RE: proftpd exploit??

2001-05-28 Thread Bojan Zdrnja
-Original Message- From: Marcelo Drudi Miranda [mailto:[EMAIL PROTECTED]] Sent: 26. svibanj 2001 4:49 To: [EMAIL PROTECTED] Subject: Re: proftpd exploit?? Em Thu, 24 May 2001 20:34:56 +0200 Matthias Richter [EMAIL PROTECTED] escreveu: Andres Herrera wrote on Thu May 24, 2001

Re: X tcp listening

2001-05-28 Thread Tomasz Olszewski
Hello Debian Users! On niedziela, 27 maj 2001, 13:06:33 -0500 Dana J . Laude wrote: The easy way to do it is instead of using "startx" use "startx -- -nolisten tcp". Yes, I know this :) The problem is that I need that option to be set by default, independently from the method an user chooses

Re: X tcp listening

2001-05-28 Thread Tomasz Olszewski
Hello Debian Users! On niedziela, 27 maj 2001, 17:00:37 + Jim Breton wrote: Yep... actually this _is_ the correct way to deal with this. But I want to make the "-nolisten tcp" option always active. If an user creates his own $HOME/.xserverrc, it overrides the system wide xserverrc.

Re: X tcp listening

2001-05-28 Thread Ben Pfaff
Jim Breton [EMAIL PROTECTED] writes: On Mon, May 28, 2001 at 01:46:07PM +0200, Tomasz Olszewski wrote: If an user creates his own $HOME/.xserverrc, it overrides the system wide xserverrc. So make /usr/bin/X11/X a wrapper for the real X. Problem with this is, if you upgrade or

hi, any help ? about an evil mysterious crazy Open tcp port ?

2001-05-28 Thread killah
how, can i see the tcp port 4350 that states to be opened useing nmap what is his proccess and which file is it's owned ? doing ps with many different parameters doesn't saw me any unusual. maybe guys you can help me. Also after connecting with netcat to that port, seems closed and when i am

Re: hi, any help ? about an evil mysterious crazy Open tcp port ?

2001-05-28 Thread Ken Seefried
killah writes: how, can i see the tcp port 4350 that states to be opened useing nmap what is his proccess and which file is it's owned ? You can use the lsof command to see what processes is bound to a given port. As I recall, it would be lsof -i TCP:4350 and lsof -i UDP:4350, but don't

Re: hi, any help ? about an evil mysterious crazy Open tcp port ?

2001-05-28 Thread Robert Mognet
Hello, On Tue, May 29, 2001 at 03:05:52AM +0300, killah wrote: how, can i see the tcp port 4350 that states to be opened useing nmap As root, you can do: fuser -v -n tcp 4350 and: lsof -i tcp:4350 The lsof command, if it finds anything, will return a PID as part of it's

RE: wdm security

2001-05-28 Thread Juha Jäykkä
startx -- -nolisten tcp Obviously this would do the trick, but see below as to why it is not a good option. only as part of the perennially-discussed task-harden. Doesn't even effect remote xsessions, as you should be using ssh to tunnel your sessions anyway. There is no way of ssh

RE: proftpd exploit??

2001-05-28 Thread Bojan Zdrnja
-Original Message- From: Marcelo Drudi Miranda [mailto:[EMAIL PROTECTED] Sent: 26. svibanj 2001 4:49 To: debian-security@lists.debian.org Subject: Re: proftpd exploit?? Em Thu, 24 May 2001 20:34:56 +0200 Matthias Richter [EMAIL PROTECTED] escreveu: Andres Herrera wrote on Thu

Re: X tcp listening

2001-05-28 Thread Tomasz Olszewski
Hello Debian Users! On niedziela, 27 maj 2001, 13:06:33 -0500 Dana J . Laude wrote: The easy way to do it is instead of using startx use startx -- -nolisten tcp. Yes, I know this :) The problem is that I need that option to be set by default, independently from the method an user chooses to

Re: X tcp listening

2001-05-28 Thread Tomasz Olszewski
Hello Debian Users! On niedziela, 27 maj 2001, 17:00:37 + Jim Breton wrote: Yep... actually this _is_ the correct way to deal with this. But I want to make the -nolisten tcp option always active. If an user creates his own $HOME/.xserverrc, it overrides the system wide xserverrc. Besides,

Re: X tcp listening

2001-05-28 Thread Jim Breton
On Mon, May 28, 2001 at 01:46:07PM +0200, Tomasz Olszewski wrote: If an user creates his own $HOME/.xserverrc, it overrides the system wide xserverrc. So make /usr/bin/X11/X a wrapper for the real X. Problem with this is, if you upgrade or re-install the package containing it, it will get

Re: X tcp listening

2001-05-28 Thread Ben Pfaff
Jim Breton [EMAIL PROTECTED] writes: On Mon, May 28, 2001 at 01:46:07PM +0200, Tomasz Olszewski wrote: If an user creates his own $HOME/.xserverrc, it overrides the system wide xserverrc. So make /usr/bin/X11/X a wrapper for the real X. Problem with this is, if you upgrade or

hi, any help ? about an evil mysterious crazy Open tcp port ?

2001-05-28 Thread killah
how, can i see the tcp port 4350 that states to be opened useing nmap what is his proccess and which file is it's owned ? doing ps with many different parameters doesn't saw me any unusual. maybe guys you can help me. Also after connecting with netcat to that port, seems closed and when i am

Re: hi, any help ? about an evil mysterious crazy Open tcp port ?

2001-05-28 Thread Ken Seefried
killah writes: how, can i see the tcp port 4350 that states to be opened useing nmap what is his proccess and which file is it's owned ? You can use the lsof command to see what processes is bound to a given port. As I recall, it would be lsof -i TCP:4350 and lsof -i UDP:4350, but don't

Re: hi, any help ? about an evil mysterious crazy Open tcp port ?

2001-05-28 Thread Robert Mognet
Hello, On Tue, May 29, 2001 at 03:05:52AM +0300, killah wrote: how, can i see the tcp port 4350 that states to be opened useing nmap As root, you can do: fuser -v -n tcp 4350 and: lsof -i tcp:4350 The lsof command, if it finds anything, will return a PID as part of it's

losetup -e

2001-05-28 Thread S. Kraig
Hi, I have been playing around with loop back file systems recently (mostly playing with Linux-care's bootable buisness card mini CD-ROM linux system...which uses a compressed ext2 file system image) and realized that the -e (encryption) option provides a perfect mechanism for a different

Re: losetup -e

2001-05-28 Thread Jim Breton
On Mon, May 28, 2001 at 11:09:29PM -0400, S. Kraig wrote: the 'international kernel' and after enabling that form of encryption... so where do I start in doing this? http://www.kerneli.org/