Re: [work] Integrity of Debian packages

2003-03-07 Thread Gary MacDougall
ot;.  My feeling has alway's been that you can't have Freedom without having paid for it in some way. We're paying right now by letting some of the little things of our Freedom go.  It's a small price to know when I wake up everyday, I can still be "free" to do what I

Re: [work] Integrity of Debian packages

2003-03-07 Thread Gary MacDougall
Yes, the American Empire is certainly on the move... and the World is their oyster. Be afraid, be very afraid. Ted Maybe you should talk to the family of the 3300 people in the WTC that died because the FBI, CIA or Special Services didn't have or couldn't intercept the many mail, fax

Re: [work] Integrity of Debian packages

2003-03-07 Thread Gary MacDougall
ot;.  My feeling has alway's been that you can't have Freedom without having paid for it in some way. We're paying right now by letting some of the little things of our Freedom go.  It's a small price to know when I wake up everyday, I can still be "free" to do what I

Re: [work] Integrity of Debian packages

2003-03-07 Thread Gary MacDougall
Yes, the American Empire is certainly on the move... and the World is their oyster. Be afraid, be very afraid. Ted Maybe you should talk to the family of the 3300 people in the WTC that died because the FBI, CIA or Special Services didn't have or couldn't intercept the many mail, fax and

Re: [work] Integrity of Debian packages

2003-03-06 Thread Gary MacDougall
If the FBI has the power, time and energy to install a proxy between my router and my ISP to spoof a package host (i.e. security.debian.org) just to root my servers, then they are clearly a heck of lot more "geeky" than I thought. Hell, why go through that trouble, why not just grab my traffic

Re: [work] Integrity of Debian packages

2003-03-06 Thread Gary MacDougall
If the FBI has the power, time and energy to install a proxy between my router and my ISP to spoof a package host (i.e. security.debian.org) just to root my servers, then they are clearly a heck of lot more "geeky" than I thought. Hell, why go through that trouble, why not just grab my traffic

Re: [personal] securing pop3

2003-02-09 Thread Gary MacDougall
Not sure if you care, but qmail has vpopmail, which is a non-passwd file based authentation method. I've been using qmail now for about 3 years solid, and I have to say its probably the most secure, fast and reliable e-mail server out there. Combine qmail with vpopmail and qmailadmin and you've

Re: [personal] securing pop3

2003-02-09 Thread Gary MacDougall
Not sure if you care, but qmail has vpopmail, which is a non-passwd file based authentation method. I've been using qmail now for about 3 years solid, and I have to say its probably the most secure, fast and reliable e-mail server out there. Combine qmail with vpopmail and qmailadmin and you've

RE: CNAME, iptables and qmail

2002-05-07 Thread Gary MacDougall
Giacomo, How about an example!?! I'm a little surprise as to why you'd point out an exploit and not tell people how to fix it... Thanks, Gary -Original Message- From: Giacomo Mulas [mailto:[EMAIL PROTECTED] Sent: Tuesday, May 07, 2002 3:48 AM To: Michal Melewski Cc: debian-security@list

RE: CNAME, iptables and qmail

2002-05-07 Thread Gary MacDougall
Giacomo, How about an example!?! I'm a little surprise as to why you'd point out an exploit and not tell people how to fix it... Thanks, Gary -Original Message- From: Giacomo Mulas [mailto:[EMAIL PROTECTED]] Sent: Tuesday, May 07, 2002 3:48 AM To: Michal Melewski Cc: [EMAIL PROTECTED]

RE: CNAME, iptables and qmail

2002-05-06 Thread Gary MacDougall
Damn!! I hit send before editing this message. Sorry! Please read this instead of my previous message. ... I'm setting up a Deb (woody) box with qmail and iptables. I've got both installed, both seem be operating fine. Iptables is setup to no allow traffic other than 25, 110 and of course 22 (s

CNAME, iptables and qmail

2002-05-06 Thread Gary MacDougall
I'm setting up a Deb (woody) box with qmail and iptables. I've got both installed, both seem be operating fine. Incidently, other than 25, 110 and of course 22 (ssh). The problem I'm running into is iptables is causing e-mail to be allowed through the server and I get this message in the /var/l

RE: CNAME, iptables and qmail

2002-05-06 Thread Gary MacDougall
Damn!! I hit send before editing this message. Sorry! Please read this instead of my previous message. ... I'm setting up a Deb (woody) box with qmail and iptables. I've got both installed, both seem be operating fine. Iptables is setup to no allow traffic other than 25, 110 and of course 22 (

CNAME, iptables and qmail

2002-05-06 Thread Gary MacDougall
I'm setting up a Deb (woody) box with qmail and iptables. I've got both installed, both seem be operating fine. Incidently, other than 25, 110 and of course 22 (ssh). The problem I'm running into is iptables is causing e-mail to be allowed through the server and I get this message in the /var/

RE: failed ssh breakins on my exposed www box ..

2002-03-25 Thread Gary MacDougall
Thats in your neighborhood dude, Here in Boston, you sneeze and blue lights are flashing... g. -Original Message- From: Christopher Petro [mailto:[EMAIL PROTECTED] Behalf Of Petro Sent: Monday, March 25, 2002 5:30 PM To: Gary MacDougall Cc: Langdon Green; andreas mayer; debian-security

RE: failed ssh breakins on my exposed www box ..

2002-03-25 Thread Gary MacDougall
onday, March 25, 2002 4:43 PM To: andreas mayer; Gary MacDougall; debian-security@lists.debian.org Subject: Re: failed ssh breakins on my exposed www box .. >I think the net is freedom, and that is good... That is the silliest thing I have ever heard. So what you are saying is that any

RE: failed ssh breakins on my exposed www box ..

2002-03-25 Thread Gary MacDougall
Thats in your neighborhood dude, Here in Boston, you sneeze and blue lights are flashing... g. -Original Message- From: Christopher Petro [mailto:[EMAIL PROTECTED]]On Behalf Of Petro Sent: Monday, March 25, 2002 5:30 PM To: Gary MacDougall Cc: Langdon Green; andreas mayer; [EMAIL

RE: failed ssh breakins on my exposed www box ..

2002-03-25 Thread Gary MacDougall
: Monday, March 25, 2002 4:43 PM To: andreas mayer; Gary MacDougall; [EMAIL PROTECTED] Subject: Re: failed ssh breakins on my exposed www box .. >I think the net is freedom, and that is good... That is the silliest thing I have ever heard. So what you are saying is that any kiddy/profes

Re: failed ssh breakins on my exposed www box ..

2002-03-24 Thread Gary MacDougall
> > We seriouslly need a US branch of the law-enforcement to deal > > with this sort of stuff. I think if more people got prosecuted for > > trying to crack into a site, the level of BS would drop to zero. > > Yeah! And what if the attacker is from a other country? > You cannot just bomb 'em for t

Re: failed ssh breakins on my exposed www box ..

2002-03-24 Thread Gary MacDougall
> > We seriouslly need a US branch of the law-enforcement to deal > > with this sort of stuff. I think if more people got prosecuted for > > trying to crack into a site, the level of BS would drop to zero. > > Yeah! And what if the attacker is from a other country? > You cannot just bomb 'em for

Re: failed ssh breakins on my exposed www box ..

2002-03-24 Thread Gary MacDougall
I get these all the time. I've come to expect people to do this. It sucks, but hey, what can you do. I'm fed up trying to report and chase them down. We seriouslly need a US branch of the law-enforcement to deal with this sort of stuff. I think if more people got prosecuted for trying to crack

Re: failed ssh breakins on my exposed www box ..

2002-03-24 Thread Gary MacDougall
I get these all the time. I've come to expect people to do this. It sucks, but hey, what can you do. I'm fed up trying to report and chase them down. We seriouslly need a US branch of the law-enforcement to deal with this sort of stuff. I think if more people got prosecuted for trying to crac

RE: Secure Finger Daemon

2002-01-06 Thread Gary MacDougall
We've "given the finger" to the finger daemon years ago... no need for it. g -Original Message- From: Moritz Schulte [mailto:[EMAIL PROTECTED] Behalf Of Moritz Schulte Sent: Sunday, January 06, 2002 11:20 AM To: Debian-Security List Subject: Re: Secure Finger Daemon eim <[EMAIL PROTECTE

RE: Secure Finger Daemon

2002-01-06 Thread Gary MacDougall
We've "given the finger" to the finger daemon years ago... no need for it. g -Original Message- From: Moritz Schulte [mailto:[EMAIL PROTECTED]]On Behalf Of Moritz Schulte Sent: Sunday, January 06, 2002 11:20 AM To: Debian-Security List Subject: Re: Secure Finger Daemon eim <[EMAIL PROT

RE: [d-security] RE: strange proftpd segfault and conntrack_ftp messages

2002-01-03 Thread Gary MacDougall
, Jan 03, 2002 at 11:44:49AM -0500, Gary MacDougall wrote: > Right, and I think its strange that the parent process felt the need > to kill the child process. It might be justified if the child seg'd > or died, but i thought xinetd handled this with more grace than say > inetd... ju

RE: strange proftpd segfault and conntrack_ftp messages

2002-01-03 Thread Gary MacDougall
mmers [mailto:[EMAIL PROTECTED] Sent: Thursday, January 03, 2002 11:34 AM To: Gary MacDougall Cc: Sven Hoexter; debian-security@lists.debian.org Subject: Re: strange proftpd segfault and conntrack_ftp messages On Thu, Jan 03, 2002 at 11:31:38AM -0500, Gary MacDougall wrote: > I find it interest

RE: strange proftpd segfault and conntrack_ftp messages

2002-01-03 Thread Gary MacDougall
I find it interesting that the seg fault happened, then xinetd reported it failed. I wonder if its not proftp, but xinet... just a thought. g. -Original Message- From: Sven Hoexter [mailto:[EMAIL PROTECTED] Sent: Thursday, January 03, 2002 5:24 AM To: debian-security@lists.debian.org Cc:

RE: [d-security] RE: strange proftpd segfault and conntrack_ftp messages

2002-01-03 Thread Gary MacDougall
at 11:44:49AM -0500, Gary MacDougall wrote: > Right, and I think its strange that the parent process felt the need > to kill the child process. It might be justified if the child seg'd > or died, but i thought xinetd handled this with more grace than say > inetd... just curious,

RE: strange proftpd segfault and conntrack_ftp messages

2002-01-03 Thread Gary MacDougall
mmers [mailto:[EMAIL PROTECTED]] Sent: Thursday, January 03, 2002 11:34 AM To: Gary MacDougall Cc: Sven Hoexter; [EMAIL PROTECTED] Subject: Re: strange proftpd segfault and conntrack_ftp messages On Thu, Jan 03, 2002 at 11:31:38AM -0500, Gary MacDougall wrote: > I find it interesting that the s

RE: strange proftpd segfault and conntrack_ftp messages

2002-01-03 Thread Gary MacDougall
I find it interesting that the seg fault happened, then xinetd reported it failed. I wonder if its not proftp, but xinet... just a thought. g. -Original Message- From: Sven Hoexter [mailto:[EMAIL PROTECTED]] Sent: Thursday, January 03, 2002 5:24 AM To: [EMAIL PROTECTED] Cc: Christian Ha

RE: faq? rpc.statd: gethostbyname error for

2001-12-31 Thread Gary MacDougall
Looks like a buffer overrun attempt on gethostbyname().   First I'd start poking around your logs and see if someone "got root"... Start checking the dates and times of /sbin/ etc. etc.   Then, I'd look at an exploit possibility for gethostbyname(), then double check all of your libs and s

RE: faq? rpc.statd: gethostbyname error for

2001-12-31 Thread Gary MacDougall
Looks like a buffer overrun attempt on gethostbyname().   First I'd start poking around your logs and see if someone "got root"... Start checking the dates and times of /sbin/ etc. etc.   Then, I'd look at an exploit possibility for gethostbyname(), then double check all of your libs and s

RE: Secure 2.4.x kernel

2001-12-27 Thread Gary MacDougall
> Now, I do not know about American law, but at least in Finland the >guy whose gun (assault rifles are illegal anyway unless they are >rendered non-automatic) was stolen, is likely to get punished as well! >It depends on how the gun was stored: it needs to be locked away in a >different location

RE: Secure 2.4.x kernel

2001-12-27 Thread Gary MacDougall
> Now, I do not know about American law, but at least in Finland the >guy whose gun (assault rifles are illegal anyway unless they are >rendered non-automatic) was stolen, is likely to get punished as well! >It depends on how the gun was stored: it needs to be locked away in a >different locatio

Re: Unidentified subject!

2001-12-25 Thread Gary MacDougall
Although you raise a very good point. I have a severe problem with this notion of a "whitehat" cracker. For example: If I left the keys in the door and someone unlocked my door, walked in and then called me and said "hey, stupid, i'm in your home -- I'm calling you from there, see!". I'd say "he

Re: Secure 2.4.x kernel

2001-12-25 Thread Gary MacDougall
ter law be any different? I see you point, do you see mine? g. - Original Message - From: "Howland, Curtis" <[EMAIL PROTECTED]> To: "Ralf Dreibrodt" <[EMAIL PROTECTED]>; "Gary MacDougall" <[EMAIL PROTECTED]> Cc: Sent: Tuesday, Decembe

Re: Unidentified subject!

2001-12-25 Thread Gary MacDougall
Although you raise a very good point. I have a severe problem with this notion of a "whitehat" cracker. For example: If I left the keys in the door and someone unlocked my door, walked in and then called me and said "hey, stupid, i'm in your home -- I'm calling you from there, see!". I'd say "h

Re: Secure 2.4.x kernel

2001-12-25 Thread Gary MacDougall
omputer law be any different? I see you point, do you see mine? g. - Original Message - From: "Howland, Curtis" <[EMAIL PROTECTED]> To: "Ralf Dreibrodt" <[EMAIL PROTECTED]>; "Gary MacDougall" <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]&

Re: Secure 2.4.x kernel

2001-12-25 Thread Gary MacDougall
> On Monday, December 24, 2001, at 10:52 , Gary MacDougall wrote: > > > Someone said that St. Jude was what I was looking for, and I think > > its pretty much *exactly* what I was pointing out. > > Can't, in general, stop an attack. All the attacker has to do is >

Re: Secure 2.4.x kernel

2001-12-25 Thread Gary MacDougall
> On Monday, December 24, 2001, at 10:52 , Gary MacDougall wrote: > > > Someone said that St. Jude was what I was looking for, and I think > > its pretty much *exactly* what I was pointing out. > > Can't, in general, stop an attack. All the attacker has to do is >

Re: Secure 2.4.x kernel

2001-12-24 Thread Gary MacDougall
> On Friday, December 21, 2001, at 03:25 , Gary MacDougall wrote: > > > Wouldn't it be nice to be able to run the kernel in "secure mode"? > > I'm curious to know if we could limit the amount of "root exploits" > > by this method, it would

Re: Secure 2.4.x kernel

2001-12-24 Thread Gary MacDougall
> On Friday, December 21, 2001, at 03:25 , Gary MacDougall wrote: > > > Wouldn't it be nice to be able to run the kernel in "secure mode"? > > I'm curious to know if we could limit the amount of "root exploits" > > by this method, it would

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
understand more about it. I was just trying to illicit conversation on the topic. Thats all . I apologize if i pissed you off (or anyone else). I didn't mean too. gary -Original Message- From: Kelly Martin [mailto:[EMAIL PROTECTED] Sent: Friday, December 21, 2001 3:36 PM To: &#

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
Hmmm I don't buy that this *couldn't* be done on the Intel. I might be overstepping my knowledge, but I'm sure there *must* be a way. Going back to my 68k days, it would have been fairly easy to write this. Hey, I'm not an Intel assembly/opcode expert, but it seems to me, I think that you could si

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
st of what the process is allowed to exec, and blocks the syscall if you can't. The list of syscall arguments is created by running the module in "learn" mode, where it allows all syscalls. http://sourceforge.net/projects/stjude On Fri, Dec 21, 2001 at 12:35:27PM -0500, G

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
to understand more about it. I was just trying to illicit conversation on the topic. Thats all . I apologize if i pissed you off (or anyone else). I didn't mean too. gary -Original Message- From: Kelly Martin [mailto:[EMAIL PROTECTED]] Sent: Friday, December 21, 2001 3:36 PM To: &#x

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
Hmmm I don't buy that this *couldn't* be done on the Intel. I might be overstepping my knowledge, but I'm sure there *must* be a way. Going back to my 68k days, it would have been fairly easy to write this. Hey, I'm not an Intel assembly/opcode expert, but it seems to me, I think that you could s

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
Interesting. Has someone done some work on this? I'm mean, lets face it, your running a bunch of servers and they have boat loads of daemon's. Why they'll need to fork/exec a shell is really a good question -- in my mind, they don't. I could be wrong. Why not simply build this ability into the

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
I should also add... I do understand that running processes as "root" is basically the problem... but in theory, the setup of running things under a different user can be a pain -- why not simply allow the kernel to handle it... ... -Original Message----- From: Gary MacDouga

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
Thanks everyone for the answer. I was pretty sure that the kernel would be able to detect the fault, but I needed to *make* sure before i asked another question. Now heres my next questions and its a security one. Based off what was explained by Noah and Kelly, it appears to me that Buffer Overru

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
t the process is allowed to exec, and blocks the syscall if you can't. The list of syscall arguments is created by running the module in "learn" mode, where it allows all syscalls. http://sourceforge.net/projects/stjude On Fri, Dec 21, 2001 at 12:35:27PM -0500, Gary MacDougall wr

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
Interesting. Has someone done some work on this? I'm mean, lets face it, your running a bunch of servers and they have boat loads of daemon's. Why they'll need to fork/exec a shell is really a good question -- in my mind, they don't. I could be wrong. Why not simply build this ability into the

Re: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
Since we're on the 2.4 kernel, I have a question thats been jawing at me and haven't really had the time to peel through code and look... In the kernel (ok, stand up you kernel guru's!), when a "segmentation fault" is raised, I don't care where, doesn't the kernel get some sort of notification ev

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
I should also add... I do understand that running processes as "root" is basically the problem... but in theory, the setup of running things under a different user can be a pain -- why not simply allow the kernel to handle it... ... -Original Message----- From: Gary MacDouga

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
Thanks everyone for the answer. I was pretty sure that the kernel would be able to detect the fault, but I needed to *make* sure before i asked another question. Now heres my next questions and its a security one. Based off what was explained by Noah and Kelly, it appears to me that Buffer Overr

Re: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
Since we're on the 2.4 kernel, I have a question thats been jawing at me and haven't really had the time to peel through code and look... In the kernel (ok, stand up you kernel guru's!), when a "segmentation fault" is raised, I don't care where, doesn't the kernel get some sort of notification e