Re: irq 11: nobody cared

2005-08-23 Thread Nigel Rantor

Jeff Garzik wrote:
Read REPORTING-BUGS.  We can't do much of anything with this report. 
Tell us what's on irq 11, for starters


Righto. While doing that I found that my udev is out of date for the 
2.6.13-rc6 kernel.


Is there a chance that upgrading will kill my current 2.6.7-rc3 setup?

If not I'll go ahead and upgrade that and run some more tests before 
posting a full report.


  n

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


irq 11: nobody cared

2005-08-23 Thread Nigel Rantor


Hail,

I posted a report a while back, no answer.

Who should I be talking to wrt to the irq 11: nobody cared issue?

I'm happy to provide as much info as possible but need to know what info 
is required.


I'm happily running 2.6.7, tried the latest and greatest (2.6.12) and 
found the problem, then started by looking at 2.6.8 and found the 
problem there too.


It happens on boot, is a showstopper and I'm wondering what, if anything 
useful I can provide you guys.


Throw me a bone...

  Nige

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


irq 11: nobody cared

2005-08-23 Thread Nigel Rantor


Hail,

I posted a report a while back, no answer.

Who should I be talking to wrt to the irq 11: nobody cared issue?

I'm happy to provide as much info as possible but need to know what info 
is required.


I'm happily running 2.6.7, tried the latest and greatest (2.6.12) and 
found the problem, then started by looking at 2.6.8 and found the 
problem there too.


It happens on boot, is a showstopper and I'm wondering what, if anything 
useful I can provide you guys.


Throw me a bone...

  Nige

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: irq 11: nobody cared

2005-08-23 Thread Nigel Rantor

Jeff Garzik wrote:
Read REPORTING-BUGS.  We can't do much of anything with this report. 
Tell us what's on irq 11, for starters


Righto. While doing that I found that my udev is out of date for the 
2.6.13-rc6 kernel.


Is there a chance that upgrading will kill my current 2.6.7-rc3 setup?

If not I'll go ahead and upgrade that and run some more tests before 
posting a full report.


  n

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


2.6.12 Boot Hang Disabled IRQ 11

2005-07-25 Thread Nigel Rantor


Hi all,

I downloaded and compiled 2.6.12 yesterday, I am currently running 
2.6.7-rc3.


The boot eventually hangs (irq 11, nobody cared) but since the disks 
aren't mounted yet I have no dmesg output.


So, before I can provide a decent report I need some way of getting this 
output, is there a better way than simply copying it down from the terminal?


Ta,

  n

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


2.6.12 Boot Hang Disabled IRQ 11

2005-07-25 Thread Nigel Rantor


Hi all,

I downloaded and compiled 2.6.12 yesterday, I am currently running 
2.6.7-rc3.


The boot eventually hangs (irq 11, nobody cared) but since the disks 
aren't mounted yet I have no dmesg output.


So, before I can provide a decent report I need some way of getting this 
output, is there a better way than simply copying it down from the terminal?


Ta,

  n

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Open source firewalls

2005-07-13 Thread Nigel Rantor

Vinay Venkataraghavan wrote:

Hello,


Hello, *devil's advocate hat on*


I have implemented an bare bones Intrusion detection
system that currently detects scans like open, bouce,
half open etc and a host of other tcp scans.


As an aside, why, we have snort?


I would like to develop this into a full blown IDS
which is capable of detecting buffer overflow attacks,
sql injection etc. 


I know how to implement buffer overflow attacks. But
how would an intrusion detection system detect a
buffer overflow attack. My question is at the layer
that the intrusion detection system operates, how will
it know that a particular string for exmaple is liable
to overflow a vulnerable buffer. 


Erm, if you know how some buffer overflow attacks work then surely the 
answer is "it depends on the application". To tell if an application is 
vulnerable you would have to audit it in some manner. Either by checking 
the source or doing some black-box testing on it.


Even if you did have a great big database of apps and had identifed 
which of them had possible vulnerabilities it would be easier to simply 
fix them rather than get an external system to disallow such inputs.


And not forgetting that you would have to have some way for your IDS to 
tell what app was running behind a specific port. Thought about that yet?



Are there other open source firewall implementations
other than snort?


Snort isn't a firewall. Don't mix apples and oranges. Snort is an IDS. 
The current de-facto "firewall" for linux is the iptables suite.


Cheers,

  n
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Open source firewalls

2005-07-13 Thread Nigel Rantor

Vinay Venkataraghavan wrote:

Hello,


Hello, *devil's advocate hat on*


I have implemented an bare bones Intrusion detection
system that currently detects scans like open, bouce,
half open etc and a host of other tcp scans.


As an aside, why, we have snort?


I would like to develop this into a full blown IDS
which is capable of detecting buffer overflow attacks,
sql injection etc. 


I know how to implement buffer overflow attacks. But
how would an intrusion detection system detect a
buffer overflow attack. My question is at the layer
that the intrusion detection system operates, how will
it know that a particular string for exmaple is liable
to overflow a vulnerable buffer. 


Erm, if you know how some buffer overflow attacks work then surely the 
answer is it depends on the application. To tell if an application is 
vulnerable you would have to audit it in some manner. Either by checking 
the source or doing some black-box testing on it.


Even if you did have a great big database of apps and had identifed 
which of them had possible vulnerabilities it would be easier to simply 
fix them rather than get an external system to disallow such inputs.


And not forgetting that you would have to have some way for your IDS to 
tell what app was running behind a specific port. Thought about that yet?



Are there other open source firewall implementations
other than snort?


Snort isn't a firewall. Don't mix apples and oranges. Snort is an IDS. 
The current de-facto firewall for linux is the iptables suite.


Cheers,

  n
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/