/var/log/wtmp

2003-03-07 Thread Albert Cervera Areny
I received a mail with this subject from localhost, and with what I suppose it is the diff between wtmp and its previous version. What I'd like to know is how I can rebuild the file to see what's been the change and the logins deleted? Also.. what is the daemon that sends this messages?

/var/log/wtmp

2003-03-07 Thread Albert Cervera Areny
I received a mail with this subject from localhost, and with what I suppose it is the diff between wtmp and its previous version. What I'd like to know is how I can rebuild the file to see what's been the change and the logins deleted? Also.. what is the daemon that sends this messages?

Re: Stack-smashing protection

2002-12-07 Thread Albert Cervera Areny
A Saturday 07 December 2002 2:37, David B Harris va escriure: On Sat, 7 Dec 2002 01:09:59 +0100 Albert Cervera Areny [EMAIL PROTECTED] wrote: So it isn't really that the hole system runs 8% slower. Sorry for my first explanation... Now I think it is an overhead which is afordable seeing

Re: Stack-smashing protection

2002-12-07 Thread Albert Cervera Areny
A Saturday 07 December 2002 2:37, David B Harris va escriure: On Sat, 7 Dec 2002 01:09:59 +0100 Albert Cervera Areny [EMAIL PROTECTED] wrote: So it isn't really that the hole system runs 8% slower. Sorry for my first explanation... Now I think it is an overhead which is afordable seeing

Stack-smashing protection

2002-12-06 Thread Albert Cervera Areny
I've read in slashdot (http://bsd.slashdot.org/article.pl?sid=02/12/02/2035207) that openbsd has included stack-smashing protection using the ProPolice (http://www.trl.ibm.com/projects/security/ssp/) patch for GCC 3.2 I think it would be a great idea to use this patch with debian too as soon

Re: Stack-smashing protection

2002-12-06 Thread Albert Cervera Areny
protection from a quantifiable risk. I dont want to see the kernel go the way of MS's kernel ,one huge bloated mess. Lets see some papers/justification for this item, it may not be needed in all situations. regards Thing On Sat, 07 Dec 2002 09:29, Albert Cervera Areny wrote: I've read

Stack-smashing protection

2002-12-06 Thread Albert Cervera Areny
I've read in slashdot (http://bsd.slashdot.org/article.pl?sid=02/12/02/2035207) that openbsd has included stack-smashing protection using the ProPolice (http://www.trl.ibm.com/projects/security/ssp/) patch for GCC 3.2 I think it would be a great idea to use this patch with debian too as soon

Re: Stack-smashing protection

2002-12-06 Thread Albert Cervera Areny
protection from a quantifiable risk. I dont want to see the kernel go the way of MS's kernel ,one huge bloated mess. Lets see some papers/justification for this item, it may not be needed in all situations. regards Thing On Sat, 07 Dec 2002 09:29, Albert Cervera Areny wrote: I've read

Fwd: Re: Squirrel Mail 1.2.7 XSS Exploit

2002-10-02 Thread Albert Cervera Areny
Debian testing and unstable use it too.. -- Missatge transmès -- Subject: Re: Squirrel Mail 1.2.7 XSS Exploit Date: Thu, 19 Sep 2002 16:51:09 -0500 (CDT) From: Jason Munro [EMAIL PROTECTED] To: [EMAIL PROTECTED] DarC KonQuesT said: Sorry if you receive two of these.

Fwd: Re: Squirrel Mail 1.2.7 XSS Exploit

2002-10-02 Thread Albert Cervera Areny
Debian testing and unstable use it too.. -- Missatge transmès -- Subject: Re: Squirrel Mail 1.2.7 XSS Exploit Date: Thu, 19 Sep 2002 16:51:09 -0500 (CDT) From: Jason Munro [EMAIL PROTECTED] To: bugtraq@securityfocus.com DarC KonQuesT said: Sorry if you receive two of

Fwd: RAZOR advisory: Linux util-linux chfn local root vulnerability

2002-07-29 Thread Albert Cervera Areny
I suppose this vulnerability affects also debian. I've already changed the setuid bit in chfn and chsh though it is supposed to be difficult to exploit. -- Missatge transmès -- Subject: RAZOR advisory: Linux util-linux chfn local root vulnerability Date: Mon, 29 Jul 2002