Re: user flags in public temp space (was Re: chflags() [heads up])

1999-08-06 Thread sirsyko
Adam Morrison wrote: From the OpenBSD change logs: revision 1.59 date: 1999/07/30 18:27:47; author: deraadt; state: Exp; lines: +20 -1 do not permit regular users to chflags/fchflags on chr or blk devices -- even if they happen to own them at the moment. Mike Frantzen ([EMAIL

Re: Microsoft ask users to crack win2000 site

1999-08-06 Thread John Horn
Aleph1, I don't know if this posting is really pertinent to the list but considering the potential for serious penalties, I thought it might be advisable to point this out. Hmmm, interesting. Nevertheless, such activity contravenes various federal statutes and/or possibly state statutes at

Paranoid? Running SSHD as normal users.

1999-08-06 Thread Erik Parker
This could be good.. But this could be bad. Running on a system with out the shadow password suite, then this would work very easily, running on a machine with a shadow password suite, it would atleast require the shadow file to be group writeable to the GID you run the program as. Which in most

vlock + magic SysRQ key

1999-08-06 Thread Luis M. Cruz
Hi! Sorry if somebody has noticed this before or is only a stupid remark, but a few days ago I found that you can kill vlock (and similar programs that lock all linux consoles) with the alt+sysrq+k key combination on LiNUX 2.2.X and 2.3.X (if you enabled magic keys when you compiled the

Re: SGID man

1999-08-06 Thread Henrik Nordstrom
Isaac To wrote: But yes, it is ugly. It might be better if any SGID program is also SUID nobody, and re-acquire real user privilege only when required. But still, it is ugly. That is not a viable approach unless the binary (and all other binaries owned by nobody) also is immutable. If the

Re: Nifty DoS in Foundry networks gear.

1999-08-06 Thread Jan B. Koum
It seem I am not able to re-produce the problem any more. So... sorry and never mind. I'll go sit in the corner now. -- Yan On Mon, Aug 02, 1999 at 04:58:43PM -0700, "Jan B. Koum " jkb wrote: Running tcp nmap scan against Foundry network gear make it go boom. What makes it more

Re: Linux blind TCP spoofing, act II + others

1999-08-06 Thread Alan Cox
So, the version of my patch for 2.0.34 didn't need to fix this any more. Of course, future updates of the patch I was making based on the latest one, and never bothered to check for this bug again. Now, after your post, I am looking at patch-2.0.35.gz: - return 0; + return 1;

Re: Linux blind TCP spoofing, act II + others

1999-08-06 Thread Salvatore Sanfilippo -antirez-
On Sun, Aug 01, 1999 at 01:10:06AM +0200, Nergal wrote: Now let's recall another Linux feature. Many OSes (including Linux) assign to ID field of an outgoing IP datagram consecutive, increasing numbers (we forget about fragmentation here; irrelevant in this case). That enables anyone to

Please pass the word: RAID registration deadlines!

1999-08-06 Thread Gene Spafford
Research Advances in Intrusion Detection (RAID 99) The 2nd annual RAID workshop will attract researchers, educators, policy makers and technologists from around the world to the Purdue University campus, September 7-9. The workshop will feature research presentations, panels, and discussion on

Re: [LoWNOISE] Password hunting with webramp

1999-08-06 Thread sfaust
you can also find them easly by running a http server version reply. The incorporated web server inside M3 Webramp returns this as version reply wr_httpd/1.0.24April'9 without the . I was aware about this problem for some time and the problem is very dangerous. IF you have more then 1modem

Re: Microsoft ask users to crack win2000 site

1999-08-06 Thread Duncan Simpson
Since nobody has pointed it out yet it has been said by various people, at least one of them in print, (including Spafford, I think) that these challenges are unlikely to attract the real experts, who can charge large consulting fees. It simply makes no sense for these people to give their

Re: Microsoft ask users to crack win2000 site

1999-08-06 Thread Ray Barnes
On Thu, 5 Aug 1999, John Horn wrote: Hmmm, interesting. Nevertheless, such activity contravenes various federal statutes and/or possibly state statutes at either the point of origination and/or the destination (or both). I would suggest that anyone interested in accepting this offer

Re: Cisco 675 password nonsense

1999-08-06 Thread Dave Dittrich
With good reason. In bridging mode with a Windows 9x/NT box, your network neighborhood will show everyone else's PC that has any file/print sharing enabled. So, it's trivially easy to connect to a non-passworded share. That depends on the DSL provider, I believe. On my USWest.net DSL