Re: Fwd: Exim 3.34 and lower (fwd)

2002-02-14 Thread Dave Kline
Saw it yesterday and sure enough, it crashes my Exim with a segfault. I run Exim on Debian 2.2 with no modifications. -A. Dave xbud wrote: Not sure if this made to this list. I haven't confirmed the following, but thought it was worth forwarding. -xbud -- Forwarded Message

Re: How to modify SSH2 prompt message?

2002-02-11 Thread Dave Kline
Not that I like security-through-obscurity, but if a cracker runs scanssh on me and sees I am running Debian there is that much less to figure out. I can understand the maintainer's point of view, but I would rather audit my network SSH installs manually. So I would be interested in removing

These 'roots' are bugging me.

2002-01-30 Thread Dave Kline
I have a number of Debian 2.2 systems that have some critical daemons running as root. The most concerning offender is BIND8. BIND has been tried and convicted, and by judging its turbulent past, I have no choice but to demote it from its root status. I don't have dynamic interfaces for

These 'roots' are bugging me.

2002-01-30 Thread Dave Kline
I have a number of Debian 2.2 systems that have some critical daemons running as root. The most concerning offender is BIND8. BIND has been tried and convicted, and by judging its turbulent past, I have no choice but to demote it from its root status. I don't have dynamic interfaces for it

Re: Securing bind..

2002-01-28 Thread Dave Kline
BIND should be treated with the utmost caution, as CERT has listed it as the #1 way to break into a computer and Im sure some of us have had k1dd13z on our systems because of it. I know I have seen this discussion before in old USENET posts, but I do think it would be a good idea to maybe

Re: su - user question

2002-01-21 Thread Dave Kline
martin f krafft wrote: also sprach Adam Warner [EMAIL PROTECTED] [2002.01.21.1444 +0100]: Martin, it's a server in my spare room :-) The only person installing a backdoor on the server would be an unlawful intruder. Or a cat who can type ;-) Your points are well taken and I would follow the

Re: su - user question

2002-01-21 Thread Dave Kline
martin f krafft wrote: also sprach Adam Warner [EMAIL PROTECTED] [2002.01.21.1444 +0100]: Martin, it's a server in my spare room :-) The only person installing a backdoor on the server would be an unlawful intruder. Or a cat who can type ;-) Your points are well taken and I would follow the

Re: Mailserver HDD organization

2002-01-17 Thread Dave Kline
Though I have supported Sendmail in Big-Iron environments, I am now using the Default Debian Exim to serve mail. I have been happy with Exim and it has served me reliably. Yet I don't often hear its name used as an alternative to Sendmail. Usually I hear Postfix or Qmail. Though I have

Re: ping6

2002-01-17 Thread Dave Kline
Ping for IPv6. You should see other utilities that end with 6 as well. -A. Dave Répási Tibor wrote: Hy! What is /bin/ping6 ??? Is it normal that /bin/ping and /bin/ping6 has setuid to root? regards, Tibor Repasi -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a

Re: Mailserver HDD organization

2002-01-17 Thread Dave Kline
Though I have supported Sendmail in Big-Iron environments, I am now using the Default Debian Exim to serve mail. I have been happy with Exim and it has served me reliably. Yet I don't often hear its name used as an alternative to Sendmail. Usually I hear Postfix or Qmail. Though I have used

Re: ping6

2002-01-17 Thread Dave Kline
Ping for IPv6. You should see other utilities that end with 6 as well. -A. Dave Répási Tibor wrote: Hy! What is /bin/ping6 ??? Is it normal that /bin/ping and /bin/ping6 has setuid to root? regards, Tibor Repasi

Re: change ssh

2002-01-16 Thread Dave Kline
No Fear: Well, if you are using Debian stable/Potato, add the line: deb http://security.debian.org potato/updates main contrib non-free to your sources.list. Then apt-get update ; apt-get upgrade. If SID/testing, just apt-get update ; apt-get upgrade. If none of the above, merely go nab

Re: change ssh

2002-01-16 Thread Dave Kline
No Fear: Well, if you are using Debian stable/Potato, add the line: deb http://security.debian.org potato/updates main contrib non-free to your sources.list. Then apt-get update ; apt-get upgrade. If SID/testing, just apt-get update ; apt-get upgrade. If none of the above, merely go nab

Re: I've been hacked by DevilSoul

2002-01-14 Thread Dave Kline
OTOH, if somebody obtains root privileges, he can probably plant a kernel in the swapfile and instruct the boot loader to load it on the next reboot. AFAIK, most if not all checksumming tools don't deal properly with such scenarios. Quite a scary scenario. How could one plant a file in