Re: User process limitations..

2003-02-22 Thread Julian Plamann
On Thu, 2003-02-20 at 01:33, Kenneth Hauklien wrote: Hi Is there any way to limit a users / groups processes? I run a shell/web server and want to limit them down to for example 2-3 processes. Is this possible in any way? That depends largely on what operating system the machine is

RE: Email headers

2003-02-22 Thread David Gillett
I pop them over to http://spamcop.net, and let their scripts sort out what's credible and what isn't. (Note that the trail sometimes peters out at an anonymizing relay or gateway) Dave Gillett -Original Message- From: Marty [mailto:[EMAIL PROTECTED] Could someone explain how

RE: Email headers

2003-02-22 Thread Vince Dang
Here you go. Enjoy. http://www.claws-and-paws.com/spam-l/tracking.html http://combat.uxn.com/ -Original Message- From: Marty [mailto:[EMAIL PROTECTED] Sent: Thursday, February 20, 2003 10:33 AM To: [EMAIL PROTECTED] Subject: Email headers Hi group, Could someone explain how to

Re: Securing a web server through reverse proxy?

2003-02-22 Thread Scott Liebergen
mod_proxy is very powerful , but when it comes to security I wouldn't use it use it to protect another server as it had some problems in the past . In addition to mod_proxy, you can also use mod_rewrite to lock down what can be requested and what can't. Our developers had content

Re: IAS RADIUS service

2003-02-22 Thread SimonChan
Hi Gordon, I have done it with NT4 option pack so that my Ipass could authenticate via the Radius ( configure as proxy) to NT username password. The new version is actually for win2k. Not sure if it works with NT4. It's available at the microsoft website. tks. Rgds, Simon

RE: It's ok we're behind a firewall

2003-02-22 Thread Duane H. Hesser
On 19-Feb-2003 John Brightwell wrote: Are there any sites out there with the facts and figures about internal exploits and cautionary tales about disgruntled employees or IT savvy nighttime cleaners? It's hard to find such information, since companies are reluctant to make it public.

SSL protocol flaw, request for opinions

2003-02-22 Thread Juan Velasquez
I just read this story which explains how the Swiss Federal Institute of Technology exploited a flaw in the SSL protocol to hijack an 8 character password from a bunch of SSL encrypted email logins. I was surprised. What does the security community think of this?

links for decoding e-mail headers Re: Email headers

2003-02-22 Thread Nigel Dyson-Hudson
try these: http://www.expita.com/header1.html is a reference sheet for e-mail, smtp, headers http://www.stopspam.org/email/headers/headers.html is a good tutorial on how to understand e-mail headers. http://spamcop.net/fom-serve/cache/16.html has a link to how to get the full header info for

Re: User process limitations..

2003-02-22 Thread Kenneth Hauklien
In-Reply-To: [EMAIL PROTECTED] Sorry for the weak information. Im running debian gnu linux. Ive found one silly perl script that can check after how many processes a user / group can run but is doesnt work very well. There also found out that /etc/security/limit.conf works ( pam ). Its the same

Re: HIPAA certs

2003-02-22 Thread Chris Berry
From: Jason Hastain [EMAIL PROTECTED] I have a few clients who are doctors running small practices. They have small LAN's and DSL connectinos behind a simple NAT router/firewall in one case and persoanl FW's in the other (unfortunatly not my decision in either case). Each has approached me about

RE: Secure NFS

2003-02-22 Thread Peet Grobler
I've been wondering about this for a while now... Everybody knows NFS is insecure. Right. So no-one uses it. Why not simply modify NFS to use encryption? Why not? Not tunneling, modify the source to either (a) establish ssl connections, or (b) manually encrypt all traffic (I would prefer this

RE: passwords

2003-02-22 Thread Högman, Lars
One (usually) good way to teach users about the how and why of passwords is to sit down with them and browse the network, preferably some very important folders, and ask them how their manager would react if I deleted all the files there. After all, it's your account that does the deleting, so

RE: tools used to examine a computer

2003-02-22 Thread Trevor Cushen
I was letting this discussion pass but a glaring error needs to be corrected. Good point. The correct use of terminology, particularly in an area as technical as this discussion, is important. When other, unusual terms and phrases, w/o an explanation, begin to be used, the discussion can

RE: Securing a webserver through reverse proxy?

2003-02-22 Thread Alisson Leite de Morais Veras
Hi there, continuing on this thread That's a implementation I was wondering to do, but interacting with SNORT, to make changes in the destination address (squid or iptables routing). If an attack were detected, it would redirect the traffick to another server or some king of honneypot.

Re: User process limitations..

2003-02-22 Thread Johan De Meersman
ulimit -u , see the bash infopage for more info. Kenneth Hauklien wrote: Hi Is there any way to limit a users / groups processes? I run a shell/web server and want to limit them down to for example 2-3 processes. Is this possible in any way? Thank you all in advance Kenneth Hauklien

RE: HIPAA certs

2003-02-22 Thread Garbrecht, Frederick
The absence of very specific requirements in the HIPAA regs is a source of a lot of consternation, but I believe the policies were specifically written to be vague; the actual 'fit' of security and privacy recommendations will vary depending on a number of factors that may be unique to each

Re: User process limitations..

2003-02-22 Thread Tarun Dua
Is there any way to limit a users / groups processes? I run a shell/web server and want to limit them down to for example 2-3 processes. Is this possible in any way? You can edit /etc/security/limits.conf on Linux.It has most of what you want for shell users. However you will need to find

RE: It's ok we're behind a firewall

2003-02-22 Thread Ben Schorr
1. Still a large majority of computer crime (data theft, damage etc) is caused by people who have access to internal systems ... is there anywhere that I can get facts and figures to support this? Check with the FBI. 2. In an average company it's not so difficult to gain physical

Re: Windows 2000 Server Attacks

2003-02-22 Thread Su Wadlow
--On Thursday, February 20, 2003 12:57 PM -0500 Paul Stewart [EMAIL PROTECTED] wrote: We have no idea how this person has managed to gain some form of access to these servers and are obviously quite concerned. What services are the servers running? Are the machines *fully* patched? We've had

Re: HIPAA certs

2003-02-22 Thread Brian Jones
Jason, Try here: http://www.cms.hhs.gov/regulations/hipaa/cms0003-5/0049f-econ-ofr-2-12-03.pdf from about page 264, especially the grid on the last 3 pages. The regs don't take effect until april, so no one knows what to look for, and if you are dealing with small providers it is after that

RE: Windows 2000 Server Attacks

2003-02-22 Thread Mark Stunnenberg
What I know about this, is that 'they' use a bug in IIS to get access on the server. Most of the time they will install a serv-u ftp server. And make hidden dirs that cannot be accessed directly by browsing through the directories (dirs like com1, lpt1 a.o.) The file msudb32.exe doesn't ring a

RE: Remote access solution

2003-02-22 Thread Michael Parker
You might want to try Famtech's RAdmin...I've been using it for a while with no problems. It can integrate with Windows authentication or plain password as well as IP filtering. better yet, it's fast and all traffic is encrypted. http://www.famatech.com/default.html Regards, Michael

RE: User process limitations..

2003-02-22 Thread Geert Hauwaerts
Dear Sir, You could use ulimits (get and set user limitations). I use group defined limits in the /etc/profile script. For example: (group users) if [ `id -g` = 100 ]; then ulimit -S -H -c 10 -f 5 -l 5 -d 5 -v 5 -m 5 -s 1000 -u 30 -t 1800 -n 1024 fi They have this

re: Windows 2000 Server Attacks

2003-02-22 Thread H C
Paul, The filename of the software that is responsible we believe to be msudb32.exe how did you come to this conclusion? Did you run fport to determine that this is the file/process using port 24? What other services do you have running? HTTP? FTP? How about your EventLogs? Do they

RE: IP-adresses in Windows 2000 event log

2003-02-22 Thread John Tolmachoff
Is there any way to change the settings of a domain controller's event logging system, so that the system stores the client's ip-adress whenever a client tries to logon to the server. Basic logging is already possible, but if the client machine is not part of the domain (for example a

RE: HIPAA certs

2003-02-22 Thread Taylor, Bud
The answer is that until it gets to court no one knows. HIPAA represents 1000's of pages of requirements that are ambiguous at best and contradictory at worst. HIPAA's useful function is the standardization of procedure codes saving the health care industry and in turn consumers untold sums.

Re: User process limitations..

2003-02-22 Thread camthompson
To enable user quotas on a partition in redhat ( dont know about other linuxes), add usrquota after defaults or whatever you have in its place in the fstab to edit a quota, type edquota -u username; might wanna read the man page on it first before you go editing away. Also you might wanna

RE: Email headers

2003-02-22 Thread Lucas Zaichkowsky
Check out http://www.spamcop.net -Lucas -Original Message- From: Marty [mailto:[EMAIL PROTECTED] Sent: Thursday, February 20, 2003 12:33 PM To: [EMAIL PROTECTED] Subject: Email headers Hi group, Could someone explain how to decipher Email header? How can we know the real sender of

RE: User process limitations..

2003-02-22 Thread Bill Roe
You didn't mention the OS. On HPUX there are things called resource limits. The kernel has a soft and hard limits, these limits are compiled into the kernel. Programs get an error, for example trying to create a new process or open a file. The initial error is the soft limit. The program can

RE: HIPAA certs

2003-02-22 Thread John Tolmachoff
Can anyone shed some light onto this subject or point me to a document with only the IT requirements prefereably boiled down to something simple? The final documents have just come out finally in the last few weeks, so digested documents are going to be hard to find right now. I understand it

RE: HIPAA certs

2003-02-22 Thread Robinson, Sonja
If they are just thinking about it now they're in some serious trouble. You've got until April 16th to basically comply or chance being fined heavily at a minimum and $20K is just for starters. If they comply with ISO 17799 then they should be relatively OK EXCEPT where they are dealing with PHI

RE: Email headers

2003-02-22 Thread John Tolmachoff
Could someone explain how to decipher Email header? How can we know the real sender of spam or virus email? Go a googling for Sam Spade. You paste the header in there and it helps explain. John Tolmachoff MCSE, CSSA IT Manager, Network Engineer RelianceSoft, Inc. Fullerton, CA 92835

Re: Email headers

2003-02-22 Thread Matti Haack
Hi Marty one nice tool, which explains the headers and checks them is Spam Spade: http://www.samspade.org/ There is an Online and a windows version. I prefer the later. Matti Hi group, Could someone explain how to decipher Email header? How can we know the real sender of spam or virus

Re: It's ok we're behind a firewall

2003-02-22 Thread Alessandro Bottonelli
On Wednesday 19 February 2003 11:58, John Brightwell wrote: It's ok we're behind a firewall I have been hearing this from customers or prospective customers since the press (many years ago) and Hollywood begun to address the sexy side of computer crime--the bunch of black hats out there.

RE: Remote access solution

2003-02-22 Thread Chris Berry
From: Orlando J. Cano [mailto:[EMAIL PROTECTED] I have recently been assigned to join efforts with our Network group in coming up with a secure remote access solution for our Network. This will involve accessing servers in our DMZ. I was wondering if this securityfocus community could elaborate

Re: User process limitations..

2003-02-22 Thread Nick Shapley
Check out the limits.conf file, its under /etc/security on my RH box. The nproc parameter is the one you want. Cheers, Nick Brad Arlt wrote: On Thu, Feb 20, 2003 at 09:33:36AM -, Kenneth Hauklien wrote: Hi Is there any way to limit a users / groups processes? I run a shell/web server and

Re: User process limitations..

2003-02-22 Thread David M. Fetter
The ulimit command would be the proper choice here. If you want in on a permanent basis then use the limit.conf file. I'm not sure why you would want/need a separate script to do the same thing? Do you have a specific reason for this? Kenneth Hauklien wrote: In-Reply-To: [EMAIL PROTECTED]

Re: Remote access solution

2003-02-22 Thread Nuzman
While I haven't studied the security of the protocol itself, RDP is supposed to be somewhat secure. I use administrative terminal services to manage Win2k systems in the DMZ. The firewall restricts access to the RDP port only from specific admin workstations (IP addresses) on the internal network.

RE: tools used to examine a computer

2003-02-22 Thread Robinson, Sonja
As a side to calling in Law Enforcement, normally you have to already have your case and prove a loss (felony loss) so document all of your costs (human, resource, downtime, etc.). I believe in calling in LE's when required and I think that more companies should prosecute offenders instead of

Permissions scanner

2003-02-22 Thread Di Fresco Marco
Hi, I hope you accept another request from a newbie home user (by the way, thank again for the suggestions about basic software for security [Suggestions for basic software for security]). Here it is my situation: computer with WinXP Pro. and a cable modem; I have 4 account (+1 for Guest but it