Re: Hi :

2001-10-19 Thread vdongen
I do have snort installed and it gives me nicely daily status logs containing absolutly nothing :( There might be more programs mailing root(or alias for root) with nothingCRON maybe... Gr, Ivo Without the darkness,

Re: Hi :

2001-10-19 Thread Raghavendra Bhat
[Fri, Oct 19, 2001 at 08:42:34AM +0200] vdongen : I do have snort installed and it gives me nicely daily status logs containing absolutely nothing Have you configured snort ? Iff not, this can be done via the debconf front-end or via 'hand'. -- ragOO, VU2RGU

central administration techniques

2001-10-19 Thread Juha Jäykkä
I was wondering if there are any secure methods of centrally managing the versions of certain files on Debian machines. I currently have a woody, two sids and several potatos which need to be kept up to date. The security patches are not much of a concern since they are quite infrequent (except

Re: central administration techniques

2001-10-19 Thread Tomasz Papszun
On Fri, 19 Oct 2001 at 17:54:28 +0300, Juha Jykk wrote: [...] case, which is the safest option? Currently I am considering configuring sudo to enable the admin user to execute a single script (mods 0700) without a password or just chmod that script 4700. I am not

Re: central administration techniques

2001-10-19 Thread Juha Jäykkä
3. Break into one of the other machines, use the suided script to ^ I can't answer your questions - I know too little. Just one remark: AFAIK, Linux doesn't support suided shell scripts. At least it didn't do that a few years

Re: central administration techniques

2001-10-19 Thread Alson van der Meulen
On Fri, Oct 19, 2001 at 06:33:43PM +0300, Juha J?ykk? wrote: 3. Break into one of the other machines, use the suided script to ^ I can't answer your questions - I know too little. Just one remark: AFAIK, Linux doesn't support

Re: central administration techniques

2001-10-19 Thread Alson van der Meulen
On Fri, Oct 19, 2001 at 05:54:28PM +0300, Juha J?ykk? wrote: I was wondering if there are any secure methods of centrally managing the versions of certain files on Debian machines. I currently have a woody, two sids and several potatos which need to be kept up to date. The security patches

BugTraq Kernel 2.2.19

2001-10-19 Thread Niall Walsh
Hi, I just discovered http://www.securityfocus.com/cgi-bin/archive.pl?id=1mid=221337start=2001-10-15end=2001-10-21 thanks to /. (so I'm sure more of you are aware of it). I was just wondering if anyone can let me know how we discover when we are likely to see an update for the kernel on

Virtual Congress in UniNet; Congreso Virtual en UniNet

2001-10-19 Thread viZard
First announcement of II INTERNACIONAL UNIX MEETING IN UNINET (UMEET 2001) December 1st -- December 15th, 2001 (Excuse us if you recive this letter more than once) UniNet, is a University Network, a non profit organization,

Re: central administration techniques

2001-10-19 Thread Juha Jäykkä
changes via cvs to a nfs mount, all the client machines download changes via a cron job. Whoooa... nfs? Security++... I could consider using some secure networked file system, though but I doubt cron would be a good idea. Or maybe it is. Anyone any concerns? Another thing that crossed my

Re: central administration techniques

2001-10-19 Thread nrvale0
maybe have a look at cfengine? or apt-cache search / freshmeat / google for other options I was down this road just a few months ago. cfengine is nice except that the author doesn't believe that 'administrative information' is something that should be protected and thus has no plans to move

Re: BugTraq Kernel 2.2.19

2001-10-19 Thread Michael C. Alonzo
On Fri, Oct 19, 2001 at 05:13:19PM +0100, Niall Walsh wrote: Hi, I just discovered http://www.securityfocus.com/cgi-bin/archive.pl?id=1mid=221337start=2001-10-15end=2001-10-21 thanks to /. (so I'm sure more of you are aware of it). I was just wondering if anyone can let me know how

Re: BugTraq Kernel 2.2.19

2001-10-19 Thread Kenneth Pronovici
i think Linus has already approved the patch. im not sure yet when will it arrive though.. Yes, the email linked to by that /. posting : http://www.securityfocus.com/cgi-bin/archive.pl?id=1mid=221337start=2001-10-15end=2001-10-21 has attached to it the Linus-blessed 2.2.19 patch. KEN

Re: BugTraq Kernel 2.2.19

2001-10-19 Thread Rob VanFleet
On Fri, Oct 19, 2001 at 12:24:45PM -0500, Kenneth Pronovici wrote: i think Linus has already approved the patch. im not sure yet when will it arrive though.. Yes, the email linked to by that /. posting :

Re: BugTraq Kernel 2.2.19

2001-10-19 Thread Kenneth Pronovici
Has anyone else noticed that the included exploit does not affect 2.2.19? I tested it on one of my boxes and got the expected 'Operation not permitted'. Maybe I'm misunderstanding the problem, but I thought taht 2.2.19 took care of (well hindered) the ptrace problems. I can't make the

Re: BugTraq Kernel 2.2.19

2001-10-19 Thread j. rivera
Hello, I run Woody with 2.2.19 compiled from source, and the ptrace exploited worked even with an older version of Openwall applied (scary...), but I snagged fresh kernel source and the new Openwall patch, and it fails with the message you receive ("execl: Operation not permitted."). Regards,

Re: central administration techniques

2001-10-19 Thread Petro
On Fri, Oct 19, 2001 at 09:41:22AM -0700, nrvale0 wrote: maybe have a look at cfengine? or apt-cache search / freshmeat / google for other options I was down this road just a few months ago. cfengine is nice except that the author doesn't believe that 'administrative information' is

Re: central administration techniques

2001-10-19 Thread Vineet Kumar
* Juha J?ykk? ([EMAIL PROTECTED]) [011019 07:57]: I was wondering if there are any secure methods of centrally managing the versions of certain files on Debian machines. I currently have a woody, two sids and several potatos which need to be kept up to date. The security patches are not

ssh vulernability

2001-10-19 Thread ahall
Hello, Has debian released a new ssh dpkg yet? Thanks. Andrew -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Re: ssh vulernability

2001-10-19 Thread Ethan Benson
On Fri, Oct 19, 2001 at 06:06:34PM -0400, [EMAIL PROTECTED] wrote: Hello, Has debian released a new ssh dpkg yet? no -- Ethan Benson http://www.alaska.net/~erbenson/ PGP signature

Re: ssh vulernability

2001-10-19 Thread Garrett Ellis
I run Debian; and I applied the OpenSSH patch myself as soon as it was posted. Does anybody know of the advantages of waiting for a new .deb file to get circulated are? The patch was a change to two lines of code; so I just made the changes and rebuilt OpenSSH. That's how I do all of my

2.4.12 ???

2001-10-19 Thread martin f krafft
is stock (non Debian) 2.4.12 now secure or not? i am getting confused. if it isn't, where can i find patches for it to make it secure? sorry to be asking so blatantly, but i don't have much time to worry about my private systems these days. please help. -- martin; (greetings from

Re: 2.4.12 ???

2001-10-19 Thread Cheng H. Lee
As far as I can tell, yes, the 2.4.12 kernel from kernel.org is secure (at least w/ regard to the bugs listed at http://www.securityfocus.com/cgi-bin/archive.pl?id=1mid=221337start=2001-10-15end=2001-10-21 I've just built the kernel and ran the exploits provided in the securityfocus article; so

Re: Hi :

2001-10-19 Thread vdongen
I do have snort installed and it gives me nicely daily status logs containing absolutly nothing :( There might be more programs mailing root(or alias for root) with nothingCRON maybe... Gr, Ivo Without the darkness,

Re: Hi :

2001-10-19 Thread Raghavendra Bhat
[Fri, Oct 19, 2001 at 08:42:34AM +0200] vdongen : I do have snort installed and it gives me nicely daily status logs containing absolutely nothing Have you configured snort ? Iff not, this can be done via the debconf front-end or via 'hand'. -- ragOO, VU2RGU

central administration techniques

2001-10-19 Thread Juha Jäykkä
I was wondering if there are any secure methods of centrally managing the versions of certain files on Debian machines. I currently have a woody, two sids and several potatos which need to be kept up to date. The security patches are not much of a concern since they are quite infrequent (except

Re: central administration techniques

2001-10-19 Thread Tomasz Papszun
On Fri, 19 Oct 2001 at 17:54:28 +0300, Juha Jäykkä wrote: [...] case, which is the safest option? Currently I am considering configuring sudo to enable the admin user to execute a single script (mods 0700) without a password or just chmod that script 4700. I am not

Re: central administration techniques

2001-10-19 Thread Juha Jäykkä
3. Break into one of the other machines, use the suided script to ^ I can't answer your questions - I know too little. Just one remark: AFAIK, Linux doesn't support suided shell scripts. At least it didn't do that a few years ago

Re: central administration techniques

2001-10-19 Thread Alson van der Meulen
On Fri, Oct 19, 2001 at 06:33:43PM +0300, Juha J?ykk? wrote: 3. Break into one of the other machines, use the suided script to ^ I can't answer your questions - I know too little. Just one remark: AFAIK, Linux doesn't support

Re: central administration techniques

2001-10-19 Thread Alson van der Meulen
On Fri, Oct 19, 2001 at 05:54:28PM +0300, Juha J?ykk? wrote: I was wondering if there are any secure methods of centrally managing the versions of certain files on Debian machines. I currently have a woody, two sids and several potatos which need to be kept up to date. The security patches

BugTraq Kernel 2.2.19

2001-10-19 Thread Niall Walsh
Hi, I just discovered http://www.securityfocus.com/cgi-bin/archive.pl?id=1mid=221337start=2001-10-15end=2001-10-21 thanks to /. (so I'm sure more of you are aware of it). I was just wondering if anyone can let me know how we discover when we are likely to see an update for the kernel on

Virtual Congress in UniNet; Congreso Virtual en UniNet

2001-10-19 Thread viZard
First announcement of II INTERNACIONAL UNIX MEETING IN UNINET (UMEET 2001) December 1st -- December 15th, 2001 (Excuse us if you recive this letter more than once) UniNet, is a University Network, a non profit organization,

Re: central administration techniques

2001-10-19 Thread Juha Jäykkä
changes via cvs to a nfs mount, all the client machines download changes via a cron job. Whoooa... nfs? Security++... I could consider using some secure networked file system, though but I doubt cron would be a good idea. Or maybe it is. Anyone any concerns? Another thing that crossed my

Re: central administration techniques

2001-10-19 Thread nrvale0
maybe have a look at cfengine? or apt-cache search / freshmeat / google for other options I was down this road just a few months ago. cfengine is nice except that the author doesn't believe that 'administrative information' is something that should be protected and thus has no plans to move

Re: BugTraq Kernel 2.2.19

2001-10-19 Thread Michael C. Alonzo
On Fri, Oct 19, 2001 at 05:13:19PM +0100, Niall Walsh wrote: Hi, I just discovered http://www.securityfocus.com/cgi-bin/archive.pl?id=1mid=221337start=2001-10-15end=2001-10-21 thanks to /. (so I'm sure more of you are aware of it). I was just wondering if anyone can let me know how

Re: BugTraq Kernel 2.2.19

2001-10-19 Thread Kenneth Pronovici
i think Linus has already approved the patch. im not sure yet when will it arrive though.. Yes, the email linked to by that /. posting : http://www.securityfocus.com/cgi-bin/archive.pl?id=1mid=221337start=2001-10-15end=2001-10-21 has attached to it the Linus-blessed 2.2.19 patch. KEN --

Re: BugTraq Kernel 2.2.19

2001-10-19 Thread Rob VanFleet
On Fri, Oct 19, 2001 at 12:24:45PM -0500, Kenneth Pronovici wrote: i think Linus has already approved the patch. im not sure yet when will it arrive though.. Yes, the email linked to by that /. posting :

Re: BugTraq Kernel 2.2.19

2001-10-19 Thread Kenneth Pronovici
Has anyone else noticed that the included exploit does not affect 2.2.19? I tested it on one of my boxes and got the expected 'Operation not permitted'. Maybe I'm misunderstanding the problem, but I thought taht 2.2.19 took care of (well hindered) the ptrace problems. I can't make the

Re: BugTraq Kernel 2.2.19

2001-10-19 Thread j. rivera
Hello, I run Woody with 2.2.19 compiled from source, and the ptrace exploited worked even with an older version of Openwall applied (scary...), but I snagged fresh kernel source and the new Openwall patch, and it fails with the message you receive ("execl: Operation not permitted."). Regards,

Re: central administration techniques

2001-10-19 Thread Petro
On Fri, Oct 19, 2001 at 09:41:22AM -0700, nrvale0 wrote: maybe have a look at cfengine? or apt-cache search / freshmeat / google for other options I was down this road just a few months ago. cfengine is nice except that the author doesn't believe that 'administrative information' is

Re: central administration techniques

2001-10-19 Thread Vineet Kumar
* Juha J?ykk? ([EMAIL PROTECTED]) [011019 07:57]: I was wondering if there are any secure methods of centrally managing the versions of certain files on Debian machines. I currently have a woody, two sids and several potatos which need to be kept up to date. The security patches are not much

ssh vulernability

2001-10-19 Thread ahall
Hello, Has debian released a new ssh dpkg yet? Thanks. Andrew

Re: ssh vulernability

2001-10-19 Thread Ethan Benson
On Fri, Oct 19, 2001 at 06:06:34PM -0400, [EMAIL PROTECTED] wrote: Hello, Has debian released a new ssh dpkg yet? no -- Ethan Benson http://www.alaska.net/~erbenson/ pgpKxRSjHMTTx.pgp Description: PGP signature

Re: ssh vulernability

2001-10-19 Thread Garrett Ellis
I run Debian; and I applied the OpenSSH patch myself as soon as it was posted. Does anybody know of the advantages of waiting for a new .deb file to get circulated are? The patch was a change to two lines of code; so I just made the changes and rebuilt OpenSSH. That's how I do all of my non-kernel

2.4.12 ???

2001-10-19 Thread martin f krafft
is stock (non Debian) 2.4.12 now secure or not? i am getting confused. if it isn't, where can i find patches for it to make it secure? sorry to be asking so blatantly, but i don't have much time to worry about my private systems these days. please help. -- martin; (greetings from

Re: 2.4.12 ???

2001-10-19 Thread Cheng H. Lee
As far as I can tell, yes, the 2.4.12 kernel from kernel.org is secure (at least w/ regard to the bugs listed at http://www.securityfocus.com/cgi-bin/archive.pl?id=1mid=221337start=2001-10-15end=2001-10-21 I've just built the kernel and ran the exploits provided in the securityfocus article; so