Re: SSH with potato, not very secure?

2001-03-02 Thread William R. Ward
he updates, I'd be covered. Since this appears to not be the case, is there something that can be done to make this fact more readily apparent to users? --Bill. -- William R Ward[EMAIL PROTECTED] http://www.bayview.c

Re: News server ?

2001-03-14 Thread William R. Ward
t of Debian. --Bill. -- William R Ward[EMAIL PROTECTED] http://www.bayview.com/~hermit/ - "Those are my principles. If you don't like them I have others."-Groucho Marx -- To UNSUBSCRIBE, email to [E

Strange output from last command

2001-03-21 Thread William R. Ward
2.17 kernel. --Bill. -- William R Ward[EMAIL PROTECTED] http://www.bayview.com/~hermit/ - "Those are my principles. If you don't like them I have others."-Groucho Marx -- To UNSUBSCRIBE, email to [E

Re: Strange output from last command

2001-03-21 Thread William R. Ward
Mike Dresser writes: "William R. Ward" wrote: I've replaced the legit usernames and IP's with "xxx" but left them in for context. I'm worried that the "date" entries are a consequence of some hacker activity, but I have been unable to find any other symptom

MD5 sums of individual files?

2001-03-28 Thread William R. Ward
? --Bill. -- William R Ward[EMAIL PROTECTED] http://www.bayview.com/~hermit/ - "Those are my principles. If you don't like them I have others."-Groucho Marx -- To UNSUBSCRIBE, email to [EMAIL

Re: MD5 sums of individual files?

2001-03-28 Thread William R. Ward
Olaf Meeuwissen writes: [EMAIL PROTECTED] (William R. Ward) writes: One way to test if you have been hacked is to run an MD5 checksum of key binaries and look to see if it's been replaced by the intruder. Is there any place where the MD5 sums of individual executable files (not the .deb

Re: shutdown user and accountability

2001-11-27 Thread William R Ward
could confirm it that way. It's not perfect, but given the policies you have to live with, it may be the only type of solution you can come up with. --Bill. -- William R Ward[EMAIL PROTECTED] http://www.wards.net/~bill

VI wrapper for SUDO?

2001-11-29 Thread William R Ward
to the final location. Does such a beast exist? If not, I think it should. It should probably obey the /etc/alternatives preferences for editors, too. --Bill. -- William R Ward[EMAIL PROTECTED] http://www.wards.net/~bill

Re: VI wrapper for SUDO?

2001-11-29 Thread William R Ward
William R Ward [EMAIL PROTECTED] writes: Is there any kind of wrapper that can be used to allow sudo to grant editing access to only one file? I am thinking of something similar to vipw or visudo, but with security in mind; following this basic algorithm: 1. Using user privileges, Copy

Re: VI wrapper for SUDO? - another bad way ??

2001-11-29 Thread William R. Ward
like your sucpaliases? Or should a C equivalent be written instead? --Bill. -- William R Ward[EMAIL PROTECTED] http://www.wards.net/~bill/ - If you're not part of the solution, you're part

Re: VI wrapper for SUDO? - another bad way ??

2001-11-29 Thread William R. Ward
to replace /etc/aliases w/o giving um root access Of course, the idea is to give certain permissions to certain users without giving away the farm. That's what sudo's all about. --Bill. -- William R Ward[EMAIL PROTECTED] http://www.wards.net/~bill

Re: apache log entry

2001-10-08 Thread William R. Ward
at all; if you do, change the IP addresses to whatever is appropriate for your system.) Directory proxy:* order deny,allow deny from all allow from 192.168.0.0/255.255.0.0 /Directory HTH. --Bill. -- William R Ward[EMAIL PROTECTED] http://www.wards.net

Re: VI wrapper for SUDO? - another bad way ??

2001-12-04 Thread William R Ward
martin f krafft [EMAIL PROTECTED] writes: * William R. Ward [EMAIL PROTECTED] [2001.11.29 18:00:40-0800]: Question: Is it generally considered secure enough to sudo a bash script like your sucpaliases? Or should a C equivalent be written instead? no. especially not the quick'n'dirty

Re: VI wrapper for SUDO? - another bad way ??

2001-12-04 Thread William R. Ward
Gerfried Fuchs writes: * William R. Ward [EMAIL PROTECTED] [2001-12-04 11:56]: Because the thread originated there. I haven't seen it before here. Do you really mean [EMAIL PROTECTED] and not [EMAIL PROTECTED]? Those are two totally different things Maybe you have to resend your message

Re: SSH with potato, not very secure?

2001-03-02 Thread William R. Ward
be covered. Since this appears to not be the case, is there something that can be done to make this fact more readily apparent to users? --Bill. -- William R Ward[EMAIL PROTECTED] http://www.bayview.com/~hermit

Re: News server ?

2001-03-14 Thread William R. Ward
. -- William R Ward[EMAIL PROTECTED] http://www.bayview.com/~hermit/ - Those are my principles. If you don't like them I have others.-Groucho Marx

Strange output from last command

2001-03-21 Thread William R. Ward
. -- William R Ward[EMAIL PROTECTED] http://www.bayview.com/~hermit/ - Those are my principles. If you don't like them I have others.-Groucho Marx

Re: Strange output from last command

2001-03-21 Thread William R. Ward
Mike Dresser writes: William R. Ward wrote: I've replaced the legit usernames and IP's with xxx but left them in for context. I'm worried that the date entries are a consequence of some hacker activity, but I have been unable to find any other symptoms. I did a web search and did not find

MD5 sums of individual files?

2001-03-28 Thread William R. Ward
? --Bill. -- William R Ward[EMAIL PROTECTED] http://www.bayview.com/~hermit/ - Those are my principles. If you don't like them I have others.-Groucho Marx

Re: MD5 sums of individual files?

2001-03-29 Thread William R. Ward
Olaf Meeuwissen writes: [EMAIL PROTECTED] (William R. Ward) writes: One way to test if you have been hacked is to run an MD5 checksum of key binaries and look to see if it's been replaced by the intruder. Is there any place where the MD5 sums of individual executable files (not the .deb files

Re: Logging practices (and why does it suck in Debian?)

2001-04-19 Thread William R. Ward
libc6 and other important shared libraries that I don't want to upgrade because it would destabilize the whole system. What I'd like to see is some kind of snapshot status where it was linked against the stable versions of all the common libraries etc. --Bill. -- William R Ward[EMAIL

Re: apache log entry

2001-10-08 Thread William R. Ward
at all; if you do, change the IP addresses to whatever is appropriate for your system.) Directory proxy:* order deny,allow deny from all allow from 192.168.0.0/255.255.0.0 /Directory HTH. --Bill. -- William R Ward[EMAIL PROTECTED] http://www.wards.net

Re: shutdown user and accountability

2001-11-27 Thread William R Ward
could confirm it that way. It's not perfect, but given the policies you have to live with, it may be the only type of solution you can come up with. --Bill. -- William R Ward[EMAIL PROTECTED] http://www.wards.net/~bill

VI wrapper for SUDO?

2001-11-29 Thread William R Ward
to the final location. Does such a beast exist? If not, I think it should. It should probably obey the /etc/alternatives preferences for editors, too. --Bill. -- William R Ward[EMAIL PROTECTED] http://www.wards.net/~bill

Re: VI wrapper for SUDO?

2001-11-29 Thread William R Ward
William R Ward [EMAIL PROTECTED] writes: Is there any kind of wrapper that can be used to allow sudo to grant editing access to only one file? I am thinking of something similar to vipw or visudo, but with security in mind; following this basic algorithm: 1. Using user privileges, Copy

Re: VI wrapper for SUDO? - another bad way ??

2001-11-29 Thread William R. Ward
like your sucpaliases? Or should a C equivalent be written instead? --Bill. -- William R Ward[EMAIL PROTECTED] http://www.wards.net/~bill/ - If you're not part of the solution, you're part

Re: VI wrapper for SUDO? - another bad way ??

2001-11-29 Thread William R. Ward
to replace /etc/aliases w/o giving um root access Of course, the idea is to give certain permissions to certain users without giving away the farm. That's what sudo's all about. --Bill. -- William R Ward[EMAIL PROTECTED] http://www.wards.net/~bill

Re: VI wrapper for SUDO? - another bad way ??

2001-12-04 Thread William R Ward
martin f krafft [EMAIL PROTECTED] writes: * William R. Ward [EMAIL PROTECTED] [2001.11.29 18:00:40-0800]: Question: Is it generally considered secure enough to sudo a bash script like your sucpaliases? Or should a C equivalent be written instead? no. especially not the quick'n'dirty

Re: VI wrapper for SUDO? - another bad way ??

2001-12-04 Thread William R. Ward
Gerfried Fuchs writes: * William R Ward [EMAIL PROTECTED] [2001-12-03 00:50]: Right; but assuming one takes care of this kind of issue, is there anything inherently unsafe about running shell scripts through sudo? shell scripts usually call other programs - whose behavior could be most

Re: VI wrapper for SUDO? - another bad way ??

2001-12-04 Thread William R. Ward
Gerfried Fuchs writes: * William R. Ward [EMAIL PROTECTED] [2001-12-04 11:56]: Because the thread originated there. I haven't seen it before here. Do you really mean [EMAIL PROTECTED] and not debian-security@LISTS.debian.org? Those are two totally different things Maybe you have to resend