root fs/crypted

2001-05-29 Thread clemens
on a piece of paper and hide behind the bookshelf. (probably i should crosspost to debian-legal. the whole non-US issue has been left untouched) what do YOU think? shell debian be the first(?) privacy enhanced distro? clemens ^* SAWFASP = searched archives without finding a similiar posting

Re: root fs/crypted

2001-05-30 Thread clemens
On Wed, May 30, 2001 at 10:46:19AM +0200, Jan Niehusmann wrote: On Wed, May 30, 2001 at 01:08:21AM -0700, [EMAIL PROTECTED] wrote: Couldn't you say something like I'm so sorry, I can't remember the pass phrase, my mind has failed me...etc? What about a more provable approach: The

Re: root fs/crypted

2001-05-30 Thread clemens
On Wed, May 30, 2001 at 12:17:35PM +0900, Curt Howland wrote: [cut] but that only works at startup. if the system is running, having the entire disk encrypted is no different than the fact it's all in hex already. an individual user based encryption means all you have to do is logout, not

Re: root fs/crypted

2001-05-30 Thread clemens
On Wed, May 30, 2001 at 10:46:19AM +0200, Jan Niehusmann wrote: On Wed, May 30, 2001 at 01:08:21AM -0700, [EMAIL PROTECTED] wrote: Couldn't you say something like I'm so sorry, I can't remember the pass phrase, my mind has failed me...etc? What about a more provable approach: The

Re: root fs/crypted

2001-05-30 Thread clemens
On Tue, May 29, 2001 at 08:02:50PM -0700, Paul Lowe wrote: I like this. Would it be difficult to modify Debian, so that upon install, it creates an encrypted root volume and starts things off the right way? 3 things are needed to that upon installation: - losetup -e your favourite chiper

Re: root fs/crypted

2001-05-30 Thread clemens
On Wed, May 30, 2001 at 12:17:35PM +0900, Curt Howland wrote: [cut] but that only works at startup. if the system is running, having the entire disk encrypted is no different than the fact it's all in hex already. an individual user based encryption means all you have to do is logout, not

Re: root fs/crypted

2001-05-30 Thread clemens
30, 2001 at 03:01:17AM +0200, clemens wrote: SAWFASP^* as laws around the globe are forged to weak personal privacy, police knocking on one's door, because of portscanning a previously hacked website, and - i don't have to tell those of you, which are reading slashdot - as pretty strange

ip spoofing (httpd)

2001-04-10 Thread Clemens Hermann
Hi, today I had a discussion with somebody about the possibility of ip-spoofing that affects the apache. In particular we were talking about a cgi-script he implemented. The script is sort of an online-voting-system. To avoid that someone clicks several times he uses the source-IP and each IP

Re: Automatic Debian security updates, an Implementation

2002-11-19 Thread Fruhwirth Clemens
On Fri, 2002-10-18 at 09:55, Gustavo Franco wrote: Talking about secpack, is it non-free? I can't see in your mail(Clemens) the url or apt-line to get the source package. No, it's BSD. I didn't dare to put up a license for that minimal collection. There isn't even a source package. I just dpkg

Secpack update for 2004 key.

2004-02-08 Thread Fruhwirth Clemens
of this package, please speak out. Regards, Clemens P.S.: I'm sorry that this update took me so long, but I lost interest in using Debian because of it's release cycles. No offense. pgp0.pgp Description: PGP signature

Re: USB Stick, GPG and CryptoFS in a startup script

2004-04-28 Thread Clemens Bier
Hallo Goswin, Goswin von Brederlow schrieb: Clemens Bier [EMAIL PROTECTED] writes: snip cannot open '/dev/tty' : no such device or address Error: Password must be at least 20 characters /snip I think you need to redirect input from /dev/tty or /dev/console explicitly or you need

DM-Crypt and PAM Mount

2004-11-06 Thread Clemens Bier
file entries: snip /var/log/auth.log/ Nov 7 00:48:25 zappa kdm: :0[11226]: pam_mount: (defined by globalconf) Nov 7 00:48:25 zappa kdm: :0[11226]: pam_mount: user: clemens Nov 7 00:48:25 zappa kdm: :0[11226]: pam_mount: server: Nov 7 00:48:25 zappa kdm: :0[11226]: pam_mount: volume

ip spoofing (httpd)

2001-04-10 Thread Clemens Hermann
Hi, today I had a discussion with somebody about the possibility of ip-spoofing that affects the apache. In particular we were talking about a cgi-script he implemented. The script is sort of an online-voting-system. To avoid that someone clicks several times he uses the source-IP and each IP has

CryptoAPI: Need beta-testers.

2002-08-09 Thread Fruhwirth Clemens
, please contact me. For further information on how to use cryptoloop have a look at http://www.kerneli.org/cryptoapi/howto/ This is not yet an official CryptoAPI release. Feedback is highly appreciated, Clemens pgp5PDshCYwtC.pgp Description: PGP signature

Automatic Debian security updates, an Implementation

2002-10-18 Thread Fruhwirth Clemens
Hi! http://therapy.endorphin.org/secpack_0.1-1.deb implements a simple cron based daily security update with signature checking using a modified version of ajt's apt-check-sigs. Feedback is appreciated. CC please, /me not on list. Regards, Clemens pgpVBkwjvCD5f.pgp Description: PGP signature

Re: Automatic Debian security updates, an Implementation

2002-11-19 Thread Fruhwirth Clemens
On Fri, 2002-10-18 at 09:55, Gustavo Franco wrote: Talking about secpack, is it non-free? I can't see in your mail(Clemens) the url or apt-line to get the source package. No, it's BSD. I didn't dare to put up a license for that minimal collection. There isn't even a source package. I just dpkg

secpack update - Automatic security updates

2003-02-04 Thread Fruhwirth Clemens
An update to secpack is available with the new Debian ftp archive key. http://therapy.endorphin.org/secpack/ secpack implements updates from security.debian.org with signature checking. I'm no official debian developer. Does anyone want to adopt this unofficial package? Regards, Clemens

Secpack update for 2004 key.

2004-02-08 Thread Fruhwirth Clemens
of this package, please speak out. Regards, Clemens P.S.: I'm sorry that this update took me so long, but I lost interest in using Debian because of it's release cycles. No offense. pgpemWoxwyrvo.pgp Description: PGP signature

USB Stick, GPG and CryptoFS in a startup script

2004-04-27 Thread Clemens Bier
out, the init script /etc/init.d/bootmisc.sh sets the permissions on the tty device. I am still a noobie to Kernel internals. Thus I am not sure where to look for further clues. Thanks for any tips or hints. Have a nice day Clemens Bier #!/bin/sh -e case $1 in start) /sbin

Re: USB Stick, GPG and CryptoFS in a startup script

2004-04-28 Thread Clemens Bier
Hallo Goswin, Goswin von Brederlow schrieb: Clemens Bier [EMAIL PROTECTED] writes: snip cannot open '/dev/tty' : no such device or address Error: Password must be at least 20 characters /snip I think you need to redirect input from /dev/tty or /dev/console explicitly or you need

Re: USB Stick, GPG and CryptoFS in a startup script

2004-04-30 Thread Clemens Bier
On Thu, 2004-04-29 at 00:11, Hubert Chan wrote: Clemens == Clemens Bier [EMAIL PROTECTED] writes: [...] Clemens So, now we come to the point: When I integrate my script into Clemens /etc/init.d as one of the startup scripts, I get the following Clemens error message during boot time snip

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-07 Thread Clemens Pfaffinger
Hi, thanks for this information! I just hope that this is a hoax. What would you suggest for securing a server running openSSH? How can I notice such an attack in my log files? Cheers Kontaktinformationen clem...@csrv.at www.cdev.at 2009/7/7 Henrique

Re: HEAD's UP: possible 0day SSH exploit in the wild

2009-07-07 Thread Clemens Pfaffinger
iptables. Regards Kontaktinformationen clem...@csrv.at www.cdev.at 2009/7/7 Clemens Pfaffinger clpfaffin...@gmail.com Hi, this is standard for me. I always change the port of the openSSH-server. My (current) solution is: Portsentry listens on port 22

Done: [SECURITY] [DSA 2290-1] samba security update

2011-08-08 Thread Clemens Heuberger
-- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4e3f7e6c@tugraz.at