Re: sysadmin in training

2023-05-13 Thread Olaf Dietsche
Michael Lazin writes: > SInce Ossec HIDS is GNU Public licensed I think this is not a bad idea to > include this in the documentation. The referenced article does describe > securing Debian with open source tools and I honestly have seen this > documentation for the first time tonight and I

Re: crontab failure for daylight savings

2003-10-05 Thread Olaf Dietsche
Billy Naylor [EMAIL PROTECTED] writes: It appears that cronjobs running between 2am and 3am sunday morning seem to not have been run, i'm in New Zealand which went into summer daylight savings over the weekend. If you go to daylight savings, the clock jumps from 2am to 3am. So, there's no way

Re: crontab failure for daylight savings

2003-10-05 Thread Olaf Dietsche
Billy Naylor [EMAIL PROTECTED] writes: It appears that cronjobs running between 2am and 3am sunday morning seem to not have been run, i'm in New Zealand which went into summer daylight savings over the weekend. If you go to daylight savings, the clock jumps from 2am to 3am. So, there's no way

Re: Simple e-mail virus scanner

2003-08-20 Thread Olaf Dietsche
Hi, [EMAIL PROTECTED] writes: Does the same approach could be use with sendmail ? Any examples? I guess, you could integrate this in http://www.spamassassin.org. SpamAssassin already scans the email body for signs of spam, so it shouldn't be too hard, to add another regex. Although, I never

Re: Simple e-mail virus scanner

2003-08-20 Thread Olaf Dietsche
Hi, Игорь Ляпин [EMAIL PROTECTED] writes: Does the same approach could be use with sendmail ? Any examples? I guess, you could integrate this in http://www.spamassassin.org. SpamAssassin already scans the email body for signs of spam, so it shouldn't be too hard, to add another regex.

Re: snmp packets

2003-07-31 Thread Olaf Dietsche
ulrich berthold [EMAIL PROTECTED] writes: SCAN Proxy (8080) attempt the next outstanding alarm message was a SNMP public access udp. i looked into it and to my surprise found out, that these packages are originating on the server's external interface and going to two (nonexistent) privat ip

Re: snmp packets

2003-07-31 Thread Olaf Dietsche
ulrich berthold [EMAIL PROTECTED] writes: SCAN Proxy (8080) attempt the next outstanding alarm message was a SNMP public access udp. i looked into it and to my surprise found out, that these packages are originating on the server's external interface and going to two (nonexistent) privat ip

Re: capabilities

2003-07-24 Thread Olaf Dietsche
Adam ENDRODI [EMAIL PROTECTED] writes: -- Problem 3: I'd like to grant or revoke capabilities to/from a running process. This seems to be the easiest, except that the kernel in the default configuration doesn't permit this (cap_bound doesn't contain CAP_SETPCAP which

Re: capabilities

2003-07-24 Thread Olaf Dietsche
Adam ENDRODI [EMAIL PROTECTED] writes: -- Problem 3: I'd like to grant or revoke capabilities to/from a running process. This seems to be the easiest, except that the kernel in the default configuration doesn't permit this (cap_bound doesn't contain CAP_SETPCAP which

Re: odd process running /usr/sbin/sendmail -i -CronDaemon -odi -oem root

2003-06-19 Thread Olaf Dietsche
Robert Ebright [EMAIL PROTECTED] writes: I have had some problems with attempted hacks on my box and posted here the last few days. So I've been checking the processing running on my box and I see this. PID TTY STAT TIME COMMAND 28406 ?S 0:00 /usr/sbin/sendmail -i

Re: odd process running /usr/sbin/sendmail -i -CronDaemon -odi -oem root

2003-06-19 Thread Olaf Dietsche
Robert Ebright [EMAIL PROTECTED] writes: I have had some problems with attempted hacks on my box and posted here the last few days. So I've been checking the processing running on my box and I see this. PID TTY STAT TIME COMMAND 28406 ?S 0:00 /usr/sbin/sendmail -i

Re: Advice Needed On Recent Rootings

2003-05-28 Thread Olaf Dietsche
Jayson Vantuyl [EMAIL PROTECTED] writes: Thankfully, we don't have root passwords. In our space, we find root to more of a concept than a user, so we disable the password and set up a group that can su to root. That way we have a good handle on things. Root never logs in, so we know

Re: Advice Needed On Recent Rootings

2003-05-28 Thread Olaf Dietsche
Jayson Vantuyl [EMAIL PROTECTED] writes: Thankfully, we don't have root passwords. In our space, we find root to more of a concept than a user, so we disable the password and set up a group that can su to root. That way we have a good handle on things. Root never logs in, so we know

Re: Disabling netstat

2003-04-21 Thread Olaf Dietsche
Brian McGroarty [EMAIL PROTECTED] writes: So far as I can tell, there's no non-hackish way to accomplish what I'd like. I have to either hold a file open to make chmod changes stay in effect in /proc, or I have to patch the kernel. This sure seems kind of silly... why add all these things

Re: smtp auth

2003-04-01 Thread Olaf Dietsche
Arnold J. Fischer [EMAIL PROTECTED] writes: I'm trying to set up my dial-up system for mail relaying via mx.freenet.de and they are using smtp-auth to accept every mail from someone who has an email-account on their system. I read a couple of articles about the configuration of postfix and

Re: smtp auth

2003-04-01 Thread Olaf Dietsche
Arnold J. Fischer [EMAIL PROTECTED] writes: I'm trying to set up my dial-up system for mail relaying via mx.freenet.de and they are using smtp-auth to accept every mail from someone who has an email-account on their system. I read a couple of articles about the configuration of postfix and

Re: Permissions on /root/

2003-03-08 Thread Olaf Dietsche
Christian Jaeger [EMAIL PROTECTED] writes: I began working with (unix/)linux.) And as written in my other reply I'm still missing a better alternative to /root/bin. /local-admin's-software/bin maybe? AFAIK, the FHS does not provide any. Maybe /usr/local/sbin is, what you're looking for?

Re: Permissions on /root/

2003-03-08 Thread Olaf Dietsche
Christian Jaeger [EMAIL PROTECTED] writes: At 23:29 Uhr +0100 08.03.2003, Olaf Dietsche wrote: Christian Jaeger [EMAIL PROTECTED] writes: I began working with (unix/)linux.) And as written in my other reply I'm still missing a better alternative to /root/bin. /local-admin's-software

Re: Permissions on /root/

2003-03-08 Thread Olaf Dietsche
Christian Jaeger [EMAIL PROTECTED] writes: I began working with (unix/)linux.) And as written in my other reply I'm still missing a better alternative to /root/bin. /local-admin's-software/bin maybe? AFAIK, the FHS does not provide any. Maybe /usr/local/sbin is, what you're looking for?

Re: Permissions on /root/

2003-03-08 Thread Olaf Dietsche
Christian Jaeger [EMAIL PROTECTED] writes: At 23:29 Uhr +0100 08.03.2003, Olaf Dietsche wrote: Christian Jaeger [EMAIL PROTECTED] writes: I began working with (unix/)linux.) And as written in my other reply I'm still missing a better alternative to /root/bin. /local-admin's-software

Re: X Security Issues?

2002-11-19 Thread Olaf Dietsche
Edward Guldemond [EMAIL PROTECTED] writes: Starting nmap V. 2.54BETA31 ( www.insecure.org/nmap/ ) Interesting ports on (removed) (XX.XX.XXX.XX): (The 1552 ports scanned but not shown below are in state: closed) Port State Service 22/tcp openssh 1024/tcp open

Re: X Security Issues?

2002-11-19 Thread Olaf Dietsche
Edward Guldemond [EMAIL PROTECTED] writes: On Wed, Nov 20, 2002 at 12:53:27AM +0100, Olaf Dietsche wrote: Look at man xinit and man Xserver. There you will find an option -nolisten. In /etc/X11/xinit/xserverrc, I have the following line: exec /usr/bin/X11/X -dpi 100 -nolisten tcp So why

Re: X Security Issues?

2002-11-19 Thread Olaf Dietsche
Edward Guldemond [EMAIL PROTECTED] writes: Starting nmap V. 2.54BETA31 ( www.insecure.org/nmap/ ) Interesting ports on (removed) (XX.XX.XXX.XX): (The 1552 ports scanned but not shown below are in state: closed) Port State Service 22/tcp openssh 1024/tcp open

Re: X Security Issues?

2002-11-19 Thread Olaf Dietsche
Edward Guldemond [EMAIL PROTECTED] writes: On Wed, Nov 20, 2002 at 12:53:27AM +0100, Olaf Dietsche wrote: Look at man xinit and man Xserver. There you will find an option -nolisten. In /etc/X11/xinit/xserverrc, I have the following line: exec /usr/bin/X11/X -dpi 100 -nolisten tcp So why

Re: port 16001 and 111

2002-10-18 Thread Olaf Dietsche
Jussi Ekholm [EMAIL PROTECTED] writes: Olaf Dietsche olaf.dietsche#[EMAIL PROTECTED] wrote: Jussi Ekholm [EMAIL PROTECTED] writes: So, what would try to connect to my system's port 16001 and 111 from within my own system? Should I be concerned? Should I expect the worst? Any insight

Re: port 16001 and 111

2002-10-18 Thread Olaf Dietsche
Jussi Ekholm [EMAIL PROTECTED] writes: Olaf Dietsche [EMAIL PROTECTED] wrote: Jussi Ekholm [EMAIL PROTECTED] writes: So, what would try to connect to my system's port 16001 and 111 from within my own system? Should I be concerned? Should I expect the worst? Any insight on this issue would

Re: port 16001 and 111

2002-10-15 Thread Olaf Dietsche
Hi there (from Germany), Jussi Ekholm [EMAIL PROTECTED] writes: So, what would try to connect to my system's port 16001 and 111 from within my own system? Should I be concerned? Should I expect the worst? Any insight on this issue would calm me down... Port 111 is used by portmap. If you

Re: port 16001 and 111

2002-10-15 Thread Olaf Dietsche
Hi there (from Germany), Jussi Ekholm [EMAIL PROTECTED] writes: So, what would try to connect to my system's port 16001 and 111 from within my own system? Should I be concerned? Should I expect the worst? Any insight on this issue would calm me down... Port 111 is used by portmap. If you

Re: Named daemon and port 32770? (and port 32985 on restart)

2002-10-15 Thread Olaf Dietsche
Javier Fernández-Sanguino Peña [EMAIL PROTECTED] writes: Is the first open port reasonable? I wonder why named is listening on UDP port 32770 which, after a brief google search, comes up as a port usually used by Solaris' rpcbind (which used to be vulnerable). IIRC, this port (could be any