/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5aa90a84589282b87666f92b6c3c917c8080a9bf
Vincent Deffontaines
?
It seems your apache2 fails at notifying status.modsecurity.org online,
as it is starting.
See
https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual#SecStatusEngine
for more details.
Vincent
--
What is it you need, that makes your heart beat ?
Do you really know, cause it doesn't show.
New Order - Round & round
On Fri, May 20, 2016 at 11:23 PM, Ralph Sanchez <rwsanch...@gmail.com> wrote:
> I tried setenforce and what not, but they simply returned the SELinux
> was not enabled.
Can you post your GRUB configuration?
Brandon Vincent
es, subscriptions
etc.) to determine your location far more accurately. Try out the
following (if you live within the United States, you'll probably be
shocked at the accuracy):
http://ipinfo.io
https://www.maxmind.com/en/locate-my-ip-address
Brandon Vincent
It sounds more like your login was what was throwing the alert.
The best advice I can offer is to not use an "untrusted" VPN. Free VPN
services have to make money somehow.
Brandon Vincent
//github.com/tintinweb/striptls
[2] https://www.eff.org/deeplinks/2014/11/starttls-downgrade-attacks
[3] https://tools.ietf.org/html/rfc2595
Brandon Vincent
popo
-Message d'origine-
De : Salvatore Bonaccorso [mailto:car...@debian.org]
Envoyé : jeudi 14 janvier 2016 22:53
À : debian-security-annou...@lists.debian.org
Objet : [SECURITY] [DSA 3431-2] ganeti regression update
Importance : Haute
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
❦ 2 novembre 2015 20:00 +0100, Moritz Mühlenhoff :
>> There are many tradeoffs recently with projects that do not want to
>> provide a sensible security track for stable releases:
>>
>> - always package the latest release (Chromium)
>
> For chromium and iceweasel the vast
❦ 1 novembre 2015 23:22 +0100, Moritz Muehlenhoff :
> Security support for elasticsearch in jessie is hereby discontinued. The
> project no longer releases information on fixed security issues which
> allow backporting them to released versions of Debian and actively
>
Package: security-tracker
Severity: normal
On https://security-tracker.debian.org/tracker/CVE-2014-3660 I can see:
Release Version Status
jessie2.9.1+dfsg1-5 fixed
stretch 2.9.1+dfsg1-5 vulnerable
i.e. the same version of the package is listed both as fixed and
,
Vincent
--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/01628a71ffdcbbaab3e6816de3861...@raceme.org
On 06/09/2014 01:30 PM, Andrea Zwirner wrote:
Will the update be available for squeeze-lts?
Andrea,
Squeeze-LTS is maintained by volunteers rather than the Debian
security team. If a package is released, a notification should be
posted to the debian-lts-announce mailing list.
Brandon Vincent
to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-annou...@lists.debian.org
Hi,
Wrong subject: s/arpwatch/libgdata/
Cheers,
Vincent
--
To UNSUBSCRIBE, email to debian-security-requ
and that's what happen
with the provided configuration.
--
Vincent Bernat ☯ http://vincent.bernat.im
panic(Attempted to kill the idle task!);
2.2.16 /usr/src/linux/kernel/exit.c
pgppr0EkB7n7u.pgp
Description: PGP signature
VINCENT ti...@reloaded.fr
Jabber : ti...@jabber.fr
KeyID : 0x4BA8A39B
--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
. Vincent.
--
Vincent Zweije zwe...@xs4all.nl| If you're flamed in a group you
http://www.xs4all.nl/~zweije/ | don't read, does anybody get burnt?
[Xhost should be taken out and shot] |-- Paul Tomblin on a.s.r
confirmation tu me mets au
courant des démarches à suivre . Je te laisse mon
adresse au besoin : angelina_robi...@yahoo.fr
Laurentien1320, rue St-PaulAncienne-Lorette, QuébecG2E
1Z4 Cordialement ,
A bientôt
--
Cordialement,
Hautot Vincent.
Chef de projet - Consultant
Hi,
Perhaps with rainbow crack ?
You can seesource code for linux. here ==
http://www.antsight.com/zsl/rainbowcrack/
Regards
Vincent
Le jeudi 23 octobre 2008 à 12:14 +0200, Johann Spies a écrit :
Is it possible to use rainbow tables with a password cracker on Linux
like 'john'? If so
without being prompted for a password at all.
I tend to consider this as a quite bad bug, but it seems it has been so
for a while in Lenny, and even in upstream PAM.
Vincent
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
for details.
Vincent
--
On sait qu'une cité va devenir grande quand on y voit les anciens planter
des arbres, alors qu'ils savent qu'ils ne profiteront jamais de leur
ombre.
Proverbe Grec
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL
in Linux
vanilla kernel since 2.6.21.1
See http://software.inl.fr//trac/wiki/contribs/RandomSkype
Vincent Deffontaines
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
OoO En ce début de soirée du mardi 20 mai 2008, vers 21:45, Alexandros
Papadopoulos [EMAIL PROTECTED] disait:
3. Testing to see if you can still get on to a server is exactly what
I would have done, if my connection had not been killed by the server
itself a few seconds after upgrading the
OoO En cette nuit nuageuse du mercredi 21 mai 2008, vers 01:32, Kees
Cook [EMAIL PROTECTED] disait:
* Add empty DSA-2048, since they weren't any bad ones.
How is it possible?
Thanks.
--
BOFH excuse #63:
not properly grounded, please bury computer
pgp3twM6bO48f.pgp
Description: PGP
OoO En ce début d'après-midi nuageux du samedi 17 mai 2008, vers 14:15,
Nico Golde [EMAIL PROTECTED] disait:
are there updates for this issue for old stable - sarge?
sarge is not affected
I suppose that people may still be interested in blacklist support.
and besides that the security
OoO En ce début d'après-midi nuageux du mardi 13 mai 2008, vers 14:06,
Florian Weimer [EMAIL PROTECTED] disait:
Package: openssl
Vulnerability : predictable random number generator
Some other random questions:
- It seems that firefox does not handle CRL unless manually imported,
OoO En cette soirée bien amorcée du mardi 13 mai 2008, vers 22:21, John
Keimel [EMAIL PROTECTED] disait:
Since some keys are generated automatically, (e.g. ssh host keys) users will
have to regenerate keys,they haven't generated in the first place and might
not be aware of their existens.
OoO En cette soirée bien amorcée du mardi 13 mai 2008, vers 22:38, John
Keimel [EMAIL PROTECTED] disait:
Restarting OpenSSH do not close existing connections.
Yes, that's correct. I agree.
But the instructions I saw were for 'shutting down the SSHD server' -
not just 'restarting it'.
of calling iptables multiple times. (IIRC, at some point in the past,
debian used that to save
rules at system shutdown and reload them at boot, but I may be wrong).
Vincent
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
, and posh has it. I prefer the formulation from the posh manpage:
In the above modifiers, the : can be omitted, in which case the
conditions only depend on name being set (as opposed to set and not
null). [...]
Vincent
--
Vincent Danjean GPG key ID 0x9D025E87
port but not totally unheard of.
Indeed, root has to be running it. It looks like a privileged port to me.
Vincent Deffontaines
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
On Fri, 2005-09-30 at 08:49 +0200, Martin Schulze wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 829-1 [EMAIL PROTECTED]
http://www.debian.org/security/
Hi !
proftpd in Sarge is vulnerable to a format string vulnerability. The
corresponding bug is marked as fixed in 1.2.10-20 and found in
1.2.10-15 (which is the Sarge version). This means that the Sarge
version is still vulnerable. However, the bug is closed and not tagged
OoO Pendant le journal télévisé du dimanche 31 juillet 2005, vers
20:29, Nikita V. Youshchenko [EMAIL PROTECTED] disait:
Requiring users to install an important component (which Mozilla is) from
other sources is a bad idea in this context. I think it should not be the
way how Debian
OoO En cette fin de matinée radieuse du mardi 26 juillet 2005, vers
11:02, martin f krafft [EMAIL PROTECTED] disait:
However, I feel that our users should be told about the problem, and
not just through Joey's blog entry. Thus, can I please urge the
security team to release an appropriate
OoO En cette fin de matinée radieuse du mercredi 27 juillet 2005, vers
11:21, martin f krafft [EMAIL PROTECTED] disait:
security-announce seems unavailable too.
How so? lists.debian.org is up and a message sent and signed by the
security team to -security-announce should show up. Or am I
. Most distributions
kindly add all these helpful mailcap entries.
my mailcap file (made by Debian installation) doesn't have any of this
capabilities. Cannot verify for others distributions but that's a Debian
list here anyway ...
--
Vincent Hanquez
--
To UNSUBSCRIBE, email to [EMAIL
Hello,
I juste write a little documentation about how I create a chrooted environment
for ssh, you can find the doc at:
http://vince.kerneled.org/files/ssh_chroot.txt
Please, give me some comments about the method I adopt here.
Regards,
--
Vincent Tantardini [EMAIL PROTECTED]
Kerneled
others have
noticed stuff.
Vincent
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
others have
noticed stuff.
Vincent
that explain that kind of reverse-proxy setup.
You can also consider using Apache with mod_proxy, and possibly mod_security
Vincent
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
that explain that kind of reverse-proxy setup.
You can also consider using Apache with mod_proxy, and possibly mod_security
Vincent
in your httpd.conf
Vincent
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
in your httpd.conf
Vincent
OoO Peu avant le début de l'après-midi du dimanche 07 mars 2004, vers
13:13, EErdem [EMAIL PROTECTED] disait:
I've searched, but couldn't find kernel patch for bf2.4. Is there a
patch for this or i have to change kernel.
You should use cryptoloop patches. They are available as Debian
OoO Peu avant le début de l'après-midi du dimanche 07 mars 2004, vers
13:13, EErdem [EMAIL PROTECTED] disait:
I've searched, but couldn't find kernel patch for bf2.4. Is there a
patch for this or i have to change kernel.
You should use cryptoloop patches. They are available as Debian
: Permission denied
$/usr/bin/perl /tmp/foo.pl
foo
Which seems pretty logical, indeed.
Vincent
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
: Permission denied
$/usr/bin/perl /tmp/foo.pl
foo
Which seems pretty logical, indeed.
Vincent
-Original Message-
From: Peter Cordes [mailto:[EMAIL PROTECTED]
Sent: Wednesday, July 16, 2003 9:35 AM
To: [EMAIL PROTECTED]
Subject: Re: execute permissions in /tmp
On Tue, Jul 15, 2003 at 09:38:45AM +0200, DEFFONTAINES Vincent wrote:
On Sun, Jul 13, 2003 at 11:55:45PM
-Original Message-
From: Peter Cordes [mailto:[EMAIL PROTECTED]
Sent: Wednesday, July 16, 2003 9:35 AM
To: debian-security@lists.debian.org
Subject: Re: execute permissions in /tmp
On Tue, Jul 15, 2003 at 09:38:45AM +0200, DEFFONTAINES Vincent wrote:
On Sun, Jul 13, 2003
will not be able to execute any files that are not in
root-owned directories writeable only by root. If the sysctl option
is enabled, a sysctl option with name tpe is created.
Vincent
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
will not be able to execute any files that are not in
root-owned directories writeable only by root. If the sysctl option
is enabled, a sysctl option with name tpe is created.
Vincent
On Mon, Jun 16, 2003 at 10:54:54AM +0200, Mario Ohnewald wrote:
Not even with sudo?
Hmm, this way it will work
--
Tab
pgp0.pgp
Description: PGP signature
On Mon, Jun 16, 2003 at 10:22:49AM +0200, Mario Ohnewald wrote:
Hello!
I want to chroot a application/gameserver.
What is the better/securest way?
1.) Chroot /path and then do a su -s /bin/sh user -c start.sh
or
2.) su -s /bin/sh user and then do the chroot /path as normal user and
On Mon, Jun 16, 2003 at 10:54:54AM +0200, Mario Ohnewald wrote:
Not even with sudo?
Hmm, this way it will work
--
Tab
pgpNe4F7mIpKh.pgp
Description: PGP signature
While I agree with your observation I feel compelled to
defend his point.
He said mounting /tmp will stop MOST Trojans. While it might
not stop a trojan planted by a person, it will stop a trojan
planted by a worm (which is what this thread is about) since
the author of the worm might
While I agree with your observation I feel compelled to
defend his point.
He said mounting /tmp will stop MOST Trojans. While it might
not stop a trojan planted by a person, it will stop a trojan
planted by a worm (which is what this thread is about) since
the author of the worm might
Have a look at the coroner toolkit from Dan Farmer and Wietse Venema.
Debian packaged : tct
It is advised *not* to turn off your box, maybe you can unplug its
network...
not sure its a good idea even.
http://www.fish.com/tct/help-when-broken-into
Chosen extract :
What to do
---
The
Hello
On a fresh installed Woody, I've a strange Problem: After a
syslogd restart (by hand or logrotate) I lose the kernel
messages. All the ather facilities are well, only kern.* is
missing.
Klogd is reporting the messages to the display as well, but
syslogd doesn't catch them.
Hello
On a fresh installed Woody, I've a strange Problem: After a
syslogd restart (by hand or logrotate) I lose the kernel
messages. All the ather facilities are well, only kern.* is
missing.
Klogd is reporting the messages to the display as well, but
syslogd doesn't catch them.
-Original Message-
From: Josh Carroll [mailto:[EMAIL PROTECTED]
Sent: Friday 21 March 2003 08:46
To: [EMAIL PROTECTED]
Subject: Re: is iptables enough?
There are a couple of reasons why I use -j DROP
instead of -J REJECT. Firstly, sending responses to
packets your dropping
-Original Message-
From: Josh Carroll [mailto:[EMAIL PROTECTED]
Sent: Friday 21 March 2003 08:46
To: debian-security@lists.debian.org
Subject: Re: is iptables enough?
There are a couple of reasons why I use -j DROP
instead of -J REJECT. Firstly, sending responses to
packets
[EMAIL PROTECTED]:~# iptables-save
# Generated by iptables-save v1.2.7a on Fri Mar 21 10:13:12 2003
*nat
:PREROUTING ACCEPT [17038:1364291]
:POSTROUTING ACCEPT [1561:131055]
:OUTPUT ACCEPT [7155:558179]
-A PREROUTING -i ppp0 -p tcp -m tcp --dport 25 -j REDIRECT
--to-ports 4
-A
(and
allowed to them) on the system.
You may also want to prevent users to run other programs such as telnet,
ping, nc, traceroute and so many others...
Vincent
-Original Message-
From: Iñaki Martínez [mailto:[EMAIL PROTECTED]]
Sent: Thursday 23 January 2003 13:18
To: Charl Matthee
(and
allowed to them) on the system.
You may also want to prevent users to run other programs such as telnet,
ping, nc, traceroute and so many others...
Vincent
-Original Message-
From: Iñaki Martínez [mailto:[EMAIL PROTECTED]
Sent: Thursday 23 January 2003 13:18
To: Charl Matthee
Is it http://www.debian.org/banners/ you are talking about? :-)
-Original Message-
From: Jord Swart [mailto:[EMAIL PROTECTED]]
Sent: Friday 10 January 2003 16:21
To: [EMAIL PROTECTED]
Subject: Re: A new Banner for the new Year
On Friday 10 January 2003 14:49, Daniel J. Rychlik
Is it http://www.debian.org/banners/ you are talking about? :-)
-Original Message-
From: Jord Swart [mailto:[EMAIL PROTECTED]
Sent: Friday 10 January 2003 16:21
To: debian-security@lists.debian.org
Subject: Re: A new Banner for the new Year
On Friday 10 January 2003 14:49,
in advance,
Josh
According to
http://outpostfirewall.com/guide/rules/preset_rules/p2p.htm
It might be some Peer to peer protocol.
Vincent
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
.
Thanks in advance,
Josh
According to
http://outpostfirewall.com/guide/rules/preset_rules/p2p.htm
It might be some Peer to peer protocol.
Vincent
On Thu, Dec 19, 2002 at 08:42:38AM -0200, Samuel Lucas Vaz de Mello wrote:
Hi all!
I'm getting this messages in the syslog:
Dec 18 10:07:55 debian syslog-ng[164]: STATS: dropped 0
Some idea about what this mean?
Regards,
Hi,
this message is syslog-ng notice message,
On Thu, Dec 19, 2002 at 08:42:05AM -0500, David B Harris wrote:
snip really, really complex and nasty ways of removing STATS messages
But remove stating messages is not what I've done..
The patch drops ONLY 0 droppet packet message. others are logged.
options { stats(3600); };
I've check the
not best since it
forces you reinstall many things and makes your conf non-too-standard.
As a conclusion, trafic from the internet to that host should go through 2
firewalls.
Trafic from that host to the DMZ should go through your additionnal
firewall.
Hope this is clear and helps,
Vincent
I personnally used courrier-pop which did good, but never did I compare it
with others.
-Original Message-
From: Ted Roby [mailto:[EMAIL PROTECTED]]
Sent: Friday 6 December 2002 11:51
To: [EMAIL PROTECTED]
Subject: pop mail recommendations
I have setup exim to host my domain's
I personnally used courrier-pop which did good, but never did I compare it
with others.
-Original Message-
From: Ted Roby [mailto:[EMAIL PROTECTED]
Sent: Friday 6 December 2002 11:51
To: debian-security@lists.debian.org
Subject: pop mail recommendations
I have setup exim to
or prelude which let you see much more than just IP
headers level.
By the way, if you only got portscanned, get used to it. There will be
many others...
Hope this helps,
Vincent
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Wednesday 4 December 2002 03:21
To correctly audit your configuration, I need an output of
/sbin/iptables -L -n -v
The mere /sbin/iptables -L [-n] is not sufficient to me, cause it won't
reveal the per interface filters.
Vincent
-Original Message-
From: Tore Nilsson [mailto:[EMAIL PROTECTED]]
Sent: Wednesday 4
the
firewall works.
-Original Message-
From: Tore Nilsson [mailto:[EMAIL PROTECTED]]
Sent: Wednesday 4 December 2002 15:13
To: DEFFONTAINES Vincent
Cc: [EMAIL PROTECTED]
Subject: Re: IPTables configuration.
Hi!
The machine is a standalone web server. I've been getting
or prelude which let you see much more than just IP
headers level.
By the way, if you only got portscanned, get used to it. There will be
many others...
Hope this helps,
Vincent
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Wednesday 4 December 2002 03:21
To correctly audit your configuration, I need an output of
/sbin/iptables -L -n -v
The mere /sbin/iptables -L [-n] is not sufficient to me, cause it won't
reveal the per interface filters.
Vincent
-Original Message-
From: Tore Nilsson [mailto:[EMAIL PROTECTED]
Sent: Wednesday 4
the
firewall works.
-Original Message-
From: Tore Nilsson [mailto:[EMAIL PROTECTED]
Sent: Wednesday 4 December 2002 15:13
To: DEFFONTAINES Vincent
Cc: debian-security@lists.debian.org
Subject: Re: IPTables configuration.
Hi!
The machine is a standalone web server. I've been
Message-
From: Tore Nilsson [mailto:[EMAIL PROTECTED]
Sent: Wednesday 4 December 2002 15:19
To: DEFFONTAINES Vincent
Cc: debian-security@lists.debian.org
Subject: Re: IPTables configuration.
Hi!
The machine is a standalone web server. I've been getting a bunch of
portscans and some
Thouh mount reports (as the /etc/mtab does too):
/path/to_file/cryptofile on /mnt/crypto type ext2 \
(rw,noexec,nosuid,nodev,loop=/dev/loop0,encryption=aes,user=myuser)
^^
Looks like the noexec option is automatically added at mount time?
Vincent
--
To UNSUBSCRIBE, email to [EMAIL
Thouh mount reports (as the /etc/mtab does too):
/path/to_file/cryptofile on /mnt/crypto type ext2 \
(rw,noexec,nosuid,nodev,loop=/dev/loop0,encryption=aes,user=myuser)
^^
Looks like the noexec option is automatically added at mount time?
Vincent
by products such as squid?
(Maybe even run a browser on the proxy and have it check it is able to
display what goes through? sounds a bit freak, doesn't it?)
By the way, I am really starting to wonder if running a HTTPS proxy is
really reasonable...
Vincent
-Original Message-
From: Phillip Hofmeister [mailto:[EMAIL PROTECTED]]
Sent: Tuesday 19 November 2002 15:30
To: DEFFONTAINES Vincent
Cc: [EMAIL PROTECTED]
Subject: Re: Bypassing proxies
On Tue, 19 Nov 2002 at 02:48:04PM +0100, DEFFONTAINES Vincent wrote:
Wondering if some
-Original Message-
From: Fadel [mailto:[EMAIL PROTECTED]]
Sent: Tuesday 19 November 2002 16:05
To: [EMAIL PROTECTED]@plutao.siteplanet.com.br
Subject:
Hi there,
I got a trouble in my network while trying to block Kazaa.
I tried to drop port 1214 with this rule:
iptables
Wondering if some people know of some content-aware
proxies/filters, to
attempt to block [some of] those dangerous products (apart
from maintaining
a black-list...)
Since the traffic is encrypted, content filtering
will not trigger.
Thats true for HTTPS, not HTTP.
And still,
by products such as squid?
(Maybe even run a browser on the proxy and have it check it is able to
display what goes through? sounds a bit freak, doesn't it?)
By the way, I am really starting to wonder if running a HTTPS proxy is
really reasonable...
Vincent
-Original Message-
From: Phillip Hofmeister [mailto:[EMAIL PROTECTED]
Sent: Tuesday 19 November 2002 15:30
To: DEFFONTAINES Vincent
Cc: debian-security@lists.debian.org
Subject: Re: Bypassing proxies
On Tue, 19 Nov 2002 at 02:48:04PM +0100, DEFFONTAINES Vincent wrote
-Original Message-
From: Fadel [mailto:[EMAIL PROTECTED]
Sent: Tuesday 19 November 2002 16:05
To: debian-security@lists.debian.org@plutao.siteplanet.com.br
Subject:
Hi there,
I got a trouble in my network while trying to block Kazaa.
I tried to drop port 1214 with this
Wondering if some people know of some content-aware
proxies/filters, to
attempt to block [some of] those dangerous products (apart
from maintaining
a black-list...)
Since the traffic is encrypted, content filtering
will not trigger.
Thats true for HTTPS, not HTTP.
And still,
Did you check the Secure-Programs-Howto ?
It is a very good document
http://www.tldp.org/HOWTO/Secure-Programs-HOWTO/index.html
Hope this helps
Vincent
-Original Message-
From: Peter Ondraska [mailto:ondraska;dcs.fmph.uniba.sk]
Sent: Tuesday 12 November 2002 14:48
To: [EMAIL
-Original Message-
From: Jan Eringa [mailto:jan.eringa;orbian.com]
Sent: Tuesday 12 November 2002 15:11
To: DEFFONTAINES Vincent
Subject: Re: errorlists
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
www.phrack.org is also a good place for in depth discussions
Did you check the Secure-Programs-Howto ?
It is a very good document
http://www.tldp.org/HOWTO/Secure-Programs-HOWTO/index.html
Hope this helps
Vincent
-Original Message-
From: Peter Ondraska [mailto:[EMAIL PROTECTED]
Sent: Tuesday 12 November 2002 14:48
To: debian-security
-Original Message-
From: Jan Eringa [mailto:[EMAIL PROTECTED]
Sent: Tuesday 12 November 2002 15:11
To: DEFFONTAINES Vincent
Subject: Re: errorlists
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
www.phrack.org is also a good place for in depth discussions on these
Phrak #50
OoO En cette nuit striée d'éclairs du samedi 09 novembre 2002, vers
02:02, Michael Ablassmeier [EMAIL PROTECTED] disait:
i did some apache chroot environment (php,perl,ssl), and now
some users want to use the php mail command, so i have to
include some mta into the chroot.
As far as i know,
OoO En cette nuit striée d'éclairs du samedi 09 novembre 2002, vers
02:02, Michael Ablassmeier [EMAIL PROTECTED] disait:
i did some apache chroot environment (php,perl,ssl), and now
some users want to use the php mail command, so i have to
include some mta into the chroot.
As far as i know,
)
Since I read several at several places on the Web that it was not possible
to build several HTTPS VirtualHosts on the same IP/Port, I'd like to add
this to the discussion.
Your comments will be appreciated.
Vincent
*
httpd.conf sample :
VirtualHost 1.2.3.4:443
ServerName
)
Since I read several at several places on the Web that it was not possible
to build several HTTPS VirtualHosts on the same IP/Port, I'd like to add
this to the discussion.
Your comments will be appreciated.
Vincent
*
httpd.conf sample :
VirtualHost 1.2.3.4:443
ServerName
On Fri, Oct 18, 2002 at 02:58:44PM +0200, [EMAIL PROTECTED] wrote:
Woody
host:/home/przemoltelnet 192.168.x.y ssh
Trying 192.168.x.y...
Connected to 192.168.x.y.
Escape character is '^]'.
SSH-2.0-OpenSSH_3.4p1 Debian 1:3.4p1-1
How can I disable the message ?
you can't without
On Fri, Oct 18, 2002 at 02:58:44PM +0200, [EMAIL PROTECTED] wrote:
Woody
host:/home/przemoltelnet 192.168.x.y ssh
Trying 192.168.x.y...
Connected to 192.168.x.y.
Escape character is '^]'.
SSH-2.0-OpenSSH_3.4p1 Debian 1:3.4p1-1
How can I disable the message ?
you can't without
1 - 100 of 130 matches
Mail list logo