Re: Nvidia amd64 driver (WAS: Root exploit for FreeBSD )

2009-12-13 Thread Mario Lobo
On Saturday 12 December 2009 22:44:54 Rolf G Nielsen wrote: Mario Lobo wrote: On Saturday 12 December 2009 21:23:00 Rolf Nielsen wrote: Where's that? The Nvidia site says nothing about it yet, and the makefile for x11/nvidia-driver still says ONLY_FOR_ARCHS=i386. I'm eagerly waiting for

Re: Nvidia amd64 driver (WAS: Root exploit for FreeBSD )

2009-12-13 Thread Rolf G Nielsen
Mario Lobo wrote: On Saturday 12 December 2009 22:44:54 Rolf G Nielsen wrote: Mario Lobo wrote: On Saturday 12 December 2009 21:23:00 Rolf Nielsen wrote: Where's that? The Nvidia site says nothing about it yet, and the makefile for x11/nvidia-driver still says ONLY_FOR_ARCHS=i386. I'm eagerly

Re: Root exploit for FreeBSD

2009-12-12 Thread Randy Bush
but i look in syslogs of some FreeBSD internet server and there is a great evidence that some botnets are (again) tryng simple combination of uid/pwd. /usr/ports/security/sshguard-* randy ___ freebsd-questions@freebsd.org mailing list

Re: Root exploit for FreeBSD

2009-12-12 Thread Polytropon
On Fri, 11 Dec 2009 13:01:51 -0800, Kurt Buff kurt.b...@gmail.com wrote: Well, yes, except this assumes one has access to the sysadmin... Physical access. It's hard to exploit a sysadmin by social engineering because he hardly has any friends. :-) -- Polytropon Magdeburg, Germany Happy

Re: Root exploit for FreeBSD

2009-12-12 Thread Chris Rees
2009/12/11 Kevin Oberman ober...@es.net: Date: Fri, 11 Dec 2009 08:49:42 + From: Matthew Seaman m.sea...@infracaninophile.co.uk Sender: owner-freebsd-curr...@freebsd.org Polytropon wrote: On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr. sfour...@gmail.com wrote: I have tried

Re: Root exploit for FreeBSD

2009-12-12 Thread Charlie Kester
On Fri 11 Dec 2009 at 20:59:57 PST Robert Huff wrote: Ulf Zimmermann writes: Just go to Fry's Electronic. Most of their systems are still MS-Dos with Novell for network, running text based inventory/quote/sales app. Ca _lot_ of small businesses have something similar. And why

Re: Root exploit for FreeBSD

2009-12-12 Thread David Southwell
2009/12/11 Kevin Oberman ober...@es.net: Date: Fri, 11 Dec 2009 08:49:42 + From: Matthew Seaman m.sea...@infracaninophile.co.uk Sender: owner-freebsd-curr...@freebsd.org Polytropon wrote: On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr. sfour...@gmail.com wrote: I have

Re: Root exploit for FreeBSD

2009-12-12 Thread M. Warner Losh
a : (comparatively) poor security record. Most recently, for example: : : http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html : : Are you trying to make your infosec guy look like an idiot? Does he : realize that FreeBSD has a grand total of 16 security

Re: Root exploit for FreeBSD

2009-12-12 Thread Sam Fourman Jr.
Are you sure that OpenBSD has a better record? I found this for loose reference. http://en.wikipedia.org/wiki/OpenBSD#Security_and_code_auditing I will say that even though on the surface OpenBSD appears to have a better track record security wise I tend to use FreeBSD for my desktop needs

Re: Root exploit for FreeBSD

2009-12-12 Thread Rolf Nielsen
Sam Fourman Jr. wrote: Are you sure that OpenBSD has a better record? I found this for loose reference. http://en.wikipedia.org/wiki/OpenBSD#Security_and_code_auditing I will say that even though on the surface OpenBSD appears to have a better track record security wise I tend to use FreeBSD

Re: Root exploit for FreeBSD

2009-12-12 Thread George Liaskos
http://www.nvnews.net/vbulletin/showthread.php?t=142120 On Sun, Dec 13, 2009 at 2:23 AM, Rolf Nielsen listrea...@lazlarlyricon.com wrote: Sam Fourman Jr. wrote: Are you sure that OpenBSD has a better record? I found this for loose reference.

Re: Root exploit for FreeBSD

2009-12-12 Thread Mario Lobo
On Saturday 12 December 2009 21:23:00 Rolf Nielsen wrote: Where's that? The Nvidia site says nothing about it yet, and the makefile for x11/nvidia-driver still says ONLY_FOR_ARCHS=i386. I'm eagerly waiting for it, but I can't find anything other than a forum post (I don't have the address

Re: Root exploit for FreeBSD

2009-12-12 Thread Rolf G Nielsen
Mario Lobo wrote: On Saturday 12 December 2009 21:23:00 Rolf Nielsen wrote: Where's that? The Nvidia site says nothing about it yet, and the makefile for x11/nvidia-driver still says ONLY_FOR_ARCHS=i386. I'm eagerly waiting for it, but I can't find anything other than a forum post (I don't have

Re: Root exploit for FreeBSD

2009-12-11 Thread Polytropon
On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr. sfour...@gmail.com wrote: I have tried looking around and OpenBSD appears to be the undisputed #1 track record in terms of security and FreeBSD is #2 (I didn't count dragonflyBSD) VMS would be #0, then? :-) -- Polytropon Magdeburg,

Re: Root exploit for FreeBSD

2009-12-11 Thread Anton Shterenlikht
On Thu, Dec 10, 2009 at 10:34:34PM -0600, Paul Schmehl wrote: I'm starting to wonder if the security manager really said what Anton claims he said, or Anton is filtering his perceptions through the anger he feels at being restricted in his ability to operate freely. If the latter is the

Re: Root exploit for FreeBSD

2009-12-11 Thread $witch
On Thu, 10 Dec 2009 15:41:41 +0100, Anton Shterenlikht me...@bristol.ac.uk wrote: From my information security manager: FreeBSD isn't much used within the University (I understand) and has a (comparatively) poor security record. .. Hi, almost all of you remark how

Re: Root exploit for FreeBSD

2009-12-11 Thread Nick Barnes
At 2009-12-11 11:29:44+, $witch writes: but i look in syslogs of some FreeBSD internet server and there is a great evidence that some botnets are (again) tryng simple combination of uid/pwd. # always, everywhere: PasswordAuthentication No Nick B

Re: Root exploit for FreeBSD

2009-12-11 Thread Polytropon
On Fri, 11 Dec 2009 12:29:44 +0100, $witch a.spine...@rfc1925.net wrote: starting from Dec 8 01:00:34 (CET) hundreds of zombies are looking for a valid username. For example Administrator... :-) i love the FreeBSD security while it is MOSTLY based on KNOWLEDGE of users than on a

Re: Root exploit for FreeBSD

2009-12-11 Thread Matthew Seaman
Polytropon wrote: On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr. sfour...@gmail.com wrote: I have tried looking around and OpenBSD appears to be the undisputed #1 track record in terms of security and FreeBSD is #2 (I didn't count dragonflyBSD) VMS would be #0, then? :-) I dunno.

Re: Root exploit for FreeBSD

2009-12-11 Thread Robert Huff
Paul Schmehl writes: And from I understand it's going to get worse. Apparently the IT services are drawing up plans to completely forbid use of non-autorized OS. I imagine fbsd will not be authorized. So I'm anticipating another battle already. Does this extend to computers

Re: Root exploit for FreeBSD

2009-12-11 Thread Dag-Erling Smørgrav
$witch a.spine...@rfc1925.net writes: but i look in syslogs of some FreeBSD internet server and there is a great evidence that some botnets are (again) tryng simple combination of uid/pwd. starting from Dec 8 01:00:34 (CET) hundreds of zombies are looking for a valid username. Starting

Re: Root exploit for FreeBSD

2009-12-11 Thread Svein Skogen (Listmail Account)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dag-Erling Smørgrav wrote: $witch a.spine...@rfc1925.net writes: but i look in syslogs of some FreeBSD internet server and there is a great evidence that some botnets are (again) tryng simple combination of uid/pwd. starting from Dec 8

Re: Root exploit for FreeBSD

2009-12-11 Thread Dag-Erling Smørgrav
Svein Skogen svein-listm...@stillbilde.net writes: The easiest way of brute-forcing access to a FreeBSD server includes locating the sysadmin and applying the common desk drawer. It's that simple. *laugh* I thought you were more of a baseball bat kind of guy :) DES -- Dag-Erling Smørgrav -

Re: Root exploit for FreeBSD

2009-12-11 Thread Stacey Son
/item/Root-exploit-for-FreeBSD-873352.html From http://www.serverwatch.com/eur/article.php/3850401/FreeBSD-Shines-While-Apple-Fails.htm All software has bugs, but it's how people react when things go wrong that you can judge them. Did the FreeBSD folks sit around and do nothing? Did

Re: Root exploit for FreeBSD

2009-12-11 Thread Mark Shroyer
On Fri, Dec 11, 2009 at 08:49:42AM +, Matthew Seaman wrote: I dunno. Haven't seen many MS-DOS exploits recently either... That's true, it would be difficult to find a local privilege escalation exploit in an operating system without the concept of limited user accounts :) -- Mark Shroyer

Re: Root exploit for FreeBSD

2009-12-11 Thread Jerry McAllister
On Fri, Dec 11, 2009 at 08:49:42AM +, Matthew Seaman wrote: Polytropon wrote: On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr. sfour...@gmail.com wrote: I have tried looking around and OpenBSD appears to be the undisputed #1 track record in terms of security and FreeBSD is #2 (I

Re: Root exploit for FreeBSD

2009-12-11 Thread Polytropon
On Fri, 11 Dec 2009 10:49:50 -0500, Jerry McAllister jerr...@msu.edu wrote: On Fri, Dec 11, 2009 at 08:49:42AM +, Matthew Seaman wrote: Polytropon wrote: On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr. sfour...@gmail.com wrote: I have tried looking around and OpenBSD

Re: Root exploit for FreeBSD

2009-12-11 Thread Svein Skogen (Listmail Account)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dag-Erling Smørgrav wrote: Svein Skogen svein-listm...@stillbilde.net writes: The easiest way of brute-forcing access to a FreeBSD server includes locating the sysadmin and applying the common desk drawer. It's that simple. *laugh* I thought

Re: Root exploit for FreeBSD

2009-12-11 Thread Weldon S Godfrey 3
If memory serves me right, sometime around 10:49am, Jerry McAllister told me: On Fri, Dec 11, 2009 at 08:49:42AM +, Matthew Seaman wrote: Polytropon wrote: On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr. sfour...@gmail.com wrote: I have tried looking around and OpenBSD appears to

Re: Root exploit for FreeBSD

2009-12-11 Thread J Sisson
2009/12/11 Svein Skogen (Listmail Account) svein-listm...@stillbilde.net The easiest way of brute-forcing access to a FreeBSD server includes locating the sysadmin and applying the common desk drawer. It's that simple. http://xkcd.com/538/ indeed.

Re: Root exploit for FreeBSD

2009-12-11 Thread Kurt Buff
On Fri, Dec 11, 2009 at 11:53, J Sisson sisso...@gmail.com wrote: 2009/12/11 Svein Skogen (Listmail Account) svein-listm...@stillbilde.net The easiest way of brute-forcing access to a FreeBSD server includes locating the sysadmin and applying the common desk drawer. It's that simple.

Re: Root exploit for FreeBSD

2009-12-11 Thread Kevin Oberman
Date: Fri, 11 Dec 2009 08:49:42 + From: Matthew Seaman m.sea...@infracaninophile.co.uk Sender: owner-freebsd-curr...@freebsd.org Polytropon wrote: On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr. sfour...@gmail.com wrote: I have tried looking around and OpenBSD appears to be

Re: Root exploit for FreeBSD

2009-12-11 Thread Ulf Zimmermann
On Fri, Dec 11, 2009 at 03:23:56PM -0800, Kevin Oberman wrote: Date: Fri, 11 Dec 2009 08:49:42 + From: Matthew Seaman m.sea...@infracaninophile.co.uk Sender: owner-freebsd-curr...@freebsd.org Polytropon wrote: On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr.

Re: Root exploit for FreeBSD

2009-12-11 Thread Robert Huff
Ulf Zimmermann writes: Just go to Fry's Electronic. Most of their systems are still MS-Dos with Novell for network, running text based inventory/quote/sales app. Ca _lot_ of small businesses have something similar. Robert Huff

Root exploit for FreeBSD

2009-12-10 Thread Anton Shterenlikht
From my information security manager: FreeBSD isn't much used within the University (I understand) and has a (comparatively) poor security record. Most recently, for example: http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html -- Anton

Re: Root exploit for FreeBSD

2009-12-10 Thread Bill Moran
/item/Root-exploit-for-FreeBSD-873352.html Are you trying to make your infosec guy look like an idiot? Does he realize that FreeBSD has a grand total of 16 security problems for all of 2009? Hell, Microsoft has that many in an average month. If he can find something (other than OpenBSD

Re: Root exploit for FreeBSD

2009-12-10 Thread Michael Butler
Anton Shterenlikht wrote: From my information security manager: FreeBSD isn't much used within the University (I understand) and has a (comparatively) poor security record. Most recently, for example: http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD

Re: Root exploit for FreeBSD

2009-12-10 Thread Mike Tancsa
-exploit-for-FreeBSD-873352.html Some say... world flat... some say roundish. There are lots of opinions to choose from. It would be nice to see an actual properly designed study quoted... or even some raw data referenced. and I am not talking about something vendor sponsored that examines

Re: Root exploit for FreeBSD

2009-12-10 Thread Steve Bertrand
/security/news/item/Root-exploit-for-FreeBSD-873352.html Are you trying to make your infosec guy look like an idiot? He doesn't really have to _try_, does he? I have always thought that an infosec person should *know* what they have running within their own network, and furthermore, gather his

Re: Root exploit for FreeBSD

2009-12-10 Thread Dag-Erling Smørgrav
Anton Shterenlikht me...@bristol.ac.uk writes: From my information security manager: FreeBSD isn't much used within the University (I understand) and has a (comparatively) poor security record. Most recently, for example: comparatively, compared to what? Windows? Linux?

Re: Root exploit for FreeBSD

2009-12-10 Thread Kevin Wilcox
/Root-exploit-for-FreeBSD-873352.html Wow. Just...wow. FreeBSD's security record, the rate at which fixes occur, the ports system and the overall sanity of the environment is *precisely* why we have been migrating from RHEL to FreeBSD at my University (I'm employed by the University

Re: Root exploit for FreeBSD

2009-12-10 Thread Andreas Rudisch
://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html Yes, and? http://docs.freebsd.org/cgi/getmsg.cgi?fetch=0+0+archive/2009/freebsd-security-notifications/20091206.freebsd-security-notifications http://security.freebsd.org/advisories/FreeBSD-SA-09:16.rtld.asc Andreas

Re: Root exploit for FreeBSD

2009-12-10 Thread joe
: http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean. ___ freebsd-questions@freebsd.org mailing list http

Re: Root exploit for FreeBSD

2009-12-10 Thread Julian Elischer
Anton Shterenlikht wrote: From my information security manager: FreeBSD isn't much used within the University (I understand) and has a (comparatively) poor security record. Most recently, for example: http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD

Re: Root exploit for FreeBSD

2009-12-10 Thread Anton Shterenlikht
, for example: http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html Are you trying to make your infosec guy look like an idiot? Does he realize that FreeBSD has a grand total of 16 security problems for all of 2009? Hell, Microsoft has that many

Re: Root exploit for FreeBSD

2009-12-10 Thread Chargen
On Thu, Dec 10, 2009 at 5:21 PM, Anton Shterenlikht me...@bristol.ac.uk wrote: On Thu, Dec 10, 2009 at 09:51:22AM -0500, Bill Moran wrote: In response to Anton Shterenlikht me...@bristol.ac.uk: I had to fight a long battle, well.. I had some support from other academics, to have a linux

Re: Root exploit for FreeBSD

2009-12-10 Thread Paul Schmehl
: http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.ht ml Please pass this to your information security manager: From one information security manager to another, you're an idiot. -- Paul Schmehl, Senior Infosec Analyst As if it wasn't already obvious, my opinions are my

Re: Root exploit for FreeBSD

2009-12-10 Thread Jason
much used within the University (I understand) and has a (comparatively) poor security record. Most recently, for example: http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.ht ml Please pass this to your information security manager: From one information security

Re: Root exploit for FreeBSD

2009-12-10 Thread Svein Skogen (Listmail Account)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Chargen wrote: On Thu, Dec 10, 2009 at 5:21 PM, Anton Shterenlikht me...@bristol.ac.uk wrote: On Thu, Dec 10, 2009 at 09:51:22AM -0500, Bill Moran wrote: In response to Anton Shterenlikht me...@bristol.ac.uk: I had to fight a long battle,

Re: Root exploit for FreeBSD

2009-12-10 Thread Gary Jennejohn
On Thu, 10 Dec 2009 16:21:50 + Anton Shterenlikht me...@bristol.ac.uk wrote: I had to fight a long battle, well.. I had some support from other academics, to have a linux class in my Faculty. Here the opposition wasn't so much security, as why would any undegraduate need linux, as if MS

Re: Root exploit for FreeBSD

2009-12-10 Thread J Sisson
On Thu, Dec 10, 2009 at 10:21 AM, Anton Shterenlikht me...@bristol.ac.ukwrote: Perhaps I should start putting together some statistics to make my case more forcefully. I fought the same battle at the Univ. I attended (as a student). They were an M$ shop as well and had issues with me running

Re: Root exploit for FreeBSD

2009-12-10 Thread Julian H. Stacey
Fortuantely, I had no problem setting up a black FreeBSD box to preserve my sanity. A tip for those threatened with no BSD box at work: FreeBSD runs fine _inside_ a box that looks like a multi sheet scanner. OK, slow, but invisible to managers who require MS only. These scanners often lie

Re: Root exploit for FreeBSD

2009-12-10 Thread Jerry
On Thu, 10 Dec 2009 20:21:26 +0100 Julian H. Stacey j...@berklix.com replied: Fortuantely, I had no problem setting up a black FreeBSD box to preserve my sanity. A tip for those threatened with no BSD box at work: FreeBSD runs fine _inside_ a box that looks like a multi sheet scanner. OK,

Re: Root exploit for FreeBSD

2009-12-10 Thread Kevin Wilcox
2009/12/10 Anton Shterenlikht me...@bristol.ac.uk: I was just stressed after being forced by him to explain why I wanted firewall exceptions for two ports to my FreeBSD portscluster nodes. I explained the reasons and that was settled. Anton, I don't know about the UK, Great Britain or

Re: Root exploit for FreeBSD

2009-12-10 Thread David Southwell
On Thu, 10 Dec 2009 20:21:26 +0100 Julian H. Stacey j...@berklix.com replied: Fortuantely, I had no problem setting up a black FreeBSD box to preserve my sanity. A tip for those threatened with no BSD box at work: FreeBSD runs fine _inside_ a box that looks like a multi sheet scanner.

Re: Root exploit for FreeBSD

2009-12-10 Thread Olivier Nicole
FreeBSD isn't much used within the University (I understand) and has a (comparatively) poor security record. Most recently, for example: http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html Are you trying to make your infosec guy look like

Re: Root exploit for FreeBSD

2009-12-10 Thread Steve Bertrand
Jerry wrote: Out of pure morbid curiosity, would you please answer this question for me. You work for a corporation that specifically requires the use of a specific OS, the OS itself is not material to this question. It also forbids the use of any unauthorized OS or equipment on the

Re: Root exploit for FreeBSD

2009-12-10 Thread Paul Schmehl
--On December 10, 2009 2:11:31 PM -0600 Kevin Wilcox kevin.wil...@gmail.com wrote: 2009/12/10 Anton Shterenlikht me...@bristol.ac.uk: I was just stressed after being forced by him to explain why I wanted firewall exceptions for two ports to my FreeBSD portscluster nodes. I explained the

Re: Root exploit for FreeBSD

2009-12-10 Thread Randy Bush
FreeBSD isn't much used within the University (I understand) and has a (comparatively) poor security record. unlike linux or windoze, rofl randy ___ freebsd-questions@freebsd.org mailing list

Re: Root exploit for FreeBSD

2009-12-10 Thread Ivo Karabojkov
http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org -- View this message in context: http://old.nabble.com/Root-exploit-for-FreeBSD-tp26728358p26739505.html Sent from the freebsd-questions mailing list archive

Re: Root exploit for FreeBSD

2009-12-10 Thread Sam Fourman Jr.
. Most recently, for example:       http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html Are you trying to make your infosec guy look like an idiot?  Does he realize that FreeBSD has a grand total of 16 security problems for all of 2009?  Hell, Microsoft has that many

Re: Root exploit for FreeBSD

2009-12-10 Thread Daniel Braniss
school :-) and has a (comparatively) poor security record. Most recently, for example: http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html as many have explained, connecting a computer