Re: ping22: can not kill this process

2008-01-04 Thread Felipe Figueiredo
Em Friday 04 January 2008 04:46:48 Rick Moen escreveu:

 Looking at the typical php.ini is faintly terrifying, starting with the
 almost invariably ignored warning comments at the top, saying these
 settings are for development environments only, and should never be
 exposed to public networks.

From the mentioned section in php.ini:

; By default, PHP installs itself with a configuration suitable for
; development purposes, and *NOT* for production purposes.

Anybody has a clue as to why was this default choosen, and not the safest one?

regards
FF



Re: ping22: can not kill this process

2008-01-04 Thread Steve Kemp
On Fri Jan 04, 2008 at 06:04:50 -0200, Felipe Figueiredo wrote:

 Anybody has a clue as to why was this default choosen, and not the safest one?

  Too many broken PHP applications?

  Anyway please see /usr/share/doc/php4-common/examples/ for
 different examples.  (Or /usr/share/doc/php5-common/examples).

Steve
-- 
http://www.steve.org.uk/


pgpiQG2VvWmON.pgp
Description: PGP signature


Install process certification

2008-01-04 Thread Keyser Söze
Hi

I'd like to know whether it's possible to check the signature of a Debian 
(Etch) install CD, at the earliest stage of the install process.
Indeed, right after the base-installer unpacks the base system files, apt loads 
the contents of the CD and checks the Release.gpg signature against the Release 
file.
Two problems, however:
- apt will complain if the signature is wrong, but won't if the Release.gpg 
file is not even present on the CD;
- this procedure excludes the udebs loaded by debian-installer

So, is there a way to secure the whole install process (I mean, besides manual 
checking)? I noticed that gpgv is among the default udebs, what is it used for?

Thanks,

--
Keyser




  
_ 
Ne gardez plus qu'une seule adresse mail ! Copiez vos mails vers Yahoo! Mail 
http://mail.yahoo.fr

Re: ping22: can not kill this process

2008-01-04 Thread Marcin Owsiany
On Thu, Jan 03, 2008 at 08:55:11PM -0500, Luis Mondesi wrote:
 And besides, noexec can't even
 stop executables anyway. That's the stupidest of flags for mount:
 
 $ /lib/ld-linux.so.2 /usr/bin/printf %s\n foo
 foo

I think some of the newer dynamic loaders do check noexec and refuse to
circumvent it.

-- 
Marcin Owsiany [EMAIL PROTECTED] http://marcin.owsiany.pl/
GnuPG: 1024D/60F41216  FE67 DA2D 0ACA FC5E 3F75  D6F6 3A0D 8AA0 60F4 1216


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: ping22: can not kill this process

2008-01-04 Thread Rick Moen
Quoting Javier Fernandez-Sanguino ([EMAIL PROTECTED]):

 Even better: /usr/share/doc/php5-common/examples/php.ini-paranoid
 (it includes some more functions in that definition)

Excellent.  Amended to:

disable_functions = dl, phpinfo, system, mail, include, shell_exec, exec, 
escapeshellarg, escapeshellcmd, passthru, proc_close, proc_open, 
proc_get_status, proc_nice, proc_open, proc_terminate, popen, pclose, chown, 
disk_free_space, disk_total_space, diskfreespace, fileinode, 
max_execution_time, set_time_limit,highlight_file, show_source

I'll be cross-checking those on a PHP4 installation to see if they're
all valid, which they might not be.  



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: ping22: can not kill this process

2008-01-04 Thread Javier Fernandez-Sanguino
2008/1/4, Rick Moen [EMAIL PROTECTED]:
 Quoting Luis Mondesi ([EMAIL PROTECTED]):

  It's time to tell PHP (via php.ini) not to allow any of those
  functions that allow executing stuff from the system (system,
  passthru, whatever).

 Amen to that.  Good starting point:
  disable_functions = system, exec, passthru, popen, escapeshellcmd, shell_exec

Even better: /usr/share/doc/php5-common/examples/php.ini-paranoid
(it includes some more functions in that definition)

IIRC it includes those and some more. You might want to diff your
php.ini copy to that one to see the different things you could do to
improve your PHP installation.

Regards

Javier


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Install process certification

2008-01-04 Thread paddy
On Fri, Jan 04, 2008 at 11:15:35AM +, Keyser S?ze wrote:
 Hi
 
 I'd like to know whether it's possible to check the signature of a Debian 
 (Etch) install CD, at the earliest stage of the install process.
 Indeed, right after the base-installer unpacks the base system files, apt 
 loads the contents of the CD and checks the Release.gpg signature against the 
 Release file.
 Two problems, however:
 - apt will complain if the signature is wrong, but won't if the Release.gpg 
 file is not even present on the CD;
 - this procedure excludes the udebs loaded by debian-installer
 
 So, is there a way to secure the whole install process (I mean, besides 
 manual checking)? I noticed that gpgv is among the default udebs, what is it 
 used for?

Perhaps I don't understand manual checking.

Would you be satisfied by checking a signature of a checksum of the CD
against a public key that you trust ?

http://www.debian.org/CD/faq/#verify

Regards,
Paddy


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: ping22: can not kill this process

2008-01-04 Thread Hubert Chathi
On Fri, 04 Jan 2008 08:23:45 +0100 Bernd Eckenfels [EMAIL PROTECTED]
wrote:

 what kind applications are using /dev/shm? I googled
  around,seem not find much information.
  right now I mount i as rw,noexec,nosuid.
 
 It is for example used to map shared memory. ...

No, it is a tmpfs directory for temporary files.  It has nothing to do
with shared memory.

-- 
Hubert Chathi [EMAIL PROTECTED] -- Jabber: [EMAIL PROTECTED]
PGP/GnuPG key: 1024D/124B61FA http://www.uhoreg.ca/
Fingerprint: 96C5 012F 5F74 A5F7 1FF7  5291 AF29 C719 124B 61FA


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: ping22: can not kill this process

2008-01-04 Thread Rick Moen
Quoting Raphael Geissert ([EMAIL PROTECTED]):

 include()? I don't want to imagine how many scripts will break.

Good catch.  (It was very late in my time zone.  I need to review that
list.)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: ping22: can not kill this process

2008-01-04 Thread Raphael Geissert
Rick Moen wrote:
 
 disable_functions = dl, phpinfo, system, mail, include, shell_exec, exec,

include()? I don't want to imagine how many scripts will break.

Cheers,
-- 
Atomo64 - Raphael

Please avoid sending me Word, PowerPoint or Excel attachments.
See http://www.gnu.org/philosophy/no-word-attachments.html


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: ping22: can not kill this process

2008-01-04 Thread Bernd Eckenfels
In article [EMAIL PROTECTED] you wrote:
 It is for example used to map shared memory. ...
 
 No, it is a tmpfs directory for temporary files.  It has nothing to do
 with shared memory.

why do you think it is named shm? it is used for shm_open and shm_unlink.
(where glibc used temporary files to mmap them)

On some systems (like mine) tmp is a symlink to it, or you use a second
instance of tmpfs. However is still is used for share memory (only).

Gruss
Bernd


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: ping22: can not kill this process

2008-01-04 Thread Hubert Chathi
On Fri, 04 Jan 2008 22:30:18 +0100 Bernd Eckenfels [EMAIL PROTECTED]
wrote:

 why do you think it is named shm? it is used for shm_open and
 shm_unlink.
 (where glibc used temporary files to mmap them)

Ah, I see.  I have never come across a program (yet) that uses it for
shared memory.  Perhaps I'm just running the wrong programs.

 On some systems (like mine) tmp is a symlink to it, or you use a
 second instance of tmpfs. However is still is used for share memory
 (only).

Actually, some things use /dev/shm for non-shared-memory purposes.
Like the resolvconf package.

-- 
Hubert Chathi [EMAIL PROTECTED] -- Jabber: [EMAIL PROTECTED]
PGP/GnuPG key: 1024D/124B61FA http://www.uhoreg.ca/
Fingerprint: 96C5 012F 5F74 A5F7 1FF7  5291 AF29 C719 124B 61FA


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: ping22: can not kill this process

2008-01-04 Thread Bernd Eckenfels
In article [EMAIL PROTECTED] you wrote:
 Ah, I see.  I have never come across a program (yet) that uses it for
 shared memory.  Perhaps I'm just running the wrong programs.

The program itself is not using it, its glibc2.2 which does use that (for
POSIX shm, I think not for SYSV. so its quite seldom used).

I need to double check, but one possible user could be Java with
-XX:+UseLargePages if it does not use hugetlbfs.

 Actually, some things use /dev/shm for non-shared-memory purposes.
 Like the resolvconf package.

I would consider that a bug, but sure possible.

Gruss
Bernd


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]