currently i've got an ever growing password list in a plain text file
stored on an encrypted loopback fs, this is getting cumbersome...
figaro's password manager (package fpm) looks nice and uses blowfish to
encrypt data but i can't find anything showing any type of third party
audit.
what does
On 2003/04/23 04:20:16AM +, Wed, simon raven wrote:
btw, anyone know if PPC kernels have had the grsec patch apply cleanly
to mainline kernel.org source? as i use xfs fs, the patching is rather
extensive, and i haven't had much luck with it. i spent more than a week
trying to compile a
On 2003/03/14 08:03:17PM +0100, Fri, Nils wrote:
How do you monitor what network traffic you have and how much? I want to
be able to see the origin and destination, type and volume.
We have two computer labs, with its respective ISP-connections, both with
volume based rates. These two
On 2003/03/14 08:03:17PM +0100, Fri, Nils wrote:
How do you monitor what network traffic you have and how much? I want to
be able to see the origin and destination, type and volume.
We have two computer labs, with its respective ISP-connections, both with
volume based rates. These two
On 2003/03/11 02:12:12PM -0600, Tue, Bill wrote:
Hello Debian,
I want to block all ip's ending in 224 to 255 but not 220 and others
searching the net I found I need to add /27 to end of the ip.
I understand /8 /16 /24 /32 somewhat but...
My question: what makes /27 significant
On 2003/03/11 02:12:12PM -0600, Tue, Bill wrote:
Hello Debian,
I want to block all ip's ending in 224 to 255 but not 220 and others
searching the net I found I need to add /27 to end of the ip.
I understand /8 /16 /24 /32 somewhat but...
My question: what makes /27 significant
On 2003/02/17 10:19:24AM -0500, Mon, Phillip Hofmeister wrote:
I have snort-mysql installed. snort appears to be running fine but
nothing ever gets written to the mysql database. The username/password
I gave snort have update/select/insert rights to the mysql DB.
Any clue of where I can
On 2003/02/17 10:19:24AM -0500, Mon, Phillip Hofmeister wrote:
I have snort-mysql installed. snort appears to be running fine but
nothing ever gets written to the mysql database. The username/password
I gave snort have update/select/insert rights to the mysql DB.
Any clue of where I can
On 2003/01/23 12:24:49PM +0100, Thu, I?aki Mart?nez wrote:
Hi!!!
I have a server in internet and i want several clients to access to it via
SSH but i DON'T want they to be able to use SSH from that server.
So i client can access the server via SSH, but s/he CAN NOT ssh to other
servers
On 2002/12/15 07:15:25PM -0800, Sun, Torrin wrote:
I changes the subject and started a new thread here. Anyway . . .
# Drop spoofed packets
iptables -A INPUT -i eth0 -j DROP -s 192.168.1.3 -d 0.0.0.0/0
What about outgoing spoofed packets? They didn't get dropped in this
script
at all.
On 2002/12/15 07:15:25PM -0800, Sun, Torrin wrote:
I changes the subject and started a new thread here. Anyway . . .
# Drop spoofed packets
iptables -A INPUT -i eth0 -j DROP -s 192.168.1.3 -d 0.0.0.0/0
What about outgoing spoofed packets? They didn't get dropped in this
script
at all.
On 2002/12/02 11:23:11PM -0500, Mon, Phillip Hofmeister wrote:
All,
Please do not have your procmail or anything else automatically mark
mail sent from debian's list as spam. Several valid emails have ended
up in my Junk folder because someone is reporting them to razor. Once
again,
On 2002/12/02 11:23:11PM -0500, Mon, Phillip Hofmeister wrote:
All,
Please do not have your procmail or anything else automatically mark
mail sent from debian's list as spam. Several valid emails have ended
up in my Junk folder because someone is reporting them to razor. Once
again,
i'm assuming these also apply to apache-ssl, but there doesn't appear to
be a new package. is it still in the works or is apache-ssl not
vulnerable?
thanks,
andrew
On 2002/11/04 04:26:57PM +0100, Mon, Martin Schulze wrote:
Package: apache
Vulnerability : several
Problem-Type :
i'm assuming these also apply to apache-ssl, but there doesn't appear to
be a new package. is it still in the works or is apache-ssl not
vulnerable?
thanks,
andrew
On 2002/11/04 04:26:57PM +0100, Mon, Martin Schulze wrote:
Package: apache
Vulnerability : several
Problem-Type :
On 2002/10/22 04:27:26PM +0200, Tue, Kjetil Kjernsmo wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi folks!
I'd like to ask what people do with their AIDE output at times when a
lot of things change on their system?
I've gone through the AIDE configuration, and I feel like
On Tue, 22 Oct 2002, Arthur de Jong wrote:
Apart from that I also use tools like debsums to keep me informed of
integrity (although a lot of packages don't provide all or correct
md5sums) (maybe I should file some bugreports for wrong md5sums)
you also might want to checkout tiger, it will
On 2002/10/22 04:27:26PM +0200, Tue, Kjetil Kjernsmo wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi folks!
I'd like to ask what people do with their AIDE output at times when a
lot of things change on their system?
I've gone through the AIDE configuration, and I feel like
On Tue, 22 Oct 2002, Arthur de Jong wrote:
Apart from that I also use tools like debsums to keep me informed of
integrity (although a lot of packages don't provide all or correct
md5sums) (maybe I should file some bugreports for wrong md5sums)
you also might want to checkout tiger, it will
On 2002/10/10 11:24:38PM +0300, Thu, Jussi Ekholm wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
J.H.M. Dassen (Ray) [EMAIL PROTECTED] wrote:
On Thu, Oct 10, 2002 at 21:31:13 -, Kisteleki R??bert wrote:
Yesterday I upgraded two severs with apt, which in turn upgraded
the
On 2002/10/10 11:24:38PM +0300, Thu, Jussi Ekholm wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
J.H.M. Dassen (Ray) [EMAIL PROTECTED] wrote:
On Thu, Oct 10, 2002 at 21:31:13 -, Kisteleki R??bert wrote:
Yesterday I upgraded two severs with apt, which in turn upgraded
the
http://www.debian.org/security/faq#mirror
Q: Why are there no official mirrors for security.debian.org?
A: The purpose of security.debian.org is to make security updates
available as quickly and easily as possible. Mirrors would add extra
complexity that is not needed and can cause frustration
http://www.debian.org/security/faq#mirror
Q: Why are there no official mirrors for security.debian.org?
A: The purpose of security.debian.org is to make security updates
available as quickly and easily as possible. Mirrors would add extra
complexity that is not needed and can cause frustration
On Fri, 03 Aug 2001 13:46:10 David Ehle wrote:
Howdy all,
Not debian specific, but this is the best batch of security minds I
have access too so I figured I'd see if this interests anyone.
I need to set up some Xterminal replacemnets - linux boxes that will
mostly only be running
24 matches
Mail list logo