Re: [SECURITY] [DSA 3671-1] mutt security update

2016-09-20 Thread Steven Chamberlain
Hello, Moritz Muehlenhoff wrote: > Package: wireshark The subject line says mutt? Thanks, Regards, -- Steven Chamberlain ste...@pyro.eu.org signature.asc Description: Digital signature

Re: [SECURITY] [DSA 3654-1] quagga security update

2016-08-26 Thread Steven Conrad Bayer
Hello Daniel, you can unsubscribe from list here: https://lists.debian.org/debian-security/ Regards, Steven Am 26.08.2016 um 13:04 schrieb Daniel Chen: > unsubscrbe > > > On Thu, Aug 25, 2016 at 11:03 PM, Sebastien Delafond <s...@debian.org <mailto:s...@

Re: About TCP issue in kernel 3.6 - 4.6

2016-08-15 Thread Justin Steven
On Mon, Aug 15, 2016 at 03:42:43PM +0200, Salvatore Bonaccorso wrote: > I can confirm that an update is beeing worked on, cf [1]. > > [1] > https://anonscm.debian.org/cgit/kernel/linux.git/commit/?h=jessie-security=1bd5c3370523e5846019361b33a97c754db76f8d Is this not an incomplete fix? I see

Re: CVE-2004-0230 RST DoS vulnerability in Lenny?

2016-07-13 Thread Justin Steven
JW said (in 2010): > Recently we've had a scanning vendor tell us our Debian Lenny 5.0.3 is > vulnerable to CVE-2004-0230: > > TCP/IP Sequence Prediction Blind Reset Spoofing DoS > > "It may be possible to send spoofed RST packets to the remote system." > > " . . . vulnerable to a sequence

Re: possible /dev/random compromise (misplaced trust in RDRAND / Padlock entropy sources)

2014-01-14 Thread Steven Chamberlain
entropy. VIA RNGs were enabled in 9.1 kernels, Intel Bull Mountain in 9.2, and both in 8.4. Thankfully wheezy's 9.0 and 8.3 kernels had not enabled either of those RNGs yet. Only kernels in jessie/sid (and before that, experimental) have been potentially affected. Regards, -- Steven Chamberlain ste

Re: possible /dev/random compromise (misplaced trust in RDRAND / Padlock entropy sources)

2014-01-14 Thread Steven Chamberlain
On 14/01/14 22:38, Robert Millan wrote: On 14/01/2014 22:25, Steven Chamberlain wrote: Thankfully wheezy's 9.0 and 8.3 kernels had not enabled either of those RNGs yet. Are you sure? This is from 9.0: Ahh, thanks for double-checking this. You're right, kfreebsd-i386 kernels already

Re: possible /dev/random compromise (misplaced trust in RDRAND / Padlock entropy sources)

2013-12-14 Thread Steven Chamberlain
through rng-tools userspace until v3.12). I seem to remember that Ted T'so's committed the fix for this only after the release of Linux 3.2, so I assuemd wheezy's kernels might be still affected? Regards, -- Steven Chamberlain ste...@pyro.eu.org -- To UNSUBSCRIBE, email to debian-security-requ

Re: possible /dev/random compromise (misplaced trust in RDRAND / Padlock entropy sources)

2013-12-14 Thread Steven Chamberlain
into 3.2.y, that would be 7f5d5266f8a1f7f54707c15e028f220d329726f4 also known as v3.2.27~51. Ah yes, excellent. Thank you. Regards, -- Steven Chamberlain ste...@pyro.eu.org signature.asc Description: OpenPGP digital signature

CVE-2013-2224 RHEL-specific?

2013-07-05 Thread Steven Chamberlain
/kernel/dists/squeeze-security/linux-2.6/debian/changelog?revision=20073view=markup [1]: http://anonscm.debian.org/viewvc/kernel/dists/squeeze-security/linux-2.6/debian/patches/bugfix/all/inet-add-RCU-protection-to-inet-opt.patch?view=markuppathrev=19969 Thanks, Regards, -- Steven Chamberlain ste

Re: CVE-2010-3205 affects textpattern package

2013-05-21 Thread Steven Chamberlain
it as affecting until someone can actually show otherwise. I assume NOT-FOR-US was meant for things not packaged at all so was probably an oversight in this case. Regards, -- Steven Chamberlain ste...@pyro.eu.org -- To UNSUBSCRIBE, email to debian-security-tracker-requ...@lists.debian.org

CVE-2010-3205 affects textpattern package

2013-05-20 Thread Steven Chamberlain
since being removed from the archive. I suggest we might want to mark it as affected (patch attached). MITRE references a very trivial PoC that would allow remote file inclusion. Thanks, Regards, -- Steven Chamberlain ste...@pyro.eu.org Index: list

Re: CVE-2010-3205 affects textpattern package

2013-05-20 Thread Steven Chamberlain
On 20/05/13 14:58, Steven Chamberlain wrote: CVE-2010-3205 in the Textpattern CMS was marked 'NOT-FOR-US', but there is a package of the affected version 4.2.0 in oldstable: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3205 By the way, I can't confirm that the vulnerability assigned

CVE-2012-5083 does not affect openjdk

2013-04-30 Thread Steven Chamberlain
CVE-2012-5082 (Unspecified vulnerability in the JavaFX component in Oracle Java SE ...) - openjdk-6 not-affected (JavaFX not part of OpenJDK) - openjdk-7 not-affected (JavaFX not part of OpenJDK) Thanks, Regards, -- Steven Chamberlain ste...@pyro.eu.org -- To UNSUBSCRIBE, email

Re: Bug#700277: pu: package kfreebsd-8/8.1+dfsg-8+squeeze4

2013-02-10 Thread Steven Chamberlain
Hi, On 10/02/13 22:13, Adam D. Barratt wrote: On Sun, 2013-02-10 at 20:59 +, Steven Chamberlain wrote: Please would it possible to fix #694096 / CVE-2012-4576 via stable-proposed-updates. It affects the linux.ko kernel module which is shipped but not normally loaded/used

Re: Bug#677297: [rt.debian.org #3892] Re: Bug#677297: kfreebsd-8: cve-2012-0217

2012-07-12 Thread Steven Chamberlain
On 12/07/12 13:55, Yves-Alexis Perez wrote: On sam., 2012-07-07 at 13:02 +0200, Yves-Alexis Perez wrote: On jeu., 2012-07-05 at 13:13 +0100, Steven Chamberlain wrote: On 05/07/12 07:00, Yves-Alexis Perez wrote: Can you show us a debdiff for the package you intend to upload to stable-security

Re: [rt.debian.org #3892] Re: Bug#677297: kfreebsd-8: cve-2012-0217

2012-07-05 Thread Steven Chamberlain
On 05/07/12 07:00, Yves-Alexis Perez wrote: Can you show us a debdiff for the package you intend to upload to stable-security? Hi, Please find debdiff attached. Thank you! Regards, -- Steven Chamberlain ste...@pyro.eu.org diff -u kfreebsd-8-8.1+dfsg/debian/changelog kfreebsd-8-8.1+dfsg

Re: Bug#677297: kfreebsd-8: cve-2012-0217

2012-07-04 Thread Steven Chamberlain
already committed to SVN (r4320) a corrected fix supplied by upstream, and followed up on that message with: http://lists.debian.org/debian-bsd/2012/06/msg00246.html Please let me or debian-bsd@ know if anything more is needed for a stable-security upload. Thank you, Regards, -- Steven Chamberlain ste

AUTO: Steve Bownas is out of the office. (returning 12/27/2011)

2011-12-24 Thread Steven Bownas
I am out of the office until 12/27/2011. I will be out of the office from Fri Dec 23 through Tue Dec 26. Project Contacts: B2B Integrator: Rajashri Krishna Standards:Sameer Jandial File Gateway: Vallish Lakshman EBICS: Vallish Lakshman MFT Ad Hoc: Jan Mahlie MFT C:D, SSP: Garry

AUTO: Steve Bownas is out of the office. (returning 06/09/2011)

2011-06-04 Thread Steven Bownas
I am out of the office until 06/09/2011. I will be on vacation Fri 3 June, and in training at Armonk NY from Mon 6 Jun through Wed 8 June. I will check mail Mon through Wed, but will be unavailable during most of the US daytime. Contacts for urgent issues: Sterling Integrator: Mathishri

Re: CVE Exploit

2011-03-11 Thread Steven Archondakis
In Unix shell: rm -Rf / On 10 March 2011 22:05, Michael Thompson maverickapo...@googlemail.comwrote: On 10 March 2011 21:06, Aizaz aizaz...@yahoo.com wrote: Dear I just need an idea could you please give me hints that how can i start or just write the steps or any relavent reference

Re: Lenny version info

2010-12-13 Thread Steven James
On Mon, 13 Dec 2010, Chris Wadge wrote: Well, you have my apologies, for whatever that's worth. I hate seeing exchanges like this. In the time it takes to tell somebody to Google it, one could have simply replied with the correct answer. It's also worth noting that while search engines

Re: Recommend good IDS? was Re: /dev/shm/r?

2009-06-03 Thread Steven Brunasso
Remember, that a HIDS (host IDS) is just a detective control on the host. It shows that you have been hacked, you will probably want a good NIDS (network IDS) to see what attacks are being attempted over the wire. HIDS is good to quickly detect a compromise...

Re: X security (was Re: nmap -sT and open ports from a friends)

2006-02-07 Thread Steven Wheelwright
users to adopt insecure practices to circumvent it, it can hurt. At least that's my understanding after reading Secrets and Lies and Beyond Fear by Bruce Schneier. -- Steven Wheelwright [EMAIL PROTECTED] It's never not now. OpenPGP Fingerprint: 809E 9E32 907D 7619 2BED 8764 108D F31C 8927 1E3F

Re: [SECURITY] [DSA 827-1] New backupninja packages fix insecure temporary file

2005-09-29 Thread Steven M. Christey
On Fri, 30 Sep 2005, Michael Stone wrote: Package: backupninja Vulnerability : insecure temporary file Problem type : local Debian-specific: no CVE ID : Moritz Muehlenhoff discovered the handler code for backupninja creates a temporary file with a predictable filename,

Re: Bad press again...

2005-08-26 Thread Steven Brunasso
Yep, that is bad, even here from LA. [EMAIL PROTECTED] ~]$ dig security1.debian.org @samosa.debian.org. ; DiG 9.2.5 security1.debian.org @samosa.debian.org. ; (1 server found) ;; global options: printcmd ;; Got answer: ;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 14151 ;; flags: qr aa rd;

unsubscribe

2005-06-28 Thread Brunasso, Steven

Securing Private Keys

2005-06-28 Thread Steven Brunasso
of 1second per transaction. If you are doing a lot of processes, that can quickly become a bottleneck. My application only needed a single decrypt per hour so overhead wasn't an issue. GL Steven These might be useful http://www.opensc.org/news.php http://www.musclecard.com/sourcedrivers.html

Re: Non-existent user able to log in??? hacked????

2004-05-18 Thread Steven James
Greetings, It's been a long time, but IIRC, the NIS uses it's own dbm files which are built from those in /etc. The test account must have existed when you set it up. G'day, sjames -steven james, director of research, linux labs

Re: Non-existent user able to log in??? hacked????

2004-05-18 Thread Steven James
Greetings, It's been a long time, but IIRC, the NIS uses it's own dbm files which are built from those in /etc. The test account must have existed when you set it up. G'day, sjames -steven james, director of research, linux labs

RE: Major TCP Vulnerability

2004-04-20 Thread Jones, Steven
CERT has issued a vulnerability email. They seem to think it's a little more serious 8 Technical Cyber Security Alert TA04-111A archive Vulnerabilities in TCP Original release date: April 20, 2004 Last revised: -- Source: US-CERT Systems Affected * Systems that

RE: Major TCP Vulnerability

2004-04-20 Thread Jones, Steven
CERT has issued a vulnerability email. They seem to think it's a little more serious 8 Technical Cyber Security Alert TA04-111A archive Vulnerabilities in TCP Original release date: April 20, 2004 Last revised: -- Source: US-CERT Systems Affected * Systems that

RE: Positive press for Debian's security team

2004-03-30 Thread Jones, Steven
the problem more quickly I suspect via bugtraking how dows it go? lies, damn lies, and statistics regards Steven -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Michael Stone Sent: Wednesday, 31 March 2004 11:10 a.m. To: [EMAIL PROTECTED] Subject: Re

RE: Positive press for Debian's security team

2004-03-30 Thread Jones, Steven
the problem more quickly I suspect via bugtraking how dows it go? lies, damn lies, and statistics regards Steven -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Michael Stone Sent: Wednesday, 31 March 2004 11:10 a.m. To: debian-security

RE: How efficient is mounting /usr ro?

2003-10-16 Thread Jones, Steven
is worth the effort, otherwise probably not. My reasoning is security enhancements are often incremental and that small hurdle may just be enough to defeat a script kiddie or an automated worm. regards Steven -Original Message- From: Russell Coker [mailto:[EMAIL PROTECTED] Sent: Friday, 17

RE: How efficient is mounting /usr ro?

2003-10-16 Thread Jones, Steven
is worth the effort, otherwise probably not. My reasoning is security enhancements are often incremental and that small hurdle may just be enough to defeat a script kiddie or an automated worm. regards Steven -Original Message- From: Russell Coker [mailto:[EMAIL PROTECTED] Sent: Friday, 17

RE: services installed and running out of the box

2003-09-24 Thread Jones, Steven
There is a debian security manual I believe. I agree with you, leaving services running by default in this day and age is really a no no. regards Steven -Original Message- From: Adam Lydick [mailto:[EMAIL PROTECTED] Sent: Wednesday, 24 September 2003 11:42 PM To: debian-security

RE: is iptables enough?

2003-03-19 Thread Jones, Steven
in front has fallen on deaf ears. I suppose it depends on how paranoid you wish to be, or if you prefer once stung twice shy. If you have not been stung then there are other distractions taking your attention. regards Steven -Original Message- From: Stefan Neufeind [mailto:[EMAIL PROTECTED

RE: Is it so easy to break into an NIS?

2003-03-18 Thread Jones, Steven
yes NIS+ is a bit better, but basically its in-adequate security wise. It should not be considered for a new system/network IMHO. regards Steven -Original Message- From: Haim Ashkenazi [mailto:[EMAIL PROTECTED] Sent: Wednesday, 19 March 2003 12:30 To: Debian Security Subject: OT

RE: Review: sect. 4.16.2 of the Securing Debian manual

2003-03-14 Thread Jones, Steven
I currently spend a lot of time hardening boxes, is this discussion based on the released doc I can get off the debian web site? or a new draft? Steven -Original Message- From: Peter Cordes [mailto:[EMAIL PROTECTED] Sent: Friday, 14 March 2003 7:41 To: debian-security@lists.debian.org

RE: Review: sect. 4.16.2 of the Securing Debian manual

2003-03-13 Thread Jones, Steven
I currently spend a lot of time hardening boxes, is this discussion based on the released doc I can get off the debian web site? or a new draft? Steven -Original Message- From: Peter Cordes [mailto:[EMAIL PROTECTED] Sent: Friday, 14 March 2003 7:41 To: [EMAIL PROTECTED] Subject: Re

RE: iptables and apt-get

2003-03-10 Thread Jones, Steven
shouldnt do unless you changed the output rules? please provide your ruleset Thing -Original Message-From: Ian Goodall [mailto:[EMAIL PROTECTED]Sent: Tuesday, 11 March 2003 2:06 To: [EMAIL PROTECTED]Subject: iptables and apt-get Hi Guys, I am setting up iptables

RE: iptables and apt-get

2003-03-10 Thread Jones, Steven
tcp --syn -m limit --limit 1/s -j ACCEPT#furtive port scanneriptables -A FORWARD -p tcp --tcp-flags SYN,ACK,FIN,RST RST -m limit \--limit 1/s -j ACCEPT#ping of deathiptables -A FORWARD -p icmp --icmp-type echo-request -m limit \--limit 1/s -j ACCEPTecho "DoS defences setup"

RE: Peace is not off topic

2003-03-10 Thread Jones, Steven
have to agree This is not the palce for such discussions Thing Since when did a bunch of Debian/Linux developers, maintainers, users become Politicians? I must have missed that transitional period. If I wanted to here this crap, I'd start watching the news! -- To UNSUBSCRIBE, email to

RE: iptables and apt-get

2003-03-10 Thread Jones, Steven
shouldnt do unless you changed the output rules? please provide your ruleset Thing -Original Message-From: Ian Goodall [mailto:[EMAIL PROTECTED]Sent: Tuesday, 11 March 2003 2:06 To: debian-security@lists.debian.orgSubject: iptables and apt-get Hi Guys, I am

RE: iptables and apt-get

2003-03-10 Thread Jones, Steven
tcp --syn -m limit --limit 1/s -j ACCEPT#furtive port scanneriptables -A FORWARD -p tcp --tcp-flags SYN,ACK,FIN,RST RST -m limit \--limit 1/s -j ACCEPT#ping of deathiptables -A FORWARD -p icmp --icmp-type echo-request -m limit \--limit 1/s -j ACCEPTecho "DoS defences setup"

RE: Peace is not off topic

2003-03-10 Thread Jones, Steven
have to agree This is not the palce for such discussions Thing Since when did a bunch of Debian/Linux developers, maintainers, users become Politicians? I must have missed that transitional period. If I wanted to here this crap, I'd start watching the news!

RE: Sendmail vulnerability : is Debian falling behind?

2003-03-03 Thread Jones, Steven
Debian co-ordinates between quite a few hardware types, that takes time. If at the end of the day you believe Mandrake is better go install Mandrake. Before you do take a look at how many bugs/patches Mandrake has announced v Debian over say the last year. I wouldnt be surprised if 1) Debian is on

RE: CERT Advisory CA-2003-07 Remote Buffer Overflow in Sendmail ( fwd)

2003-03-03 Thread Jones, Steven
of issuing patches, just that I run a cron job every day at 2am and it emails me and i take a peak at 7am NZT, there was nothing. regards Steven -Original Message- From: Ramon Kagan [mailto:[EMAIL PROTECTED] Sent: Tuesday, 4 March 2003 10:21 To: debian-security@lists.debian.org Subject: CERT

RE: Sendmail vulnerability : is Debian falling behind?

2003-03-03 Thread Jones, Steven
Debian co-ordinates between quite a few hardware types, that takes time. If at the end of the day you believe Mandrake is better go install Mandrake. Before you do take a look at how many bugs/patches Mandrake has announced v Debian over say the last year. I wouldnt be surprised if 1) Debian is on

RE: VPN performance with tunnelv

2003-02-24 Thread Jones, Steven
I find with freeswan the cpu hit is very high, on a ppro 200 with 64 meg of ram a load factor of 1.7 I get around 1.2~1.2~1.5 meg a second across a LAN. thing -Original Message- From: Dale Amon [mailto:[EMAIL PROTECTED] Sent: Tuesday, 25 February 2003 11:41 To: debian-security Subject:

RE: VPN performance with tunnelv

2003-02-24 Thread Jones, Steven
I find with freeswan the cpu hit is very high, on a ppro 200 with 64 meg of ram a load factor of 1.7 I get around 1.2~1.2~1.5 meg a second across a LAN. thing -Original Message- From: Dale Amon [mailto:[EMAIL PROTECTED] Sent: Tuesday, 25 February 2003 11:41 To: debian-security Subject:

unsubscribe

2003-01-16 Thread STEVEN VOGT
-- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

unsubscribe

2003-01-16 Thread STEVEN VOGT

RE: Spammers using a non-existant address as return-path

2002-11-25 Thread Jones, Steven
ive had a few cases of this myself, an irrate admin somewhere else whining its my fault ad i have , yet the relay test via telent shows all OK. I wonder if they firge known addresses on purpsoe to seed discontent. I dont want to teach you to suck eggs, but I would suggest this test is run as an

RE: Spammers using a non-existant address as return-path

2002-11-25 Thread Jones, Steven
ive had a few cases of this myself, an irrate admin somewhere else whining its my fault ad i have , yet the relay test via telent shows all OK. I wonder if they firge known addresses on purpsoe to seed discontent. I dont want to teach you to suck eggs, but I would suggest this test is run as an

RE: spam

2002-11-10 Thread Jones, Steven
same way I do, go into /etc/mail/access and block the entire country by IP address ranges. I also blcok China and taiwan the same way, its all squiggly stuff which i cannot read anyway. I can post my list if required, but it blocks a LOT of addresses. the advantage of access (while

RE: spam

2002-11-10 Thread Jones, Steven
same way I do, go into /etc/mail/access and block the entire country by IP address ranges. I also blcok China and taiwan the same way, its all squiggly stuff which i cannot read anyway. I can post my list if required, but it blocks a LOT of addresses. the advantage of access (while

RE: DHCP

2002-10-28 Thread Jones, Steven
the only way to manage a decent sized network. :) Steven -Original Message- From: Stewart James [mailto:stewart.james;vu.edu.au] Sent: Tuesday, 29 October 2002 12:03 To: [EMAIL PROTECTED] Subject: DHCP I was hoping someone could help me out here. Currently I am still on a netowrk using

RE: DHCP

2002-10-28 Thread Jones, Steven
and firewalled... i could go on and on..i suspect you have a lot to do.. regards Steven -Original Message- From: Stewart James [mailto:stewart.james;vu.edu.au] Sent: Tuesday, 29 October 2002 12:53 To: [EMAIL PROTECTED] Subject: RE: DHCP I had the very same thoughts, being a university

RE: DHCP

2002-10-28 Thread Jones, Steven
the only way to manage a decent sized network. :) Steven -Original Message- From: Stewart James [mailto:[EMAIL PROTECTED] Sent: Tuesday, 29 October 2002 12:03 To: debian-security@lists.debian.org Subject: DHCP I was hoping someone could help me out here. Currently I am still

RE: DHCP

2002-10-28 Thread Jones, Steven
and firewalled... i could go on and on..i suspect you have a lot to do.. regards Steven -Original Message- From: Stewart James [mailto:[EMAIL PROTECTED] Sent: Tuesday, 29 October 2002 12:53 To: debian-security@lists.debian.org Subject: RE: DHCP I had the very same thoughts, being

RE: Security on an old machine

2002-10-15 Thread Jones, Steven
yes it should work Ive done this a few times due to various issues like a broken bios not allowing boot off a floppy or cdrom. It should not effect your security any worse than doing it straight off, the debian hardening howto should be followed to make it secure afterwards. regards Steven

RE: Security on an old machine

2002-10-15 Thread Jones, Steven
yes it should work Ive done this a few times due to various issues like a broken bios not allowing boot off a floppy or cdrom. It should not effect your security any worse than doing it straight off, the debian hardening howto should be followed to make it secure afterwards. regards Steven

RE: Security on an old machine

2002-10-15 Thread Jones, Steven
Having done this (floppy install) its a pain to find enough floppies and time consuming. removing hd and shoving it in another machine is way quicker, a netboot install is the other option. regards Thing Since it's Debian, you don't need to stick it in a separate machine. Just get enough

RE: SSL update.. still giving me a Vulnerable status

2002-09-18 Thread Steven
If you are talking about the 443 number after the IP, that is the port number. Https runs on port 443. HTH, Steven exitus acta probat fide, sed cui vide -Original Message- From: Jeroen de Leeuw den Bouter [mailto:[EMAIL PROTECTED]] Sent: Tuesday, September 17, 2002 11:26 PM

RE: SSL update.. still giving me a Vulnerable status

2002-09-18 Thread Steven
If you are talking about the 443 number after the IP, that is the port number. Https runs on port 443. HTH, Steven exitus acta probat fide, sed cui vide -Original Message- From: Jeroen de Leeuw den Bouter [mailto:[EMAIL PROTECTED] Sent: Tuesday, September 17, 2002 11:26 PM

Re: question from a newbie regarding possible trojan

2002-09-17 Thread Steven
-- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Re: question from a newbie regarding possible trojan

2002-09-17 Thread Steven

RE: Mail relay attempts

2002-08-27 Thread Jones, Steven
Ive found port sentry really good for detecting port scans and then routeing the return packets to no where. :) Thing -Original Message- From: Rolf Kutz [mailto:[EMAIL PROTECTED] Sent: Wednesday, 28 August 2002 4:10 To: [EMAIL PROTECTED] Debian. Org Subject: Re: Mail relay attempts *

RE: [SECURITY] [DSA-134-1] OpenSSH remote vulnerability

2002-06-24 Thread Jones, Steven
I would suggest it means either write a tight firewall ruleset to restrict access or dont allow connections from the interneta t all. Ive now donethe latter, after the previous weakness its just to great a risk. regards Steven -Original Message- From: Phillip Hofmeister [mailto:[EMAIL

Re: ipop3d delays

2002-03-07 Thread Steven Barker
lookups (reject will usually work), or to configure ipop3d to not do to lookups in the first place. I would say that the first is probably better as many other services (SMTP comes to mind) also do ident lookups on anyone who connects to them. Hope that helps. -- Steven Barker

RE: Emulate real ip's to access intranet hosts from outside

2002-02-13 Thread Steven
that can have security implications. My .03, adjusted for inflation Steven exitus acta probat fide, sed cui vide -Original Message- From: Phillip Hofmeister [mailto:[EMAIL PROTECTED]] Sent: Wednesday, February 13, 2002 6:42 AM To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject

RE: Emulate real ip's to access intranet hosts from outside

2002-02-13 Thread Steven
that can have security implications. My .03, adjusted for inflation Steven exitus acta probat fide, sed cui vide -Original Message- From: Phillip Hofmeister [mailto:[EMAIL PROTECTED] Sent: Wednesday, February 13, 2002 6:42 AM To: [EMAIL PROTECTED] Cc: debian-security

RE: Secure 2.4.x kernel

2001-12-21 Thread Steven James
: 171 - Release Date: 12/19/2001 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED] steven james, director of research, linux labs LinuxBIOS Cluster Solutions 230 peachtree st nw

Re: Two questions about /etc/apt/sources.list

2001-10-23 Thread Steven Barker
being provided on a non-us machine, they include non-us packages along with the regular ones. -- Steven Barker [EMAIL PROTECTED] You will stop at nothing to reach your objective, but only because your brakes are defective. GnuPG public key: http

Re: Two questions about /etc/apt/sources.list

2001-10-23 Thread Steven Barker
? Yes, stable/updates does include non-us packages (like ssh) so you should be kept up on all security updates. -- Steven Barker [EMAIL PROTECTED] The bigger they are, the harder they hit. Get my GnuPG public key at: http://www.blckknght.org/pubkey.asc

Re: Two questions about /etc/apt/sources.list

2001-10-23 Thread Steven Barker
being provided on a non-us machine, they include non-us packages along with the regular ones. -- Steven Barker [EMAIL PROTECTED] You will stop at nothing to reach your objective, but only because your brakes are defective. GnuPG public key: http

Re: Two questions about /etc/apt/sources.list

2001-10-23 Thread Steven Barker
? Yes, stable/updates does include non-us packages (like ssh) so you should be kept up on all security updates. -- Steven Barker [EMAIL PROTECTED] The bigger they are, the harder they hit. Get my GnuPG public key at: http://www.blckknght.org/pubkey.asc

Re: TREAT URGENT

2001-10-17 Thread Steven Barker
/419coal/ would be a good place to start). -- Steven Barker [EMAIL PROTECTED] The universe is like a safe to which there is a combination -- but the combination is locked up in the safe. -- Peter DeVries GnuPG public key: http

Re: TREAT URGENT

2001-10-16 Thread Steven Barker
/alphae/419coal/ would be a good place to start). -- Steven Barker [EMAIL PROTECTED] The universe is like a safe to which there is a combination -- but the combination is locked up in the safe. -- Peter DeVries GnuPG public key: http

Re: FW: a filter for tcp socket

2001-09-06 Thread Steven James
of unsubscribe. Trouble? Contact [EMAIL PROTECTED] -steven james, director of research, linux labs LinuxBIOS Cluster Solutions 230 peachtree st nw ste 701 High-Speed Colocation, Hosting, atlanta.ga.us 30303 Web Design, Linux Hardware

Re: listen on tcp port and log input ??

2001-09-05 Thread Steven Barker
connection then quit, however. I'm not sure if thats what you want. Its a place to start, anyway. -- Steven Barker [EMAIL PROTECTED] Goldenstern's Rules: (1) Always hire a rich attorney (2) Never buy from a rich salesman. GnuPG public key

Re: A thought on Layne

2001-09-01 Thread Steven Barker
be funny. Of course, he's using MS Outlook Express (judging from his headers) so it would probably be have to be his ISP that got rooted. -- Steven Barker [EMAIL PROTECTED] God is a comedian playing to an audience too afraid to laugh. - Voltaire GnuPG

Re: Layne (was: Re: Is ident secure?)

2001-09-01 Thread Steven Barker
forwarded one of the messages to [EMAIL PROTECTED] Perhaps they'll respond faster if they get more than one complaint? -- Steven Barker [EMAIL PROTECTED] ultima netgod: My calculator has more registers than the x86, and -thats- sad GnuPG public key

Re: Is ident secure?

2001-09-01 Thread Steven Barker
abuse. -- Steven Barker [EMAIL PROTECTED] In Tennessee, it is illegal to shoot any game other than whales from a moving automobile. GnuPG public key: http://www.students.uiuc.edu/~scbarker/pubkey.asc Fingerprint: 272A 3EC8 52CE F22B F745 775E 5292 F743 EBD5

Re: HARASS ME MORE.........

2001-09-01 Thread Steven Barker
- From: Layne [EMAIL PROTECTED] To: debian-security@lists.debian.org; Steven Barker [EMAIL PROTECTED] Sent: Saturday, September 01, 2001 12:44 AM Subject: HARASS ME MORE. I ASKED YOU MORONS NOT TO SEND ME ANYMORE E-MAIL BUT HERE YOU GO AGAIN. IS THERE ANY INTELLIGENT PEOPLE

Re: A thought on Layne

2001-09-01 Thread Steven Barker
be funny. Of course, he's using MS Outlook Express (judging from his headers) so it would probably be have to be his ISP that got rooted. -- Steven Barker [EMAIL PROTECTED] God is a comedian playing to an audience too afraid to laugh. - Voltaire GnuPG public

Re: Layne (was: Re: Is ident secure?)

2001-08-31 Thread Steven Barker
forwarded one of the messages to [EMAIL PROTECTED] Perhaps they'll respond faster if they get more than one complaint? -- Steven Barker [EMAIL PROTECTED] ultima netgod: My calculator has more registers than the x86, and -thats- sad GnuPG public key

Re: Is ident secure?

2001-08-31 Thread Steven Barker
abuse. -- Steven Barker [EMAIL PROTECTED] In Tennessee, it is illegal to shoot any game other than whales from a moving automobile. GnuPG public key: http://www.students.uiuc.edu/~scbarker/pubkey.asc Fingerprint: 272A 3EC8 52CE F22B F745 775E 5292 F743 EBD5

Re: gnupg fingerprint

2001-08-29 Thread Steven Barker
doing gpg --recv-key followed by their key ID. The key ID is the last 8 characters of the fingerprint (so my key ID, as seen in the fingerprint in my sig, is EBD5936B). I hope that helps. -- Steven Barker [EMAIL PROTECTED] Non-Determinism is not meant

Re: Running root commands by http

2001-08-23 Thread Steven Barker
ssh into a host from any web browser. Once they're logged in, you can let them do admin stuff with setuid programs, or sudo, or something of that nature. -- Steven Barker [EMAIL PROTECTED] When you're dining out and you suspect something's wrong, you're

Re: File transfer using ssh

2001-08-23 Thread Steven Barker
the interfaces of rcp and ftp respectively. Neither require anything other than sshd to be running on the server. -- Steven Barker [EMAIL PROTECTED] If you can count your money, you don't have a billion dollars. -- J. Paul Getty PGP Key Fingerprint

Re: Running root commands by http

2001-08-23 Thread Steven Barker
ssh into a host from any web browser. Once they're logged in, you can let them do admin stuff with setuid programs, or sudo, or something of that nature. -- Steven Barker [EMAIL PROTECTED] When you're dining out and you suspect something's wrong, you're

Re: File transfer using ssh

2001-08-22 Thread Steven Barker
the interfaces of rcp and ftp respectively. Neither require anything other than sshd to be running on the server. -- Steven Barker [EMAIL PROTECTED] If you can count your money, you don't have a billion dollars. -- J. Paul Getty PGP Key Fingerprint

Re: apt sources.list

2001-08-21 Thread Steven James
? Contact [EMAIL PROTECTED] -steven james, director of research, linux labs LinuxBIOS Cluster Solutions 230 peachtree st nw ste 701 High-Speed Colocation, Hosting, atlanta.ga.us 30303 Web Design, Linux Hardware,http

Re: strangelog

2001-08-12 Thread Steven Barker
) This is root (uid=0) becoming nobody. It's surely a cron job that is setup to change user to nobody before running. The locate package runs updatedb as nobody every day, for example. -- Steven Barker [EMAIL PROTECTED] Woolsey-Swanson Rule: People would

Re: red worm amusement

2001-07-22 Thread Steven Barker
security and the simplicity of apt-get install foo. -- Steven Barker [EMAIL PROTECTED] Perhaps, after all, America never has been discovered. I myself would say that it had merely been detected. -- Oscar Wilde PGP Key Fingerprint: 1A33 9F2E

Re: red worm amusement

2001-07-22 Thread Steven Barker
security and the simplicity of apt-get install foo. -- Steven Barker [EMAIL PROTECTED] Perhaps, after all, America never has been discovered. I myself would say that it had merely been detected. -- Oscar Wilde PGP Key Fingerprint: 1A33

Re: red worm amusement

2001-07-22 Thread Steven Barker
On Sat, Jul 21, 2001 at 11:59:17PM -0700, Mike Fedyk wrote: On Sun, Jul 22, 2001 at 02:50:14AM -0400, Steven Barker wrote: I think that there should be a way to install a debian server packages without having the installation scripts start the server. This need not be default

Re: --no-run option (was: Re: red worm amusement)

2001-07-22 Thread Steven Barker
On Sun, Jul 22, 2001 at 04:00:43PM +0200, Bernhard R. Link wrote: On Sun, 22 Jul 2001, Steven Barker wrote: I think that there should be a way to install a debian server packages without having the installation scripts start the server. This need not be default, but it should be possible

  1   2   >