Re: Is ident secure?

2001-08-31 Thread Martin F Krafft
also sprach Ethan Benson (on Fri, 31 Aug 2001 03:30:54AM -0800): rubbish, if the admin is incompetent enough to be running these things as root he will have a cracked box regardless of whether identd is running or not. you have a point, even though there is no need to become offensive! and

Re: Is ident secure?

2001-08-31 Thread Martin F Krafft
also sprach Christian Kurz (on Fri, 31 Aug 2001 04:15:55PM +0200): process accounting. process accounting. Would you care to explain that a bit more and especially compare it with ident protocol (advantages and disadvantages)? process accounting is simply the kernel keeping track of all

Re: Is ident secure?

2001-08-30 Thread Martin F Krafft
On Thu, Aug 30, 2001 at 11:14:33PM -0300, Alisson Sellaro wrote: I was checking my firewall logs and have detected lots of TCP/113 dropped packets. Checking /etc/services I realized it was ident traffic. What do you think about such service? Should I let it blocked or should I allow it

Re: Is ident secure?

2001-08-30 Thread Martin F Krafft
On Thu, Aug 30, 2001 at 11:14:33PM -0300, Alisson Sellaro wrote: I was checking my firewall logs and have detected lots of TCP/113 dropped packets. Checking /etc/services I realized it was ident traffic. What do you think about such service? Should I let it blocked or should I allow it without

Re: aargh... I am being asked to change to SuSE

2001-07-16 Thread Martin F. Krafft
also sprach Juha J?ykk? (on Mon, 16 Jul 2001 11:03:41AM +0300): Anyone care to help me: I need some _strong_ points in favour of Debian, against SuSE. No crap, please. I need to presuade my superiors to turn from RH to Debian instead of SuSE as they would like to do. I need strong evidence

Re: aargh... I am being asked to change to SuSE

2001-07-16 Thread Martin F. Krafft
also sprach Ethan Benson (on Mon, 16 Jul 2001 04:14:51AM -0800): this isn't an answer, but install Debian, then change /etc/issue as well as /etc/motd to suggest SuSE, and trust me, none of your superiors are going to get it :) like they would ever login to the machine anyway. word up.

Re: Sudo and Chown?

2001-07-13 Thread Martin F. Krafft
also sprach Anders Gj?re (on Fri, 13 Jul 2001 10:52:09AM +0200): do sudo default allow the sudo-user to run every program, or just the program you spesify? the latter, of course. how will sudo work if you use the time command? like time vim /etc/passwd if you allow time with arbitrary

Re: Network File System

2001-07-13 Thread Martin F. Krafft
also sprach Dan Hutchinson (on Fri, 13 Jul 2001 03:51:49PM -0400): Does anyone know of a secure network file system like Active Directories from Microsoft ^ hahahahaha! um. do you read bugtraq or: have you ever administered one of those dreadfully sad

Re: Sudo and Chown?

2001-07-13 Thread Martin F. Krafft
also sprach Anders Gj?re (on Fri, 13 Jul 2001 10:52:09AM +0200): do sudo default allow the sudo-user to run every program, or just the program you spesify? the latter, of course. how will sudo work if you use the time command? like time vim /etc/passwd if you allow time with arbitrary

Re: [security] Re: Using BIND in a chroot enviro?

2001-07-02 Thread Martin F. Krafft
also sprach Dossy (on Sun, 01 Jul 2001 10:10:42PM -0400): No. IIRC, 53/tcp is also used for DNS queries (not just XFER's) when the size is larger than the RFC specifies for the UDP-based payload. Or, some such type of edge-case of the DNS spec. uhm - which is only the case if you slave a

Re: [security] iptables

2001-07-02 Thread Martin F. Krafft
also sprach GARGIULO Eduardo INGDESI (on Mon, 02 Jul 2001 04:25:57PM -0300): I was using ipchains, but now I have kernel v2.4.5 with iptables. I want to know how to monitor masqueraded connections. I mean the output of ipchains -L -M -v using iptables. I didn't found it in man iptables.

Re: [security] Re: Using BIND in a chroot enviro?

2001-07-01 Thread Martin F. Krafft
also sprach Tim Haynes (on Sun, 01 Jul 2001 05:02:26PM +0100): In the init.d scripts, you'll find it easiest to rip out the start-stop-daemon stuff and run the command directly, /usr/sbin/named -t /etc/bind -u named unless you're a purist in which case, you tell me how instead ;)

Re: [security] Re: Using BIND in a chroot enviro?

2001-07-01 Thread Martin F. Krafft
also sprach Tim Haynes (on Sun, 01 Jul 2001 05:02:26PM +0100): In the init.d scripts, you'll find it easiest to rip out the start-stop-daemon stuff and run the command directly, /usr/sbin/named -t /etc/bind -u named unless you're a purist in which case, you tell me how instead ;)

<    1   2   3   4   5