[no subject]

2001-11-12 Thread Benoît MARTINET
Hi, I've just compiled installed openssh-3.0p1 on my Debian 2.2 but failed to login using root and users' passwords. Password authentication failed all the time and it prompted Permission Denied on the command line. A message, Failed password for [user] from .. was logged in

Re: Vulnerable SSH versions

2001-11-12 Thread Ethan Benson
On Mon, Nov 12, 2001 at 11:30:49AM +0100, Michal Kara wrote: Hi there! During this weekend, there has been paper posted to bugtraq named Analysis of SSH crc32 compensation attack detector exploit. It talks about a recorded successful exploit using overflow in CRC32 compensation attack

OpenSSH 3, DEBIAN 2.2 and PAM authentication

2001-11-12 Thread Benoît MARTINET
(Sorry, I've already post this message, but without subject...) Hi, I've just compiled installed openssh-3.0p1 on my Debian 2.2 but failed to login using root and users' passwords. Password authentication failed all the time and it prompted Permission Denied on the command line. A

Re: OpenSSH 3, DEBIAN 2.2 and PAM authentication

2001-11-12 Thread Jose Celestino
Have you configured it with: --with-md5-passwords ? Thus spake Benoît MARTINET, on Mon, Nov 12, 2001 at 12:00:12PM +0100: (Sorry, I've already post this message, but without subject...) Hi, I've just compiled installed openssh-3.0p1 on my Debian 2.2 but failed to login using root

RE: OpenSSH 3, DEBIAN 2.2 and PAM authentication

2001-11-12 Thread Magus Ba'al
This sounds like something I had to help a friend out with this recently. Took me ~15sec to tell him his problem. Configure openssh3 like so: ./configure --with-pam If it whines about the pam headers, pop into dselect and grab 'em, then try it again, compile, install, restart ssh, give a

Re: OpenSSH 3, DEBIAN 2.2 and PAM authentication

2001-11-12 Thread Carsten Nottebohm
I've just compiled installed openssh-3.0p1 on my Debian 2.2 but failed to login using root and users' passwords. Password authentication failed all the time and it prompted Permission Denied on the command line. A message, Failed password for [user] from .. was logged in

Re: OpenSSH 3, DEBIAN 2.2 and PAM authentication

2001-11-12 Thread Benoît MARTINET
I've just compiled installed openssh-3.0p1 on my Debian 2.2 but failed to login using root and users' passwords. Password authentication failed all the time and it prompted Permission Denied [...] Have you configured it with: --with-md5-passwords ? Thanks, that solve the

Re: OpenSSH 3, DEBIAN 2.2 and PAM authentication

2001-11-12 Thread Jose Celestino
Thus spake Benoît MARTINET, on Mon, Nov 12, 2001 at 02:52:15PM +0100: I've just compiled installed openssh-3.0p1 on my Debian 2.2 but failed to login using root and users' passwords. Password authentication failed all the time and it prompted Permission Denied [...] Have you

Re: Vulnerable SSH versions

2001-11-12 Thread Henrique de Moraes Holschuh
On Tue, 13 Nov 2001, Howland, Curtis wrote: The tar file that contains the base Woody install, which is used as the jumping off point for installation. There isn't one, at least not for bootflopies. We use debootstrap to fetch the most up-to-date packages of that distribution and install them,

RE: Vulnerable SSH versions

2001-11-12 Thread Howland, Curtis
I will gladly grant that the tar file may not exist for the boot floppies, and that I do not have on hand the CD to check it. It also may have been a Potato(e) phenominon, no longer in use. However, it did exist. Which makes me wonder, why ship Woody with 2.2.20 at all? Oh well, not my decision.

Re: Vulnerable SSH versions

2001-11-12 Thread Ethan Benson
On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote: I will gladly grant that the tar file may not exist for the boot floppies, and that I do not have on hand the CD to check it. It also may have been a Potato(e) phenominon, no longer in use. However, it did exist. yes releases

Re: Vulnerable SSH versions

2001-11-12 Thread Petro
On Mon, Nov 12, 2001 at 05:54:04PM -0800, Ethan Benson wrote: On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote: I will gladly grant that the tar file may not exist for the boot floppies, and that I do not have on hand the CD to check it. It also may have been a Potato(e)

Re: SPAM was RE: INSURE GOOD RECEPTION! VITAL EMERGENCY STRATEGY!!!

2001-11-12 Thread Oyvind A. Holm
On 2001-11-10 00:17 Vineet Kumar wrote: * Sebastiaan ([EMAIL PROTECTED]) [011109 14:44]: High, On Fri, 9 Nov 2001, Ed Street wrote: Hey, Is there *anything* we can do about all this Spam that's getting on this list? Yes. We can silently ignore them rather than turn each

Re: 'mirror' with iptables

2001-11-12 Thread Yotam Rubin
On Tue, Nov 13, 2001 at 02:06:56AM -0200, phadell wrote: hello there, I would like to do a rule that mirror the packets that incoming from a portscanner. The rule must return the packets to the source. If anyone scan my machine ports, the result will be the list of source address open

[no subject]

2001-11-12 Thread Benoît MARTINET
Hi, I've just compiled installed openssh-3.0p1 on my Debian 2.2 but failed to login using root and users' passwords. Password authentication failed all the time and it prompted Permission Denied on the command line. A message, Failed password for [user] from .. was logged in

Re: your mail

2001-11-12 Thread Emmanuel Lacour
On Mon, Nov 12, 2001 at 10:46:13AM +0100, Beno?t MARTINET wrote: Hi, I've just compiled installed openssh-3.0p1 on my Debian 2.2 but failed to login using root and users' passwords. Password authentication failed all the time and it prompted Permission Denied on the command line.

Vulnerable SSH versions

2001-11-12 Thread Michal Kara
Hi there! During this weekend, there has been paper posted to bugtraq named Analysis of SSH crc32 compensation attack detector exploit. It talks about a recorded successful exploit using overflow in CRC32 compensation attack detection code, a hole, which was discovered in February this year.

Re: Vulnerable SSH versions

2001-11-12 Thread Ethan Benson
On Mon, Nov 12, 2001 at 11:30:49AM +0100, Michal Kara wrote: Hi there! During this weekend, there has been paper posted to bugtraq named Analysis of SSH crc32 compensation attack detector exploit. It talks about a recorded successful exploit using overflow in CRC32 compensation attack

Re: Vulnerable SSH versions

2001-11-12 Thread Jö Fahlke
Am Mon, 12. Nov 2001, 11:30:49 +0100 schrieb Michal Kara: Hi there! During this weekend, there has been paper posted to bugtraq named Analysis of SSH crc32 compensation attack detector exploit. It talks about a recorded successful exploit using overflow in CRC32 compensation attack

OpenSSH 3, DEBIAN 2.2 and PAM authentication

2001-11-12 Thread Benoît MARTINET
(Sorry, I've already post this message, but without subject...) Hi, I've just compiled installed openssh-3.0p1 on my Debian 2.2 but failed to login using root and users' passwords. Password authentication failed all the time and it prompted Permission Denied on the command line. A

Re: Vulnerable SSH versions

2001-11-12 Thread Ville Uski
* Michal Kara [EMAIL PROTECTED] [02 11:35]: Hi there! Hi During this weekend, there has been paper posted to bugtraq named Analysis of SSH crc32 compensation attack detector exploit. It talks about a recorded successful exploit using overflow in CRC32 compensation attack

Re: OpenSSH 3, DEBIAN 2.2 and PAM authentication

2001-11-12 Thread Jose Celestino
Have you configured it with: --with-md5-passwords ? Thus spake Benoît MARTINET, on Mon, Nov 12, 2001 at 12:00:12PM +0100: (Sorry, I've already post this message, but without subject...) Hi, I've just compiled installed openssh-3.0p1 on my Debian 2.2 but failed to login using root

RE: OpenSSH 3, DEBIAN 2.2 and PAM authentication

2001-11-12 Thread Magus Ba'al
This sounds like something I had to help a friend out with this recently. Took me ~15sec to tell him his problem. Configure openssh3 like so: ./configure --with-pam If it whines about the pam headers, pop into dselect and grab 'em, then try it again, compile, install, restart ssh, give a

Re: OpenSSH 3, DEBIAN 2.2 and PAM authentication

2001-11-12 Thread Carsten Nottebohm
I've just compiled installed openssh-3.0p1 on my Debian 2.2 but failed to login using root and users' passwords. Password authentication failed all the time and it prompted Permission Denied on the command line. A message, Failed password for [user] from .. was logged in

Re: OpenSSH 3, DEBIAN 2.2 and PAM authentication

2001-11-12 Thread Mark Janssen
On Mon, Nov 12, 2001 at 02:21:11PM +0100, Carsten Nottebohm wrote: Looks fine to me. I think OpenSSH uses /etc/pam.d/sshd (Note the d in the end). Try renaming your pam config file. To be exact, SSH uses whatever the binary is named. So if you name it opensshd it'll use /etc/pam.d/opensshd.

Re: OpenSSH 3, DEBIAN 2.2 and PAM authentication

2001-11-12 Thread Benoît MARTINET
I've just compiled installed openssh-3.0p1 on my Debian 2.2 but failed to login using root and users' passwords. Password authentication failed all the time and it prompted Permission Denied [...] Have you configured it with: --with-md5-passwords ? Thanks, that solve the

Re: OpenSSH 3, DEBIAN 2.2 and PAM authentication

2001-11-12 Thread Jose Celestino
Thus spake Benoît MARTINET, on Mon, Nov 12, 2001 at 02:52:15PM +0100: I've just compiled installed openssh-3.0p1 on my Debian 2.2 but failed to login using root and users' passwords. Password authentication failed all the time and it prompted Permission Denied [...] Have you

RE: Vulnerable SSH versions

2001-11-12 Thread Howland, Curtis
A quick question concerning such things... I have a remote server that I do not trust myself to upgrade from Potato(e) to Woody, and such vulnerabilities do worry me a little. Is there any general expectation that such back porting will continue once Woody is released? Curt- -Original

Re: Vulnerable SSH versions

2001-11-12 Thread Wichert Akkerman
Previously Howland, Curtis wrote: I have a remote server that I do not trust myself to upgrade from Potato(e) to Woody, and such vulnerabilities do worry me a little. Is there any general expectation that such back porting will continue once Woody is released? I expect only for a limited

Re: Vulnerable SSH versions

2001-11-12 Thread Ethan Benson
On Tue, Nov 13, 2001 at 09:02:56AM +0900, Howland, Curtis wrote: A quick question concerning such things... I have a remote server that I do not trust myself to upgrade from Potato(e) to Woody, and such vulnerabilities do worry me a little. Is there any general expectation that such back

RE: Vulnerable SSH versions

2001-11-12 Thread Howland, Curtis
Thanks. I've been keeping it up to date weekly or so, but just to be sure I changed the sources.list to be ... potato/... instead of ... stable/... for when stable changes. Even a blank-disk install of Woody wasn't straight forward. The kernel in the distribution tar file was 2.2.xx, changing to

Re: Vulnerable SSH versions

2001-11-12 Thread Ethan Benson
On Tue, Nov 13, 2001 at 09:25:29AM +0900, Howland, Curtis wrote: Thanks. I've been keeping it up to date weekly or so, but just to be sure I changed the sources.list to be ... potato/... instead of ... stable/... for when stable changes. Even a blank-disk install of Woody wasn't straight

RE: Vulnerable SSH versions

2001-11-12 Thread Howland, Curtis
The tar file that contains the base Woody install, which is used as the jumping off point for installation. The tar file has binary kernel, /boot, /proc and other directories, I'm not sure exactly what the limit to its contents is. I found this out by building a CD via the assemble the CD image

Re: Vulnerable SSH versions

2001-11-12 Thread Henrique de Moraes Holschuh
On Tue, 13 Nov 2001, Howland, Curtis wrote: The tar file that contains the base Woody install, which is used as the jumping off point for installation. There isn't one, at least not for bootflopies. We use debootstrap to fetch the most up-to-date packages of that distribution and install them,

Re: Vulnerable SSH versions

2001-11-12 Thread Ethan Benson
On Tue, Nov 13, 2001 at 09:41:54AM +0900, Howland, Curtis wrote: The tar file that contains the base Woody install, which is used as the jumping off point for installation. there is no such thing. The tar file has binary kernel, /boot, /proc and other directories, I'm not sure exactly what

RE: Vulnerable SSH versions

2001-11-12 Thread Howland, Curtis
I will gladly grant that the tar file may not exist for the boot floppies, and that I do not have on hand the CD to check it. It also may have been a Potato(e) phenominon, no longer in use. However, it did exist. Which makes me wonder, why ship Woody with 2.2.20 at all? Oh well, not my decision.

Re: Vulnerable SSH versions

2001-11-12 Thread Ethan Benson
On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote: I will gladly grant that the tar file may not exist for the boot floppies, and that I do not have on hand the CD to check it. It also may have been a Potato(e) phenominon, no longer in use. However, it did exist. yes releases

Re: Vulnerable SSH versions

2001-11-12 Thread Petro
On Mon, Nov 12, 2001 at 05:54:04PM -0800, Ethan Benson wrote: On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote: I will gladly grant that the tar file may not exist for the boot floppies, and that I do not have on hand the CD to check it. It also may have been a Potato(e)

Re: SPAM was RE: INSURE GOOD RECEPTION! VITAL EMERGENCY STRATEGY!!!

2001-11-12 Thread Oyvind A. Holm
On 2001-11-10 00:17 Vineet Kumar wrote: * Sebastiaan ([EMAIL PROTECTED]) [011109 14:44]: High, On Fri, 9 Nov 2001, Ed Street wrote: Hey, Is there *anything* we can do about all this Spam that's getting on this list? Yes. We can silently ignore them rather than turn each

RE: SPAM was RE: INSURE GOOD RECEPTION! VITAL EMERGENCY STRATEGY!!!

2001-11-12 Thread Howland, Curtis
While the traffic load on debian-user, for instance, makes subscribing just to ask one question somewhat hazardous to ones mailspool, I agree with making debian-security posting by subscriber only. It really isn't moderating, and doesn't take anyones time. To whom should we address the

'mirror' with iptables

2001-11-12 Thread phadell
hello there, I would like to do a rule that mirror the packets that incoming from a portscanner. The rule must return the packets to the source. If anyone scan my machine ports, the result will be the list of source address open ports. Anyone could help me with this rule? phadell ps.:

Re: Vulnerable SSH versions

2001-11-12 Thread Oyvind A. Holm
On 2001-11-12 16:54 Ethan Benson wrote: On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote: CH Which makes me wonder, why ship Woody with 2.2.20 at all? Oh well, not CH my decision. EB because 2.4 is not stable yet. *applause* I was hoping for that. Great decision. In fact the

Re: 'mirror' with iptables

2001-11-12 Thread Yotam Rubin
On Tue, Nov 13, 2001 at 02:06:56AM -0200, phadell wrote: hello there, I would like to do a rule that mirror the packets that incoming from a portscanner. The rule must return the packets to the source. If anyone scan my machine ports, the result will be the list of source address open