[SLUG] Re: Re: Preventing attacks

2004-11-09 Thread Matthew Palmer
On Tue, Nov 09, 2004 at 06:14:23PM +1100, [EMAIL PROTECTED] wrote:
 On Tue, Nov 09, 2004 at 02:25:22PM +1100, James Gregory wrote:
  On Tue, Nov 09, 2004 at 03:31:50PM +1100, Toliman wrote:
   and it is 'relatively' secure, in that it would hopefully 
   take a p4 a few hours to brute force... more likely in minutes.
  
  How long is 'a few hours'? I didn't think things were that dire. Are you
  talking about a straight brute force or some kind of known-plaintext
  attack or what?
 
 Isn't the kerberos ticket only valid for a few minutes anyway?

Only if you want to be re-typing your password every few minutes.

One of the features of Kerberos was supposed to be a single sign-on --
obtain a TGT (Ticket-Granting Ticket) and then use that as a
password-equivalent until it times out, after which time you need to get
another TGT by resupplying your credential (password).

Think of it as longer-lived one-time passwords -- you don't have to keep
typing your password all the time, but the password you do pass around has
a limited life and gets recreated every few hours.

- Matt


signature.asc
Description: Digital signature
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Re: [SLUG] Re: Preventing attacks

2004-11-09 Thread Toliman
[EMAIL PROTECTED] wrote:
On Tue, Nov 09, 2004 at 02:25:22PM +1100, James Gregory wrote:
 

On Tue, Nov 09, 2004 at 03:31:50PM +1100, Toliman wrote:
   

and it is 'relatively' secure, in that it would hopefully 
take a p4 a few hours to brute force... more likely in minutes.
 

How long is 'a few hours'? I didn't think things were that dire. Are you
talking about a straight brute force or some kind of known-plaintext
attack or what?
   

Isn't the kerberos ticket only valid for a few minutes anyway?
So 1 hour, few hours ... doesn't matter at the moment.
Matt
Yeah, that's the big thing. you have a limited period of time to use the 
token before you have to request another, losing any benefit to the 
original token.

but if you look at the tools that are used to break in, it isnt a quick 
process. it usually involves surveillance and/or subversively tapping 
into less secure systems/users to gain elevated privileges over time. 
like WEP and other cracking methods, the strategy is to watch the 
KBC/network segment for traffic, to identify the traffic for extended 
periods and cryptanalyse the tokens for common data, like the domains 
used, hosts, passwords, users, vulnerabilities on the infrastructure, 
things like that.

but it is essentially brute-force. it could take 1 attempt, or 20 
million. or more. the central idea is to test the keyspace, the possible 
combinations of keys to choose from. since DES's key is 56 bits, the 
space to check is reduced, also using differential cryptananlysis and 
other methods. the same problem does not exist in 3DES, or AES, the 
brute force combinations are exponentially more difficult, it would 
require some very kooky math to weaken AES - reduce the possible 
combinations for a brute force to reduce the time necessary. hours might 
be pushing it, sure, and CISC/RISC processors are not that fast at 
non-specific tasks like DES cracking, so it might be a few hundred 
hours, split over hundreds of machines.

anyway ... as long as the master password isn't cracked, and a few other 
major passwords/logins used to wrap the databases and traffic to and 
from the KDC, the system is very much secure. the token expires after a 
few minutes, and the number of DES combinations to brute-force is still 
a high number, in the order of ~2^53 combinations for DES. however, 
since DES was/is used to wrap/secure a lot of the data travelling around 
the economic sectors, there is a lot of value in (very ruthless and 
organised cartels, organisations, 'family businesses') spending some 
serious money on distributed parallel processing to break DES before 
tokens expire.

for reference, the EFF proved how feasible it was in 1998, with a 
self-built FPGA setup, a deadline of 10 days in which to break the 
challenge, they developed a system to methodically crunch through ~92 
billion combinations/day on a limited budget.

We searched more than 88 billion keys every second, for 56 hours, 
before we found the right 56-bit key to decrypt the answer to the RSA 
challenge
http://www.eff.org/Privacy/Crypto/Crypto_misc/DESCracker/HTML/19980716_eff_descracker_pressrel.html

there's always the human factor too.
http://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis
Toliman.
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


[SLUG] xcdroast DVD burner pioneer 108

2004-11-09 Thread linley
Trying to get my brand spaking pioneer 108 working under 
FC2/xcdroast/cdrecord-ProDVD
loading the cdrecord-Prodvdin my ~xcdroast/bin does not seem to work!
error is :

** (xcdroast:19308): WARNING **: Invalid cdrecord-ProDVD version 
2.01-dvd found.Expecting at least version 2.01a11
Start xcdroast with the -n option to override (not recommended!)
Any ideas
--
Linley Caetan  
98108854
[EMAIL PROTECTED]
www.lovelsretreat.com
Your home in the blue mountains
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Re: Preventing attacks

2004-11-09 Thread Ken Foskey
On Tue, 2004-11-09 at 15:31 +1100, Toliman wrote:
 Ken Foskey wrote:
 
 On Mon, 2004-11-08 at 23:27 +1100, James Gregory wrote:
 
 Foes anyone know the ciphers that kerberos uses?  I was going to ask the
 person that did cryptography in Uni recently :-)
   
 Kerberos uses DES, but the encryption method can be negotiated in 
 versions v4. DES is still used in a lot of operational cryptographic 
 applications,and it is 'relatively' secure, in that it would hopefully 
 take a p4 a few hours to brute force... more likely in minutes. Which is 
 why DES has been phased out for at least 5 years, replaced by AES in 
 secure applications.

OK this echos my research today (cost me a coffee :-)

Kerberos by default uses DES encryption so a fully encrypted Kerberos
telnet would use DES encryption by default.  It is possible to put
additional ciphers into kerberos but it is not part of the standard.

By comparison ssh uses 3DES by default here are the cipher options from
one version of ssh itself.  For those that do not know 3DES is literally
encrypt in DES three times, very secure, the man page notes that DES is
insecure.

AnyCipher: Any available cipher (apart from none) can be used.
AnyStdCipher: Allows only standard ciphers, i.e. those ciphers mentioned
in the IETF-SecSH-draft (excluding none). This is the default cipher
value.
AES128 Use 128-bit Advanced Encryption Standard (Rijndael) encryption.
AES192 Use 192-bit Advanced Encryption Standard (Rijndael) encryption.
AES256 Use 256-bit Advanced Encryption Standard (Rijndael) encryption.
3DES Use 3DES encryption.
Blowfish: Use Blowfish encryption.
Twofish: Use Twofish encryption.
Arcfour: Use Arcfour encryption.
CAST: Use CAST encryption.
DES: Use DES encryption. DES is generally considered a very weak cipher,
and its use is not recommended. It is offered as a fallback option only.
none: Don't use encryption. Use this option for testing purposes only!


OK my research is that using kerberos is NO MORE security that ssh but
is significantly less secure than ssh by default.  My apologies for
being painful however but sometimes the likelihood of someone being
right is inversely proportional to the number of people shouting them
down.

Here endeth the lesson on security.  If someone tells you something is
more secure you simply must do your own homework.  What they are saying
may be dated information which appears to be the case here, DES is
certainly a dated protocol in security terms.

-- 
Ken Foskey

-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Re: Preventing attacks

2004-11-09 Thread David Kempe
Ken Foskey wrote:
Arcfour: Use Arcfour encryption.
I believe this is a reimplementation of RC4 is anyone is interested what 
i means.

dave
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


[SLUG] Graphic Pen - the return

2004-11-09 Thread Elliott-Brennan
Hello all,
Well. I've tried to resolve this myself with no success.
A recap :)
I have a Dolphin Graphic tablet and pen.
USB Tablet Series Version 1.04
Manufacturer: AIPTEK International Inc.
Speed: 1.5Mb/s (low)
USB Version:  1.10
Device Class: 00(ifc )
Device Subclass: 00
Device Protocol: 00
Maximum Default Endpoint Size: 8
Number of Configurations: 1
Vendor Id: 08ca
Product Id: 0010
Revision Number:  1.03
According to my reading, it is supposed to be a clone of the Hyperpen 
8000U OR 12000U (originally thought it was a 600U)

http://www.qbik.ch/usb/devices/showdev.php?id=745
The pen, when plugged in can be seen by Mandrake 10 Official (as above).
Everything works, pressure, buttons on pen (there are no buttons on the 
tablet) etc... except:

By scribing an area roughly an inch down and two across, the cursor 
covers the whole screen. The tablet it obviously much bigger - 150mm 
across by 115mm down.

Now, I've tried a number of suggestions I've found on-line - the latest 
being:

http://www.justlinux.com/forum/showthread.php?s=57aa4cce806209a6cb25c7477c2e1393threadid=128382highlight=aiptek
(It's a little long and didn't want to paste it in)
I've changed the baud rate in the suggestion to a slower speed and found 
that it makes no difference.

X starts (I've crashed it that frequently that I can now replace the 
XF86Config-4 file in my sleep) okay with the changes suggested on the 
site above - but nothing is changed.

I suspect (!) that the pen is NOT even reading what I've put in (pardon 
my expression, but I don't really know WHAT should be reading the 
configuring I've been doing :))

So... I'm now back to square one. I haven't buggered it up, I still have 
my original XF86Config-4 file (thanks to those who reminded me to do 
this earlier) and I still have my Mandrake box going and, barely, my 
self respect.

Any and all suggestions most gratefully appreciated.
Regards,
   Patrick
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Re: Preventing attacks

2004-11-09 Thread Jordan Wightman
David Kempe wrote:
Arcfour: Use Arcfour encryption.

I believe this is a reimplementation of RC4 is anyone is interested what 
i means.

dave
Last time I checked, there was an interesting story about Arcfour.
Effectively, RC4 was a trade secret of RSA, but someone released the 
details of the algorithm to the Cypherpunks mailing list in September 1994.

As it was in the public domain, the trade secret status was lost, but 
RSA still has a trademark on the name RC4. Hence, Arcfour.

It's actually specified in a (perhaps withdrawn) Internet Draft that's 
still mirrored on the Mozilla site, AFAIR.

Stream cipher, big problems with statistical attacks on the initial part 
of the generated keystream, it's the source of some of the problems with 
WEP in wireless stuff. Don't use with the same IV and Key, etc. Standard 
stream cipher stuff applies. Go read applied crypto if you want to know 
more.

Cheers,
Jordan
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Re: Preventing attacks

2004-11-09 Thread O Plameras
Ken Foskey wrote:
On Tue, 2004-11-09 at 15:31 +1100, Toliman wrote:
 

Ken Foskey wrote:
   

On Mon, 2004-11-08 at 23:27 +1100, James Gregory wrote:
Foes anyone know the ciphers that kerberos uses?  I was going to ask the
person that did cryptography in Uni recently :-)
 

Kerberos uses DES, but the encryption method can be negotiated in 
versions v4. DES is still used in a lot of operational cryptographic 
applications,and it is 'relatively' secure, in that it would hopefully 
take a p4 a few hours to brute force... more likely in minutes. Which is 
why DES has been phased out for at least 5 years, replaced by AES in 
secure applications.
   

OK this echos my research today (cost me a coffee :-)
Kerberos by default uses DES encryption so a fully encrypted Kerberos
telnet would use DES encryption by default.  It is possible to put
additional ciphers into kerberos but it is not part of the standard.
By comparison ssh uses 3DES by default here are the cipher options from
one version of ssh itself.  For those that do not know 3DES is literally
encrypt in DES three times, very secure, the man page notes that DES is
insecure.
AnyCipher: Any available cipher (apart from none) can be used.
AnyStdCipher: Allows only standard ciphers, i.e. those ciphers mentioned
in the IETF-SecSH-draft (excluding none). This is the default cipher
value.
AES128 Use 128-bit Advanced Encryption Standard (Rijndael) encryption.
AES192 Use 192-bit Advanced Encryption Standard (Rijndael) encryption.
AES256 Use 256-bit Advanced Encryption Standard (Rijndael) encryption.
3DES Use 3DES encryption.
Blowfish: Use Blowfish encryption.
Twofish: Use Twofish encryption.
Arcfour: Use Arcfour encryption.
CAST: Use CAST encryption.
DES: Use DES encryption. DES is generally considered a very weak cipher,
and its use is not recommended. It is offered as a fallback option only.
none: Don't use encryption. Use this option for testing purposes only!
OK my research is that using kerberos is NO MORE security that ssh but
is significantly less secure than ssh by default.  My apologies for
being painful however but sometimes the likelihood of someone being
right is inversely proportional to the number of people shouting them
down.
Here endeth the lesson on security.  If someone tells you something is
more secure you simply must do your own homework.  What they are saying
may be dated information which appears to be the case here, DES is
certainly a dated protocol in security terms.
 

I am using MIT krb5-1.3.3 which was the latest release in April, 2004.
The current release is MIT krb5-1.3.5.(http://web.mit.edu/kerberos/www/)
This a snippet of what I have in my /etc/krb5.conf:
default_tgs_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5
default_tkt_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5
permitted_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5
I use this in AFS (Andrew File System - http://www.openafs.org )
setup at home to test.
Not only can I configure it to use triple des but in addition it is
used in combination with others. Sources apart from MIT says
kerberos5 is the stronger security encryption tool. This is
easily check from the Internet.
The yards to measure security for some  tool or software is done by
evaluating the product in its entirity and not only bits and pieces of
it.
Have some fun.

--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Re: Preventing attacks

2004-11-09 Thread O Plameras
O Plameras wrote:
I am using MIT krb5-1.3.3 which was the latest release in April, 2004.
The current release is MIT krb5-1.3.5.(http://web.mit.edu/kerberos/www/)
This a snippet of what I have in my /etc/krb5.conf:
default_tgs_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5
default_tkt_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5
permitted_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5

I also use this setup in my home network to test OpenLDAP as
Authentication Server using Cyrus-SASL as my security transport layer.
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Re: Preventing attacks

2004-11-09 Thread O Plameras
[EMAIL PROTECTED] wrote:

Isn't the kerberos ticket only valid for a few minutes anyway?
 

In kerberos Version 5 this has been changed to allow seconds as units.
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Re: Apache, CSS PHP

2004-11-09 Thread amos
Howard Lowndes wrote:
On Tue, 2004-11-09 at 10:37, Matthew Palmer wrote:
On Tue, Nov 09, 2004 at 02:30:16AM +1100, Howard Lowndes wrote:
I have a CSS file which has to be named *.css so that Apache knows to
send it as a text/css mime type but I want to do some PHP processing on
before it goes out; unfortunately Apache appears not to know to pass it
through the PHP handler as it not named *.php so the embedded PHP code
doesn't get processed.
I assume I have to do something with Action, AddHandler and SetHandler
directives, but just what exactly.
When I want to add PHP processing to a file type, I just add the file
extension to the AddType application/x-httpd-php line in my httpd.conf.  You
could do a similar thing with your .css files, but there's a problem -- I
think, by default, any request that gets passed through PHP ends up with a
content-type of text/html no matter what.  Basically, at the time you
delegate responsibility for a file to PHP, Apache says not my problem any
more and lets PHP specify the content type.
So, in your PHPified CSS files, you'll need to run something like
header('Content-Type: text/css'); to specify the content-type of the file. 
By the time you do this to all of your CSS files, you're better off (as has
been explained already) putting your dynamic CSS stuff into a .php file,
referencing it in your LINK tags as such, and just telling the file to
announce to the world (via the aforementioned header) that it's a CSS file,
and proud!

I can see what you are saying here, and I have the line in my
head/head block that reads:
link rel=stylesheet type=text/css name=cssname.php/link
which is what I think you are saying but when the file name ends in .php
it seemingly ignores the type statement so I guess PHP must be sending
out different mime type headers, and it looks like I will have to do as
Amos suggests.
I'm not sure about the rest but I think he made it pretty clear that you
can add a php command like:
header('Content-Type: text/css');
at the very beginning of the CSS file (before a buffer gets flushed).
(that's the PHP command I didn't know due to lack of experience with
PHP).
This will set the HTTP header of the response when the server sends
away the CSS file after it was processed by PHP, which seems to be
what eventually the browser looks at.
Cheers,
--Amos
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Re: Apache, CSS PHP

2004-11-09 Thread Howard Lowndes
On Wed, 2004-11-10 at 07:39, [EMAIL PROTECTED] wrote:
 Howard Lowndes wrote:
  On Tue, 2004-11-09 at 10:37, Matthew Palmer wrote:
  
 On Tue, Nov 09, 2004 at 02:30:16AM +1100, Howard Lowndes wrote:
 
 I have a CSS file which has to be named *.css so that Apache knows to
 send it as a text/css mime type but I want to do some PHP processing on
 before it goes out; unfortunately Apache appears not to know to pass it
 through the PHP handler as it not named *.php so the embedded PHP code
 doesn't get processed.
 
 I assume I have to do something with Action, AddHandler and SetHandler
 directives, but just what exactly.
 
 When I want to add PHP processing to a file type, I just add the file
 extension to the AddType application/x-httpd-php line in my httpd.conf.  You
 could do a similar thing with your .css files, but there's a problem -- I
 think, by default, any request that gets passed through PHP ends up with a
 content-type of text/html no matter what.  Basically, at the time you
 delegate responsibility for a file to PHP, Apache says not my problem any
 more and lets PHP specify the content type.
 
 So, in your PHPified CSS files, you'll need to run something like
 header('Content-Type: text/css'); to specify the content-type of the file. 
 By the time you do this to all of your CSS files, you're better off (as has
 been explained already) putting your dynamic CSS stuff into a .php file,
 referencing it in your LINK tags as such, and just telling the file to
 announce to the world (via the aforementioned header) that it's a CSS file,
 and proud!
  
  
  I can see what you are saying here, and I have the line in my
  head/head block that reads:
  link rel=stylesheet type=text/css name=cssname.php/link
  which is what I think you are saying but when the file name ends in .php
  it seemingly ignores the type statement so I guess PHP must be sending
  out different mime type headers, and it looks like I will have to do as
  Amos suggests.
 
 I'm not sure about the rest but I think he made it pretty clear that you
 can add a php command like:
 
 header('Content-Type: text/css');
 
 at the very beginning of the CSS file (before a buffer gets flushed).
 (that's the PHP command I didn't know due to lack of experience with
 PHP).
 This will set the HTTP header of the response when the server sends
 away the CSS file after it was processed by PHP, which seems to be
 what eventually the browser looks at.

Yes that is the way I went - it works fine - tks to all.
 
 Cheers,
 
 --Amos
-- 
Howard.
LANNet Computing Associates;
Your Linux people http://www.lannetlinux.com
--
When you just want a system that works, you choose Linux;
when you want a system that just works, you choose Microsoft.
--
Flatter government, not fatter government;
Get rid of the Australian states.


-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Re: Preventing attacks

2004-11-09 Thread Ken Foskey
On Wed, 2004-11-10 at 05:46 +1100, O Plameras wrote:

 I am using MIT krb5-1.3.3 which was the latest release in April, 2004.
 The current release is MIT krb5-1.3.5.(http://web.mit.edu/kerberos/www/)
 
 This a snippet of what I have in my /etc/krb5.conf:
 
  default_tgs_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5
  default_tkt_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5
  permitted_enctypes = des3-hmac-sha1 des-cbc-crc des-cbc-md5
  
 I use this in AFS (Andrew File System - http://www.openafs.org )
 setup at home to test.
 
 Not only can I configure it to use triple des but in addition it is
 used in combination with others. Sources apart from MIT says
 kerberos5 is the stronger security encryption tool. This is
 easily check from the Internet.
 
 The yards to measure security for some  tool or software is done by
 evaluating the product in its entirity and not only bits and pieces of
 it.

Your assertion was 'kerberos is MORE secure that ssh' (to that effect).
Your specific setup is NO MORE secure than ssh by default and less
secure than you can make ssh by simple command line option (better
ciphers) should you need that extra security.  A novice could easily
make themselves LESS secure with Kerberos by using default options.

Yes or No?


You (or your distro) had to configure kerberos to make it that secure
plus by default not all kerberos servers can handle 3DES out of the box.
(For the record you can change the default of ssh just as easily.)

Yes or No?


Kerberos servers are not as available as ssh servers?

Yes or No?

-- 
Ken Foskey

-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Re: Preventing attacks

2004-11-09 Thread O Plameras
Ken Foskey wrote:
Your assertion was 'kerberos is MORE secure that ssh' (to that effect).
Your specific setup is NO MORE secure than ssh by default and less
secure than you can make ssh by simple command line option (better
ciphers) should you need that extra security.  A novice could easily
make themselves LESS secure with Kerberos by using default options.
Yes or No?
 

I compared ssh with kerberos using differences in their functionalities. I
do not say, myself, that one or another is better. It's true I stated 
kerberos
is stronger but that is a  qoute from people who knows not MINE.

BTW, I use OpenSSH myself (http://www.openssh.org/) and I do not say
there is no place for it other than kerberos. In fact, there are 
circumstances when
SSH is more appropriate than Kerberos in my judgement, but it is up to 
the user.
So, I am not trying to convince anyone that my way is the only way. I am 
just
exposing what's available and what other people say about it.

I just try to expose the materials I am using and so that readers may 
compare
them to what they have and discover why their experiences are different or
the same as mine.

You (or your distro) had to configure kerberos to make it that secure
plus by default not all kerberos servers can handle 3DES out of the box.
(For the record you can change the default of ssh just as easily.)
Yes or No?
 

I use MIT kerberos, so far. I am toying with the idea of also testing 
Heimdal. I
think MIT kerberos is 3DES configured by default, but I have'nt checked. You
can checked that when you have time. I believe that it will be useful if 
you check,

http://www.ietf.org/rfc/rfc1510.txt
because as always only snippets of what I know about kerberos I can say. But
RFC1510 spells out  comprehensive specifications about kerberos and I do not
pretend to be expert in these things. I just say what needs to be said IMHO
and I leave the rest to the readers and not ME to make judgements for them.
Kerberos servers are not as available as ssh servers?
 

I do not know what is specifically meant here and a 'yes' or 'no is not 
as simple as
that in matters like this. It is up to the person who has conducted his 
research thoroughly
to make that call.

--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


Re: [SLUG] Re: Preventing attacks

2004-11-09 Thread O Plameras
O Plameras wrote:
I use MIT kerberos, so far. I am toying with the idea of also testing 
Heimdal. I
think MIT kerberos is 3DES configured by default, but I have'nt 
checked. You
can checked that when you have time. I believe that it will be useful 
if you check,

http://www.ietf.org/rfc/rfc1510.txt
because as always only snippets of what I know about kerberos I can 
say. But
RFC1510 spells out  comprehensive specifications about kerberos and I 
do not
pretend to be expert in these things. I just say what needs to be said 
IMHO
and I leave the rest to the readers and not ME to make judgements for 
them.


I meant to include this enhancements to RFC1510:
http://ietfreport.isoc.org/idref/draft-ietf-krb-wg-kerberos-clarifications/
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


[SLUG] Re: Recomendação de Mala direta, email, lista de emails

2004-11-09 Thread Ricardo Costa
De todos este sites recomendo o Divulgamail. Comprei uma excelente listas
de e-mail para divulgação. Pesquisei vários e eles tem o melhor serviço de
fato. O endereço é:   
http://www.gueb.de/dvgamail

Muito bom mesmo! Vale a pena conferir.

Ricardo Costa




Estou querendo divulgar meu site por email (mala direta virtual), 
 mas não sei qual o site devo escolher. Alguém tem alguma dica ou
recomendação?

Mariana

 

-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


[SLUG] Re: Recomendação de Mala direta, email, lista de emails

2004-11-09 Thread Ricardo Costa
De todos este sites recomendo o Divulgamail. Comprei uma excelente listas
de e-mail para divulgação. Pesquisei vários e eles tem o melhor serviço de
fato. O endereço é:   
http://www.gueb.de/dvgamail

Muito bom mesmo! Vale a pena conferir.

Ricardo Costa




Estou querendo divulgar meu site por email (mala direta virtual), 
 mas não sei qual o site devo escolher. Alguém tem alguma dica ou
recomendação?

Mariana

 

-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


[SLUG] Reminder: PostgreSQL Users Group meeting November 9th at James Squire Brew House

2004-11-09 Thread Gavin Sherry
Hi all,

Just a reminder that this month's postponed PostgreSQL Users Group meeting
will kick off this evening, Tuesday the 9th at 6:30 at the James Squire
Brew House.

http://www.malt-shovel.com.au/brewhouse.asp?Sydney=true

I will be giving a detailed tutorial on Point in Time Recovery and Tim
Allen has offered to provide a case study of his company's use of
PostgreSQL in their media asset management application.

Any one interested in attending, irrespective of knowledge or experience,
is welcome.

Be sure to invite friends, colleagues and your MySQL or Oracle loving
boss ;-)

Thanks,

Gavin
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


[SLUG] lost file

2004-11-09 Thread Kevin Saenz
Hi all,

I have misplaced a file that I downloaded to get my Dlink wireless
card to work under Linux
now I have tried to download it and it nolonger exists on the site did
anyone from the group download the following file?
DWLG650plus_utility_v.1.0.zip

If you have it could you please email it to me off the group?

Thanks

Kevin
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


[SLUG] /etc/dhcpd.conf

2004-11-09 Thread Adam Bogacki
Hi, I'm trying to configure /etc/dhcpd in order to set up a two machine 
home network using LTSP.
The P1 client boots with etherboot but I can't start dhcpd.
Below is my my most recent config attempt, together with the current 
error message when I try to start dhcpd.
My DNS is 203.79.110.81 and the server IP used in successful Win config 
is 192.168.0.1

Any constructive ideas ?
Adam Bogacki,
[EMAIL PROTECTED]
... lost in Confusia's tender mercies ...
default-lease-time   21600;
max-lease-time   21600;
option subnet-mask   255.255.255.0;
option broadcast-address 203.79.110.255;
option routers   203.79.110.81;
option domain-name-servers   203.79.110.81;
option domain-name   paradise.net.nz;  # --Fix this 
domain name
option root-path 203.79.110.81:/opt/ltsp/i386;

subnet  192.168.0.0 netmask 255.255.255.0 {
range dynamic-bootp 192.168.0.1 192.168.0.253;
}
subnet 203.79.110.0 netmask 255.255.255.0 {
use-host-decl-names  on;
option log-servers   203.79.110.81;

Tux:/etc# dhcpd start
Internet Software Consortium DHCP Server 2.0pl5
Copyright 1995, 1996, 1997, 1998, 1999 The Internet Software Consortium.
All rights reserved.
Please contribute if you find this software useful.
For info, please visit http://www.isc.org/dhcp-contrib.html
No subnet declaration for start (0.0.0.0).
Please write a subnet declaration in your dhcpd.conf file for the
network segment to which interface start is attached.
exiting.
Tux:/etc#


--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html


[SLUG] Re: /etc/dhcpd.conf

2004-11-09 Thread Matthew Palmer
On Wed, Nov 10, 2004 at 07:25:54PM +1300, Adam Bogacki wrote:
 Hi, I'm trying to configure /etc/dhcpd in order to set up a two machine 
 home network using LTSP.
 The P1 client boots with etherboot but I can't start dhcpd.
 Below is my my most recent config attempt, together with the current 
 error message when I try to start dhcpd.
 My DNS is 203.79.110.81 and the server IP used in successful Win config 
 is 192.168.0.1

 No subnet declaration for start (0.0.0.0).
 Please write a subnet declaration in your dhcpd.conf file for the
 network segment to which interface start is attached.

Show the the output of 'ipconfig -a', and what exact command line (you may
have to dig through your startup scripts) you're using to start dhcpd.  If
you can't work out how exactly dhcpd is being started, write back with
distro, version, etc, and more help will be provided.

I suspect that you have an active interface called 'start' which doesn't
have an IP address, but which dhcpd is being told to listen on.  But let's
see whether the above data helps decide that.

- Matt


signature.asc
Description: Digital signature
-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

[SLUG] Re: usb

2004-11-09 Thread USB










 :
  
 40 ,.

HDD USB-  .
   .

 ,:

1.2004
2.2004
3.  
4.   2003
5.  
6.   2003
7. 
8.   
9.  
10.  
11. 
12. 
13. 
14.  
15.  
16.  2003
17.  2004 
HDD: 

. 
. 
   (  HDD   ) 
  (  HDD  1. ), 1 . 
  ("  ") 

: 15000  
..  . 
   ., . 
: 8 (095) 589-44-17 

E, .









fduvrjji.jpg-- 
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Re: [SLUG] lost file

2004-11-09 Thread amos
Googling for this file name got me the link at
http://www.linuxquestions.org/hcl/showproduct.php?product=1125
which points to a non-existing file, but if you try to
browse that FTP directory you can see files which might
contain later versions?
(dwlg650plus_driver_eu_v2.04.zip,
dwlg650plus_WPA-utility-driver_2.02.zip)
Try:
ftp://ftp.dlink.de/dwl-products/dwl-g650PLUS/Treiber_Firmware/
Also, if you have such a non-working link in some other site then
maybe you can try to trim the last part of that URL and see what
you get.
HTH,
--Amos
Kevin Saenz wrote:
Hi all,
I have misplaced a file that I downloaded to get my Dlink wireless
card to work under Linux
now I have tried to download it and it nolonger exists on the site did
anyone from the group download the following file?
DWLG650plus_utility_v.1.0.zip
If you have it could you please email it to me off the group?
Thanks
Kevin
--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html