Re: FW: Try security update from the Microsoft

2003-06-20 Thread Kay-Michael Voit
A Windows-worm in the debian-security list? Great :D BM - Original message follows - BM Microsoft Consumer BM this is the latest version of security update, the BM June 2003, Cumulative Patch update which eliminates all BM known security vulnerabilities affecting Internet Explorer, BM

Re: FW: Try security update from the Microsoft

2003-06-20 Thread Kay-Michael Voit
A Windows-worm in the debian-security list? Great :D BM - Original message follows - BM Microsoft Consumer BM this is the latest version of security update, the BM June 2003, Cumulative Patch update which eliminates all BM known security vulnerabilities affecting Internet Explorer, BM

Re: MAC-based ssh

2003-05-02 Thread Kay-Michael Voit
did you consider just to blockother mac-addresses through iptables? but... i don't know, what you are doing there, but are you sure you want to grant every user ssh access? i assume you need to be root for this? how are you going to solve it over ssh? and how do you prevent users from just

Re[2]: MAC-based ssh

2003-05-02 Thread Kay-Michael Voit
DDC using mac addresses for client authentication seems to me as an extremely DDC risky business as a mac address can easily be copied/cloned/spoofed... DDC imho, it does not offer any authentication at all... i under stood it as additional security to certificates or passwords (more like

Port forwarding wrong after days

2003-04-29 Thread Kay-Michael Voit
-BEGIN PGP SIGNED MESSAGE- Hash: MD5 Hi, I'm running a small router and firewall at home. eth0 - LAN eth1 - access point - WLAN eth2 - WAN On a client im running a donkeyclient, so I had to forward port (it works without, but then you get a so called low id with result in worse download

Re[2]: Port forwarding wrong after days

2003-04-29 Thread Kay-Michael Voit
-BEGIN PGP SIGNED MESSAGE- Hash: MD5 I've search for something like this, but did not find anything. How do I flush it? RK It would have been the NAT table anyway (my RK mistake). You flush it with iptables -F -t nat. RK The reboot done the job, so it must be something RK else. You

Re: is this a mistake? i ywdaha3ak

2003-04-27 Thread Kay-Michael Voit
is what what? i cannot see anything, only an unloadable and linked image... is this a spam mail? if not, please do not send such mails but plaintext AW Erase your email record here. AW -- AW To UNSUBSCRIBE, email to [EMAIL PROTECTED] AW with a subject of unsubscribe. Trouble? Contact [EMAIL

Re[6]: Chkrootkit

2003-04-27 Thread Kay-Michael Voit
AE Sorry, I see now. This case, the proper solution would be fixing AE the program which emits the incorrect warning, isn't it? the program is chrootkit, isn't it? -- Public Key erhältlich auf den PGP-Keyservern, sowie mit weiteren Informationen auf http:\\www.voits.net. Fingerprint:

Re: WAS: HELP, my Debian Server was hacked!

2003-04-24 Thread Kay-Michael Voit
IRvD PS I would really like to see you perlscript, if you could send it to me personallyI would really apriciate it. place me on the list, too, please. IRvD On Thu, 24 Apr 2003 14:17:48 +0200, [EMAIL PROTECTED] wrote: On Thu, Apr 24, 2003 at 11:43:06AM +0200, I.R. van Dongen wrote:

Chkrootkit

2003-04-24 Thread Kay-Michael Voit
-BEGIN PGP SIGNED MESSAGE- Hash: MD5 Hi, I'm just setting up my first webserver in a productive environment. Now I wonder how I could use chkrootkit. My first idea was to run a cronjob, butI have two problems with this solution: 1) An attacker could just change the chkrootkit binaries.

Re[2]: Chkrootkit

2003-04-24 Thread Kay-Michael Voit
-BEGIN PGP SIGNED MESSAGE- Hash: MD5 DCE for (1) I guess you can put the binaries in a read-only medium and run DCE them from there, like a CD-ROM or a write-protected floppy/flash-medium. Well, the attacker could just stop the cronjob... but great idea though. My server is a remote

Firewall Logs on Dialup Server

2003-04-13 Thread Kay-Michael Voit
Hi, how do you suggest dealing with firewall logs from a computer which is connected through a dialup connection? For I receive a new IP every 24h hours, my logs are full of P2P connection attempts. How can I log iptables LOG outputs somewherer different from the standard output? And is there any