Re: 2.2.18 exploit, and updating the kernel

2002-03-20 Thread Dominique Fortier

Frodo Baggins wrote:


On Sun, Mar 17, 2002 at 01:59:47PM +0100, vdongen scripsit:


If I'm not out of line on this, I would suggest getting netinstall.
potato: http://markybobdeb.sourceforge.net/elf/files/netinst-2.2r4.iso
woody: 
http://people.debian.org/~ieure/netinst/releases/20020215/woody_netinst-20020215-i386.iso

most machines nowadays have cdrom players.



Would you know if these CD includes a pppoe thing? Tha is, I have an
ADSL connection, so I would like to use it to install.

10q


Yep it does, rp-ppoe-1.01 i think.

Have a lot of fun !




Re: 2.2.18 exploit, and updating the kernel

2002-03-19 Thread Dominique Fortier

Frodo Baggins wrote:

On Sun, Mar 17, 2002 at 01:59:47PM +0100, vdongen scripsit:

If I'm not out of line on this, I would suggest getting netinstall.
potato: http://markybobdeb.sourceforge.net/elf/files/netinst-2.2r4.iso
woody: 
http://people.debian.org/~ieure/netinst/releases/20020215/woody_netinst-20020215-i386.iso

most machines nowadays have cdrom players.


Would you know if these CD includes a pppoe thing? Tha is, I have an
ADSL connection, so I would like to use it to install.

10q

Yep it does, rp-ppoe-1.01 i think.

Have a lot of fun !



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: 2.2.18 exploit, and updating the kernel

2002-03-18 Thread Frodo Baggins

On Sun, Mar 17, 2002 at 01:59:47PM +0100, vdongen scripsit:
 If I'm not out of line on this, I would suggest getting netinstall.
 potato: http://markybobdeb.sourceforge.net/elf/files/netinst-2.2r4.iso
 woody: 
http://people.debian.org/~ieure/netinst/releases/20020215/woody_netinst-20020215-i386.iso
 
 most machines nowadays have cdrom players.

Would you know if these CD includes a pppoe thing? Tha is, I have an
ADSL connection, so I would like to use it to install.

10q

-- 
Leo TheHobbit 
IRCnet #roma2
ICQ 56656060

-BEGIN GEEK CODE BLOCK-
Version: 3.12
GED/CS d? s-:++ a+ C++ UL+++ P E+ W++ N+ o K? !w O? M V PS+++ 
PE-- Y+ PPG+ t++ 5? X-- R+ tv+ b+++ DI? D G++ e*() h r++ y+++(*)
--END GEEK CODE BLOCK--
++


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: 2.2.18 exploit, and updating the kernel

2002-03-18 Thread Frodo Baggins
On Sun, Mar 17, 2002 at 01:59:47PM +0100, vdongen scripsit:
 If I'm not out of line on this, I would suggest getting netinstall.
 potato: http://markybobdeb.sourceforge.net/elf/files/netinst-2.2r4.iso
 woody: 
 http://people.debian.org/~ieure/netinst/releases/20020215/woody_netinst-20020215-i386.iso
 
 most machines nowadays have cdrom players.

Would you know if these CD includes a pppoe thing? Tha is, I have an
ADSL connection, so I would like to use it to install.

10q

-- 
Leo TheHobbit 
IRCnet #roma2
ICQ 56656060

-BEGIN GEEK CODE BLOCK-
Version: 3.12
GED/CS d? s-:++ a+ C++ UL+++ P E+ W++ N+ o K? !w O? M V PS+++ 
PE-- Y+ PPG+ t++ 5? X-- R+ tv+ b+++ DI? D G++ e*() h r++ y+++(*)
--END GEEK CODE BLOCK--
++



Re: 2.2.18 exploit, and updating the kernel

2002-03-17 Thread David Hart

On Fri, Mar 15, 2002 at 06:16:22PM -0500, [EMAIL PROTECTED] wrote:

 I have a potato system - with the 2.2.18 kernel. Somone has gotten into a box 
 on my network and used this exploit to gain root: 
 http://:infected.ilm.net/xpl0itz/l1nux/epcs2.c+epcs2hl=enie=ISO-8859-1
 The other boxes that are net accessible are openbsd -- This system is a dual 
 p6 so I need debian for smp.
 
 Is there a proper 'debian' way to go about patching the kernel against this 
 exploit, or updating the kernel to 2.4. 

I think make-kpkg might be what you're looking for.  It creates a deb
from the kernel sources.

-- 
David Hart
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: 2.2.18 exploit, and updating the kernel

2002-03-17 Thread B Beck

On Sun, 17 Mar 2002 13:59:47 +0100
vdongen [EMAIL PROTECTED] wrote:
 
 most machines nowadays have cdrom players.

Heh, true!
I guess somewhere I got in the habit of downloading the floppies to install rather 
than .isos.  I think at the time I only had one CDROM and 5 machines and I got really 
tired of swapping it every time I needed a fresh install.
Either way's viable and it's good to have a multitude of skills.  As long as someone's 
able to get deb installed (and running), I'd consider it a victory :)

regards

Brad Beck - Linux guru in beta


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: 2.2.18 exploit, and updating the kernel

2002-03-17 Thread David Hart
On Fri, Mar 15, 2002 at 06:16:22PM -0500, [EMAIL PROTECTED] wrote:

 I have a potato system - with the 2.2.18 kernel. Somone has gotten into a box 
 on my network and used this exploit to gain root: 
 http://:infected.ilm.net/xpl0itz/l1nux/epcs2.c+epcs2hl=enie=ISO-8859-1
 The other boxes that are net accessible are openbsd -- This system is a dual 
 p6 so I need debian for smp.
 
 Is there a proper 'debian' way to go about patching the kernel against this 
 exploit, or updating the kernel to 2.4. 

I think make-kpkg might be what you're looking for.  It creates a deb
from the kernel sources.

-- 
David Hart
[EMAIL PROTECTED]



Re: 2.2.18 exploit, and updating the kernel

2002-03-17 Thread vdongen

 That's the proper 'debian' way to do it.  But if you've already been
 rooted you'll probably want to start from a fresh install.  Download
 the install floppy images from
 http://ftp.us.debian.org/debian/dists/woody/main/disks-i386/current/i
 mages-1.44/
 
jikes, how oldfashion.

If I'm not out of line on this, I would suggest getting netinstall.
potato: http://markybobdeb.sourceforge.net/elf/files/netinst-2.2r4.iso
woody: 
http://people.debian.org/~ieure/netinst/releases/20020215/woody_netinst-20020215-i386.iso

most machines nowadays have cdrom players.

Greetz,

Ivo




Re: 2.2.18 exploit, and updating the kernel

2002-03-17 Thread B Beck
On Sun, 17 Mar 2002 13:59:47 +0100
vdongen [EMAIL PROTECTED] wrote:
 
 most machines nowadays have cdrom players.

Heh, true!
I guess somewhere I got in the habit of downloading the floppies to install 
rather than .isos.  I think at the time I only had one CDROM and 5 machines and 
I got really tired of swapping it every time I needed a fresh install.
Either way's viable and it's good to have a multitude of skills.  As long as 
someone's able to get deb installed (and running), I'd consider it a victory :)

regards

Brad Beck - Linux guru in beta



Re: 2.2.18 exploit, and updating the kernel

2002-03-16 Thread Francesco P. Lovergine
On Fri, Mar 15, 2002 at 06:16:22PM -0500, [EMAIL PROTECTED] wrote:
 I have a potato system - with the 2.2.18 kernel. Somone has gotten into a box 
 on my network and used this exploit to gain root: 
 http://:infected.ilm.net/xpl0itz/l1nux/epcs2.c+epcs2hl=enie=ISO-8859-1
 The other boxes that are net accessible are openbsd -- This system is a dual 
 p6 so I need debian for smp.
 
 Is there a proper 'debian' way to go about patching the kernel against this 
 exploit, or updating the kernel to 2.4. 
 

2.2.18 is deprecated. Use the latest one (2.2.19) in potato. 
It's rock solid (some security patches were backported in it).

-- 
Francesco P. Lovergine



2.2.18 exploit, and updating the kernel

2002-03-15 Thread DORolfe

I have a potato system - with the 2.2.18 kernel. Somone has gotten into a box 
on my network and used this exploit to gain root: 
http://:infected.ilm.net/xpl0itz/l1nux/epcs2.c+epcs2hl=enie=ISO-8859-1
The other boxes that are net accessible are openbsd -- This system is a dual 
p6 so I need debian for smp.

Is there a proper 'debian' way to go about patching the kernel against this 
exploit, or updating the kernel to 2.4. 

Thanks, 
David Rolfe @ work


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: 2.2.18 exploit, and updating the kernel

2002-03-15 Thread B Beck

On Fri, 15 Mar 2002 18:16:22 EST
[EMAIL PROTECTED] wrote:

I get: Could not connect to remote server when I try to follow that link.
I get: The address is not available from this machine when I strip out the extra 
leading : :)
I am curious as to seeing what potato is vulnerable to.
However: if you want the 2.4.* kernel on your deb box, you should upgrade to woody.  
Not only for the 2.4 kernel, but also for more up to date packages and security 
patches.
so do this:

debian# vi /etc/apt/sources.list
 substitute potato w/ woody to upgrade to woody

deb http://security.debian.org/debian-security potato/updates main contrib non-free
deb http://security.debian.org/debian-non-US potato/non-US main contrib non-free
deb http://security.debian.org potato/updates main contrib non-free

debian# apt-get dist-upgrade
debian# apt-get update
debian# apt-get upgrade

That's the proper 'debian' way to do it.  But if you've already been rooted you'll 
probably want to start from a fresh install.  Download the install floppy images from 
http://ftp.us.debian.org/debian/dists/woody/main/disks-i386/current/images-1.44/

Hope that helps, and sorry to hear about the root job :(

Brad Beck - linux guru in beta



 I have a potato system - with the 2.2.18 kernel. Somone has gotten into a box 
 on my network and used this exploit to gain root: 
 http://:infected.ilm.net/xpl0itz/l1nux/epcs2.c+epcs2hl=enie=ISO-8859-1
 The other boxes that are net accessible are openbsd -- This system is a dual 
 p6 so I need debian for smp.
 
 Is there a proper 'debian' way to go about patching the kernel against this 
 exploit, or updating the kernel to 2.4. 
 
 Thanks, 
 David Rolfe @ work
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 
 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: 2.2.18 exploit, and updating the kernel

2002-03-15 Thread Francesco P. Lovergine

On Fri, Mar 15, 2002 at 06:16:22PM -0500, [EMAIL PROTECTED] wrote:
 I have a potato system - with the 2.2.18 kernel. Somone has gotten into a box 
 on my network and used this exploit to gain root: 
 http://:infected.ilm.net/xpl0itz/l1nux/epcs2.c+epcs2hl=enie=ISO-8859-1
 The other boxes that are net accessible are openbsd -- This system is a dual 
 p6 so I need debian for smp.
 
 Is there a proper 'debian' way to go about patching the kernel against this 
 exploit, or updating the kernel to 2.4. 
 

2.2.18 is deprecated. Use the latest one (2.2.19) in potato. 
It's rock solid (some security patches were backported in it).

-- 
Francesco P. Lovergine


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




2.2.18 exploit, and updating the kernel

2002-03-15 Thread DORolfe
I have a potato system - with the 2.2.18 kernel. Somone has gotten into a box 
on my network and used this exploit to gain root: 
http://:infected.ilm.net/xpl0itz/l1nux/epcs2.c+epcs2hl=enie=ISO-8859-1
The other boxes that are net accessible are openbsd -- This system is a dual 
p6 so I need debian for smp.

Is there a proper 'debian' way to go about patching the kernel against this 
exploit, or updating the kernel to 2.4. 

Thanks, 
David Rolfe @ work



Re: 2.2.18 exploit, and updating the kernel

2002-03-15 Thread B Beck
On Fri, 15 Mar 2002 18:16:22 EST
[EMAIL PROTECTED] wrote:

I get: Could not connect to remote server when I try to follow that link.
I get: The address is not available from this machine when I strip out the 
extra leading : :)
I am curious as to seeing what potato is vulnerable to.
However: if you want the 2.4.* kernel on your deb box, you should upgrade to 
woody.  Not only for the 2.4 kernel, but also for more up to date packages and 
security patches.
so do this:

debian# vi /etc/apt/sources.list
 substitute potato w/ woody to upgrade to woody

deb http://security.debian.org/debian-security potato/updates main contrib 
non-free
deb http://security.debian.org/debian-non-US potato/non-US main contrib non-free
deb http://security.debian.org potato/updates main contrib non-free

debian# apt-get dist-upgrade
debian# apt-get update
debian# apt-get upgrade

That's the proper 'debian' way to do it.  But if you've already been rooted 
you'll probably want to start from a fresh install.  Download the install 
floppy images from 
http://ftp.us.debian.org/debian/dists/woody/main/disks-i386/current/images-1.44/

Hope that helps, and sorry to hear about the root job :(

Brad Beck - linux guru in beta



 I have a potato system - with the 2.2.18 kernel. Somone has gotten into a box 
 on my network and used this exploit to gain root: 
 http://:infected.ilm.net/xpl0itz/l1nux/epcs2.c+epcs2hl=enie=ISO-8859-1
 The other boxes that are net accessible are openbsd -- This system is a dual 
 p6 so I need debian for smp.
 
 Is there a proper 'debian' way to go about patching the kernel against this 
 exploit, or updating the kernel to 2.4. 
 
 Thanks, 
 David Rolfe @ work
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]