Re: PermitRootLogin enabled by default - yuppers

2002-06-26 Thread Alvin Oga
hi ya john On Wed, 26 Jun 2002, John Galt wrote: > On Wed, 26 Jun 2002, Alvin Oga wrote: > > > >if an attacker got in ... as a user game over... they got in ??? > > - question is what damage can they do as "user" ... > > that's what happened--the EPIC hole gave user. monkey.org (Dug So

Re: DSA-134-1

2002-06-26 Thread InfoEmergencias - Luis Gómez
El mar, 25-06-2002 a las 12:40, Robert van der Meulen escribió: > and disclosure is only done when it doesn't affect > openbsd (or the '5 years without..' line on openbsd.org). You'll love this one: "One remote hole in the default install, in nearly 6 years!" Great X'DD Depending on the language

Re: PermitRootLogin enabled by default

2002-06-26 Thread Olaf Meeuwissen
Travis Cole <[EMAIL PROTECTED]> writes: > On Wed, Jun 26, 2002 at 02:11:00PM +0200, InfoEmergencias - Luis Gómez wrote: > > Hi all > > > > Messing up with sshd_config for all the privsep stuff, I've > > noticed that PermitRootLogin was set to yes in my three woody > > boxes. I usually consider t

Re: PermitRootLogin enabled by default

2002-06-26 Thread John Galt
On Wed, 26 Jun 2002, Alvin Oga wrote: > >hi all > >if an attacker got in ... as a user game over... they got in ??? > - question is what damage can they do as "user" ... that's what happened--the EPIC hole gave user. monkey.org (Dug Song) was using standard security practice at that

RE: PermitRootLogin enabled by default

2002-06-26 Thread Howland, Curtis
Alvin, If the cracker can get in as a user, it's merely a matter of time before they can worm their way into becoming root. Defenses against this are difficult, the NSA version "SELinux" deliberately places great restrictions on user abilities to try to prevent just such things. But I don't thi

Re: PermitRootLogin enabled by default

2002-06-26 Thread Alvin Oga
hi ya in order to update 10, 100 boxes ... with new setof changes.. you do NOT need to login into any of um ... many different ways to update each target box based on some "master distribution server" -- you do want to test the updates in a test farm before it goes out to production and prot

FW: ISS Advisory: OpenSSH Remote Challenge Vulnerability

2002-06-26 Thread Yu Guanghui
-Original Message- From: X-Force [mailto:[EMAIL PROTECTED] Sent: Wednesday, June 26, 2002 9:56 PM To: bugtraq@securityfocus.com Subject: ISS Advisory: OpenSSH Remote Challenge Vulnerability -BEGIN PGP SIGNED MESSAGE- Internet Security Systems Security Advisory June 26, 2002 Op

Re: PermitRootLogin enabled by default

2002-06-26 Thread Alvin Oga
hi all if an attacker got in ... as a user game over... they got in ??? - question is what damage can they do as "user" ... if an attacker get in the same way as root... game is really over... as they now have complete control of yoru machine.. - i prefer to disallow root l

Re: PermitRootLogin enabled by default

2002-06-26 Thread Travis Cole
On Wed, Jun 26, 2002 at 02:11:00PM +0200, InfoEmergencias - Luis Gómez wrote: > Hi all > > Messing up with sshd_config for all the privsep stuff, I've noticed that > PermitRootLogin was set to yes in my three woody boxes. I usually > consider this a problem (although it has been my fault - i shoul

Re: PermitRootLogin enabled by default

2002-06-26 Thread John Galt
That's how monkey.org got taken over--they SCREENed a su, and the attacker reattached it after getting as user via EPIC... On 26 Jun 2002, Christian Egli wrote: > >Simon Kirby <[EMAIL PROTECTED]> writes: > >> Using "su root" later is worse than just logging in as root with a key. > >I cannot un

Re: openssh packages not vulnerable

2002-06-26 Thread Paul Baker
On Wednesday, June 26, 2002, at 03:50 PM, Richard wrote: Even worse, on 2.0.x kernels "PrivilegeSeparation" doesn't work, rendinging sshd useless for interactive sessions or make it vurneble is you disable it. All debian versions of ssh packages are not vulnerable, AFAIK. I'm hoping the secu

Re: openssh packages not vulnerable

2002-06-26 Thread Richard
On Wed, 26 Jun 2002, Paul Baker wrote: > I'm curious what recourse Debian is planning to take now? Perhaps > removing the buggy OpenSSH 3.3 packages off of security.debian.org so > people don't upgrade to it since it's not at all necessary and it will > only cause problems like screwing up com

Re: unsubscribe

2002-06-26 Thread John Goerzen
This won't work. Have you noticed how EVERY MESSAGE says exactly how to do it, and how you didn't do that? You need to sent the message to [EMAIL PROTECTED] On Wed, Jun 26, 2002 at 09:34:09PM +0200, [EMAIL PROTECTED] wrote: > > > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a su

Re: openssh packages not vulnerable

2002-06-26 Thread Travis Cole
On Wed, Jun 26, 2002 at 02:35:21PM -0500, Paul Baker wrote: > > I'm curious what recourse Debian is planning to take now? Perhaps > removing the buggy OpenSSH 3.3 packages off of security.debian.org so > people don't upgrade to it since it's not at all necessary and it will > only cause problem

openssh packages not vulnerable

2002-06-26 Thread Paul Baker
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 So as it turns out, AFAIK, none of the versions of OpenSSH in Debian were actually vulnerable to the exploit found by ISS and reported in DSA-134 Potato wasn't vulnerable because it is SSH1 only, and the problem lies in the ChallengeResponseAuthe

unsubscribe

2002-06-26 Thread weyhing
-- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: PermitRootLogin enabled by default

2002-06-26 Thread Rob VanFleet
On Wed, Jun 26, 2002 at 02:11:00PM +0200, InfoEmergencias - Luis Gómez wrote: > Hi all > > Messing up with sshd_config for all the privsep stuff, I've noticed that > PermitRootLogin was set to yes in my three woody boxes. I usually > consider this a problem (although it has been my fault - i shoul

Re: [Fwd: ISS Advisory: OpenSSH Remote Challenge Vulnerability]

2002-06-26 Thread Lupe Christoph
On Wednesday, 2002-06-26 at 18:14:35 +0200, Mark Janssen wrote: > >From what I understand, the advisory below is for the security issue > we've been buggering over for the last 2-3 days. > As I understand it, there is no need to upgrade to openssh 3.3 and use > priv-sep code, when we turn of the v

Re: [d-security] Re: DSA-134-1

2002-06-26 Thread Christian Hammers
On Wed, Jun 26, 2002 at 07:23:49PM +0200, Florian Weimer wrote: > Well, it appears if OpenSSH 1.2.3 was *not* vulnerable, so the whole > exercise was rather pointless. But drill inspector Theo ("update and don't ask questions, soldier!"), showed at least how good our new security upload architectu

Re: DSA-134-1

2002-06-26 Thread Michael Furr
On Wed, 2002-06-26 at 13:23, Florian Weimer wrote: > Well, it appears if OpenSSH 1.2.3 was *not* vulnerable, so the whole > exercise was rather pointless. > > Thanks, Theo. "Worst advisory ever." -m -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contac

Re: [Fwd: ISS Advisory: OpenSSH Remote Challenge Vulnerability]

2002-06-26 Thread Greg Hunt
I don't see a better way of handling the OpenSSH announcement. More details or a patch would have allowed people to start writing exploits, at least they warned users of an upcoming bug and provided a work around. The OpenSSH team had to communicate with many vendors and eventually the details w

Re: PermitRootLogin enabled by default

2002-06-26 Thread Andrew Sayers
I think there may be a compromise solution here... In short: it is good to make people log in as a normal user before trying to log in as root, because that way an attacker needs to compromise a normal user before starting on root. The standard way of doing this is to use "su", but that only acce

Re: DSA-134-1

2002-06-26 Thread Florian Weimer
Florian Weimer <[EMAIL PROTECTED]> writes: > Wichert Akkerman <[EMAIL PROTECTED]> writes: > >> Definitely. I really wish we could do more but the complete lack >> of more information we have make things difficult. Backporting >> OpenSSH 3.3p1 to to potato is also slightly complicated by missing >>

OpenSSH 3.4 released... should FIX problems

2002-06-26 Thread Mark Janssen
Head over to OpenSSH.com They have just released version 3.4, which should fix some overflow problems and adds lot's of new checks against dubious input. Advisories and updates on the various pages there. Mark Janssen Syconos IT Consultancy -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with

Re: [Fwd: ISS Advisory: OpenSSH Remote Challenge Vulnerability]

2002-06-26 Thread Anne Carasik
Hi Simon, This one time, [EMAIL PROTECTED] wrote: > I am a bit worried about the ssh advisories, not the actual package > itself (well, that too) but the way it was handled -- the openssh team > issued new versions of a package and a security advisory asking > everyone to update to the new package

Re: [Fwd: ISS Advisory: OpenSSH Remote Challenge Vulnerability]

2002-06-26 Thread simon+debian-security
I am a bit worried about the ssh advisories, not the actual package itself (well, that too) but the way it was handled -- the openssh team issued new versions of a package and a security advisory asking everyone to update to the new package, Debian and others jumped on it and sent the new version o

Re: PermitRootLogin enabled by default

2002-06-26 Thread Tim Haynes
Sebastian Rittau <[EMAIL PROTECTED]> writes: > On Wed, Jun 26, 2002 at 02:11:00PM +0200, InfoEmergencias - Luis Gómez wrote: > > > IMHO, we'd better set it to no. I always thought it was much better. Is > > there any landscape in which you may want to allow direct root login to > > your host? >

Re: PermitRootLogin enabled by default

2002-06-26 Thread InfoEmergencias - Luis Gómez
El mié, 26-06-2002 a las 16:39, Sebastian Rittau escribió: > Yes, there is. For example I have some servers that retrieve their user > information from a database. If the database is not reachable, an > ordinary user can't login, but root can, since it's the only local > account with login privileg

Re: PermitRootLogin enabled by default

2002-06-26 Thread Sebastian Rittau
On Wed, Jun 26, 2002 at 02:11:00PM +0200, InfoEmergencias - Luis Gómez wrote: > IMHO, we'd better set it to no. I always thought it was much better. Is > there any landscape in which you may want to allow direct root login to > your host? Yes, there is. For example I have some servers that retrie

Re: PermitRootLogin enabled by default

2002-06-26 Thread Simon Kirby
On Wed, Jun 26, 2002 at 05:08:32PM +0200, Christian Egli wrote: > Simon Kirby <[EMAIL PROTECTED]> writes: > > > Using "su root" later is worse than just logging in as root with a key. > > I cannot understand why using "su root" later would be worse. Can you > enlighten me? Sure. In all cases,

Re: PermitRootLogin enabled by default

2002-06-26 Thread Derek J. Balling
On Wed, Jun 26, 2002 at 04:05:58PM +0200, Christoph Ulrich Scholler wrote: On Wed, Jun 26, 2002 at 02:11:00PM +0200 or thereabouts, InfoEmergencias - Luis Gómez wrote: > Messing up with sshd_config for all the privsep stuff, I've noticed that > PermitRootLogin was set to yes in my three woody

Re: [Fwd: ISS Advisory: OpenSSH Remote Challenge Vulnerability]

2002-06-26 Thread Anne Carasik
Hi Mark, From the OpenSSH web page: "At least one major security vulnerability exists in many deployed OpenSSH versions (2.9.9 to 3.3). Please see the ISS advisory, or our own OpenSSH advisory on this topic where simple patches are provided for the pre-authentication problem. Systems running with

[Fwd: ISS Advisory: OpenSSH Remote Challenge Vulnerability]

2002-06-26 Thread Mark Janssen
>From what I understand, the advisory below is for the security issue we've been buggering over for the last 2-3 days. As I understand it, there is no need to upgrade to openssh 3.3 and use priv-sep code, when we turn of the various challenge-response systems discussed below (BSD-AUTH and SKEY).

Re: PermitRootLogin enabled by default

2002-06-26 Thread Christian Egli
Simon Kirby <[EMAIL PROTECTED]> writes: > Using "su root" later is worse than just logging in as root with a key. I cannot understand why using "su root" later would be worse. Can you enlighten me? -- Christian Egli wyona: research & development http://www.wyona.com -- To UNSUBSCRIBE, email

Re: PermitRootLogin enabled by default

2002-06-26 Thread Simon Kirby
On Wed, Jun 26, 2002 at 04:05:58PM +0200, Christoph Ulrich Scholler wrote: > On Wed, Jun 26, 2002 at 02:11:00PM +0200 or thereabouts, InfoEmergencias - > Luis Gómez wrote: > > Messing up with sshd_config for all the privsep stuff, I've noticed that > > PermitRootLogin was set to yes in my three w

Re: PermitRootLogin enabled by default

2002-06-26 Thread Christoph Ulrich Scholler
On Wed, Jun 26, 2002 at 02:11:00PM +0200 or thereabouts, InfoEmergencias - Luis Gómez wrote: > Messing up with sshd_config for all the privsep stuff, I've noticed that > PermitRootLogin was set to yes in my three woody boxes. I usually > consider this a problem (although it has been my fault - i s

Re: PermitRootLogin enabled by default

2002-06-26 Thread Steve Mickeler
I tend to set it to "without-password" to allow a remote root entry only via RSA/DSA keys, also making sure to restrict it further with as many applicable options for "AuthorizedKeysFile" ( man sshd ) This is done as a restricated remote root backdoor as well as automated network backups via dump

Re: PermitRootLogin enabled by default

2002-06-26 Thread CaT
On Wed, Jun 26, 2002 at 02:11:00PM +0200, InfoEmergencias - Luis G?mez wrote: > IMHO, we'd better set it to no. I always thought it was much better. Is > there any landscape in which you may want to allow direct root login to > your host? rsync where you want to keep userid/groupid info. -- GOVE

RE: PermitRootLogin enabled by default

2002-06-26 Thread Jan Johansson
>Is > there any landscape in which you may want to allow direct > root login to > your host? I allow it to my firewall, since there isnt any other account on there. but then again, that system only listens to my internal interfaces.. So, not typical maybe? -- To UNSUBSCRIBE, email to [EMAIL P

PermitRootLogin enabled by default

2002-06-26 Thread InfoEmergencias - Luis Gómez
Hi all Messing up with sshd_config for all the privsep stuff, I've noticed that PermitRootLogin was set to yes in my three woody boxes. I usually consider this a problem (although it has been my fault - i should have checked and noticed this much time ago). What do you think of this? IMHO, we'd b

Re: Problems with SSH Upgrade

2002-06-26 Thread SIBAUD Benoît FTRD/DAC/ISS
Title: Re: Problems with SSH Upgrade Hi, > Disabling protocol version 2. Could not load host key > Restarting OpenBSD Secure Shell server: sshd  > Disabling protocol version 2. Could not load host key > [SNIP] >

Re: DSA-134-1

2002-06-26 Thread Oystein Viggen
* [Moritz Schulte] > As a side note: many network daemons could make use of this special > feature to be more secure. Off the top of my head, I can think of telnetd, popd and imapd. For ssh, you would need to support public key authentication in the passwd server, and ftp will have to deal with

Novidades

2002-06-26 Thread mailing
Content-type:text/html http://www.lojadotelemovel.com/images/riscado_cinza.gif";> http://www.lojadotelemovel.com/mailing/images/logo.gif"; width="580" height="49"> http://www.lojadotelemovel.com/mailing/images/topo.jpg"; width="580" heigh

Problems with SSH Upgrade

2002-06-26 Thread Hendrik Naumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Firts: the potato upgrade works perfectly for me. But I upgraded a woodybox (kernel 2.4.18-686) to ssh_1%3a3.3p1-0.0woody4_i386.deb . When restarting sshd by the init script the following error message is droped Disabling protocol version 2. Co

Re: DSA-134-1

2002-06-26 Thread Moritz Schulte
Phillip Hofmeister <[EMAIL PROTECTED]> writes: [Not directly in reference to this problem, just some more information.] > *TECHNICALLY* every login is root. Yes, that is how it works in Unix. People could say that this concept is not perfect. Since Debian is not only a GNU/Linux distribution a

Re: security.debian.org is down

2002-06-26 Thread Thomas J. Zeeman
On 26 Jun 2002, David Bell wrote: > It seems to be down again... I'm getting connection timed out messages, > though, I was able to connect a half hour ago. SurfNet (where s.d.o is hosted) is having some router gone wild. It tends to be down one minute and up a few later. They're working on th

Re: security.debian.org is down

2002-06-26 Thread David Bell
It seems to be down again... I'm getting connection timed out messages, though, I was able to connect a half hour ago. On Tue, 2002-06-25 at 23:02, Jonas Weismüller wrote: > > Yes, it came back! Everything fine now ! ;-) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubsc

Re: SSH upgrade update / resolution

2002-06-26 Thread Fredrik Ax
On Wed, Jun 26, 2002 at 02:35:09PM +0900, Curt Howland wrote: > Ok, it's resolved. > > I have never generated keys for ssh2 so, rather than fall back to ssh1, > it just fails. > > If I tell the client to force ssh1 "ssh -1", it works with the ssh1 RSA > keys just fine. > > If I turn on password

Re: New version of SSH refusing login

2002-06-26 Thread Bryan Andersen
Back it out... If you read the release notes you would have seen that the ssh upgrade has problems with PAM. Use something like IPCHAINS or IPTABLES to restrict which IP addresses are allowed to access your box via SSH until such time that SSH using privilege separation handles PAM properly.

Re: non-us.debian.org is down

2002-06-26 Thread vdongen
Both are on SurfNet in The netherlands, I suppose they went down for a short while or the connection between your ISP and Surf went down. Greetings, Ivo van Dongen -Original Message- From: "Ng Fong Chu" <[EMAIL PROTECTED]> Date: Wed, 26 Jun 2002 13:51:06 +0800 Subject: non-us.debian.org

Re: non-us.debian.org is down

2002-06-26 Thread Curt Howland
Ng Fong Chu wrote: > > I am installing Debian but having problem to connect to non-us.debian.org, > Pls help. Thanks. > > Fong Chu Have you tried the mirrors? deb http://ftp.jp.debian.org/debian-non-US testing/non-US main contrib non-free -- September 11th, 2001 The proudest day for gun cont

non-us.debian.org is down

2002-06-26 Thread Ng Fong Chu
I am installing Debian but having problem to connect to non-us.debian.org, Pls help. Thanks. Fong Chu - Original Message - From: "Jonas Weismüller" <[EMAIL PROTECTED]> To: Sent: Wednesday, June 26, 2002 12:02 PM Subject: Re: security.debian.org is down > > I can ping it, and I just di

SSH upgrade update / resolution

2002-06-26 Thread Curt Howland
Ok, it's resolved. I have never generated keys for ssh2 so, rather than fall back to ssh1, it just fails. If I tell the client to force ssh1 "ssh -1", it works with the ssh1 RSA keys just fine. If I turn on password authentication, it "fails back" to that just fine. I guess if the server and cli