Re: Upcoming FreeBSD Security Advisory

2009-11-30 Thread Bryan Drewery
Colin, Thank you so much for alerting us and providing a temporary patch. I had a user attempt to use the public exploit today, but due to /tmp being noexec, it failed. Luckily I caught him before he modified the script to work though. Now I am patched and can sleep tonight :) Thanks, Bryan

Re: disable (new)syslog rotation and raise securelevel ... possible?

2010-07-12 Thread Bryan Drewery
Fernan, You can disable newsyslog by adding newsyslog_enable=NO to your /etc/rc.conf or /etc/rc.conf.local Also be aware that you will need to reboot with kern_securelevel_enable=NO in one of those files, to lower the securelevel. You should also consider a remote syslog host. Bryan

Re: Default password hash

2012-06-09 Thread Bryan Drewery
On 6/9/2012 6:34 AM, Mike Tancsa wrote: Sort of a security issue considering this assessment of MD5 You can use blf (blowfish) as well. Regards, Bryan Drewery ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo

Re: FreeBSD Security Advisory FreeBSD-SA-12:08.linux

2012-11-22 Thread Bryan Drewery
On 11/22/2012 6:02 PM, FreeBSD Security Advisories wrote: IV. Workaround No workaround is available, but systems not using the Linux binary compatibility layer are not vulnerable. The following command can be used to test if the Linux binary compatibility layer is loaded: #

Re: FreeBSD Security Advisory FreeBSD-SA-12:08.linux

2012-11-22 Thread Bryan Drewery
On 11/22/2012 6:30 PM, Bryan Drewery wrote: On 11/22/2012 6:02 PM, FreeBSD Security Advisories wrote: IV. Workaround No workaround is available, but systems not using the Linux binary compatibility layer are not vulnerable. The following command can be used to test if the Linux binary

Re: FreeBSD Security Advisory FreeBSD-SA-13:06.mmap

2013-06-20 Thread Bryan Drewery
in the future: echo 'security.bsd.unprivileged_proc_debug=0' /etc/sysctl.conf service sysctl start You should still hastily patch/reboot your system though. -- Regards, Bryan Drewery ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org

Re: fatal: cipher_init: EVP_CipherInit: set key failed for aes128-cbc [preauth]

2013-09-28 Thread Bryan Drewery
/local/etc/ssh/sshd_config). Apparently security/openssh-portable needs a fix similar to the base system head/crypto/openssh r251088. -GAWollman Yup. I didn't realize I had put that into the port. Fixed for upcoming 6.3. Thanks, Bryan Drewery signature.asc Description: OpenPGP digital

Re: http://heartbleed.com/

2014-04-07 Thread Bryan Drewery
. 1.0.1_10 has the fix. -- Regards, Bryan Drewery signature.asc Description: OpenPGP digital signature

Re: Missing binary package security updates?

2014-04-10 Thread Bryan Drewery
for security updates. Right now pkgng binary packages are not really suitable for production use because of lacking essential security updates. (There should be a loud and clear warning about this in the Handbook if it stays this way?) Best Regards, -- Regards, Bryan Drewery

Re: Retiring portsnap [was MITM attacks against portsnap and freebsd-update]

2014-04-10 Thread Bryan Drewery
portsnap how to speak SVN, while still behaving the same, may cover my concerns. To be fair SVN does have its advantages: 1. Quicker updates for users. 2. Easier patch generation for PR submission. 3. Similarly, viewing your changes more easily. -- Regards, Bryan Drewery signature.asc Description

Re: De Raadt + FBSD + OpenSSH + hole?

2014-04-19 Thread Bryan Drewery
of the optional patches available in the port had issues. -- Regards, Bryan Drewery signature.asc Description: OpenPGP digital signature

Re: RFC: Proposal: Install a /etc/ssl/cert.pem by default?

2014-07-02 Thread Bryan Drewery
maintaining a ca-root-freebsd.pem even better, as long as you are willing to. IMHO always install it, don't depend on MK_OPENSSL. Is the file actually specific to OpenSSL? Ports would love to have it be available all the time regardless of SSL library choices. -- Regards, Bryan Drewery

[CFT] SSP Package Repository available

2014-08-20 Thread Bryan Drewery
On 9/21/2013 5:49 AM, Bryan Drewery wrote: Ports now support enabling Stack Protector [1] support on FreeBSD 10 i386 and amd64, and older releases on amd64 only currently. Support may be added for earlier i386 releases once all ports properly respect LDFLAGS. To enable, just add WITH_SSP

Re: bash velnerability

2014-09-25 Thread Bryan Drewery
shells, like scponly, should not be written in bash. 6. SSH authorized_keys/sshd_config forced commands should also not be written in bash. Cheers, Bryan Drewery signature.asc Description: OpenPGP digital signature

Re: bash velnerability

2014-09-26 Thread Bryan Drewery
On 9/26/2014 11:46 AM, Bartek Rutkowski wrote: On Fri, Sep 26, 2014 at 6:40 PM, Bryan Drewery bdrew...@freebsd.org wrote: On 9/26/2014 2:36 AM, Steve Clement wrote: Dear all, In case you urgently need to go the manual route, here is one way to really patch your systems: https

Re: bash velnerability

2014-09-26 Thread Bryan Drewery
the fixes since yesterday. The packages are building. -- Regards, Bryan Drewery signature.asc Description: OpenPGP digital signature

Re: bash velnerability

2014-09-26 Thread Bryan Drewery
On 9/26/2014 11:51 AM, Bryan Drewery wrote: On 9/26/2014 11:46 AM, Bartek Rutkowski wrote: On Fri, Sep 26, 2014 at 6:40 PM, Bryan Drewery bdrew...@freebsd.org wrote: On 9/26/2014 2:36 AM, Steve Clement wrote: Dear all, In case you urgently need to go the manual route, here is one way

Re: pkg repositories out of alignment

2014-09-26 Thread Bryan Drewery
not well prepared for security updates to packages yet. We have many technical challenges to work through still. -- Regards, Bryan Drewery signature.asc Description: OpenPGP digital signature

Re: bash velnerability

2014-09-26 Thread Bryan Drewery
On 9/26/2014 12:41 PM, Bryan Drewery wrote: On 9/26/2014 11:51 AM, Bryan Drewery wrote: On 9/26/2014 11:46 AM, Bartek Rutkowski wrote: Apparently, the full fix is still not delivered, accordingly to this: http://seclists.org/oss-sec/2014/q3/741 Kind regards, Bartek Rutkowski I'm pretty

Re: bash velnerability

2014-09-29 Thread Bryan Drewery
On 9/29/2014 11:01 AM, Mike Tancsa wrote: On 9/26/2014 5:01 PM, Bryan Drewery wrote: On 9/26/2014 12:41 PM, Bryan Drewery wrote: On 9/26/2014 11:51 AM, Bryan Drewery wrote: On 9/26/2014 11:46 AM, Bartek Rutkowski wrote: Apparently, the full fix is still not delivered, accordingly

Re: bash velnerability

2014-09-30 Thread Bryan Drewery
On 9/30/2014 1:54 PM, Jung-uk Kim wrote: On 2014-09-29 12:13:15 -0400, Bryan Drewery wrote: On 9/29/2014 11:01 AM, Mike Tancsa wrote: On 9/26/2014 5:01 PM, Bryan Drewery wrote: On 9/26/2014 12:41 PM, Bryan Drewery wrote: On 9/26/2014 11:51 AM, Bryan Drewery wrote: On 9/26/2014 11:46 AM

Re: bash velnerability

2014-09-30 Thread Bryan Drewery
On 9/30/2014 1:54 PM, Jung-uk Kim wrote: On 2014-09-29 12:13:15 -0400, Bryan Drewery wrote: On 9/29/2014 11:01 AM, Mike Tancsa wrote: On 9/26/2014 5:01 PM, Bryan Drewery wrote: On 9/26/2014 12:41 PM, Bryan Drewery wrote: On 9/26/2014 11:51 AM, Bryan Drewery wrote: On 9/26/2014 11:46 AM

Re: RFC: Proposal: Install a /etc/ssl/cert.pem by default?

2014-10-01 Thread Bryan Drewery
On 7/2/2014 8:55 PM, Bryan Drewery wrote: On 7/2/2014 6:45 PM, Xin Li wrote: Hi, Currently, FreeBSD does not install a default /etc/ssl/cert.pem because we do not maintain one ourselves. We do, however, provide a port, security/ca_root_nss, which have an option to install a symbolic link

Re: RFC: Proposal: Install a /etc/ssl/cert.pem by default?

2014-10-02 Thread Bryan Drewery
On 10/2/2014 8:25 AM, Eric van Gyzen wrote: On 10/01/2014 16:58, Bryan Drewery wrote: On 7/2/2014 8:55 PM, Bryan Drewery wrote: On 7/2/2014 6:45 PM, Xin Li wrote: Hi, Currently, FreeBSD does not install a default /etc/ssl/cert.pem because we do not maintain one ourselves. We do, however

SSP now default for ports/packages, ssp/new_xorg repository EOL

2014-11-02 Thread Bryan Drewery
/usr/local/etc/pkg/repos/ for the ssp or new_xorg repositories. Regards, Bryan Drewery on behalf of portmgr ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to freebsd

Re: pkg audit / vuln.xml failures

2015-05-18 Thread Bryan Drewery
, and committers, feel the file is not easy to contribute to. Regards, Bryan Drewery signature.asc Description: OpenPGP digital signature

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
On 11/11/2015 1:23 AM, Dag-Erling Smørgrav wrote: > Bryan Drewery <bdrew...@freebsd.org> writes: >> Actually I am missing the client-side VersionAddendum support (ssh.c). I >> only have server-side (sshd.c). This is just due to lack of motivation >> to import the chang

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
p rsyncd on the > backup server. > Yes, it's more a matter of convenience with key management. I admit that after some recent changes I've made I did resort to using the base SSH and rsync:// to achieve my backups over VPN out of not wanting to customize the the new system further with the port

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
On 11/11/2015 8:51 AM, Dag-Erling Smørgrav wrote: > Bryan Drewery <bdrew...@freebsd.org> writes: >> Another thing that I did with the port was restore the tcpwrapper >> support that upstream removed. Again, if we decide it is not worth >> keeping in base I will remov

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
e > request. Damien is generally pretty open to suggestions. > My own experience here has been positive, both with patches, feature suggestion, and general discussion. The upstream is more open than people may think. -- Regards, Bryan Drewery signature.asc Description: OpenPGP digital signature

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
why having a NONE cypher compiled in, > but disabled in the configuration is a bad idea? My reasoning for wanting SSH/SCP with NONE is precisely because of the ssh key support. It simplifies a lot to be able to use the same key over a VPN and not over the VPN to connect to the same system. -- Reg

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
On 11/11/15 4:05 PM, Slawa Olhovchenkov wrote: > On Wed, Nov 11, 2015 at 03:58:35PM -0800, Bryan Drewery wrote: > >>> Some for as ports version? >>> Or ports version different? >>> Or port mantainer have more time (this is not to blame for DES)? >>> I am

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
On 11/11/2015 3:56 PM, Slawa Olhovchenkov wrote: > On Wed, Nov 11, 2015 at 10:18:08AM -0800, Bryan Drewery wrote: > >> On 11/11/2015 10:13 AM, Slawa Olhovchenkov wrote: >>> On Wed, Nov 11, 2015 at 05:51:25PM +0100, Dag-Erling Smørgrav wrote: >>> >>>> B

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
On 11/11/2015 10:13 AM, Slawa Olhovchenkov wrote: > On Wed, Nov 11, 2015 at 05:51:25PM +0100, Dag-Erling Smørgrav wrote: > >> Bryan Drewery <bdrew...@freebsd.org> writes: >>> Another thing that I did with the port was restore the tcpwrapper >>> support that u

Re: OpenSSH HPN

2015-11-11 Thread Bryan Drewery
and fixed upstream in the last day and I wrote in a similar fix in the port. That speaks a lot about its usage in the port currently. -- Regards, Bryan Drewery signature.asc Description: OpenPGP digital signature

Re: OpenSSH HPN

2015-11-10 Thread Bryan Drewery
e case now. There is nothing different compared to upstream OpenSSH now for logging. -- Regards, Bryan Drewery ___ freebsd-security@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to &q

Re: OpenSSH HPN

2015-11-10 Thread Bryan Drewery
anges (which I did upstream, and did apply to the base HPN as well) and the logging changes (which were far too intrusive to maintain). -- Regards, Bryan Drewery ___ freebsd-security@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/free

Re: OpenSSH HPN

2015-11-10 Thread Bryan Drewery
performance should be more than acceptable for > today's uses (i.e. cipher performance is 2GB/sec+). AES-NI doesn't help the absurdity of double-encrypting when using scp or rsync/ssh over an encrypted VPN, which is where NONE makes sense to use for me. -- Regards

Re: OpenSSH HPN

2015-11-10 Thread Bryan Drewery
On 11/10/15 4:40 PM, Bryan Drewery wrote: > Anyway, reverting the base SSH to stock, and then importing all patches > from the ports default version should result in the same base patches > applied and a working HPN. Actually I am missing the client-side VersionAddendum support (ssh.c

Re: FreeBSD Security Advisory FreeBSD-SA-15:22.openssh

2015-08-26 Thread Bryan Drewery
vulnerabilities Affects: All supported versions of FreeBSD. I know RELENG_8 is no longer supported, but does this issue impact FreeBSD 8.x ? Yes. The port (not quarterly one) is fully updated to 7.1 with the fixes as a workaround. -- Regards, Bryan Drewery bdrewery@freenode/EFNet

Re: Quarterly packages and security updates...

2015-08-25 Thread Bryan Drewery
audit' output are normally backported to the quarterly branch quickly. I am exploring ways of making the quarterly builds run multiples times per day. -- Regards, Bryan Drewery signature.asc Description: OpenPGP digital signature

Re: svn commit: r304626 - head/lib/libpam/modules/pam_ssh

2016-08-22 Thread Bryan Drewery
== >> --- head/lib/libpam/modules/pam_ssh/pam_ssh.cMon Aug 22 19:05:11 >> 2016(r304625) >> +++ head/lib/libpam/modules/pam_ssh/pam_ssh.cMon Aug 22 19:27:20 >> 2016 (r304626) >>

Re: Intel hardware bug

2018-01-03 Thread Bryan Drewery
s lifted. I do know that the right people are definitely aware of what's going on. -- Regards, Bryan Drewery signature.asc Description: OpenPGP digital signature

Re: Early heads-up: plan to remove local patches for TCP Wrappers support in sshd

2020-03-24 Thread Bryan Drewery
bly keep the patch in the tree for some time, to support > MFCs to stable branches; the patch will be removed entirely later on. FYI if you need this feature the port still has it and is at 8.2 now. -- Regards, Bryan Drewery signature.asc Description: OpenPGP digital signature