Re: speaking of squid ports...

2003-03-26 Thread Jason Lunz
[EMAIL PROTECTED] said:
> Umm...  No.
> 
> It's used for ICP, a protocol for intercommunication between squid
> caches.  For example, at my site we have two different caches.  One is
> basically transparent.  The other provides anonymizing services.  But,
> through ICP, both caches can make use of each other's cached objects.

no, Kevin's right. squid has its own built-in caching dns resolver, and
since it's a client it shows up on a different port every time. It seems
the only way to turn it off is to disable squid's internal resolver and
use an external one, but that's a whole new can of worms. 

> Dunno how you turn it off, though.  Iptables?  

As I said, icp can be turned off with "icp_port 0", as noted in the
squid.conf comments. It uses udp port 3130 by default.

Jason



Re: speaking of squid ports...

2003-03-26 Thread Kevin Cheek
"Noah L. Meyerhans" <[EMAIL PROTECTED]> writes:

> On Wed, Mar 26, 2003 at 02:15:28PM -0500, Kevin Cheek wrote:
> > 
> > I believe that UDP port is for receiving DNS responses.
> 
> Umm...  No.
> 
> It's used for ICP, a protocol for intercommunication between squid
> caches.  For example, at my site we have two different caches.  One is
> basically transparent.  The other provides anonymizing services.  But,
> through ICP, both caches can make use of each other's cached objects.
> 
> Dunno how you turn it off, though.  Iptables?  
> 
> noah

He already said he turned off the ICP port, so I'm guessing that isn't
it.  Also, the ICP port is 3130 by default, not 1414.

Squid also can use a udp port for snmp (default 3401).

FWIW, I found a couple of references to squid's use of a random high
udp port on the squid-user list.  The only responses I could find
indicated that this port is used for DNS.

-Kevin



Re: speaking of squid ports...

2003-03-26 Thread Alexander Reelsen
On Wed, Mar 26, 2003 at 03:18:36PM -0500, Noah L. Meyerhans wrote:
> On Wed, Mar 26, 2003 at 02:15:28PM -0500, Kevin Cheek wrote:
> > I believe that UDP port is for receiving DNS responses.
> It's used for ICP, a protocol for intercommunication between squid
> caches.  For example, at my site we have two different caches.  One is
> basically transparent.  The other provides anonymizing services.  But,
> through ICP, both caches can make use of each other's cached objects.
> 
> Dunno how you turn it off, though.  Iptables?  
Should work by setting the icp_port to '0'... If it is written via -u in
the init scripts the config file settings are overwritten, so beware.


Regards, Alexander

-- 
Alexander Reelsen
http://tretmine.org



Re: speaking of squid ports...

2003-03-26 Thread Noah L. Meyerhans
On Wed, Mar 26, 2003 at 02:15:28PM -0500, Kevin Cheek wrote:
> 
> I believe that UDP port is for receiving DNS responses.

Umm...  No.

It's used for ICP, a protocol for intercommunication between squid
caches.  For example, at my site we have two different caches.  One is
basically transparent.  The other provides anonymizing services.  But,
through ICP, both caches can make use of each other's cached objects.

Dunno how you turn it off, though.  Iptables?  

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgpTmaxDw5SGb.pgp
Description: PGP signature


Re: speaking of squid ports...

2003-03-26 Thread Jason Lunz
[EMAIL PROTECTED] said:
> Umm...  No.
> 
> It's used for ICP, a protocol for intercommunication between squid
> caches.  For example, at my site we have two different caches.  One is
> basically transparent.  The other provides anonymizing services.  But,
> through ICP, both caches can make use of each other's cached objects.

no, Kevin's right. squid has its own built-in caching dns resolver, and
since it's a client it shows up on a different port every time. It seems
the only way to turn it off is to disable squid's internal resolver and
use an external one, but that's a whole new can of worms. 

> Dunno how you turn it off, though.  Iptables?  

As I said, icp can be turned off with "icp_port 0", as noted in the
squid.conf comments. It uses udp port 3130 by default.

Jason


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: speaking of squid ports...

2003-03-26 Thread Kevin Cheek
"Noah L. Meyerhans" <[EMAIL PROTECTED]> writes:

> On Wed, Mar 26, 2003 at 02:15:28PM -0500, Kevin Cheek wrote:
> > 
> > I believe that UDP port is for receiving DNS responses.
> 
> Umm...  No.
> 
> It's used for ICP, a protocol for intercommunication between squid
> caches.  For example, at my site we have two different caches.  One is
> basically transparent.  The other provides anonymizing services.  But,
> through ICP, both caches can make use of each other's cached objects.
> 
> Dunno how you turn it off, though.  Iptables?  
> 
> noah

He already said he turned off the ICP port, so I'm guessing that isn't
it.  Also, the ICP port is 3130 by default, not 1414.

Squid also can use a udp port for snmp (default 3401).

FWIW, I found a couple of references to squid's use of a random high
udp port on the squid-user list.  The only responses I could find
indicated that this port is used for DNS.

-Kevin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: speaking of squid ports...

2003-03-26 Thread Kevin Cheek

I believe that UDP port is for receiving DNS responses.

-Kevin

Jason Lunz <[EMAIL PROTECTED]> writes:

> does anyone know what squid's udp sockets are for, and how to close
> them? As far as I can tell, I don't need them, but I've been unable to
> find a combination of squid directives to make them all go away. The icp
> port can be closed using "icp_port 0", but the other one is dynamic and
> isn't referred to in the squid docs as far as I can tell:
> 
> [kahlua](0) # netstat -lp | grep squid
> tcp0  0 *:3128  *:*   LISTEN  673/(squid)
> udp0  0 *:1414  *:*   673/(squid)
> 
> the udp port isn't there immediately after starting squid, but it always
> shows up after a client uses the proxy. port 1414 isn't constant; it's
> different every time.
> 
> Jason



Re: speaking of squid ports...

2003-03-26 Thread Alexander Reelsen
On Wed, Mar 26, 2003 at 03:18:36PM -0500, Noah L. Meyerhans wrote:
> On Wed, Mar 26, 2003 at 02:15:28PM -0500, Kevin Cheek wrote:
> > I believe that UDP port is for receiving DNS responses.
> It's used for ICP, a protocol for intercommunication between squid
> caches.  For example, at my site we have two different caches.  One is
> basically transparent.  The other provides anonymizing services.  But,
> through ICP, both caches can make use of each other's cached objects.
> 
> Dunno how you turn it off, though.  Iptables?  
Should work by setting the icp_port to '0'... If it is written via -u in
the init scripts the config file settings are overwritten, so beware.


Regards, Alexander

-- 
Alexander Reelsen
http://tretmine.org


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: speaking of squid ports...

2003-03-26 Thread Noah L. Meyerhans
On Wed, Mar 26, 2003 at 02:15:28PM -0500, Kevin Cheek wrote:
> 
> I believe that UDP port is for receiving DNS responses.

Umm...  No.

It's used for ICP, a protocol for intercommunication between squid
caches.  For example, at my site we have two different caches.  One is
basically transparent.  The other provides anonymizing services.  But,
through ICP, both caches can make use of each other's cached objects.

Dunno how you turn it off, though.  Iptables?  

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgp0.pgp
Description: PGP signature


Re: speaking of squid ports...

2003-03-26 Thread Kevin Cheek

I believe that UDP port is for receiving DNS responses.

-Kevin

Jason Lunz <[EMAIL PROTECTED]> writes:

> does anyone know what squid's udp sockets are for, and how to close
> them? As far as I can tell, I don't need them, but I've been unable to
> find a combination of squid directives to make them all go away. The icp
> port can be closed using "icp_port 0", but the other one is dynamic and
> isn't referred to in the squid docs as far as I can tell:
> 
> [kahlua](0) # netstat -lp | grep squid
> tcp0  0 *:3128  *:*   LISTEN  673/(squid)
> udp0  0 *:1414  *:*   673/(squid)
> 
> the udp port isn't there immediately after starting squid, but it always
> shows up after a client uses the proxy. port 1414 isn't constant; it's
> different every time.
> 
> Jason


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



speaking of squid ports...

2003-03-26 Thread Jason Lunz
does anyone know what squid's udp sockets are for, and how to close
them? As far as I can tell, I don't need them, but I've been unable to
find a combination of squid directives to make them all go away. The icp
port can be closed using "icp_port 0", but the other one is dynamic and
isn't referred to in the squid docs as far as I can tell:

[kahlua](0) # netstat -lp | grep squid
tcp0  0 *:3128  *:* LISTEN  673/(squid)
udp0  0 *:1414  *:* 673/(squid)

the udp port isn't there immediately after starting squid, but it always
shows up after a client uses the proxy. port 1414 isn't constant; it's
different every time.

Jason



Re: noboby with a shell !!

2003-03-26 Thread Sven Hoexter
On Wed, Mar 26, 2003 at 10:50:48AM -0500, Noah L. Meyerhans wrote:
> On Wed, Mar 26, 2003 at 12:11:58PM +0100, Sven Hoexter wrote:
> > Well yes it could :) As long as the user has no valid password it's not very
> > usefull. Take a look into the /etc/shadow and in the second field you'll 
> > find
> > ! or * indicating that this user has a invalid password. See man 5 shadow.
> 
> That's hardly true.  If an attacker could somehow create an ssh
> authorized_keys file, they could log in without a password.
and if he can somehow create the non existing home dir.
or if he can somehow change the $HOME ... oh forgot when he has the power to
somehow change the $HOME he can change the $SHELL or if he can edit the
/etc/passwd he's root ... who cares about nobody.

Yeah there are so many side conditions that could happen, what a horror - time
to take the internet offline. *hrhr*

Well at least you shouldn't run all your daemons under one uid. Create one for
the ftpd one for your httpd and so on.

SCNR
Sven
-- 
It really sucks to give your heart to a girl
You want to know her like she knows the whole world
But 10 seconds in, it's obvious, your going nowhere...
[Bowling for Soup - Drunk Enough To Dance - I Don't Wanna Rock]



Removing invalid keys from keyring

2003-03-26 Thread Kjetil Kjernsmo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi all,

I guess this question might be more suited on gnupg-users, but as I'm 
not subscribed to that list, I hope you can forgive me for asking 
here... It is a really short question...

Is there a way to remove revoked/expired and otherwise invalid or 
useless keys from a GPG keyring, in batch?

I once downloaded the 4500 keys that were closest to me, but many of 
them are invalid now, and I'd like to remove those in a quick way? Are 
there possibly any scripts lying around? 

Cheers,

Kjetil
- -- 
Kjetil Kjernsmo
Astrophysicist/IT Consultant/Skeptic/Ski-orienteer/Orienteer/Mountaineer
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED]
Homepage: http://www.kjetil.kjernsmo.net/OpenPGP KeyID: 6A6A0BBC
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+gdVUlE/Gp2pqC7wRAuMfAJ0S6ZCqvbwqOWvniKll0VS2yFJ3GACdH7O5
n1/6EF0XsnD3E7QuCduh/WQ=
=Q6Zm
-END PGP SIGNATURE-



speaking of squid ports...

2003-03-26 Thread Jason Lunz
does anyone know what squid's udp sockets are for, and how to close
them? As far as I can tell, I don't need them, but I've been unable to
find a combination of squid directives to make them all go away. The icp
port can be closed using "icp_port 0", but the other one is dynamic and
isn't referred to in the squid docs as far as I can tell:

[kahlua](0) # netstat -lp | grep squid
tcp0  0 *:3128  *:* LISTEN  673/(squid)
udp0  0 *:1414  *:* 673/(squid)

the udp port isn't there immediately after starting squid, but it always
shows up after a client uses the proxy. port 1414 isn't constant; it's
different every time.

Jason


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: bind squid to interface

2003-03-26 Thread Jens Schuessler
* Michael West <[EMAIL PROTECTED]> [26-03-03 15:16]:
> I would like to bind squid to a specific interface.  

Look at /etc/squid.conf:
  
# NETWORK OPTIONS
# -

#  TAG: http_port
#   Usage:  port
#   hostname:port
#   1.2.3.4:port
#
#   The socket addresses where Squid will listen for HTTP client
#   requests.  You may specify multiple socket addresses.
#   There are three forms: port alone, hostname with port, and
#   IP address with port.  If you specify a hostname or IP
#   address, then Squid binds the socket to that specific
#   address.  This replaces the old 'tcp_incoming_address'
#   option.  Most likely, you do not need to bind to a specific
#   address, so you can use the port number alone.
#
#   The default port number is 3128.
#
#   If you are running Squid in accelerator mode, then you
#   probably want to listen on port 80 also, or instead.
#
#   The -a command line option will override the *first* port
#   number listed here.   That option will NOT override an IP
#   address, however.
#
#   You may specify multiple socket addresses on multiple lines.
#
#Default:
http_port 127.0.0.1:3128

HTH
Jens



Re: bind squid to interface

2003-03-26 Thread Frank Peters
Michael West wrote:
> 
> I would like to bind squid to a specific interface.
[...]
> What am I doing wrong with xinetd?  What other ways are there to make
> squid bind to an interface?

IIRC there used to be an option "tcp_incoming_adress" in
/etc/squid.conf, but I think lately it was changed to be included in the
"http_port" option.

HTH

Frank



Re: bind squid to interface

2003-03-26 Thread Christoph Moench-Tegeder
## Michael West ([EMAIL PROTECTED]):

> I would like to bind squid to a specific interface.  

http_port hostname:port
http_port ip:port
http_port port

It's documented.

Regards,
cmt

-- 
Spare Space



Re: Re: noboby with a shell !!

2003-03-26 Thread martin . j
Dit e-mail adres bestaat niet



Re: noboby with a shell !!

2003-03-26 Thread Sven Hoexter
On Wed, Mar 26, 2003 at 10:50:48AM -0500, Noah L. Meyerhans wrote:
> On Wed, Mar 26, 2003 at 12:11:58PM +0100, Sven Hoexter wrote:
> > Well yes it could :) As long as the user has no valid password it's not very
> > usefull. Take a look into the /etc/shadow and in the second field you'll find
> > ! or * indicating that this user has a invalid password. See man 5 shadow.
> 
> That's hardly true.  If an attacker could somehow create an ssh
> authorized_keys file, they could log in without a password.
and if he can somehow create the non existing home dir.
or if he can somehow change the $HOME ... oh forgot when he has the power to
somehow change the $HOME he can change the $SHELL or if he can edit the
/etc/passwd he's root ... who cares about nobody.

Yeah there are so many side conditions that could happen, what a horror - time
to take the internet offline. *hrhr*

Well at least you shouldn't run all your daemons under one uid. Create one for
the ftpd one for your httpd and so on.

SCNR
Sven
-- 
It really sucks to give your heart to a girl
You want to know her like she knows the whole world
But 10 seconds in, it's obvious, your going nowhere...
[Bowling for Soup - Drunk Enough To Dance - I Don't Wanna Rock]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: noboby with a shell !!

2003-03-26 Thread Noah L. Meyerhans
On Wed, Mar 26, 2003 at 12:11:58PM +0100, Sven Hoexter wrote:
> Well yes it could :) As long as the user has no valid password it's not very
> usefull. Take a look into the /etc/shadow and in the second field you'll find
> ! or * indicating that this user has a invalid password. See man 5 shadow.

That's hardly true.  If an attacker could somehow create an ssh
authorized_keys file, they could log in without a password.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgpe68AZnJ3WP.pgp
Description: PGP signature


Removing invalid keys from keyring

2003-03-26 Thread Kjetil Kjernsmo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi all,

I guess this question might be more suited on gnupg-users, but as I'm 
not subscribed to that list, I hope you can forgive me for asking 
here... It is a really short question...

Is there a way to remove revoked/expired and otherwise invalid or 
useless keys from a GPG keyring, in batch?

I once downloaded the 4500 keys that were closest to me, but many of 
them are invalid now, and I'd like to remove those in a quick way? Are 
there possibly any scripts lying around? 

Cheers,

Kjetil
- -- 
Kjetil Kjernsmo
Astrophysicist/IT Consultant/Skeptic/Ski-orienteer/Orienteer/Mountaineer
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED]
Homepage: http://www.kjetil.kjernsmo.net/OpenPGP KeyID: 6A6A0BBC
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+gdVUlE/Gp2pqC7wRAuMfAJ0S6ZCqvbwqOWvniKll0VS2yFJ3GACdH7O5
n1/6EF0XsnD3E7QuCduh/WQ=
=Q6Zm
-END PGP SIGNATURE-


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: bind squid to interface

2003-03-26 Thread Michael Streb
On Wednesday 26 March 2003 15:16, Michael West wrote:

Hi there,

how about :


http_port xxx.xxx.xxx.xxx:8000
tcp_outgoing_address xxx.xxx.xxx.xxx
udp_outgoing_address xxx.xxx.xxx.xxx


in the squid config and run squid as daemon ?

Michi

> I would like to bind squid to a specific interface.
>
> I thought the easy way to do this would be with xinetd, but I get:
>
> Mar 26 06:05:09 localhost squid: Cannot open HTTP Port
> Mar 26 06:05:49 localhost last message repeated 10 times
>
> When I try to use it.  Normally this would mean there is a squid process
> already running, but there is no other squid process.
>
> service squid
> {
> disable = no
> socket_type = stream
> wait= no
> user= root
> bind= 192.0.0.1
> server  = /usr/sbin/squid
> server_args= -N -D -YC -u0
> }
>
> What am I doing wrong with xinetd?  What other ways are there to make
> squid bind to an interface?
>
>  ~Michael

-- 
Bisping & Bisping GmbH & Co. KG  Michael Streb
internet and network   [EMAIL PROTECTED]
Spitalstrasse 21-24-26 phone +49-9123-9740-630
D-91207 Lauf a. d. Pegnitzfax +49-9123-9740-97
 
http://photo.bisping.de   *http://bisping.de   *http://lauf.de



Re: noboby with a shell !!

2003-03-26 Thread François TOURDE
Yoann <[EMAIL PROTECTED]> writes:

> there is an * in /etc/shadow for nobody, but all services (ftp, web...)
> are running with the uid nobody so if there is an attack on an unknow
> bug (I keep up to date all services) on those services (buffer overflow
> for example),  It's will be unsercure.. .

It will be unsecure even if the shell field is filled with garbage...

1) The buffer overflow kind of attack is to launch a program from
within another, a shell for example.

2) The shell shield (more easy to write than to tell) is used by:

- /bin/login to launch a shell, or a pppd in some case
- /*/ftpd to allow (/bin/true) or disallow (/bin/false) ftp access
- probably lot of others programs.

HTH.

-- 
Reality always seems harsher in the early morning.
-- 
François TOURDE - tourde.org - 23 rue Bernard GANTE - 93250 VILLEMOMBLE
Tél: 01 49 35 96 69 - Mob: 06 81 01 81 80
eMail: mailto:[EMAIL PROTECTED] - URL: http://francois.tourde.org/



Re: bind squid to interface

2003-03-26 Thread Frank Peters
Michael West wrote:
> 
> I would like to bind squid to a specific interface.
[...]
> What am I doing wrong with xinetd?  What other ways are there to make
> squid bind to an interface?

IIRC there used to be an option "tcp_incoming_adress" in
/etc/squid.conf, but I think lately it was changed to be included in the
"http_port" option.

HTH

Frank


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: bind squid to interface

2003-03-26 Thread Jens Schuessler
* Michael West <[EMAIL PROTECTED]> [26-03-03 15:16]:
> I would like to bind squid to a specific interface.  

Look at /etc/squid.conf:
  
# NETWORK OPTIONS
# -

#  TAG: http_port
#   Usage:  port
#   hostname:port
#   1.2.3.4:port
#
#   The socket addresses where Squid will listen for HTTP client
#   requests.  You may specify multiple socket addresses.
#   There are three forms: port alone, hostname with port, and
#   IP address with port.  If you specify a hostname or IP
#   address, then Squid binds the socket to that specific
#   address.  This replaces the old 'tcp_incoming_address'
#   option.  Most likely, you do not need to bind to a specific
#   address, so you can use the port number alone.
#
#   The default port number is 3128.
#
#   If you are running Squid in accelerator mode, then you
#   probably want to listen on port 80 also, or instead.
#
#   The -a command line option will override the *first* port
#   number listed here.   That option will NOT override an IP
#   address, however.
#
#   You may specify multiple socket addresses on multiple lines.
#
#Default:
http_port 127.0.0.1:3128

HTH
Jens


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: bind squid to interface

2003-03-26 Thread Christoph Moench-Tegeder
## Michael West ([EMAIL PROTECTED]):

> I would like to bind squid to a specific interface.  

http_port hostname:port
http_port ip:port
http_port port

It's documented.

Regards,
cmt

-- 
Spare Space


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Re: noboby with a shell !!

2003-03-26 Thread martin . j
Dit e-mail adres bestaat niet


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



bind squid to interface

2003-03-26 Thread Michael West
I would like to bind squid to a specific interface.  

I thought the easy way to do this would be with xinetd, but I get:

Mar 26 06:05:09 localhost squid: Cannot open HTTP Port
Mar 26 06:05:49 localhost last message repeated 10 times

When I try to use it.  Normally this would mean there is a squid process
already running, but there is no other squid process.

service squid
{
disable = no
socket_type = stream
wait= no
user= root
bind= 192.0.0.1
server  = /usr/sbin/squid
server_args= -N -D -YC -u0
}

What am I doing wrong with xinetd?  What other ways are there to make
squid bind to an interface?

 ~Michael



Re: noboby with a shell !!

2003-03-26 Thread Noah L. Meyerhans
On Wed, Mar 26, 2003 at 12:11:58PM +0100, Sven Hoexter wrote:
> Well yes it could :) As long as the user has no valid password it's not very
> usefull. Take a look into the /etc/shadow and in the second field you'll find
> ! or * indicating that this user has a invalid password. See man 5 shadow.

That's hardly true.  If an attacker could somehow create an ssh
authorized_keys file, they could log in without a password.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgp0.pgp
Description: PGP signature


Re: bind squid to interface

2003-03-26 Thread Michael Streb
On Wednesday 26 March 2003 15:16, Michael West wrote:

Hi there,

how about :


http_port xxx.xxx.xxx.xxx:8000
tcp_outgoing_address xxx.xxx.xxx.xxx
udp_outgoing_address xxx.xxx.xxx.xxx


in the squid config and run squid as daemon ?

Michi

> I would like to bind squid to a specific interface.
>
> I thought the easy way to do this would be with xinetd, but I get:
>
> Mar 26 06:05:09 localhost squid: Cannot open HTTP Port
> Mar 26 06:05:49 localhost last message repeated 10 times
>
> When I try to use it.  Normally this would mean there is a squid process
> already running, but there is no other squid process.
>
> service squid
> {
> disable = no
> socket_type = stream
> wait= no
> user= root
> bind= 192.0.0.1
> server  = /usr/sbin/squid
> server_args= -N -D -YC -u0
> }
>
> What am I doing wrong with xinetd?  What other ways are there to make
> squid bind to an interface?
>
>  ~Michael

-- 
Bisping & Bisping GmbH & Co. KG  Michael Streb
internet and network   [EMAIL PROTECTED]
Spitalstrasse 21-24-26 phone +49-9123-9740-630
D-91207 Lauf a. d. Pegnitzfax +49-9123-9740-97
 
http://photo.bisping.de   *http://bisping.de   *http://lauf.de


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: noboby with a shell !!

2003-03-26 Thread François TOURDE
Yoann <[EMAIL PROTECTED]> writes:

> there is an * in /etc/shadow for nobody, but all services (ftp, web...)
> are running with the uid nobody so if there is an attack on an unknow
> bug (I keep up to date all services) on those services (buffer overflow
> for example),  It's will be unsercure.. .

It will be unsecure even if the shell field is filled with garbage...

1) The buffer overflow kind of attack is to launch a program from
within another, a shell for example.

2) The shell shield (more easy to write than to tell) is used by:

- /bin/login to launch a shell, or a pppd in some case
- /*/ftpd to allow (/bin/true) or disallow (/bin/false) ftp access
- probably lot of others programs.

HTH.

-- 
Reality always seems harsher in the early morning.
-- 
François TOURDE - tourde.org - 23 rue Bernard GANTE - 93250 VILLEMOMBLE
Tél: 01 49 35 96 69 - Mob: 06 81 01 81 80
eMail: mailto:[EMAIL PROTECTED] - URL: http://francois.tourde.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: noboby with a shell !!

2003-03-26 Thread Yoann

Hi,


I look at in the file /etc/passwd on my server today, and I saw the user
nobody has a shell !!. When I installed my debian (sarge, I know it's
bad, but it's just a server for me...) I put /bin/false. A few days ago,
while an upgrade, apt asked to me to upgrade that file to the new
version and answer yes, so I think it come from that action, but it
could be unsecure to put /bin/sh for nobody ?


Well yes it could :) As long as the user has no valid password it's 
not very
usefull. Take a look into the /etc/shadow and in the second field 
you'll find

! or * indicating that this user has a invalid password. See man 5 shadow.


there is an * in /etc/shadow for nobody, but all services (ftp, web...)
are running with the uid nobody so if there is an attack on an unknow
bug (I keep up to date all services) on those services (buffer overflow
for example),  It's will be unsercure.. .


nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
 ^^^
I change to :

nobody:x:65534:65534:nobody:/dev/null:/bin/false


This might be bad cause AFAIK a few cronjobs change from their root uid to
nobody via the su command. See your /var/log/syslog maybe you'll now get
some errors from cron jobs at night.


I will pay attention , thx


Sven


Yoann




bind squid to interface

2003-03-26 Thread Michael West
I would like to bind squid to a specific interface.  

I thought the easy way to do this would be with xinetd, but I get:

Mar 26 06:05:09 localhost squid: Cannot open HTTP Port
Mar 26 06:05:49 localhost last message repeated 10 times

When I try to use it.  Normally this would mean there is a squid process
already running, but there is no other squid process.

service squid
{
disable = no
socket_type = stream
wait= no
user= root
bind= 192.0.0.1
server  = /usr/sbin/squid
server_args= -N -D -YC -u0
}

What am I doing wrong with xinetd?  What other ways are there to make
squid bind to an interface?

 ~Michael


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: noboby with a shell !!

2003-03-26 Thread Yoann
Hi,

I look at in the file /etc/passwd on my server today, and I saw the user
nobody has a shell !!. When I installed my debian (sarge, I know it's
bad, but it's just a server for me...) I put /bin/false. A few days ago,
while an upgrade, apt asked to me to upgrade that file to the new
version and answer yes, so I think it come from that action, but it
could be unsecure to put /bin/sh for nobody ?
Well yes it could :) As long as the user has no valid password it's 
not very
usefull. Take a look into the /etc/shadow and in the second field 
you'll find
! or * indicating that this user has a invalid password. See man 5 shadow.
there is an * in /etc/shadow for nobody, but all services (ftp, web...)
are running with the uid nobody so if there is an attack on an unknow
bug (I keep up to date all services) on those services (buffer overflow
for example),  It's will be unsercure.. .
nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
 ^^^
I change to :
nobody:x:65534:65534:nobody:/dev/null:/bin/false
This might be bad cause AFAIK a few cronjobs change from their root uid to
nobody via the su command. See your /var/log/syslog maybe you'll now get
some errors from cron jobs at night.
I will pay attention , thx

Sven
Yoann



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Re: noboby with a shell !!

2003-03-26 Thread robjeh
Does the user nobody has got a password in /etc/shadow ?

greets
  Robbert

Citeren Yoann <[EMAIL PROTECTED]>:

> hi,
> 
> I look at in the file /etc/passwd on my server today, and I saw the user 
> nobody has a shell !!. When I installed my debian (sarge, I know it's 
> bad, but it's just a server for me...) I put /bin/false. A few days ago, 
> while an upgrade, apt asked to me to upgrade that file to the new 
> version and answer yes, so I think it come from that action, but it 
> could be unsecure to put /bin/sh for nobody ?
> 
> nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
>   
> I change to :
> 
> nobody:x:65534:65534:nobody:/dev/null:/bin/false
> 
> Yoann
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact
> [EMAIL PROTECTED]
> 
> 
> 





__


http://www.wanadoo.nl/



Re: noboby with a shell !!

2003-03-26 Thread Sven Hoexter
On Wed, Mar 26, 2003 at 11:35:38AM +0100, Yoann wrote:

Hi,

> I look at in the file /etc/passwd on my server today, and I saw the user 
> nobody has a shell !!. When I installed my debian (sarge, I know it's 
> bad, but it's just a server for me...) I put /bin/false. A few days ago, 
> while an upgrade, apt asked to me to upgrade that file to the new 
> version and answer yes, so I think it come from that action, but it 
> could be unsecure to put /bin/sh for nobody ?
Well yes it could :) As long as the user has no valid password it's not very
usefull. Take a look into the /etc/shadow and in the second field you'll find
! or * indicating that this user has a invalid password. See man 5 shadow.
 
> nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
>  
> I change to :
> 
> nobody:x:65534:65534:nobody:/dev/null:/bin/false
This might be bad cause AFAIK a few cronjobs change from their root uid to
nobody via the su command. See your /var/log/syslog maybe you'll now get
some errors from cron jobs at night.

Sven

-- 
It really sucks to give your heart to a girl
You want to know her like she knows the whole world
But 10 seconds in, it's obvious, your going nowhere...
[Bowling for Soup - Drunk Enough To Dance - I Don't Wanna Rock]



noboby with a shell !!

2003-03-26 Thread Yoann

hi,

I look at in the file /etc/passwd on my server today, and I saw the user 
nobody has a shell !!. When I installed my debian (sarge, I know it's 
bad, but it's just a server for me...) I put /bin/false. A few days ago, 
while an upgrade, apt asked to me to upgrade that file to the new 
version and answer yes, so I think it come from that action, but it 
could be unsecure to put /bin/sh for nobody ?


nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
 
I change to :

nobody:x:65534:65534:nobody:/dev/null:/bin/false

Yoann



Re: noboby with a shell !!

2003-03-26 Thread robjeh
Does the user nobody has got a password in /etc/shadow ?

greets
  Robbert

Citeren Yoann <[EMAIL PROTECTED]>:

> hi,
> 
> I look at in the file /etc/passwd on my server today, and I saw the user 
> nobody has a shell !!. When I installed my debian (sarge, I know it's 
> bad, but it's just a server for me...) I put /bin/false. A few days ago, 
> while an upgrade, apt asked to me to upgrade that file to the new 
> version and answer yes, so I think it come from that action, but it 
> could be unsecure to put /bin/sh for nobody ?
> 
> nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
>   
> I change to :
> 
> nobody:x:65534:65534:nobody:/dev/null:/bin/false
> 
> Yoann
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact
> [EMAIL PROTECTED]
> 
> 
> 





__


http://www.wanadoo.nl/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: noboby with a shell !!

2003-03-26 Thread Sven Hoexter
On Wed, Mar 26, 2003 at 11:35:38AM +0100, Yoann wrote:

Hi,

> I look at in the file /etc/passwd on my server today, and I saw the user 
> nobody has a shell !!. When I installed my debian (sarge, I know it's 
> bad, but it's just a server for me...) I put /bin/false. A few days ago, 
> while an upgrade, apt asked to me to upgrade that file to the new 
> version and answer yes, so I think it come from that action, but it 
> could be unsecure to put /bin/sh for nobody ?
Well yes it could :) As long as the user has no valid password it's not very
usefull. Take a look into the /etc/shadow and in the second field you'll find
! or * indicating that this user has a invalid password. See man 5 shadow.
 
> nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
>  
> I change to :
> 
> nobody:x:65534:65534:nobody:/dev/null:/bin/false
This might be bad cause AFAIK a few cronjobs change from their root uid to
nobody via the su command. See your /var/log/syslog maybe you'll now get
some errors from cron jobs at night.

Sven

-- 
It really sucks to give your heart to a girl
You want to know her like she knows the whole world
But 10 seconds in, it's obvious, your going nowhere...
[Bowling for Soup - Drunk Enough To Dance - I Don't Wanna Rock]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: is iptables enough?

2003-03-26 Thread Steffen Burmeister
Hi all,

On Tue, Mar 25, 2003 at 01:46:32PM -0600, Jones wrote:
> One thing they forgot to mention was that they used Exchange for 
> email.  That means instead of running exim, I will have to forward 
> SMTP & POP traffic to their Exchange server.  The Exchange server 
> will not be directly connected to the Internet.

If you only port-forward the connections to the Exchange
Server you will expose it to the world like you would
run it on the firewall itself.

You are right about forwarding the traffic (how else should
they get their mail :), but IMHO it is far better to still 
use exim, but "only" as a smart-host to redirect mail from 
the internet to the Exchange-server and back. If you update 
your debian-box regularly, you don't have to worry about the 
security of the Exchange-server that much.

later

   Steffen Burmeister, Dipl. Wirtschaftsinformatiker (BA)

--
ebios informationssysteme volker birk
gut-betha-platz 1 88339 bad waldsee germany
phone +49 (7524) 93421fax +49 (7524) 93423   
mailto:[EMAIL PROTECTED]http://www.ebios.de



pgpCWb3BeQjTl.pgp
Description: PGP signature


noboby with a shell !!

2003-03-26 Thread Yoann
hi,

I look at in the file /etc/passwd on my server today, and I saw the user 
nobody has a shell !!. When I installed my debian (sarge, I know it's 
bad, but it's just a server for me...) I put /bin/false. A few days ago, 
while an upgrade, apt asked to me to upgrade that file to the new 
version and answer yes, so I think it come from that action, but it 
could be unsecure to put /bin/sh for nobody ?

nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
 
I change to :
nobody:x:65534:65534:nobody:/dev/null:/bin/false

Yoann

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Re: is iptables enough?

2003-03-26 Thread Steffen Burmeister
Hi all,

On Tue, Mar 25, 2003 at 01:46:32PM -0600, Jones wrote:
> One thing they forgot to mention was that they used Exchange for 
> email.  That means instead of running exim, I will have to forward 
> SMTP & POP traffic to their Exchange server.  The Exchange server 
> will not be directly connected to the Internet.

If you only port-forward the connections to the Exchange
Server you will expose it to the world like you would
run it on the firewall itself.

You are right about forwarding the traffic (how else should
they get their mail :), but IMHO it is far better to still 
use exim, but "only" as a smart-host to redirect mail from 
the internet to the Exchange-server and back. If you update 
your debian-box regularly, you don't have to worry about the 
security of the Exchange-server that much.

later

   Steffen Burmeister, Dipl. Wirtschaftsinformatiker (BA)

--
ebios informationssysteme volker birk
gut-betha-platz 1 88339 bad waldsee germany
phone +49 (7524) 93421fax +49 (7524) 93423   
mailto:[EMAIL PROTECTED]http://www.ebios.de



pgp0.pgp
Description: PGP signature