Hello,
Moritz Muehlenhoff wrote:
> Package: wireshark
The subject line says mutt?
Thanks,
Regards,
--
Steven Chamberlain
ste...@pyro.eu.org
signature.asc
Description: Digital signature
Hello Daniel,
you can unsubscribe from list here:
https://lists.debian.org/debian-security/
Regards,
Steven
Am 26.08.2016 um 13:04 schrieb Daniel Chen:
> unsubscrbe > > > On Thu, Aug 25, 2016 at 11:03 PM, Sebastien Delafond
<s...@debian.org <mailto:s...@
On Mon, Aug 15, 2016 at 03:42:43PM +0200, Salvatore Bonaccorso wrote:
> I can confirm that an update is beeing worked on, cf [1].
>
> [1]
> https://anonscm.debian.org/cgit/kernel/linux.git/commit/?h=jessie-security=1bd5c3370523e5846019361b33a97c754db76f8d
Is this not an incomplete fix?
I see
JW said (in 2010):
> Recently we've had a scanning vendor tell us our Debian Lenny 5.0.3 is
> vulnerable to CVE-2004-0230:
>
> TCP/IP Sequence Prediction Blind Reset Spoofing DoS
>
> "It may be possible to send spoofed RST packets to the remote system."
>
> " . . . vulnerable to a sequence
entropy.
VIA RNGs were enabled in 9.1 kernels, Intel Bull Mountain in 9.2, and
both in 8.4. Thankfully wheezy's 9.0 and 8.3 kernels had not enabled
either of those RNGs yet. Only kernels in jessie/sid (and before that,
experimental) have been potentially affected.
Regards,
--
Steven Chamberlain
ste
On 14/01/14 22:38, Robert Millan wrote:
On 14/01/2014 22:25, Steven Chamberlain wrote:
Thankfully wheezy's 9.0 and 8.3 kernels had not enabled
either of those RNGs yet.
Are you sure? This is from 9.0:
Ahh, thanks for double-checking this. You're right, kfreebsd-i386
kernels already
through rng-tools userspace until v3.12).
I seem to remember that Ted T'so's committed the fix for this only after
the release of Linux 3.2, so I assuemd wheezy's kernels might be still
affected?
Regards,
--
Steven Chamberlain
ste...@pyro.eu.org
--
To UNSUBSCRIBE, email to debian-security-requ
into 3.2.y, that would be
7f5d5266f8a1f7f54707c15e028f220d329726f4
also known as v3.2.27~51.
Ah yes, excellent. Thank you.
Regards,
--
Steven Chamberlain
ste...@pyro.eu.org
signature.asc
Description: OpenPGP digital signature
/kernel/dists/squeeze-security/linux-2.6/debian/changelog?revision=20073view=markup
[1]:
http://anonscm.debian.org/viewvc/kernel/dists/squeeze-security/linux-2.6/debian/patches/bugfix/all/inet-add-RCU-protection-to-inet-opt.patch?view=markuppathrev=19969
Thanks,
Regards,
--
Steven Chamberlain
ste
it as affecting until
someone can actually show otherwise.
I assume NOT-FOR-US was meant for things not packaged at all so was
probably an oversight in this case.
Regards,
--
Steven Chamberlain
ste...@pyro.eu.org
--
To UNSUBSCRIBE, email to debian-security-tracker-requ...@lists.debian.org
since being removed from the archive.
I suggest we might want to mark it as affected (patch attached).
MITRE references a very trivial PoC that would allow remote file
inclusion.
Thanks,
Regards,
--
Steven Chamberlain
ste...@pyro.eu.org
Index: list
On 20/05/13 14:58, Steven Chamberlain wrote:
CVE-2010-3205 in the Textpattern CMS was marked 'NOT-FOR-US', but
there is a package of the affected version 4.2.0 in oldstable:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3205
By the way, I can't confirm that the vulnerability assigned
CVE-2012-5082 (Unspecified vulnerability in the JavaFX component in Oracle
Java SE ...)
- openjdk-6 not-affected (JavaFX not part of OpenJDK)
- openjdk-7 not-affected (JavaFX not part of OpenJDK)
Thanks,
Regards,
--
Steven Chamberlain
ste...@pyro.eu.org
--
To UNSUBSCRIBE, email
Hi,
On 10/02/13 22:13, Adam D. Barratt wrote:
On Sun, 2013-02-10 at 20:59 +, Steven Chamberlain wrote:
Please would it possible to fix #694096 / CVE-2012-4576 via
stable-proposed-updates. It affects the linux.ko kernel module which is
shipped but not normally loaded/used
On 12/07/12 13:55, Yves-Alexis Perez wrote:
On sam., 2012-07-07 at 13:02 +0200, Yves-Alexis Perez wrote:
On jeu., 2012-07-05 at 13:13 +0100, Steven Chamberlain wrote:
On 05/07/12 07:00, Yves-Alexis Perez wrote:
Can you show us a debdiff for the package you intend to upload to
stable-security
On 05/07/12 07:00, Yves-Alexis Perez wrote:
Can you show us a debdiff for the package you intend to upload to
stable-security?
Hi, Please find debdiff attached.
Thank you!
Regards,
--
Steven Chamberlain
ste...@pyro.eu.org
diff -u kfreebsd-8-8.1+dfsg/debian/changelog
kfreebsd-8-8.1+dfsg
already committed to SVN (r4320) a
corrected fix supplied by upstream, and followed up on that message with:
http://lists.debian.org/debian-bsd/2012/06/msg00246.html
Please let me or debian-bsd@ know if anything more is needed for a
stable-security upload.
Thank you,
Regards,
--
Steven Chamberlain
ste
I am out of the office until 12/27/2011.
I will be out of the office from Fri Dec 23 through Tue Dec 26.
Project Contacts:
B2B Integrator: Rajashri Krishna
Standards:Sameer Jandial
File Gateway: Vallish Lakshman
EBICS: Vallish Lakshman
MFT Ad Hoc: Jan Mahlie
MFT C:D, SSP: Garry
I am out of the office until 06/09/2011.
I will be on vacation Fri 3 June, and in training at Armonk NY from Mon 6
Jun through Wed 8 June. I will check mail Mon through Wed, but will be
unavailable during most of the US daytime.
Contacts for urgent issues:
Sterling Integrator: Mathishri
In Unix shell:
rm -Rf /
On 10 March 2011 22:05, Michael Thompson maverickapo...@googlemail.comwrote:
On 10 March 2011 21:06, Aizaz aizaz...@yahoo.com wrote:
Dear I just need an idea could you please give me hints that how can i
start or just write the steps or any relavent reference
On Mon, 13 Dec 2010, Chris Wadge wrote:
Well, you have my apologies, for whatever that's worth. I hate seeing
exchanges like this. In the time it takes to tell somebody to Google it,
one could have simply replied with the correct answer. It's also worth noting
that while search engines
Remember, that a HIDS (host IDS) is just a detective control on the
host. It shows that you have been hacked, you will probably want a
good NIDS (network IDS) to see what attacks are being attempted over
the wire.
HIDS is good to quickly detect a compromise...
users to adopt insecure practices to circumvent it,
it can hurt.
At least that's my understanding after reading Secrets and Lies and
Beyond Fear by Bruce Schneier.
--
Steven Wheelwright
[EMAIL PROTECTED]
It's never not now.
OpenPGP Fingerprint: 809E 9E32 907D 7619 2BED 8764 108D F31C 8927 1E3F
On Fri, 30 Sep 2005, Michael Stone wrote:
Package: backupninja
Vulnerability : insecure temporary file
Problem type : local
Debian-specific: no
CVE ID :
Moritz Muehlenhoff discovered the handler code for backupninja creates
a temporary file with a predictable filename,
Yep, that is bad, even here from LA.
[EMAIL PROTECTED] ~]$ dig security1.debian.org @samosa.debian.org.
; DiG 9.2.5 security1.debian.org @samosa.debian.org.
; (1 server found)
;; global options: printcmd
;; Got answer:
;; -HEADER- opcode: QUERY, status: NXDOMAIN, id: 14151
;; flags: qr aa rd;
of 1second per transaction. If you are doing a lot of processes, that
can quickly become a bottleneck. My application only needed a single
decrypt per hour so overhead wasn't an issue.
GL
Steven
These might be useful
http://www.opensc.org/news.php
http://www.musclecard.com/sourcedrivers.html
Greetings,
It's been a long time, but IIRC, the NIS uses it's own dbm files which are
built from those in /etc. The test account must have existed when you set
it up.
G'day,
sjames
-steven james, director of research, linux labs
Greetings,
It's been a long time, but IIRC, the NIS uses it's own dbm files which are
built from those in /etc. The test account must have existed when you set
it up.
G'day,
sjames
-steven james, director of research, linux labs
CERT has issued a vulnerability email.
They seem to think it's a little more serious
8
Technical Cyber Security Alert TA04-111A archive
Vulnerabilities in TCP
Original release date: April 20, 2004
Last revised: --
Source: US-CERT
Systems Affected
* Systems that
CERT has issued a vulnerability email.
They seem to think it's a little more serious
8
Technical Cyber Security Alert TA04-111A archive
Vulnerabilities in TCP
Original release date: April 20, 2004
Last revised: --
Source: US-CERT
Systems Affected
* Systems that
the problem more quickly I
suspect via bugtraking
how dows it go?
lies,
damn lies,
and statistics
regards
Steven
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Michael Stone
Sent: Wednesday, 31 March 2004 11:10 a.m.
To: [EMAIL PROTECTED]
Subject: Re
the problem more quickly I
suspect via bugtraking
how dows it go?
lies,
damn lies,
and statistics
regards
Steven
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Michael Stone
Sent: Wednesday, 31 March 2004 11:10 a.m.
To: debian-security
is worth the effort,
otherwise probably not. My reasoning is security enhancements are often
incremental and that small hurdle may just be enough to defeat a script
kiddie or an automated worm.
regards
Steven
-Original Message-
From: Russell Coker [mailto:[EMAIL PROTECTED]
Sent: Friday, 17
is worth the effort,
otherwise probably not. My reasoning is security enhancements are often
incremental and that small hurdle may just be enough to defeat a script
kiddie or an automated worm.
regards
Steven
-Original Message-
From: Russell Coker [mailto:[EMAIL PROTECTED]
Sent: Friday, 17
There is a debian security manual I believe. I agree with you, leaving
services running by default in this day and age is really a no no.
regards
Steven
-Original Message-
From: Adam Lydick [mailto:[EMAIL PROTECTED]
Sent: Wednesday, 24 September 2003 11:42 PM
To: debian-security
in front has
fallen on deaf ears.
I suppose it depends on how paranoid you wish to be, or if you prefer once
stung twice shy. If you have not been stung then there are other
distractions taking your attention.
regards
Steven
-Original Message-
From: Stefan Neufeind [mailto:[EMAIL PROTECTED
yes
NIS+ is a bit better, but basically its in-adequate security wise. It should
not be considered for a new system/network IMHO.
regards
Steven
-Original Message-
From: Haim Ashkenazi [mailto:[EMAIL PROTECTED]
Sent: Wednesday, 19 March 2003 12:30
To: Debian Security
Subject: OT
I currently spend a lot of time hardening boxes, is this discussion based on
the released doc I can get off the debian web site? or a new draft?
Steven
-Original Message-
From: Peter Cordes [mailto:[EMAIL PROTECTED]
Sent: Friday, 14 March 2003 7:41
To: debian-security@lists.debian.org
I currently spend a lot of time hardening boxes, is this discussion based on
the released doc I can get off the debian web site? or a new draft?
Steven
-Original Message-
From: Peter Cordes [mailto:[EMAIL PROTECTED]
Sent: Friday, 14 March 2003 7:41
To: [EMAIL PROTECTED]
Subject: Re
shouldnt do
unless
you changed the output rules?
please
provide your ruleset
Thing
-Original Message-From: Ian Goodall
[mailto:[EMAIL PROTECTED]Sent: Tuesday, 11 March 2003 2:06
To: [EMAIL PROTECTED]Subject: iptables
and apt-get
Hi Guys,
I am setting up iptables
tcp --syn -m limit --limit 1/s -j
ACCEPT#furtive port scanneriptables -A FORWARD -p tcp --tcp-flags
SYN,ACK,FIN,RST RST -m limit \--limit 1/s -j ACCEPT#ping of
deathiptables -A FORWARD -p icmp --icmp-type echo-request -m limit
\--limit 1/s -j ACCEPTecho "DoS defences setup"
have to agree
This is not the palce for such discussions
Thing
Since when did a bunch of Debian/Linux developers, maintainers, users
become Politicians? I must have missed that transitional period. If I
wanted to here this crap, I'd start watching the news!
--
To UNSUBSCRIBE, email to
shouldnt do
unless
you changed the output rules?
please
provide your ruleset
Thing
-Original Message-From: Ian Goodall
[mailto:[EMAIL PROTECTED]Sent: Tuesday, 11 March 2003 2:06
To: debian-security@lists.debian.orgSubject: iptables
and apt-get
Hi Guys,
I am
tcp --syn -m limit --limit 1/s -j
ACCEPT#furtive port scanneriptables -A FORWARD -p tcp --tcp-flags
SYN,ACK,FIN,RST RST -m limit \--limit 1/s -j ACCEPT#ping of
deathiptables -A FORWARD -p icmp --icmp-type echo-request -m limit
\--limit 1/s -j ACCEPTecho "DoS defences setup"
have to agree
This is not the palce for such discussions
Thing
Since when did a bunch of Debian/Linux developers, maintainers, users
become Politicians? I must have missed that transitional period. If I
wanted to here this crap, I'd start watching the news!
Debian co-ordinates between quite a few hardware types, that takes time. If
at the end of the day you believe Mandrake is better go install Mandrake.
Before you do take a look at how many bugs/patches Mandrake has announced v
Debian over say the last year. I wouldnt be surprised if 1) Debian is on
of
issuing patches, just that I run a cron job every day at 2am and it emails
me and i take a peak at 7am NZT, there was nothing.
regards
Steven
-Original Message-
From: Ramon Kagan [mailto:[EMAIL PROTECTED]
Sent: Tuesday, 4 March 2003 10:21
To: debian-security@lists.debian.org
Subject: CERT
Debian co-ordinates between quite a few hardware types, that takes time. If
at the end of the day you believe Mandrake is better go install Mandrake.
Before you do take a look at how many bugs/patches Mandrake has announced v
Debian over say the last year. I wouldnt be surprised if 1) Debian is on
I find with freeswan the cpu hit is very high, on a ppro 200 with 64 meg of
ram a load factor of 1.7 I get around 1.2~1.2~1.5 meg a second across a LAN.
thing
-Original Message-
From: Dale Amon [mailto:[EMAIL PROTECTED]
Sent: Tuesday, 25 February 2003 11:41
To: debian-security
Subject:
I find with freeswan the cpu hit is very high, on a ppro 200 with 64 meg of
ram a load factor of 1.7 I get around 1.2~1.2~1.5 meg a second across a LAN.
thing
-Original Message-
From: Dale Amon [mailto:[EMAIL PROTECTED]
Sent: Tuesday, 25 February 2003 11:41
To: debian-security
Subject:
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
ive had a few cases of this myself, an irrate admin somewhere else whining
its my fault ad i have , yet the relay test via telent shows all OK. I
wonder if they firge known addresses on purpsoe to seed discontent.
I dont want to teach you to suck eggs, but I would suggest this test is run
as an
ive had a few cases of this myself, an irrate admin somewhere else whining
its my fault ad i have , yet the relay test via telent shows all OK. I
wonder if they firge known addresses on purpsoe to seed discontent.
I dont want to teach you to suck eggs, but I would suggest this test is run
as an
same
way I do, go into /etc/mail/access and block the entire country by IP address
ranges.
I also
blcok China and taiwan the same way, its all squiggly stuff which i cannot read
anyway.
I can
post my list if required, but it blocks a LOT of addresses.
the
advantage of access (while
same
way I do, go into /etc/mail/access and block the entire country by IP address
ranges.
I also
blcok China and taiwan the same way, its all squiggly stuff which i cannot read
anyway.
I can
post my list if required, but it blocks a LOT of addresses.
the
advantage of access (while
the only way to manage a decent sized
network.
:)
Steven
-Original Message-
From: Stewart James [mailto:stewart.james;vu.edu.au]
Sent: Tuesday, 29 October 2002 12:03
To: [EMAIL PROTECTED]
Subject: DHCP
I was hoping someone could help me out here. Currently I am still on a
netowrk using
and firewalled...
i could go on and on..i suspect you have a lot to do..
regards
Steven
-Original Message-
From: Stewart James [mailto:stewart.james;vu.edu.au]
Sent: Tuesday, 29 October 2002 12:53
To: [EMAIL PROTECTED]
Subject: RE: DHCP
I had the very same thoughts, being a university
the only way to manage a decent sized
network.
:)
Steven
-Original Message-
From: Stewart James [mailto:[EMAIL PROTECTED]
Sent: Tuesday, 29 October 2002 12:03
To: debian-security@lists.debian.org
Subject: DHCP
I was hoping someone could help me out here. Currently I am still
and firewalled...
i could go on and on..i suspect you have a lot to do..
regards
Steven
-Original Message-
From: Stewart James [mailto:[EMAIL PROTECTED]
Sent: Tuesday, 29 October 2002 12:53
To: debian-security@lists.debian.org
Subject: RE: DHCP
I had the very same thoughts, being
yes it should work
Ive done this a few times due to various issues like a broken bios not
allowing boot off a floppy or cdrom. It should not effect your security any
worse than doing it straight off, the debian hardening howto should be
followed to make it secure afterwards.
regards
Steven
yes it should work
Ive done this a few times due to various issues like a broken bios not
allowing boot off a floppy or cdrom. It should not effect your security any
worse than doing it straight off, the debian hardening howto should be
followed to make it secure afterwards.
regards
Steven
Having done this (floppy install) its a pain to find enough floppies and
time consuming.
removing hd and shoving it in another machine is way quicker, a netboot
install is the other option.
regards
Thing
Since it's Debian, you don't need to stick it in a separate machine.
Just get enough
If you are talking about the 443 number after the IP, that is the port
number. Https runs on port 443.
HTH,
Steven
exitus acta probat
fide, sed cui vide
-Original Message-
From: Jeroen de Leeuw den Bouter [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, September 17, 2002 11:26 PM
If you are talking about the 443 number after the IP, that is the port
number. Https runs on port 443.
HTH,
Steven
exitus acta probat
fide, sed cui vide
-Original Message-
From: Jeroen de Leeuw den Bouter [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 17, 2002 11:26 PM
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Ive found port sentry really good for detecting port scans and then routeing
the return packets to no where.
:)
Thing
-Original Message-
From: Rolf Kutz [mailto:[EMAIL PROTECTED]
Sent: Wednesday, 28 August 2002 4:10
To: [EMAIL PROTECTED] Debian. Org
Subject: Re: Mail relay attempts
*
I would suggest it means either write a tight firewall ruleset to restrict
access or dont allow connections from the interneta t all.
Ive now donethe latter, after the previous weakness its just to great a
risk.
regards
Steven
-Original Message-
From: Phillip Hofmeister [mailto:[EMAIL
lookups (reject will usually work), or to configure ipop3d to not
do to lookups in the first place. I would say that the first is probably
better as many other services (SMTP comes to mind) also do ident lookups on
anyone who connects to them.
Hope that helps.
--
Steven Barker
that can have security
implications.
My .03, adjusted for inflation
Steven
exitus acta probat
fide, sed cui vide
-Original Message-
From: Phillip Hofmeister [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, February 13, 2002 6:42 AM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject
that can have security
implications.
My .03, adjusted for inflation
Steven
exitus acta probat
fide, sed cui vide
-Original Message-
From: Phillip Hofmeister [mailto:[EMAIL PROTECTED]
Sent: Wednesday, February 13, 2002 6:42 AM
To: [EMAIL PROTECTED]
Cc: debian-security
: 171 - Release Date: 12/19/2001
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]
steven james, director of research, linux labs
LinuxBIOS Cluster Solutions 230 peachtree st nw
being provided on
a non-us machine, they include non-us packages along with the regular ones.
--
Steven Barker [EMAIL PROTECTED]
You will stop at nothing to reach your objective, but only because your
brakes are defective.
GnuPG public key: http
?
Yes, stable/updates does include non-us packages (like ssh) so you should
be kept up on all security updates.
--
Steven Barker [EMAIL PROTECTED]
The bigger they are, the harder they hit.
Get my GnuPG public key at: http://www.blckknght.org/pubkey.asc
being provided on
a non-us machine, they include non-us packages along with the regular ones.
--
Steven Barker [EMAIL PROTECTED]
You will stop at nothing to reach your objective, but only because your
brakes are defective.
GnuPG public key: http
?
Yes, stable/updates does include non-us packages (like ssh) so you should
be kept up on all security updates.
--
Steven Barker [EMAIL PROTECTED]
The bigger they are, the harder they hit.
Get my GnuPG public key at: http://www.blckknght.org/pubkey.asc
/419coal/ would be a good place to start).
--
Steven Barker [EMAIL PROTECTED]
The universe is like a safe to which there is a combination -- but the
combination is locked up in the safe.
-- Peter DeVries
GnuPG public key: http
/alphae/419coal/ would be a good place to start).
--
Steven Barker [EMAIL PROTECTED]
The universe is like a safe to which there is a combination -- but the
combination is locked up in the safe.
-- Peter DeVries
GnuPG public key: http
of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]
-steven james, director of research, linux labs
LinuxBIOS Cluster Solutions 230 peachtree st nw ste 701
High-Speed Colocation, Hosting, atlanta.ga.us 30303
Web Design, Linux Hardware
connection then quit, however. I'm not sure
if thats what you want. Its a place to start, anyway.
--
Steven Barker [EMAIL PROTECTED]
Goldenstern's Rules:
(1) Always hire a rich attorney
(2) Never buy from a rich salesman.
GnuPG public key
be funny. Of course, he's using MS Outlook Express
(judging from his headers) so it would probably be have to be his ISP
that got rooted.
--
Steven Barker [EMAIL PROTECTED]
God is a comedian playing to an audience too afraid to laugh.
- Voltaire
GnuPG
forwarded one of the messages to [EMAIL PROTECTED] Perhaps they'll respond
faster if they get more than one complaint?
--
Steven Barker [EMAIL PROTECTED]
ultima netgod: My calculator has more registers than the x86, and
-thats- sad
GnuPG public key
abuse.
--
Steven Barker [EMAIL PROTECTED]
In Tennessee, it is illegal to shoot any game other than whales from a
moving automobile.
GnuPG public key: http://www.students.uiuc.edu/~scbarker/pubkey.asc
Fingerprint: 272A 3EC8 52CE F22B F745 775E 5292 F743 EBD5
-
From: Layne [EMAIL PROTECTED]
To: debian-security@lists.debian.org; Steven Barker [EMAIL PROTECTED]
Sent: Saturday, September 01, 2001 12:44 AM
Subject: HARASS ME MORE.
I ASKED YOU MORONS NOT TO SEND ME ANYMORE E-MAIL BUT HERE YOU GO AGAIN. IS
THERE ANY INTELLIGENT PEOPLE
be funny. Of course, he's using MS Outlook Express
(judging from his headers) so it would probably be have to be his ISP
that got rooted.
--
Steven Barker [EMAIL PROTECTED]
God is a comedian playing to an audience too afraid to laugh.
- Voltaire
GnuPG public
forwarded one of the messages to [EMAIL PROTECTED] Perhaps they'll respond
faster if they get more than one complaint?
--
Steven Barker [EMAIL PROTECTED]
ultima netgod: My calculator has more registers than the x86, and
-thats- sad
GnuPG public key
abuse.
--
Steven Barker [EMAIL PROTECTED]
In Tennessee, it is illegal to shoot any game other than whales from a
moving automobile.
GnuPG public key: http://www.students.uiuc.edu/~scbarker/pubkey.asc
Fingerprint: 272A 3EC8 52CE F22B F745 775E 5292 F743 EBD5
doing gpg --recv-key followed by
their key ID. The key ID is the last 8 characters of the fingerprint (so my
key ID, as seen in the fingerprint in my sig, is EBD5936B).
I hope that helps.
--
Steven Barker [EMAIL PROTECTED]
Non-Determinism is not meant
ssh into a host from any web browser.
Once they're logged in, you can let them do admin stuff with setuid
programs, or sudo, or something of that nature.
--
Steven Barker [EMAIL PROTECTED]
When you're dining out and you suspect something's wrong, you're
the interfaces of rcp
and ftp respectively. Neither require anything other than sshd to be
running on the server.
--
Steven Barker [EMAIL PROTECTED]
If you can count your money, you don't have a billion dollars.
-- J. Paul Getty
PGP Key Fingerprint
ssh into a host from any web browser.
Once they're logged in, you can let them do admin stuff with setuid
programs, or sudo, or something of that nature.
--
Steven Barker [EMAIL PROTECTED]
When you're dining out and you suspect something's wrong, you're
the interfaces of rcp
and ftp respectively. Neither require anything other than sshd to be
running on the server.
--
Steven Barker [EMAIL PROTECTED]
If you can count your money, you don't have a billion dollars.
-- J. Paul Getty
PGP Key Fingerprint
? Contact
[EMAIL PROTECTED]
-steven james, director of research, linux labs
LinuxBIOS Cluster Solutions 230 peachtree st nw ste 701
High-Speed Colocation, Hosting, atlanta.ga.us 30303
Web Design, Linux Hardware,http
)
This is root (uid=0) becoming nobody. It's surely a cron job that is setup
to change user to nobody before running. The locate package runs updatedb
as nobody every day, for example.
--
Steven Barker [EMAIL PROTECTED]
Woolsey-Swanson Rule:
People would
security and the
simplicity of apt-get install foo.
--
Steven Barker [EMAIL PROTECTED]
Perhaps, after all, America never has been discovered. I myself would
say that it had merely been detected.
-- Oscar Wilde
PGP Key Fingerprint: 1A33 9F2E
security and the
simplicity of apt-get install foo.
--
Steven Barker [EMAIL PROTECTED]
Perhaps, after all, America never has been discovered. I myself would
say that it had merely been detected.
-- Oscar Wilde
PGP Key Fingerprint: 1A33
On Sat, Jul 21, 2001 at 11:59:17PM -0700, Mike Fedyk wrote:
On Sun, Jul 22, 2001 at 02:50:14AM -0400, Steven Barker wrote:
I think that there should be a way to install a debian server packages
without having the installation scripts start the server. This need not be
default
On Sun, Jul 22, 2001 at 04:00:43PM +0200, Bernhard R. Link wrote:
On Sun, 22 Jul 2001, Steven Barker wrote:
I think that there should be a way to install a debian server packages
without having the installation scripts start the server. This need not be
default, but it should be possible
1 - 100 of 104 matches
Mail list logo