Re: [CentOS] what percent of time are there unpatched exploits against default config?

2012-01-01 Thread Marc Deop
Agreed. I don't even label as idiots the idiots who post here, asking us to tell them how to do the job they were hired for, without any indication that they've read man pages, or googled for an answer. Last time I checked you *were* in this list therefore you are calling yourself an idiot.

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2012-01-01 Thread Ljubomir Ljubojevic
On 12/31/2011 11:45 PM, Timothy Murphy wrote: Les Mikesell wrote: Yes, I'm more worried about attacks through port 80. Can anyone point me to documentation on protecting a web-server? You should check http://www.snort.org, IDS system. ClearOS has them integrated. I can not remember if can

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2012-01-01 Thread Ljubomir Ljubojevic
On 01/01/2012 09:14 PM, Ljubomir Ljubojevic wrote: On 12/31/2011 11:45 PM, Timothy Murphy wrote: Les Mikesell wrote: Yes, I'm more worried about attacks through port 80. Can anyone point me to documentation on protecting a web-server? You should check http://www.snort.org, IDS system.

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2012-01-01 Thread Nataraj
On 12/30/2011 09:02 PM, Alex Milojkovic wrote: Scenario of botnet with 1000 PCs making attempts to crack are password ain't gonna happen. On one system that I run, for a fairly popular domain, I see botnet attacks trying to break in to the pop and ftp ports as well as botnet spam and SASL

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2012-01-01 Thread Joseph L. Casale
Does ipset work with the existing kernel under CentOS 5 and if so is there an RPM available? I've goggled around a bit, but haven't found anything. From http://ipset.netfilter.org/ I'm led to believe that the current kernel should support it. Well, you have modules on your system, and if

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2012-01-01 Thread Alex Milojkovic
to other NICs and look for this info -Alex -Original Message- From: centos-boun...@centos.org [mailto:centos-boun...@centos.org] On Behalf Of Nataraj Sent: Sunday, January 01, 2012 3:26 PM To: centos@centos.org Subject: Re: [CentOS] what percent of time are there unpatched exploits

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Drew
It's been an interesting if somewhat heated discussion. Figures the fun ones come up when I'm away. ;) The discussion of using Certs(PKI) vs Passwords to secure SSH seem to be missing an important piece of the puzzle, and that to my mind is attack vectors target value. The argument I saw

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Timothy Murphy
Drew wrote: In my case, the primary attack vector for hackers getting at my servers is via the web. Because I host primarily personal websites on my servers, the hackers motivation for breaking into my server (aside from 'it's there') is to turn the machine into a bot-net or host some viagra

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Johnny Hughes
On 12/30/2011 11:02 PM, Alex Milojkovic wrote: I think the best password policy is the one you've never told anyone and never posted on a public mailing list. How many of you out there know of cases where administrators' passwords were compromised by brute force? Can we take a count of

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Stephen Harris
On Sat, Dec 31, 2011 at 05:43:54AM -0800, Drew wrote: The argument I saw against PKI is that's it's no more secure then regular passwords because your certificates are password protected anyways and stored on external media so they can be stolen and used to access the system. Typical security

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Drew
I'm in much the same situation, and would like to protect myself to a minimal extent. But I don't understand how a usb token (below) would help. The 'token' in this case (a standard usb thumbdrive) is merely a portable container for my ssh certificates and a copy of putty (when I'm on a

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Leonard den Ottolander
Hello Johnny, On Sat, 2011-12-31 at 08:13 -0600, Johnny Hughes wrote: Here are a couple of articles for you to read: http://www.gtri.gatech.edu/casestudy/Teraflop-Troubles-Power-Graphics-Processing-Units-GPUs-Password-Security-System

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Ljubomir Ljubojevic
On 12/31/2011 03:13 PM, Johnny Hughes wrote: On 12/30/2011 11:02 PM, Alex Milojkovic wrote: I think the best password policy is the one you've never told anyone and never posted on a public mailing list. How many of you out there know of cases where administrators' passwords were

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Les Mikesell
On Sat, Dec 31, 2011 at 8:13 AM, Johnny Hughes joh...@centos.org wrote: Scenario of botnet with 1000 PCs making attempts to crack are password ain't gonna happen. You don't need a botnet of 1000 PCs ... you only need a couple of graphics cards. If you have a stolen passphrase-protected

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Alex Milojkovic
-boun...@centos.org] On Behalf Of Johnny Hughes Sent: Saturday, December 31, 2011 6:14 AM To: centos@centos.org Subject: Re: [CentOS] what percent of time are there unpatched exploits against default config? On 12/30/2011 11:02 PM, Alex Milojkovic wrote: I think the best password policy is the one

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Alex Milojkovic
] On Behalf Of Stephen Harris Sent: Saturday, December 31, 2011 6:41 AM To: CentOS mailing list Subject: Re: [CentOS] what percent of time are there unpatched exploits against default config? On Sat, Dec 31, 2011 at 05:43:54AM -0800, Drew wrote: The argument I saw against PKI is that's it's no more

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Les Mikesell
On Sat, Dec 31, 2011 at 1:50 PM, Alex Milojkovic cen...@businessforce.ca wrote: Ok let me rephrase myself. How many people have had their passwords cracked on Internet servers by means available to them? In other words gained root access by way of a TCP service. Someone cracked my gmail

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Drew
IP address allocation needs to be done smarter so that geographical regions can be isolated easier. And at some point it probably will be. There already is that capability to some extent. Between geoip and the RIR's, one can get a pretty good handle on which /8 or /16 blocks need to be blocked

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Ken godee
IP address allocation needs to be done smarter so that geographical regions can be isolated easier. And at some point it probably will be. There already is that capability to some extent. Between geoip and the RIR's, one can get a pretty good handle on which /8 or /16 blocks need to be

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Craig White
On Sat, 2011-12-31 at 15:17 -0700, Ken godee wrote: IP address allocation needs to be done smarter so that geographical regions can be isolated easier. And at some point it probably will be. There already is that capability to some extent. Between geoip and the RIR's, one can get a

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread John R Pierce
On 12/31/11 2:17 PM, Ken godee wrote: We've been thinking of using the MaxMind GeoIP Country database with Apache mod_geoip API to limit certain countries visiting our websites. Has anyone used this or have any input on it's usefulness? the virus/worm folks will just move to open relays that

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Ken godee
On 12/31/11 2:17 PM, Ken godee wrote: We've been thinking of using the MaxMind GeoIP Country database with Apache mod_geoip API to limit certain countries visiting our websites. Has anyone used this or have any input on it's usefulness? the virus/worm folks will just move to open relays

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Timothy Murphy
Les Mikesell wrote: Someone cracked my gmail password and sent what seemed like an oddly small amount of spam from it. gmail and hotmail must be very easy to crack, or is there some check apart from the password? That doesn't work for web services open to the public. You need firewalls

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Cliff Pratt
On Sun, Jan 1, 2012 at 11:45 AM, Timothy Murphy gayle...@alice.it wrote: Les Mikesell wrote: Someone cracked my gmail password and sent what seemed like an oddly small amount of spam from it. gmail and hotmail must be very easy to crack, or is there some check apart from the password?

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread Alex Milojkovic
are there unpatched exploits against default config? IP address allocation needs to be done smarter so that geographical regions can be isolated easier. And at some point it probably will be. There already is that capability to some extent. Between geoip and the RIR's, one can get a pretty good

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-31 Thread John R Pierce
On 12/31/11 5:06 PM, Alex Milojkovic wrote: I think some of these changes are coming. careful what you wish for, it may come true... ...those changes ARE coming, but they are coming at the request of the movie and music industries who are trying to legislate the ability to demand domain

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Alex Milojkovic
There is a concept called dynamic firewall i am working on that should eliminate any brute force attempts. If you think about it, if you know someone is trying to break in there is no need to give them access to the server any more. So after a hundred wrong passwords you cut them off. Reindl

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Johnny Hughes
On 12/30/2011 03:55 AM, Alex Milojkovic wrote: There is a concept called dynamic firewall i am working on that should eliminate any brute force attempts. If you think about it, if you know someone is trying to break in there is no need to give them access to the server any more. So after a

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread 夜神 岩男
On 12/30/2011 02:33 AM, Ljubomir Ljubojevic wrote: I like to use serial numbers from MB, HDD, etc., as passwords. I never use normal words for my passwords, and few other users (with ssh/cli access) are carefully checked for their passwords. If this formula is true (1/2 . 2 ^ 54 . 1s / 10)

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Lamar Owen
On Wednesday, December 28, 2011 10:38:30 PM Craig White wrote: the top priority was to get the machine back online? Seems to me that you threw away the only opportunity to find out what you did wrong and to correct that so it doesn't happen again. You are left to endlessly suffer the endless

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Johnny Hughes
On 12/30/2011 09:15 AM, Lamar Owen wrote: On Wednesday, December 28, 2011 10:38:30 PM Craig White wrote: the top priority was to get the machine back online? Seems to me that you threw away the only opportunity to find out what you did wrong and to correct that so it doesn't happen again. You

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Lamar Owen
On Tuesday, December 27, 2011 10:13:12 PM Bennett Haselton wrote: Roughly what percent of the time is there such an unpatched exploit in the wild, so that the machine can be hacked by someone keeping up with the exploits? While I did reply elsewhere in the thread, I want to address this

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Lamar Owen
On Thursday, December 29, 2011 12:33:41 PM Ljubomir Ljubojevic wrote: If you use denyhosts or fail2ban, attacker needs 10,000 attack PC's that never attacked any denyhosts or fail2ban server in recent time. That would be a very small botnet. And with gamers out there with CUDA-capable GPU's

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Lamar Owen
On Friday, December 30, 2011 10:24:15 AM Johnny Hughes wrote: Agree with this. At the very least, some kind of image (dd) of the original disk for further study even if you have to get the machine back on line and you don't have a failover machine. Speaking of dd, ddrescue in my experience is

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread m . roth
Lamar Owen wrote: On Thursday, December 29, 2011 12:33:41 PM Ljubomir Ljubojevic wrote: If you use denyhosts or fail2ban, attacker needs 10,000 attack PC's that never attacked any denyhosts or fail2ban server in recent time. That would be a very small botnet. And with gamers out there with

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Marko Vojinovic
On Friday 30 December 2011 19:40:55 夜神 岩男 wrote: [snip] We can start a 10,000 computer botnet (or, more realistically, a 10m computer botnet these days, and this is a technique used right now) working on the problem of assembling a new index table that orders and assigns every possible valid

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Craig White
On Dec 30, 2011, at 8:24 AM, Lamar Owen wrote: On Tuesday, December 27, 2011 10:13:12 PM Bennett Haselton wrote: Roughly what percent of the time is there such an unpatched exploit in the wild, so that the machine can be hacked by someone keeping up with the exploits? While I did reply

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Lamar Owen
On Friday, December 30, 2011 11:19:46 AM Marko Vojinovic wrote: You are basically saying that, given enough resources, you can precalculate all hashes for all possible passwords in advance. Can the same be said for keys? Given enough resources, you could precalculate all possible

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread 夜神 岩男
On 12/31/2011 01:19 AM, Marko Vojinovic wrote: On Friday 30 December 2011 19:40:55 夜神 岩男 wrote: [snip] We can start a 10,000 computer botnet (or, more realistically, a 10m computer botnet these days, and this is a technique used right now) working on the problem of assembling a new index

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Leonard den Ottolander
Reinl, On Thu, 2011-12-29 at 15:28 +0100, Reindl Harald wrote: why do you not tell this the idiot who is argumentating against kyes and thinks using password-login is smart? I don't like your tone. I'm not sure if it's me or Bennett you are calling an idiot or both, but in any case you should

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread m . roth
Leonard den Ottolander wrote: Reinl, On Thu, 2011-12-29 at 15:28 +0100, Reindl Harald wrote: why do you not tell this the idiot who is argumentating against kyes and thinks using password-login is smart? I don't like your tone. I'm not sure if it's me or Bennett you are calling an idiot or

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Ljubomir Ljubojevic
On 12/30/2011 05:47 PM, Craig White wrote: to reiterate my thoughts... I still don't understand the logic of the list indulging the OP's rampant speculation of various causes when his first action was to eliminate all possibility to find out what actually happened. An apt analogy is to

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Alex Milojkovic
] On Behalf Of ?? ?? Sent: Friday, December 30, 2011 9:07 AM To: centos@centos.org Subject: Re: [CentOS] what percent of time are there unpatched exploits against default config? On 12/31/2011 01:19 AM, Marko Vojinovic wrote: On Friday 30 December 2011 19:40:55 夜神 岩男 wrote: [snip] We can start

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread John R Pierce
On 12/30/11 9:02 PM, Alex Milojkovic wrote: I believe in passwords. I don't believe in PKI. It's a lot more likely that I will forget my laptop somewhere, or that someone will steal my usb key than that someone will guess my password and have opportunities to try it. you're supposed to

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Bennett Haselton
On Wed, Dec 28, 2011 at 6:10 AM, Johnny Hughes joh...@centos.org wrote: On 12/27/2011 10:42 PM, Bennett Haselton wrote: Everything installed on the machine had been installed with yum. So I assumed that meant that it would also be updated by yum if an update was available from the

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread m . roth
夜神 岩男 wrote: On 12/30/2011 12:00 AM, m.r...@5-cent.us wrote: 夜神 岩男 wrote: On 12/29/2011 10:21 PM, Marko Vojinovic wrote: On Thursday 29 December 2011 13:07:56 Reindl Harald wrote: Am 29.12.2011 12:56, schrieb Leonard den Ottolander: On Thu, 2011-12-29 at

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Peter Eckel
Hi Marko, Using the ssh key can be problematic because it is too long and too random to be memorized --- you have to carry it on a usb stick (or whereever). This provides an additional point of failure should your stick get lost or stolen. this is only correct when you use SSH keys without

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread m . roth
Reindl Harald wrote: Am 29.12.2011 14:21, schrieb Marko Vojinovic: so explain me why discuss to use or not to use the best currently availbale method in context of security? Using the ssh key can be problematic because it is too long and too random to be memorized --- you have to carry it on

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Ned Slider
On 29/12/11 03:38, Craig White wrote: On Wed, 2011-12-28 at 00:40 -0700, Bennett Haselton wrote: On Tue, Dec 27, 2011 at 10:17 PM, Rilindo Fosterrili...@me.com wrote: What was the nature of the break-in, if I may ask? I don't know how they did it, only that the hosting company had to take

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread 夜神 岩男
On 12/30/2011 12:41 AM, Marc Deop wrote: On Thursday 29 December 2011 14:59:14 Reindl Harald wrote: the hughe difference is: while having the same password (for the key) it can not be used directly for brute-force und you need the password and at least one time access to the key file Explain

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread 夜神 岩男
On 12/30/2011 01:33 AM, m.r...@5-cent.us wrote: Marko Vojinovic wrote: On Thursday 29 December 2011 14:59:14 Reindl Harald wrote: Am 29.12.2011 14:21, schrieb Marko Vojinovic: so explain me why discuss to use or not to use the best currently availbale method in context of security? Using

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread 夜神 岩男
On 12/29/2011 05:17 PM, Bennett Haselton wrote: On Wed, Dec 28, 2011 at 6:10 AM, Johnny Hughesjoh...@centos.org wrote: On 12/27/2011 10:42 PM, Bennett Haselton wrote: 2. Why have password logins at all? Using a secure ssh key only for logins makes the most sense. Well that's something

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Marko Vojinovic
On Thursday 29 December 2011 14:59:14 Reindl Harald wrote: Am 29.12.2011 14:21, schrieb Marko Vojinovic: so explain me why discuss to use or not to use the best currently availbale method in context of security? Using the ssh key can be problematic because it is too long and too random

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Johnny Hughes
On 12/29/2011 08:06 AM, Reindl Harald wrote: Am 29.12.2011 14:59, schrieb Johnny Hughes: That flaw as absolutely no access component. It allows a DDOS attack, not provide remote access to a machine. From the bug: A flaw was found in the way the Apache HTTP Server handled Range HTTP

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Ljubomir Ljubojevic
On 12/29/2011 03:53 PM, 夜神 岩男 wrote: On 12/29/2011 10:21 PM, Marko Vojinovic wrote: On Thursday 29 December 2011 13:07:56 Reindl Harald wrote: Am 29.12.2011 12:56, schrieb Leonard den Ottolander: Hello Reindl, On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote: Am 29.12.2011 09:17,

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Johnny Hughes
On 12/28/2011 08:57 PM, Craig White wrote: On Wed, 2011-12-28 at 07:43 -0600, Johnny Hughes wrote: There have been NO critical kernel updates. A critical update is one where someone can remotely execute items at the root users. Almost all critical updates are Firefox, Thunderbird, telnetd

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread m . roth
Ljubomir Ljubojevic wrote: snip I like to use serial numbers from MB, HDD, etc., as passwords. I never The one problem with this is that *if* the attacker has the slightest idea of the hardware, their task is vastly smaller. I trust, for example, that you don't use Dell's s/n/express code;

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Reindl Harald
Am 29.12.2011 09:17, schrieb Bennett Haselton: 2. Why have password logins at all? Using a secure ssh key only for logins makes the most sense. Well that's something that I'm curious about the reasoning behind -- if you're already using a completely random 12-character password, why would

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Johnny Hughes
On 12/29/2011 07:21 AM, Marko Vojinovic wrote: On Thursday 29 December 2011 13:07:56 Reindl Harald wrote: Am 29.12.2011 12:56, schrieb Leonard den Ottolander: Hello Reindl, On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote: Am 29.12.2011 09:17, schrieb Bennett Haselton: Even though the

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Leonard den Ottolander
Hello Reindl, On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote: Am 29.12.2011 09:17, schrieb Bennett Haselton: Even though the ssh key is more random, they're both sufficiently random that it would take at least hundreds of years to get in by trial and error. if you really think

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Reindl Harald
Am 29.12.2011 14:21, schrieb Marko Vojinovic: so explain me why discuss to use or not to use the best currently availbale method in context of security? Using the ssh key can be problematic because it is too long and too random to be memorized --- you have to carry it on a usb stick (or

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Reindl Harald
Am 29.12.2011 14:59, schrieb Johnny Hughes: That flaw as absolutely no access component. It allows a DDOS attack, not provide remote access to a machine. From the bug: A flaw was found in the way the Apache HTTP Server handled Range HTTP headers. A remote attacker could use this flaw

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread m . roth
夜神 岩男 wrote: On 12/29/2011 10:21 PM, Marko Vojinovic wrote: On Thursday 29 December 2011 13:07:56 Reindl Harald wrote: Am 29.12.2011 12:56, schrieb Leonard den Ottolander: On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote: Am 29.12.2011 09:17, schrieb Bennett Haselton: Even

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Ljubomir Ljubojevic
On 12/29/2011 06:45 PM, m.r...@5-cent.us wrote: Ljubomir Ljubojevic wrote: snip I like to use serial numbers from MB, HDD, etc., as passwords. I never The one problem with this is that *if* the attacker has the slightest idea of the hardware, their task is vastly smaller. I trust, for

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Marko Vojinovic
On Thursday 29 December 2011 13:07:56 Reindl Harald wrote: Am 29.12.2011 12:56, schrieb Leonard den Ottolander: Hello Reindl, On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote: Am 29.12.2011 09:17, schrieb Bennett Haselton: Even though the ssh key is more random, they're both

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Reindl Harald
Am 29.12.2011 15:24, schrieb m.r...@5-cent.us: Reindl Harald wrote: Am 29.12.2011 14:21, schrieb Marko Vojinovic: so explain me why discuss to use or not to use the best currently availbale method in context of security? Using the ssh key can be problematic because it is too long and too

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread 夜神 岩男
On 12/30/2011 12:00 AM, m.r...@5-cent.us wrote: 夜神 岩男 wrote: On 12/29/2011 10:21 PM, Marko Vojinovic wrote: On Thursday 29 December 2011 13:07:56 Reindl Harald wrote: Am 29.12.2011 12:56, schrieb Leonard den Ottolander: On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote: Am

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Reindl Harald
Am 29.12.2011 12:56, schrieb Leonard den Ottolander: Hello Reindl, On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote: Am 29.12.2011 09:17, schrieb Bennett Haselton: Even though the ssh key is more random, they're both sufficiently random that it would take at least hundreds of years

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread 夜神 岩男
On 12/29/2011 10:21 PM, Marko Vojinovic wrote: On Thursday 29 December 2011 13:07:56 Reindl Harald wrote: Am 29.12.2011 12:56, schrieb Leonard den Ottolander: Hello Reindl, On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald wrote: Am 29.12.2011 09:17, schrieb Bennett Haselton: Even though the

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread m . roth
Marko Vojinovic wrote: On Thursday 29 December 2011 14:59:14 Reindl Harald wrote: Am 29.12.2011 14:21, schrieb Marko Vojinovic: so explain me why discuss to use or not to use the best currently availbale method in context of security? Using the ssh key can be problematic because it is

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Marc Deop
On Thursday 29 December 2011 14:59:14 Reindl Harald wrote: the hughe difference is: while having the same password (for the key) it can not be used directly for brute-force und you need the password and at least one time access to the key file Explain me how having a key protected by a

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-29 Thread Cliff Pratt
On Fri, Dec 30, 2011 at 4:00 AM, m.r...@5-cent.us wrote: 夜神 岩男 wrote: On 12/29/2011 10:21 PM, Marko Vojinovic wrote: On Thursday 29 December 2011 13:07:56 Reindl Harald wrote: Am 29.12.2011 12:56, schrieb Leonard den Ottolander: On Thu, 2011-12-29 at 12:29 +0100, Reindl Harald

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-28 Thread 夜神 岩男
On 12/28/2011 02:01 PM, Bennett Haselton wrote: Yeah I know that most break-ins do happen using third-party web apps; fortunately the servers I'm running don't have or need any of those. But then what about what my friend said: For example, there was a while back ( ~march ) a kernel exploit

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-28 Thread 夜神 岩男
On 12/28/2011 04:40 PM, Bennett Haselton wrote: On Tue, Dec 27, 2011 at 10:17 PM, Rilindo Fosterrili...@me.com wrote: On Dec 27, 2011, at 11:29 PM, Bennett Haseltonbenn...@peacefire.org What was the nature of the break-in, if I may ask? I don't know how they did it, only that the hosting

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-28 Thread Johnny Hughes
On 12/27/2011 10:42 PM, Bennett Haselton wrote: Everything installed on the machine had been installed with yum. So I assumed that meant that it would also be updated by yum if an update was available from the distro. 1. Are you running PHP apps on the web server? Perl apps? Bad code in

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-28 Thread Johnny Hughes
On 12/28/2011 01:44 AM, Bennett Haselton wrote: On Tue, Dec 27, 2011 at 10:08 PM, Ken godee k...@perfect-image.com wrote: password? That's what I'm talking about -- how often does this sort of thing happen, where you need to be subscribed to be a security mailing list in order to know what

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-28 Thread Johnny Hughes
On 12/28/2011 07:55 AM, Johnny Hughes wrote: On 12/28/2011 01:40 AM, Bennett Haselton wrote: On Tue, Dec 27, 2011 at 10:17 PM, Rilindo Foster rili...@me.com wrote: On Dec 27, 2011, at 11:29 PM, Bennett Haselton benn...@peacefire.org wrote: On Tue, Dec 27, 2011 at 8:33 PM, Gilbert

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-28 Thread Eero Volotinen
http://www.awe.com/mark/blog/20110727.html -- Eero ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-28 Thread Timothy Murphy
Johnny Hughes wrote: System Administration is a time consuming and complicated thing. That is why there are System Administrators. That is why there are certifications like RHCT, RHCE, CISSP. There are a whole slew of things that people who want to run secure server need to know, and

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-28 Thread Craig White
On Wed, 2011-12-28 at 13:47 +0900, 夜神 岩男 wrote: With the vast majority of web applications being developed on frameworks like Drupal, Django and Plone, the overwhelming majority of server hacks with regard to the web have to do with attacking these structures (at least initially), not the

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-28 Thread Les Mikesell
On Wed, Dec 28, 2011 at 5:01 PM, Timothy Murphy gayle...@alice.it wrote: Running your own server is not like using a toaster.  It requires someone with a detailed level of knowledge to install and maintain it. What about home servers? Are they exposed to inbound internet traffic? If so,

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-28 Thread Craig White
On Wed, 2011-12-28 at 07:43 -0600, Johnny Hughes wrote: There have been NO critical kernel updates. A critical update is one where someone can remotely execute items at the root users. Almost all critical updates are Firefox, Thunderbird, telnetd (does anyone still allow telnet?), or samba

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-28 Thread Craig White
On Wed, 2011-12-28 at 00:40 -0700, Bennett Haselton wrote: On Tue, Dec 27, 2011 at 10:17 PM, Rilindo Foster rili...@me.com wrote: What was the nature of the break-in, if I may ask? I don't know how they did it, only that the hosting company had to take the server offline because they

[CentOS] what percent of time are there unpatched exploits against default config?

2011-12-27 Thread Bennett Haselton
Suppose I have a CentOS 5.7 machine running the default Apache with no extra modules enabled, and with the yum-updatesd service running to pull down and install updates as soon as they become available from the repository. (Assume further the password is strong, etc.) On the other hand, suppose

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-27 Thread Karanbir Singh
On 12/28/2011 03:13 AM, Bennett Haselton wrote: Roughly what percent of the time is there such an unpatched exploit in the wild, so that the machine can be hacked by someone keeping up with the exploits? 5%? 50%? 95%? there is no way to tell, and there is no metric to work against unless

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-27 Thread Gilbert Sebenste
On Tue, 27 Dec 2011, Bennett Haselton wrote: Suppose I have a CentOS 5.7 machine running the default Apache with no extra modules enabled, and with the yum-updatesd service running to pull down and install updates as soon as they become available from the repository. So the machine can

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-27 Thread Bennett Haselton
On Tue, Dec 27, 2011 at 8:33 PM, Gilbert Sebenste seben...@weather.admin.niu.edu wrote: On Tue, 27 Dec 2011, Bennett Haselton wrote: Suppose I have a CentOS 5.7 machine running the default Apache with no extra modules enabled, and with the yum-updatesd service running to pull down and

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-27 Thread Karanbir Singh
On 12/28/2011 04:29 AM, Bennett Haselton wrote: I was asking because I had a server that did get broken into, despite having yum-updatesd running and a strong password. He said that even if the software component compromised was a part of the updates being dished out from the distro ( and

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-27 Thread Bennett Haselton
Everything installed on the machine had been installed with yum. So I assumed that meant that it would also be updated by yum if an update was available from the distro. On Tue, Dec 27, 2011 at 9:38 PM, Karanbir Singh mail-li...@karan.orgwrote: On 12/28/2011 04:29 AM, Bennett Haselton wrote:

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-27 Thread 夜神 岩男
On 12/28/2011 01:29 PM, Bennett Haselton wrote: On Tue, Dec 27, 2011 at 8:33 PM, Gilbert Sebenste seben...@weather.admin.niu.edu wrote: On Tue, 27 Dec 2011, Bennett Haselton wrote: Suppose I have a CentOS 5.7 machine running the default Apache with no extra modules enabled, and with the

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-27 Thread Bennett Haselton
Yeah I know that most break-ins do happen using third-party web apps; fortunately the servers I'm running don't have or need any of those. But then what about what my friend said: For example, there was a while back ( ~march ) a kernel exploit that affected CentOS / RHEL. The patch came after 1-2

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-27 Thread Ken godee
password? That's what I'm talking about -- how often does this sort of thing happen, where you need to be subscribed to be a security mailing list in order to know what workaround to make to stay safe, as opposed to simply running yum-updatesd to install latest patches automatically. Happens

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-27 Thread Rilindo Foster
On Dec 27, 2011, at 11:29 PM, Bennett Haselton benn...@peacefire.org wrote: On Tue, Dec 27, 2011 at 8:33 PM, Gilbert Sebenste seben...@weather.admin.niu.edu wrote: On Tue, 27 Dec 2011, Bennett Haselton wrote: Suppose I have a CentOS 5.7 machine running the default Apache with no

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-27 Thread Bennett Haselton
On Tue, Dec 27, 2011 at 10:17 PM, Rilindo Foster rili...@me.com wrote: On Dec 27, 2011, at 11:29 PM, Bennett Haselton benn...@peacefire.org wrote: On Tue, Dec 27, 2011 at 8:33 PM, Gilbert Sebenste seben...@weather.admin.niu.edu wrote: On Tue, 27 Dec 2011, Bennett Haselton wrote:

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-27 Thread Bennett Haselton
On Tue, Dec 27, 2011 at 10:08 PM, Ken godee k...@perfect-image.com wrote: password? That's what I'm talking about -- how often does this sort of thing happen, where you need to be subscribed to be a security mailing list in order to know what workaround to make to stay safe, as opposed to