lost on anyone, we are NOT talking about sniffing, but
drive by malware reading a plain text file on the client OS containing
the password.
Even if you do not check the box for saving the password, the most
recent entered password is saved there.


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CA+AKB6ExyFTWPjq=jmqkjsqjxhxqqwcb-naikn9u10h0jt0...@mail.gmail.com



Re: Filezilla a security risk

2012-06-28 Thread Camaleón
On Thu, 28 Jun 2012 20:48:27 +0200, Stanisław Findeisen wrote:

 On 2012-06-28 16:45, Camaleón wrote:
 1. encryption: that's the file system's job
 
 True.
 
 Hm? You mean partition encryption?

What? :-?
 
 It won't help much if the malware is running with file owner's uid... or
 even if the system is booted at all (if you e.g. encrypt just /home).

I don't know what you mean... Encryption (of the user credentials, I 
understand) is what Filezilla developers think is something that has to 
come from the OS and the file system capabilities. And that's true, in  
linux systems there are POSIX permissions you can use to prevent your 
files being accessed by others.

If your account is hosed, well, go to their second argument: 2. don't 
get the malware in the first place ;-)

Greetings,

-- 
Camaleón


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/jsie79$no$1...@dough.gmane.org



Re: Filezilla a security risk

2012-06-28 Thread Denis Witt
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


 If your account is hosed, well, go to their second argument: 2.
 don't get the malware in the first place ;-)

Great Argument, btw. Oh, I got an Airbag on my car, get rid of the
brakes please. I don't need them anymore.

The ONLY reason why Linux based systems hasn't got such a problem with
malware is that there are not enough Desktop machines to make this a
good target. Often enough there are security holes which allow you to
take control over the entire machine. And that's fine as it is complex
software.

But if you can easily add some more security layers without loosing too
much performance and/or usability you should always do that.

Storing unhashed and unsalted or unencrypted passwords is simply stupid.
Ask the guys at last.fm. ;)

Bye.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJP7OgLAAoJEGqblLUjc3f4HRAH/2aWgEbKgpfIFivQ+gEI5mrA
BBzLSjjArrpuPWdqeXHFpNCNXRQC9zaS/UqCyWopKMCDfg9xajJQT7Ebsl3QcdeJ
TZJasrH5STZJokSOqXBM4VaTMGWfObTWeKytAKc8+6XjKI//zm4zWQbeFBLalBex
5Qpn/HeSKptb7ZYD763aZ6cHanq97HrfzO0eleM9wDRnksvvSj4yxkZRUTqq9aQL
ON1lfR14lA2rQieFiNHP1OJLEYKR1uQl7NofoOwCOUjoGpRlL9eF4VvDZMm5Z/Sz
ef/FZbVMoBF7NmQSEbtM+rpanPDOjeAtz68UQ6NKAHWYiut3XRgBDjw466/qUgU=
=q/jt
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4fece810.4030...@concepts-and-training.de



Re: Filezilla a security risk

2012-06-28 Thread Richard Hector

On 29/06/12 11:26, Denis Witt wrote:

  If your account is hosed, well, go to their second argument: 2.
  don't get the malware in the first place ;-)

Great Argument, btw. Oh, I got an Airbag on my car, get rid of the
brakes please. I don't need them anymore.


That's the wrong way round. I have brakes and drive safely, so an airbag 
isn't essential. Which isn't to say I'd get it removed if I had one.


Richard


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Archive: http://lists.debian.org/4fed01e9.3040...@walnut.gen.nz



Re: Filezilla a security risk

2012-06-28 Thread Rob Owens
On Thu, Jun 28, 2012 at 10:03:19AM +0200, Claudius Hubig wrote:
 Hello francis,
 
 francis picabia fpica...@gmail.com wrote:
  On Wed, Jun 27, 2012 at 4:46 PM, Andrei POPESCU
  andreimpope...@gmail.com wrote:
   On Mi, 27 iun 12, 16:26:48, francis picabia wrote:
   I've just learned Filezilla is a security risk.  It stores saved
   passwords and the last used password in a plain text file.
  
   As do many other programs.
  
  Huh.  None that I run.  Perhaps your standards are, uh, different.
 
 Pidgin  OpenSSH if used without passphrases, just to name two
 examples. Claws-Mail applies some weird obfuscation that doesn't
 really help, except for that I have to store my passwords somewhere
 else in plaintext, too.
 
Where does OpenSSH store a password?  Or are you referring to a
passphrase-less private key?


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120629014827.gb5...@aurora.owens.net



Re: Filezilla a security risk

2012-06-28 Thread Rob Owens
On Thu, Jun 28, 2012 at 04:24:43PM -0300, francis picabia wrote:
 On Thu, Jun 28, 2012 at 12:35 PM, Shane Johnson
 s...@rasmussenequipment.com wrote:
 
 
  Please remember that FTP by nature is insecure.  All it would take is
  for someone to packet sniff the connection and they would have the
  user name and password to the account as they are transmitted in plain
  text.
 
 Yes, this is all correct.  However filezilla does sftp as well and
 SFTP session passwords are also saved in this plain text file as
 a human readable password.  That typically translates to SSH access.
 
True, but you can restrict certain users to SFTP access only.  I do
that, and I only allow SSH access with public key authentication.

 In case this is lost on anyone, we are NOT talking about sniffing, but
 drive by malware reading a plain text file on the client OS containing
 the password.
 Even if you do not check the box for saving the password, the most
 recent entered password is saved there.
 
I notice that GFTP, for example, does not seem to save any passwords
unless you 1) create a bookmark for the connection, and 2) check the
Remember Password box.  That seems like a sensible way to do it, but
you will still be at risk with an unsavy user and/or malware on the
machine.

Malware can be in the form of a key logger, which will get anything you
type.  Unsavy users will typically check a box in the name of
convenience, and give little thought to the security implications.

-Rob


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120629020026.gc5...@aurora.owens.net



Filezilla a security risk

2012-06-27 Thread francis picabia
I've just learned Filezilla is a security risk.  It stores saved
passwords and the last used password in a plain text file.

Malware commonly scoops up this info and hacks web sites
or shell accounts.

The developer refuses to incorporate a solution
such as master password and encryption into filezilla.

His responses in numerous bug reports and feature requests are:

1. encryption: that's the file system's job
2. don't get the malware in the first place

In my opinion, people should avoid filezilla.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/ca+akb6e1ffrcnbv6pimavdvufobkuo7rglsbacr_7tgtuzd...@mail.gmail.com



Re: Filezilla a security risk

2012-06-27 Thread Andrei POPESCU
On Mi, 27 iun 12, 16:26:48, francis picabia wrote:
 I've just learned Filezilla is a security risk.  It stores saved
 passwords and the last used password in a plain text file.

As do many other programs.

 Malware commonly scoops up this info and hacks web sites
 or shell accounts.

Sure.

 The developer refuses to incorporate a solution
 such as master password and encryption into filezilla.

It's his prerogative to decide what to do with his spare time :)

 His responses in numerous bug reports and feature requests are:
 
 1. encryption: that's the file system's job
 2. don't get the malware in the first place
 
 In my opinion, people should avoid filezilla.

Once your account has been compromised you must assume that any 
sensitive or confidential information accessible through that account 
has been compromised as well. Even if the passwords are stored encrypted 
on disc, at some point they have to be decrypted anyway, at which point 
they become vulnerable.

Hope this explains,
Andrei
-- 
Offtopic discussions among Debian users and developers:
http://lists.alioth.debian.org/mailman/listinfo/d-community-offtopic


signature.asc
Description: Digital signature


Re: Filezilla a security risk

2012-06-27 Thread francis picabia
On Wed, Jun 27, 2012 at 4:46 PM, Andrei POPESCU
andreimpope...@gmail.com wrote:
 On Mi, 27 iun 12, 16:26:48, francis picabia wrote:
 I've just learned Filezilla is a security risk.  It stores saved
 passwords and the last used password in a plain text file.

 As do many other programs.

Huh.  None that I run.  Perhaps your standards are, uh, different.

 Malware commonly scoops up this info and hacks web sites
 or shell accounts.

 Sure.

 The developer refuses to incorporate a solution
 such as master password and encryption into filezilla.

 It's his prerogative to decide what to do with his spare time :)

That, wasn't the point.  The point is, waiting for a solution upstream
isn't what we should do next.

 His responses in numerous bug reports and feature requests are:

 1. encryption: that's the file system's job
 2. don't get the malware in the first place

 In my opinion, people should avoid filezilla.

 Once your account has been compromised you must assume that any
 sensitive or confidential information accessible through that account
 has been compromised as well. Even if the passwords are stored encrypted
 on disc, at some point they have to be decrypted anyway, at which point
 they become vulnerable.

 Hope this explains,

If you read some of the discussions about this vulnerability, there
are many stories of
accounts being compromised.  I'm not talking theory, but something happening
right now on many systems.  The Filezilla application is popular, and therefore
a common target of malware.  As some of us have to guard systems which
have many users on them, this is of interest.  It isn't my account I'm
worried about.

We have to do what ever possible to reduce the size of the target to
the hacker.   In this case we advise users to uninstall Filezilla
and use something else.  Not all Windows users of FTP tools are IT savvy.
They need warnings and guidance frequently.  I passed this on so
others can reduce their threat potential.

Hope this explains...


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/ca+akb6fcyz2cv+ve4wqla_iz65kdxj+qtc4jmei5ufdphf6...@mail.gmail.com



Re: Filezilla a security risk

2012-06-27 Thread Steven Rosenberg

On 06/27/2012 04:58 PM, francis picabia wrote:

On Wed, Jun 27, 2012 at 4:46 PM, Andrei POPESCU
andreimpope...@gmail.com  wrote:

On Mi, 27 iun 12, 16:26:48, francis picabia wrote:

I've just learned Filezilla is a security risk.  It stores saved
passwords and the last used password in a plain text file.


As do many other programs.


Huh.  None that I run.  Perhaps your standards are, uh, different.


Malware commonly scoops up this info and hacks web sites
or shell accounts.


Sure.


The developer refuses to incorporate a solution
such as master password and encryption into filezilla.


It's his prerogative to decide what to do with his spare time :)


That, wasn't the point.  The point is, waiting for a solution upstream
isn't what we should do next.


His responses in numerous bug reports and feature requests are:

1. encryption: that's the file system's job
2. don't get the malware in the first place

In my opinion, people should avoid filezilla.


Once your account has been compromised you must assume that any
sensitive or confidential information accessible through that account
has been compromised as well. Even if the passwords are stored encrypted
on disc, at some point they have to be decrypted anyway, at which point
they become vulnerable.

Hope this explains,


If you read some of the discussions about this vulnerability, there
are many stories of
accounts being compromised.  I'm not talking theory, but something happening
right now on many systems.  The Filezilla application is popular, and therefore
a common target of malware.  As some of us have to guard systems which
have many users on them, this is of interest.  It isn't my account I'm
worried about.

We have to do what ever possible to reduce the size of the target to
the hacker.   In this case we advise users to uninstall Filezilla
and use something else.  Not all Windows users of FTP tools are IT savvy.
They need warnings and guidance frequently.  I passed this on so
others can reduce their threat potential.

Hope this explains...




So what do you recommend as an FTP client?


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org

Archive: http://lists.debian.org/4feba789.1090...@gmail.com