Re: What to do about SSH brute force attempts?

2008-08-21 Thread GREG
Hi,

* use a Firewall to prevent other IP address to connect to your ssh
service. restrict just to yours (iptables script can be easy to find on
the web)
* use Fail2ban which can ban ssh auth failure and create iptables rules.
(google can help your search about fail2ban)
Third use a non standart ssh port (for example ) apt-get install fail2ban

Have a nice day,

Greg

 Hi all,

 since two days (approx.) I'm seeing an extremely high number of apparently
 coordinated (well, at least they are trying the same list of usernames)
 brute
 force attempts from IP addresses spread all over the world. I've got
 denyhosts
 and an additional iptables based firewall solution in place to mitigate
 these
 since quite some time already and this seems to do the trick in terms of
 blocking them fairly quickly.

 Nevertheless, I'd like to do something about it more proactively, so I
 also
 contact the abuse mailboxes as obtained from whois. From time to time I do
 even
 see responses stating that counter measures have been taken. In the
 current
 case, however, there rather seems to be a need for some more coordinated
 action
 instead of contacting the ISPs for each single IP -- this host might get
 blocked/shut down, but there is little hope of a more thorough
 investigation,
 trying to get closer to the root of these attacks.

 Well, probably I'm pretty naive in hoping that one could do anything about
 that
 at all, but maybe some of you are more experienced in security
 issues/dealing
 with CERTs, etc. and have some ideas what could be done.

 Further, what do you guys do about such attacks? Just sit back and hope
 they
 don't get hold of any passwords? Any ideas are welcome...

 Thanks,
 Michael





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Allow password auth for one user with sftp?

2007-01-16 Thread Greg Folkert
On Tue, 2007-01-16 at 09:23 +0100, Maik Holtkamp wrote:
 Hi,
 
 Michel Messerschmidt wrote/schrieb @ 15.01.2007 20:39:
 
 [...]
 
  Public keys can be stolen too. If you consider this a risk, you should
 
 [Typ|Brain]o?
 
 s/Public/Private/

My thoughts exactly... stealing and placing *MY* public key means *I*
get more access or they can communicate with me in encrypted format.

I guess, a stolen public key is like a Free Information Brochure, only
good to those that will understand and use it to contact me or want to
have me do something for them.
-- 
greg, [EMAIL PROTECTED]

The technology that is
Stronger, better, faster:  Linux


signature.asc
Description: This is a digitally signed message part


Re: Security status of mozilla-* packages

2006-04-21 Thread Greg Norris
On Thu, Apr 20, 2006 at 11:02:20AM +0100, James Davis wrote:
 Actually, the release of Thunderbird which fixes these vulnerabilities
 (1.5.0.2) has not completed testing and is not a 'release' yet. The
 vulnerability report is confusing, in that it implies that Thunderbird
 1.5.0.2 should be available.
 
 I e-mailed Mozilla's security team yesterday and they said that it
 should be released shortly (within a day or so).

It's out now...

   ftp://ftp.mozilla.org/pub/mozilla.org/thunderbird/releases/1.5.0.2/source/


signature.asc
Description: Digital signature


Re: My machine was hacked - possibly via sshd?

2005-03-29 Thread Greg Folkert
On Tue, 2005-03-29 at 13:38 +0100, Simon Heywood wrote:
 On Tue, 29 Mar 2005 at 13:18:42 +, Maurizio Lemmo - Tannoiser wrote:
  On martedì 29 marzo 2005, alle 00:34, Adam M. wrote:
   But 2.4.18 is the Debian stable kernel, which gets security updates
   and patches, no?
   
   No, it doesn't. I really think that packages like this old kernel
   should be removed from the mirrors, or at least updated with big fat
   warning.
  
  Sorry, but this isn't correct.  kernel 2.4.18-1 in woody is patched
  against known vulnerability.
 
 The security team have quietly stopped updating it, preferring to
 concentrate on the Sarge kernels.

Please back this up with proof please. Otherwise you'll be disliked even
more for your obvious lack of tact.

  Recent [vulnerabilities] involve code not present in this release of
  kernel.
 
 Some of them, maybe. But take a look at #289708 for an example of an
 unfixed vulnerability in Woody's 2.4.18.

Maybe because of this little fact you might just want to point out:

Maintainer for kernel-source-2.4.18 is Herbert Xu [EMAIL PROTECTED]

As if you don't know the implications of that. IIRC, You were in the
argument, though not hugely, which gave him cause to resign from Debian.

Quit making assumptions based on your beliefs and provide real tangible
proof. Otherwise please take it elsewhere.

-- 
greg, [EMAIL PROTECTED]

The technology that is
Stronger, better, faster: Linux


signature.asc
Description: This is a digitally signed message part


Re: My machine was hacked - possibly via sshd?

2005-03-29 Thread Greg Folkert
On Tue, 2005-03-29 at 11:52 +0200, List (mitm) wrote:
 From: Michelle Konzack [EMAIL PROTECTED]
 Sent: Tuesday, March 29, 2005 11:21 AM
 Subject: Re: My machine was hacked - possibly via sshd?
 
   Your kernel is old.  That's for starters.  2.4.30 is in rc2 now.  It
   alone fixes some security issues.  2.4.18 is ancient, and there's most
 
  But 2.4.18 is the Debian stable kernel, which gets security updates
  and patches, no?
 
 NO, since one year.
 
 Is there an official policy on what gets updated and what not? Like Malcolm
 Ferguson I was under the impression that debian stable was always updated
 with the latest security patches. Besides kernel-images are there other
 packages that do not get updated?

Mozilla for one.

Not all kernel exploits for for 2.6 or much later versions of 2.4 (after
2.4.23) really have any effect on 2.4.18-blah in the Stable Distro,
the problem areas aren't even there! But tell me, have they fixed the
futex problems in 2.6? Also, when are they going to make it so modules
(such as many IDE modules) are unloadable?

If you can justify to me why a newer kernel will fix any of my problems
on my woody systems, you will have succeeded where many other have
failed.

Just so you understand, I do like the newer kernels, but 2.6.x right now
has big difficulties with java apps, due to the futex issues. Yes, there
are other ways to implement workarounds, but why when 2.4.18 does just
fine.

My other machine is still running 2.4.20 with stack smashing protection
and preemptive task switching on. I haven't had a single problem yet.
And please, I already have tracked all the traffic on them. No point in
showing any malice now.
-- 
greg, [EMAIL PROTECTED]

The technology that is
Stronger, better, faster: Linux


signature.asc
Description: This is a digitally signed message part


Re: My machine was hacked - possibly via sshd?

2005-03-28 Thread Greg Folkert
On Mon, 2005-03-28 at 15:58 -0500, Malcolm Ferguson wrote:
 Mark Foster wrote:
 
  Malcolm Ferguson wrote:
 
  My machine was cracked on Thursday evening.  I'm trying to understand 
  how it happened so that it doesn't go down again. 
 
 
  Sounds to me like you know exactly how it happened - ssh user 
  enumeration won the jackpot.
 
 
 Thanks: you got me thinking.  I see exactly what happened now.  A 
 dictionary attack via ssh found user 'steve' with a weak password.  The 
 auth.log shows this user login and su to root.  Perhaps a local exploit?
 

I have a short summary of my tracking of these Bruteforce SSH2 attempts
that are taking up bandwidth.

Here is what I have come up with ending 21mar2005 2100 GMT:
  * Starting July 26th, 2004 totals for recent Bruteforce attempts
on knight.gregfolkert.net
  * Total of 8,988 events seperated by minutes sometimes, hours,
days, never weeks, months or years
  * 158,913 bruteforce total attempts to password guess or stumble
onto a no password user
  * 3727 unique combinations of username-(from)IP Address
  * 663 unique names used
  * 210 unique IP Addresses have been identified as sources of the
attempts

Amazing ain't it?

So, indeed It has been on the increase. Time to review those password
policies.

This is just the SSH2 problems, not to mention the Apache related
applications. We can basically quadruple the counts as a total for
everything that machine has seen.
-- 
greg, [EMAIL PROTECTED]

The technology that is
Stronger, better, faster: Linux


signature.asc
Description: This is a digitally signed message part


Re: SELinux in debian/sarge

2005-01-24 Thread Greg Norris
On Mon, Jan 24, 2005 at 09:30:01PM +1100, Russell Coker wrote:
 dselect, initsctips, and sysv-rc don't matter.  I will put new
 versions of dpkg and sysvinit on my site soon.  Some other people are
 working on coreutils.

I posted an updated version of coreutils (i386 and source) about a week
ago, at http://people.debian.org/~adric/selinux/coreutils/;.  It's not
currently setup for apt-get (I hope to take care of this in the near
future), so you'll need to download/install it directly.  So far, I 
haven't encountered any problems with it on my sid SELinux box.


signature.asc
Description: Digital signature


Re: Any way to simulate traffic?

2005-01-13 Thread Greg Folkert
On Thu, 2005-01-13 at 20:37 +0100, Javier Pardo wrote:
 Hello.
 
 I´m looking after a way to simulate traffic in order to probe my
 iptables' rules.
 
 In other words. Is there any way, any command or any iptables parameter
 to ask iptables what is going to do (according with the active rules)
 when some traffic arrives?
 
 Thanks in advanced. RatÓn.

nmap and other Security testing tools.

-- 
greg, [EMAIL PROTECTED]

The technology that is
Stronger, better, faster: Linux


signature.asc
Description: This is a digitally signed message part


Re: Log file IDS package?

2005-01-12 Thread Greg Folkert
On Wed, 2005-01-12 at 16:57 +1100, Andrew Pollock wrote:
 Hi,
 
 I've done some cursory apt-cache searching, and nothing's jumped out at
 me...
 
 Is there software in Debian that will do something along the lines of a tail
 -f of a given logfile, looking for supplied regexs and do custom actions on
 matches?
 
 I want to tarpit excessive SSH login failures.

Are you talking about the recent (since July 27th 2004) brute force ssh
attempts? The ones with NO_USER attached to them?

things like this:
Jan 10 23:52:45 knight sshd[12863]: Failed password for illegal user test from 
220.75.202.225 port 35881 ssh2
Jan 10 23:52:51 knight sshd[12865]: Failed password for illegal user guest from 
220.75.202.225 port 35973 ssh2
Jan 10 23:52:55 knight sshd[12867]: Failed password for admin from 
220.75.202.225 port 36117 ssh2
Jan 10 23:52:57 knight sshd[12869]: Failed password for admin from 
220.75.202.225 port 36212 ssh2
Jan 10 23:53:00 knight sshd[12871]: Failed password for illegal user user from 
220.75.202.225 port 36284 ssh2
Jan 10 23:53:03 knight sshd[12873]: Failed password for root from 
220.75.202.225 port 36367 ssh2
Jan 10 23:53:07 knight sshd[12882]: Failed password for root from 
220.75.202.225 port 36457 ssh2
Jan 10 23:52:45 knight sshd[12863]: Illegal user test from 220.75.202.225
Jan 10 23:52:45 knight sshd[12863]: error: Could not get shadow information for 
NOUSER
Jan 10 23:52:50 knight sshd[12865]: Illegal user guest from 220.75.202.225
Jan 10 23:52:51 knight sshd[12865]: error: Could not get shadow information for 
NOUSER
Jan 10 23:53:00 knight sshd[12871]: Illegal user user from 220.75.202.225
Jan 10 23:53:00 knight sshd[12871]: error: Could not get shadow information for 
NOUSER

Or something else?

If it is that... well unless you are doing something stupid for
passwords, you really shouldn't worry about it. This goes back to tarpit
setups for mail... it won't stop them, just increase number of
connections you'll have tied up, possibly DoS style.
-- 
greg, [EMAIL PROTECTED]

The technology that is
Stronger, better, faster:  Linux


signature.asc
Description: This is a digitally signed message part


Re: [SECURITY] [DSA 557-1] New rp-pppoe packages fix potential root compromise

2004-10-11 Thread Greg Folkert
On Mon, 2004-10-11 at 21:13 +0200, Nils Rennebarth wrote:
 Martin Schulze wrote:
  Max Vozeler discovered a vulnerability in pppoe, the PPP over Ethernet
  driver from Roaring Penguin.  When the program is running setuid root
  (which is not the case in a default Debian installation), an attacker
  could overwrite any file on the file system.
  
  For the stable distribution (woody) this problem has been fixed in
  version 3.3-1.2.
  
  For the unstable distribution (sid) this problem has been fixed in
  version 3.5-4.
 Is there an estimation when the 3.5-4 Version for unstable will hit the 
 archive?

Okay, don't run it as setuid root. Nothing I can find on bugs.d.o or
packages.d.o or alioth even begins to show 3.5-4 as existing yet.

But, unless you run rp-pppoe/pppoe as setuid root... you should be fine.
Minimizing ghe damage has already been done in the way it is setup by
default in Debian.

-- 
greg, [EMAIL PROTECTED]

The technology that is
Stronger, better, faster: Linux


signature.asc
Description: This is a digitally signed message part


Re: BAHAHA was (telnetd vulnerability from BUGTRAQ)

2004-09-28 Thread Greg Folkert
On Tue, 2004-09-28 at 12:23 +0200, Dariush Pietrzak wrote:
 I would suggest updating one's knowledge at least every ~5 years or so...
 (it's easy for me to say, because i'm still learning, maybe people with
 decades of IT experience find it more difficult to follow development of
 standards)

Wow, the next thing you are going to say, is that Microsoft isn't
standards friendly. Or that SCO doesn't own UNIX. Or that (the) SUN is
setting.

Every 5 years... I doubt *I* could keep up with that pace.

BTW, I won't get into any further arguments about ftp, mainly I am
convinced its usefulness is past. Remember *I* *AM* *CONVINCED*, which
means *OPINION*. Sure other options exist, but FTP in the  5 years ago
old school sense isn't even optimal anymore except for
anonymous/chroot'd (or non-chroot'd for significantly larger values of
sane FTPDs) UL/DL. I won't use it and haven't for 5+ years (/me grins).
-- 
greg, [EMAIL PROTECTED]

The technology that is
Stronger, better, faster: Linux


signature.asc
Description: This is a digitally signed message part


Re: telnetd vulnerability from BUGTRAQ

2004-09-27 Thread Greg Folkert
On Mon, 2004-09-27 at 09:24 +0200, Dariush Pietrzak wrote:
   The point remains that while telnet/ftp should be treated as deprecated
  Why is that exactly?
 There is no replacement for ftp, and I don't know of any problems with it?
  Please enlighten me.

ftp == good enough for public upload and download in a chroot
environment.

scp == the preferred method for data transfer between machines. Nearly
as fast on semi-modern machines. pscp == the windows equivalent for
regault *NIXX scp.

I have no problems with scp, best part there isn't the mistaken problem
of transfer in ASCII mode, when it should be in IMAGE mode (or BINARY
mode) or Vice-Versa.

We should get rid of TelnetD (The Telnet Daemon) For practical purposes
beyond place where there is no option, keep the telnet Client. About the
only thing I can think of that is useful for port 23 == mud'ing

At the very least, telnetd should not ever be installed as default. 
-- 
[EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry

Novell's Directory Services is a competitive product to Microsoft's
Active Directory in much the same way that the Saturn V is a competitive
product to those dinky little model rockets that kids light off down at
the playfield. -- Thane Walkup


signature.asc
Description: This is a digitally signed message part


Re: sshd: Logging illegal users

2004-08-16 Thread Greg Folkert
On Sun, 2004-08-15 at 19:46 -0600, s. keeling wrote:
 Incoming from Greg Folkert:
  
  Hey, I have found some thing. Rather than repost. I'll share where I
  posted it.
  
  http://z.iwethey.org/forums/render/content/show?contentid=169321
 
 Zope Error

Hmmm... try it again. I get it.

I'd be surprised if you get it again.

If you do, please send me the backtrace from the page source of the
error page.
-- 
greg, [EMAIL PROTECTED]

The technology that is
Stronger, better, faster:  Linux


signature.asc
Description: This is a digitally signed message part


Re: sshd: Logging illegal users

2004-08-15 Thread Greg Folkert
On Sun, 2004-08-15 at 19:15 +0200, Thomas Hungenberg wrote:
 Hello,
 
 sshd included with Debian/sarge logs connection attempts with illegal
 usernames this way:
 
 sshd[xxx]: Illegal user username from xxx.xxx.xxx.xxx
 sshd[xxx]: Failed unknown for illegal user username from xxx.xxx.xxx.xxx port 
 x ssh2
 
 However, the older sshd version from Debian/woody by default only logs
 the following when trying to connect with an illegal username:
 
 sshd[xxx]: Connection from xxx.xxx.xxx.xxx port x
 sshd[xxx]: Enabling compatibility mode for protocol 2.0
 
 Is there a way to make the sshd included with Debian/woody to also log
 the usernames an attacker tried to connect with?

Hey, I have found some thing. Rather than repost. I'll share where I
posted it.

http://z.iwethey.org/forums/render/content/show?contentid=169321


Check it out.
-- 
greg, [EMAIL PROTECTED]

The technology that is
Stronger, better, faster:  Linux


signature.asc
Description: This is a digitally signed message part


Re: advice needed on how to proceed

2004-07-30 Thread Greg Folkert
On Fri, 2004-07-30 at 15:06, Martin-Éric Racine wrote:
 (note: I'm not subscribing to this list, please CC me)
 
 Bug#259993 was submitted on one of my package, tagged as a security risk.
 
 Upstream has been quite cooperative in asserting the gravity and is very willing
 to fix anything that the submitter can demonstrate.  The problem is that some of
 the submitter's claims appear questionable and that he refuses to substanciate.
 
 I'm tempted to tag this as wont-fix, but would like this list's input first.

This I believe is the same bug or Security Risk that caused our
Mozilla Packager to remove the PS print engine from Mozilla and package
it that way.

Now, a specific switch passed onto ghostscript needs to be used to fix
the issue.

From the gs man page:

-dSAFER 
Disables the deletefile and renamefile operators and
the ability to open files in any mode other than
read-only. This is desirable for spoolers or any other
environments where a malicious or badly written
PostScript program must be prevented from changing
important files.

This is what he is spouting about, I think.

Cheers.
-- 
greg, [EMAIL PROTECTED]

The technology that is
Stronger, better, faster:  Linux


signature.asc
Description: This is a digitally signed message part


Re: preventing /dev/kmem and /dev/mem writes?

2004-07-26 Thread Greg Folkert
On Mon, 2004-07-26 at 10:58, [EMAIL PROTECTED] wrote:
 On Mon, Jul 26, 2004 at 10:23:21AM -0400, Michael Stone wrote:
  On Mon, Jul 26, 2004 at 11:38:33PM +1000, [EMAIL PROTECTED] wrote:
  /dev/kmem unusable. That, he says, will break lilo (I can't use GRUB as
  it doesn't support booting off RAID devices properly)
  
  Hmm. Seems to work here.
  
  Mike Stone
 
 This was with a Mylex AcceleRAID 170 RAID 5 with 6 disks. That was when
 I last tried it 2 years ago. Maybe they have added that capability..

Umm, yes. Update the Firmware on the Adapter. Then run

grub-install /dev/sda

Then (if this *IS* a Sarge or Sid machine) run update-grub, answer the
questions. Voila.

-- 
greg, [EMAIL PROTECTED]

The technology that is
Stronger, better, faster: Linux


signature.asc
Description: This is a digitally signed message part


Re: mod_ssl 2.8.19 for Apache 1.3.31

2004-07-19 Thread Greg Folkert
On Mon, 2004-07-19 at 17:44, Peter Holm wrote:
 On Mon, 19 Jul 2004 23:30:14 +0200, Phillip Hofmeister
 [EMAIL PROTECTED] wrote:
 
 Is this line in your /etc/apt/sources.list (or a line like it...)
 deb http://security.debian.org stable/updates main non-free contrib
 
 my /etc/apt/sources.list contains:
 
 deb http://security.debian.org/ stable/updates main
 
 does this affect updates for mod_ssl? I see nothing about an available
 update for this mod_ssl problem on debian.org/security?

Are you sure this affects Woody?

What version of Apache and mod_ssl is in Woody?

Are you capable of providing and working on a patch to back port the
issue fixes if it affects Woody?

Have to make sure that you understand that if this DOES affect Woody,
the fixes will have to be backported to the versions in Woody. It may
even require another package or two to fix it fully.

BTW, does the term Regression testing mean anything to you?

Are you willing to do regression testing for the Security Team?

Are you willing to do the research needed to help reduce the time to fix
release?

Can you in fact do anything to help out? Are you even willing to
Volunteer?

Are you just able to complain and expect people to JUMP and DO? A taker
and not a helper?

Debian needs people to HELP do the work, what ever work you can.
Volunteers are the HEART and SOUL of Debian. Are you willing to be a
Debian Volunteer?
-- 
greg, [EMAIL PROTECTED]

The technology that is
Stronger, better, faster:  Linux


signature.asc
Description: This is a digitally signed message part


Re: Mozilla/Firefox PostScript/default security problems

2004-07-10 Thread Greg Folkert
Excuse the cross posting, but many are discussing on all of these
lists.

On Sat, 2004-07-10 at 06:47, Magnus Therning wrote:
 
  If I were to dselect today, would I still
   be able to print to file a website page 
   as ps? [Y/N] 
 
 Yes. Printing PS to a file is still possible.
 
 What is removed is the ability to have Mozilla/Firefox execute an
 external command (e.g. lpr) in order to print.

H. Now since printing to a file is fine. (DING, light goes on.)

What say we make a PIPE and attach it to something. Oh like say a print
queue process, a redirect or something similar. That would allow us to
use nearly anything we wanted to.

Seems possible it'd be a simple process, given you could know what you
are doing. Even for Epiphany or Galeon. Heck, we could even have insert
favorite desktop environ here do the work.
-- 
greg, [EMAIL PROTECTED]

The technology that is
Stronger, better, faster:  Linux


signature.asc
Description: This is a digitally signed message part


ISC DHCP3 Certs (yes multiple)

2004-06-23 Thread Greg Folkert
http://www.kb.cert.org/vuls/id/654390

http://www.kb.cert.org/vuls/id/317350

Look like uploads are in incoming.d.o ATM. 1517 UTC
-- 
[EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry

Novell's Directory Services is a competitive product to Microsoft's
Active Directory in much the same way that the Saturn V is a competitive
product to those dinky little model rockets that kids light off down at
the playfield. -- Thane Walkup


signature.asc
Description: This is a digitally signed message part


Re: Spam fights

2004-06-11 Thread Greg Folkert
Sent to list.
On Thu, 2004-06-10 at 14:31, Jaroslaw Tabor wrote:
 Hello!
 
 W licie z czw, 10-06-2004, godz. 19:06, Greg Folkert pisze: 
   Don't do it.  Confirmation systems are just as bad as the problems that they 
   try to solve.
  
  Here, here. Agreement on all fronts. If I get a challenge, I put it into
  /dev/null
 
 I'm really surprised with your opinion. Is it so big problem, to press
 reply, when you are sending first email to someone new ?
 You are receving confirmation request whenever you are trying to update
 DNS, subscribe to newsgroup or talking with any automatic service. Is it
 so difficult ?
You see there is a difference there. *I* initiated them, not some
spammer. If someone doesn't want mail that could be very valuable to
them, especially if they asked for it on D-U... forcing me to write
another e-mail JUST to help them... nope, ain't gonna happen.

 Currently, in many cases when I'm sending email to address found on
 website I'm receiving challenge, and I fully understand people doing it.
 Whitelist with email/IP can decrease also number of challenges from
 spammers: email comming from different IP can be treated as spam
 automatically.

I implemented SPAM Filtering software and have continued to train it
with ham and spam. I started when last year when I was getting ~ 6,000
Swen e-mails a day. My e-mail address is posted EVERYWHERE.

Since that point, I get maybe 3 a day. When they (they being the
spmmers) find a new way to trick the Bayesian testing I use I'll get a
spat of about 12 or so for a few days then back to maybe 3 a day. I use
server side software (maildrop and procmail) to do the sorting after it
has been graded by the filter.

I still get upto 1000 e-mail messages a day, but those are from mailing
lists and people I support via e-mail. If I had a CR system in place,
I'd have to maintain more than I want. Consider in a given day, I e-mail
about 30+ new people a day.

I also can be and am very busy in Debian's Mailing list(s), Samba, Exim,
Grip, Elitists and many other venues. If I got a CR back for every one
of the e-mails I sent to a mailing list, I'd be answering thousands of
NEW Challenges a week. Sounds like SPAM to me. When you understand that
nearly every challenge I get comes from a forged envelope-from(or
similar), I can't see how it reduces the problem, it just double perhaps
triples the amount of mail traffic. Plus some are web-server driven
auth, thereby causing a loading of the program and grabbing of the URI
indicated in the e-mail I got from the Challenge.

So, basically: You get a piece of SPAM, your systems sends out another
piece of e-mail that is in response to the forged envelope, (assume) I
get this e-mail and then have to delete this mail or respond to it (a
third message) or goto a URI inside the Challenge (more processor time
and bandwidth) just so *YOU* can verify my message was or was not SPAM?

I consider sending me e-mail in Challenge form as unsolicited e-mail.
Therefore under my classification SPAM. Why should *I* verify your SPAM
problem for you. I deal with mine, and mine alone. I am not going to
spend resources (at my cost of those resources) to verify or not it
being SPAM.

Of course if everyone just affirmed the Challenge every time, it would
definitely not work. Where as my solution would continue to.

I also drop all of the courtesy notifications that *I* sent an
infected e-mail to a certain domain's user. There is another example of
Unsolicited E-Mail. I don't care to know that someone forged my e-mail
addy inside the one someone got. It does me absolutely ZERO good to even
read these. I have an automated system to send those to /dev/null as
well. 

I deal with enough mail per day, CR systems DO NOT reduce my number,
Spam filtering does.

BY the way, I do support Whitelisting and Blacklisting to make sure
things I want to absolutely get through do, and things I don't won't.

BTW, are you not glad *I* don't CR everyone that e-mails me? It could
have taken you 3 messages to get me to see one.
-- 
[EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry

Novell's Directory Services is a competitive product to Microsoft's
Active Directory in much the same way that the Saturn V is a competitive
product to those dinky little model rockets that kids light off down at
the playfield. -- Thane Walkup


signature.asc
Description: This is a digitally signed message part


Re: Spam fights

2004-06-11 Thread Greg Folkert
Sent to list.
On Thu, 2004-06-10 at 14:31, Jaroslaw Tabor wrote:
 Hello!
 
 W liście z czw, 10-06-2004, godz. 19:06, Greg Folkert pisze: 
   Don't do it.  Confirmation systems are just as bad as the problems that 
   they 
   try to solve.
  
  Here, here. Agreement on all fronts. If I get a challenge, I put it into
  /dev/null
 
 I'm really surprised with your opinion. Is it so big problem, to press
 reply, when you are sending first email to someone new ?
 You are receving confirmation request whenever you are trying to update
 DNS, subscribe to newsgroup or talking with any automatic service. Is it
 so difficult ?
You see there is a difference there. *I* initiated them, not some
spammer. If someone doesn't want mail that could be very valuable to
them, especially if they asked for it on D-U... forcing me to write
another e-mail JUST to help them... nope, ain't gonna happen.

 Currently, in many cases when I'm sending email to address found on
 website I'm receiving challenge, and I fully understand people doing it.
 Whitelist with email/IP can decrease also number of challenges from
 spammers: email comming from different IP can be treated as spam
 automatically.

I implemented SPAM Filtering software and have continued to train it
with ham and spam. I started when last year when I was getting ~ 6,000
Swen e-mails a day. My e-mail address is posted EVERYWHERE.

Since that point, I get maybe 3 a day. When they (they being the
spmmers) find a new way to trick the Bayesian testing I use I'll get a
spat of about 12 or so for a few days then back to maybe 3 a day. I use
server side software (maildrop and procmail) to do the sorting after it
has been graded by the filter.

I still get upto 1000 e-mail messages a day, but those are from mailing
lists and people I support via e-mail. If I had a CR system in place,
I'd have to maintain more than I want. Consider in a given day, I e-mail
about 30+ new people a day.

I also can be and am very busy in Debian's Mailing list(s), Samba, Exim,
Grip, Elitists and many other venues. If I got a CR back for every one
of the e-mails I sent to a mailing list, I'd be answering thousands of
NEW Challenges a week. Sounds like SPAM to me. When you understand that
nearly every challenge I get comes from a forged envelope-from(or
similar), I can't see how it reduces the problem, it just double perhaps
triples the amount of mail traffic. Plus some are web-server driven
auth, thereby causing a loading of the program and grabbing of the URI
indicated in the e-mail I got from the Challenge.

So, basically: You get a piece of SPAM, your systems sends out another
piece of e-mail that is in response to the forged envelope, (assume) I
get this e-mail and then have to delete this mail or respond to it (a
third message) or goto a URI inside the Challenge (more processor time
and bandwidth) just so *YOU* can verify my message was or was not SPAM?

I consider sending me e-mail in Challenge form as unsolicited e-mail.
Therefore under my classification SPAM. Why should *I* verify your SPAM
problem for you. I deal with mine, and mine alone. I am not going to
spend resources (at my cost of those resources) to verify or not it
being SPAM.

Of course if everyone just affirmed the Challenge every time, it would
definitely not work. Where as my solution would continue to.

I also drop all of the courtesy notifications that *I* sent an
infected e-mail to a certain domain's user. There is another example of
Unsolicited E-Mail. I don't care to know that someone forged my e-mail
addy inside the one someone got. It does me absolutely ZERO good to even
read these. I have an automated system to send those to /dev/null as
well. 

I deal with enough mail per day, CR systems DO NOT reduce my number,
Spam filtering does.

BY the way, I do support Whitelisting and Blacklisting to make sure
things I want to absolutely get through do, and things I don't won't.

BTW, are you not glad *I* don't CR everyone that e-mails me? It could
have taken you 3 messages to get me to see one.
-- 
[EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry

Novell's Directory Services is a competitive product to Microsoft's
Active Directory in much the same way that the Saturn V is a competitive
product to those dinky little model rockets that kids light off down at
the playfield. -- Thane Walkup


signature.asc
Description: This is a digitally signed message part


Re: Spam fights

2004-06-10 Thread Greg Folkert
On Thu, 2004-06-10 at 04:58, Russell Coker wrote:
 On Thu, 10 Jun 2004 18:21, Jaroslaw Tabor [EMAIL PROTECTED] wrote:
  I'm planning to develop this feauture, but It will be nice to hear from
  what you thing about this idea.
 
 Don't do it.  Confirmation systems are just as bad as the problems that they 
 try to solve.

Here, here. Agreement on all fronts. If I get a challenge, I put it into
/dev/null

Whomever came up with those things (like TMDA and brethren), must have
been pulling them out of /dev/ass
-- 
[EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry

Novell's Directory Services is a competitive product to Microsoft's
Active Directory in much the same way that the Saturn V is a competitive
product to those dinky little model rockets that kids light off down at
the playfield. -- Thane Walkup


signature.asc
Description: This is a digitally signed message part


Re: Spam fights

2004-06-10 Thread Greg Folkert
On Thu, 2004-06-10 at 04:58, Russell Coker wrote:
 On Thu, 10 Jun 2004 18:21, Jaroslaw Tabor [EMAIL PROTECTED] wrote:
  I'm planning to develop this feauture, but It will be nice to hear from
  what you thing about this idea.
 
 Don't do it.  Confirmation systems are just as bad as the problems that they 
 try to solve.

Here, here. Agreement on all fronts. If I get a challenge, I put it into
/dev/null

Whomever came up with those things (like TMDA and brethren), must have
been pulling them out of /dev/ass
-- 
[EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry

Novell's Directory Services is a competitive product to Microsoft's
Active Directory in much the same way that the Saturn V is a competitive
product to those dinky little model rockets that kids light off down at
the playfield. -- Thane Walkup


signature.asc
Description: This is a digitally signed message part


Re: [Colo] [SECURITY] [DSA 512-1] New gallery packages fix unauthenticated access

2004-06-02 Thread Greg Rowe

Adding to the admin todo list:

1.  gallery
2.  mailman
3.  setting up sshusers group and plain text group

Greg

-- 
Home is where the .bashrc is.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: [Colo] [SECURITY] [DSA 512-1] New gallery packages fix unauthenticated access

2004-06-02 Thread Greg Rowe

Adding to the admin todo list:

1.  gallery
2.  mailman
3.  setting up sshusers group and plain text group

Greg

-- 
Home is where the .bashrc is.



Secure temporary fifo creation

2004-05-17 Thread Greg Deitrick
Hello,

What is the recommended method for securely creating a temporary named pipe in 
C code?

Looking at the man pages for various library calls it appears that tmpfile(3) 
is probably an acceptable means of creating a temporary file, but this 
returns a FILE *.  The upstram source I'm packaging needs to make a temporary 
fifo.  It uses tempnam(3) to get a temporary file name as a char *, and then 
mkfifo(3) to make the fifo named pipe from the file name.  Is this 
sufficiently secure?

Thanks for your help.


Greg Deitrick


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Secure temporary fifo creation

2004-05-17 Thread Greg Deitrick
Hello,

What is the recommended method for securely creating a temporary named pipe in 
C code?

Looking at the man pages for various library calls it appears that tmpfile(3) 
is probably an acceptable means of creating a temporary file, but this 
returns a FILE *.  The upstram source I'm packaging needs to make a temporary 
fifo.  It uses tempnam(3) to get a temporary file name as a char *, and then 
mkfifo(3) to make the fifo named pipe from the file name.  Is this 
sufficiently secure?

Thanks for your help.


Greg Deitrick



Re: Major TCP Vulnerability

2004-04-21 Thread Greg Folkert
On Tue, 2004-04-20 at 14:29, Eric Dantan Rzewnicki wrote:
 Has anyone heard about this? this article has no details ... appologies
 for the post's data-mining ... I'm still looking for other references.
 
 http://www.washingtonpost.com/wp-dyn/articles/A27403-2004Apr20.html

SSDD, Same Stuff, Different Decade

This Vulnerability is ancient news, and it is not really a
Vulnerability.

What happens if the route goes dead? Same effect.

Overloading a router with too many MAC addresses(overflow) has a similar
effect, when the router re-inits. Another thing with the same effect.

I don't quite understand this. Poisoning BGP would be more effective.
-- 
[EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry

Novell's Directory Services is a competitive product to Microsoft's
Active Directory in much the same way that the Saturn V is a competitive
product to those dinky little model rockets that kids light off down at
the playfield. -- Thane Walkup


signature.asc
Description: This is a digitally signed message part


Re: Major TCP Vulnerability

2004-04-21 Thread Greg Folkert
On Tue, 2004-04-20 at 14:29, Eric Dantan Rzewnicki wrote:
 Has anyone heard about this? this article has no details ... appologies
 for the post's data-mining ... I'm still looking for other references.
 
 http://www.washingtonpost.com/wp-dyn/articles/A27403-2004Apr20.html

SSDD, Same Stuff, Different Decade

This Vulnerability is ancient news, and it is not really a
Vulnerability.

What happens if the route goes dead? Same effect.

Overloading a router with too many MAC addresses(overflow) has a similar
effect, when the router re-inits. Another thing with the same effect.

I don't quite understand this. Poisoning BGP would be more effective.
-- 
[EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry

Novell's Directory Services is a competitive product to Microsoft's
Active Directory in much the same way that the Saturn V is a competitive
product to those dinky little model rockets that kids light off down at
the playfield. -- Thane Walkup


signature.asc
Description: This is a digitally signed message part


Re: name based virtual host and apache-ssl

2004-03-24 Thread Greg Folkert
On Wed, 2004-03-24 at 08:01, Russell Coker wrote:
 On Wed, 24 Mar 2004 22:22, Michael Stone [EMAIL PROTECTED] wrote:
  The best you could do would be to attach different certificates to
  different ports, but that would be extremely cumbersome and probably
  would lead to confusion.
 
 What if you had http://www.company1.com/ redirect to 
 https://www.company1.com:81/ and http://www.company2.com/ redirect to 
 https://www.company2.com:82/ ?
 
 www.company1.com and www.company2.com would have the same IP address.  This 
 should work.

Why go that route. Many Proxies do not allow :81 :82 etc... It would
suck. How many instances would that force you to run anyway. Many.
Almost be easier to just say SSL == Separate virtual/real machine, and
that would suck as well.

But, on the flip-side, most companies/people wanting SSL typically want
their own machine to keep the info safe from other prying eyes.
-- 
[EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry

Novell's Directory Services is a competitive product to Microsoft's
Active Directory in much the same way that the Saturn V is a competitive
product to those dinky little model rockets that kids light off down at
the playfield. -- Thane Walkup


signature.asc
Description: This is a digitally signed message part


Re: name based virtual host and apache-ssl

2004-03-24 Thread Greg Folkert
On Wed, 2004-03-24 at 08:01, Russell Coker wrote:
 On Wed, 24 Mar 2004 22:22, Michael Stone [EMAIL PROTECTED] wrote:
  The best you could do would be to attach different certificates to
  different ports, but that would be extremely cumbersome and probably
  would lead to confusion.
 
 What if you had http://www.company1.com/ redirect to 
 https://www.company1.com:81/ and http://www.company2.com/ redirect to 
 https://www.company2.com:82/ ?
 
 www.company1.com and www.company2.com would have the same IP address.  This 
 should work.

Why go that route. Many Proxies do not allow :81 :82 etc... It would
suck. How many instances would that force you to run anyway. Many.
Almost be easier to just say SSL == Separate virtual/real machine, and
that would suck as well.

But, on the flip-side, most companies/people wanting SSL typically want
their own machine to keep the info safe from other prying eyes.
-- 
[EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry

Novell's Directory Services is a competitive product to Microsoft's
Active Directory in much the same way that the Saturn V is a competitive
product to those dinky little model rockets that kids light off down at
the playfield. -- Thane Walkup


signature.asc
Description: This is a digitally signed message part


Re: Known vulnerabilities left open in Debian?

2004-03-22 Thread Greg Folkert
On Mon, 2004-03-22 at 16:05, Matt Zimmerman wrote:
 On Mon, Mar 22, 2004 at 09:45:00PM +0100, Jan L?hr wrote:
  -BEGIN PGP SIGNED MESSAGE-
  Hash: SHA1
  
  Greetings,...
  
  Am Montag, 22. M?rz 2004 21:05 schrieb Matt Zimmerman:
   On Mon, Mar 22, 2004 at 08:57:26PM +0100, Jan L?hr wrote:
Cron is another example
  
[...]
   If you have concrete information about unfixed bugs, bring it forth.
   Otherwise this is just more FUD.
  
  Moz bug 228176 [1] is an example.
 
 We have been over the mozilla situation several times; if you have something
 helpful to contribute, I would like to hear it.  Vague allusions to
 insecure by definition don't fall into that category, though.

THANK YOU!
-- 
[EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry

Novell's Directory Services is a competitive product to Microsoft's
Active Directory in much the same way that the Saturn V is a competitive
product to those dinky little model rockets that kids light off down at
the playfield. -- Thane Walkup


signature.asc
Description: This is a digitally signed message part


Re: Known vulnerabilities left open in Debian?

2004-03-22 Thread Greg Folkert
On Mon, 2004-03-22 at 16:05, Matt Zimmerman wrote:
 On Mon, Mar 22, 2004 at 09:45:00PM +0100, Jan L?hr wrote:
  -BEGIN PGP SIGNED MESSAGE-
  Hash: SHA1
  
  Greetings,...
  
  Am Montag, 22. M?rz 2004 21:05 schrieb Matt Zimmerman:
   On Mon, Mar 22, 2004 at 08:57:26PM +0100, Jan L?hr wrote:
Cron is another example
  
[...]
   If you have concrete information about unfixed bugs, bring it forth.
   Otherwise this is just more FUD.
  
  Moz bug 228176 [1] is an example.
 
 We have been over the mozilla situation several times; if you have something
 helpful to contribute, I would like to hear it.  Vague allusions to
 insecure by definition don't fall into that category, though.

THANK YOU!
-- 
[EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry

Novell's Directory Services is a competitive product to Microsoft's
Active Directory in much the same way that the Saturn V is a competitive
product to those dinky little model rockets that kids light off down at
the playfield. -- Thane Walkup


signature.asc
Description: This is a digitally signed message part


chkrootkit - possible bad news`

2004-02-24 Thread Greg
I am running Debian on a Dec Alpha PC164.

I decided to run chkrootkit and was surprised by the following line.

Checking `bindshell'... INFECTED (PORTS:  1524 31337)

I am not sure how no interpret this.  I have checked logs, as well as binary
checks and everything seems fine.  Can someone help me interpret the logs.
I will attach them at the tail of the email in case the may be helpful.


I don't know what my next step would be.  If in deed I have been 'rooted'
then I should obviously format and rebuild the server.

Thanks in advance.

Greg MEATPLOW

#
 #chkrootkit

alpha:~# chkrootkit
ROOTDIR is `/'
Checking `amd'... not found
Checking `basename'... not infected
Checking `biff'... not found
Checking `chfn'... not infected
Checking `chsh'... not infected
Checking `cron'... not infected
Checking `date'... not infected
Checking `du'... not infected
Checking `dirname'... not infected
Checking `echo'... not infected
Checking `egrep'... not infected
Checking `env'... not infected
Checking `find'... not infected
Checking `fingerd'... not found
Checking `gpm'... not found
Checking `grep'... not infected
Checking `hdparm'... not found
Checking `su'... not infected
Checking `ifconfig'... not infected
Checking `inetd'... not infected
Checking `inetdconf'... not infected
Checking `identd'... not found
Checking `killall'... not found
Checking `ldsopreload'... not infected
Checking `login'... not infected
Checking `ls'... not infected
Checking `lsof'... not found
Checking `mail'... not infected
Checking `mingetty'... not found
Checking `netstat'... not infected
Checking `named'... not infected
Checking `passwd'... not infected
Checking `pidof'... not infected
Checking `pop2'... not found
Checking `pop3'... not found
Checking `ps'... not infected
Checking `pstree'... not found
Checking `rpcinfo'... not infected
Checking `rlogind'... not found
Checking `rshd'... not found
Checking `slogin'... not infected
Checking `sendmail'... not infected
Checking `sshd'... not infected
Checking `syslogd'... not infected
Checking `tar'... not infected
Checking `tcpd'... not infected
Checking `top'... not infected
Checking `telnetd'... not found
Checking `timed'... not found
Checking `traceroute'... not infected
Checking `write'... not infected
Checking `aliens'...
/dev/st- /dev/sto
Searching for sniffer's logs, it may take a while... nothing found
Searching for HiDrootkit's default dir... nothing found
Searching for t0rn's default files and dirs... nothing found
Searching for t0rn's v8 defaults... nothing found
Searching for Lion Worm default files and dirs... nothing found
Searching for RSHA's default files and dir... nothing found
Searching for RH-Sharpe's default files... nothing found
Searching for Ambient's rootkit (ark) default files and dirs... nothing
found
Searching for suspicious files and dirs, it may take a while... nothing
found
Searching for LPD Worm files and dirs... nothing found
Searching for Ramen Worm files and dirs... nothing found
Searching for Maniac files and dirs... nothing found
Searching for RK17 files and dirs... nothing found
Searching for Ducoci rootkit... nothing found
Searching for Adore Worm... nothing found
Searching for ShitC Worm... nothing found
Searching for Omega Worm... nothing found
Searching for Sadmind/IIS Worm... nothing found
Searching for MonKit... nothing found
Searching for anomalies in shell history files... nothing found
Checking `asp'... not infected
Checking `bindshell'... INFECTED (PORTS:  1524 31337)
Checking `lkm'... nothing detected
Checking `rexedcs'... not found
Checking `sniffer'...   eth0 is not promisc
Checking `wted'... nothing deleted
Checking `z2'...
nothing deleted



chkrootkit - possible bad news`

2004-02-23 Thread Greg
I am running Debian on a Dec Alpha PC164.

I decided to run chkrootkit and was surprised by the following line.

Checking `bindshell'... INFECTED (PORTS:  1524 31337)

I am not sure how no interpret this.  I have checked logs, as well as binary
checks and everything seems fine.  Can someone help me interpret the logs.
I will attach them at the tail of the email in case the may be helpful.


I don't know what my next step would be.  If in deed I have been 'rooted'
then I should obviously format and rebuild the server.

Thanks in advance.

Greg MEATPLOW

#
 #chkrootkit

alpha:~# chkrootkit
ROOTDIR is `/'
Checking `amd'... not found
Checking `basename'... not infected
Checking `biff'... not found
Checking `chfn'... not infected
Checking `chsh'... not infected
Checking `cron'... not infected
Checking `date'... not infected
Checking `du'... not infected
Checking `dirname'... not infected
Checking `echo'... not infected
Checking `egrep'... not infected
Checking `env'... not infected
Checking `find'... not infected
Checking `fingerd'... not found
Checking `gpm'... not found
Checking `grep'... not infected
Checking `hdparm'... not found
Checking `su'... not infected
Checking `ifconfig'... not infected
Checking `inetd'... not infected
Checking `inetdconf'... not infected
Checking `identd'... not found
Checking `killall'... not found
Checking `ldsopreload'... not infected
Checking `login'... not infected
Checking `ls'... not infected
Checking `lsof'... not found
Checking `mail'... not infected
Checking `mingetty'... not found
Checking `netstat'... not infected
Checking `named'... not infected
Checking `passwd'... not infected
Checking `pidof'... not infected
Checking `pop2'... not found
Checking `pop3'... not found
Checking `ps'... not infected
Checking `pstree'... not found
Checking `rpcinfo'... not infected
Checking `rlogind'... not found
Checking `rshd'... not found
Checking `slogin'... not infected
Checking `sendmail'... not infected
Checking `sshd'... not infected
Checking `syslogd'... not infected
Checking `tar'... not infected
Checking `tcpd'... not infected
Checking `top'... not infected
Checking `telnetd'... not found
Checking `timed'... not found
Checking `traceroute'... not infected
Checking `write'... not infected
Checking `aliens'...
/dev/st- /dev/sto
Searching for sniffer's logs, it may take a while... nothing found
Searching for HiDrootkit's default dir... nothing found
Searching for t0rn's default files and dirs... nothing found
Searching for t0rn's v8 defaults... nothing found
Searching for Lion Worm default files and dirs... nothing found
Searching for RSHA's default files and dir... nothing found
Searching for RH-Sharpe's default files... nothing found
Searching for Ambient's rootkit (ark) default files and dirs... nothing
found
Searching for suspicious files and dirs, it may take a while... nothing
found
Searching for LPD Worm files and dirs... nothing found
Searching for Ramen Worm files and dirs... nothing found
Searching for Maniac files and dirs... nothing found
Searching for RK17 files and dirs... nothing found
Searching for Ducoci rootkit... nothing found
Searching for Adore Worm... nothing found
Searching for ShitC Worm... nothing found
Searching for Omega Worm... nothing found
Searching for Sadmind/IIS Worm... nothing found
Searching for MonKit... nothing found
Searching for anomalies in shell history files... nothing found
Checking `asp'... not infected
Checking `bindshell'... INFECTED (PORTS:  1524 31337)
Checking `lkm'... nothing detected
Checking `rexedcs'... not found
Checking `sniffer'...   eth0 is not promisc
Checking `wted'... nothing deleted
Checking `z2'...
nothing deleted


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: W32/Mydoom@MM (was: Re: )

2004-01-27 Thread Greg Folkert
On Tue, 2004-01-27 at 11:50, s. keeling wrote:
 Incoming from Eduardo Almeida:
  
  I don't know if all of you already heard about this. This message is a
  virus as you can see below.
 
 Pardon me if this seems a bit thick headed, but why should I care?  The
 Windows world is always being attacked by crap like this.  Why is this
 news?
 
 I don't use Windows.  Since you're using Evolution, I assume you
 aren't either.  So what's the big deal?
 
 Of course if you're using Debian as a mailserver for an internal
 Windows network, this may affect you, but what's it got to do with
 Debian?

I use Andreas Metzler's and Marc Haber's Exim4 Debian Package. I use the
Heavy Daemon with Exiscan-acl compiled in.

in the /etc/exim4/conf.d/acl/40_exim4-config_check_data

 deny  !senders = :
  condition = ${if !def:h_Message-ID: {1}}
message = RFC2822 says you SHOULD have a Message-ID.\n\
  Most messages without it are spam,\n\
  so your mail has been rejected.

There now it pertains to Debian!
-- 
greg, [EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry


signature.asc
Description: This is a digitally signed message part


Re: LKM

2004-01-26 Thread Greg Folkert
On Mon, 2004-01-26 at 10:06, Matthijs wrote:
 On Mon, 2004-01-26 at 11:40, Thiago Ribeiro wrote:
  Hi,
  
  When I run tiger, I got a follow error:
  
  NEW: --WARN-- [rootkit004f] Chkrootkit has detected a possible rootkit
  installation
  NEW: Warning: Possible LKM Trojan installed
  
  But I alredy list my proccess and did find nothing...
  
  What's can be this?
  
 
 You know what a LKM is ?
 
 It's a Loadable Kernel Module and it can hide himself and processes and
 files...
 
 So please check your computer
Please make sure this isn't the faulty chrootkit... that mis-reported an
LKM existing on you boxen.

First off, what version of tiger and chrootkit are you using?

If chkrootkit is not the misguided version, use the latest versions of
both versions of both.
-- 
[EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry


signature.asc
Description: This is a digitally signed message part


Re: LKM

2004-01-26 Thread Greg Folkert
On Mon, 2004-01-26 at 10:06, Matthijs wrote:
 On Mon, 2004-01-26 at 11:40, Thiago Ribeiro wrote:
  Hi,
  
  When I run tiger, I got a follow error:
  
  NEW: --WARN-- [rootkit004f] Chkrootkit has detected a possible rootkit
  installation
  NEW: Warning: Possible LKM Trojan installed
  
  But I alredy list my proccess and did find nothing...
  
  What's can be this?
  
 
 You know what a LKM is ?
 
 It's a Loadable Kernel Module and it can hide himself and processes and
 files...
 
 So please check your computer
Please make sure this isn't the faulty chrootkit... that mis-reported an
LKM existing on you boxen.

First off, what version of tiger and chrootkit are you using?

If chkrootkit is not the misguided version, use the latest versions of
both versions of both.
-- 
[EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry


signature.asc
Description: This is a digitally signed message part


Re: extrange passwd behaviour

2003-12-04 Thread Greg Folkert
On Thu, 2003-12-04 at 15:12, Ruben Porras wrote:
 I've discovered that login, sudo, gdm only take care of the first 8
 characters of the passwd. The following characters don't count. See the
 following example (I've created a new user just to make the test)
 
 $$ adduser test
 Adding user test...
 Adding new group test (1006).
 Adding new user test (1006) with group test.
 Enter new UNIX password: qwertyuiop -- this, for example 10 letters
 Retype new UNIX password: qwertyuiop
 passwd: password updated successfully
 Changing the user information for test
 Enter the new value, or press ENTER for the default
 Full Name []:
 Room Number []:
 Work Phone []:
 Home Phone []:
 Other []:
 Is the information correct? [y/n] y
 
 $$ su test
 Password: qwertyui --- only 8 letters (qwertyuivnksshfdd, for example
 would be also ok)
 $$ whoami
 test
 
 
 I don't see nothing about this in BTS, I'm puzzled.
Why would it be ib BTS?

That is standard SOP. If you are root... no password needed on that
unless you have more than traditional *NIX security.

Remember root OWNS the system. root RULES the roost.

Now if you try it as an unprivileged user and it succeeds... then we
gots LOTSA problems to deal with.

-- 
[EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry


signature.asc
Description: This is a digitally signed message part


Re: extrange passwd behaviour

2003-12-04 Thread Greg Folkert
On Thu, 2003-12-04 at 15:12, Ruben Porras wrote:
 I've discovered that login, sudo, gdm only take care of the first 8
 characters of the passwd. The following characters don't count. See the
 following example (I've created a new user just to make the test)
 
 $$ adduser test
 Adding user test...
 Adding new group test (1006).
 Adding new user test (1006) with group test.
 Enter new UNIX password: qwertyuiop -- this, for example 10 letters
 Retype new UNIX password: qwertyuiop
 passwd: password updated successfully
 Changing the user information for test
 Enter the new value, or press ENTER for the default
 Full Name []:
 Room Number []:
 Work Phone []:
 Home Phone []:
 Other []:
 Is the information correct? [y/n] y
 
 $$ su test
 Password: qwertyui --- only 8 letters (qwertyuivnksshfdd, for example
 would be also ok)
 $$ whoami
 test
 
 
 I don't see nothing about this in BTS, I'm puzzled.
Why would it be ib BTS?

That is standard SOP. If you are root... no password needed on that
unless you have more than traditional *NIX security.

Remember root OWNS the system. root RULES the roost.

Now if you try it as an unprivileged user and it succeeds... then we
gots LOTSA problems to deal with.

-- 
[EMAIL PROTECTED]
REMEMBER ED CURRY! http://www.iwethey.org/ed_curry


signature.asc
Description: This is a digitally signed message part


Re: ssh + opie?

2003-08-14 Thread Greg Norris
On Fri, Aug 08, 2003 at 04:21:50PM +1000, Geoff Crompton wrote:
   I have succesfully configued sshd to allow opie logons, without
 disabling PrivSep, by configuring pam to use the libpam-opie
 module for ssh.
   In this case the user gets the normal password prompt though, and no
 opie information to tell them what password they are upto.

Could you post the configuration details?  I've tried to do this a
couple of times, but wasn't successful unless I disabled privilege
separation.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: ssh + opie?

2003-08-08 Thread Greg Norris
On Fri, Aug 08, 2003 at 04:21:50PM +1000, Geoff Crompton wrote:
   I have succesfully configued sshd to allow opie logons, without
 disabling PrivSep, by configuring pam to use the libpam-opie
 module for ssh.
   In this case the user gets the normal password prompt though, and no
 opie information to tell them what password they are upto.

Could you post the configuration details?  I've tried to do this a
couple of times, but wasn't successful unless I disabled privilege
separation.



Re: Kernel ptrace Hole - Fix For i386 ?

2003-04-14 Thread Greg Norris
On Tue, Apr 15, 2003 at 12:46:38AM +0100, Nick Boyce wrote:
 The fix is in vanilla kernel 2.4.20 as I understand it, and it sounds
 like some people here are downloading that source for their Woody i386
 systems.

By vanilla, do you mean the Linus kernel from kernel.org?  If so,
the fix was incorporated into 2.4.21-pre6... 2.4.20 wasn't updated.


pgp0r4ybFGKlM.pgp
Description: PGP signature


Re: Good Day -- RR and rbl

2002-07-02 Thread Greg Hunt
 Since I do not tolerate any level of spam I consider it immature to run a
 professional mailing list like debian security so that it can be abused
 by the most stupid script kiddie.  Sorry but the impression I got so far
 is semiprofessional. Cannot recommend it for use at work when people
 don't want to run serious/professional mailing lists.

I beleive the term you're looking for is spammers, not script kiddies. 
There wasn't any 31337 h4x0ring going on here.  

If your basis for using redhat over debian in a work environment is the amount 
of spam on a mailing list I think your network is in trouble. Redhat released 
new openssh packages on June 27th, Debian released them on June 24th. Hey, at 
least you don't have spam...

-Greg

-- 
--SupplyEdge---
Greg Hunt
800-733-3380 x 107
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: [Fwd: ISS Advisory: OpenSSH Remote Challenge Vulnerability]

2002-06-26 Thread Greg Hunt
I don't see a better way of handling the OpenSSH announcement. More details or 
a patch would have allowed people to start writing exploits, at least they 
warned users of an upcoming bug and provided a work around. The OpenSSH team 
had to communicate with many vendors and eventually the details would have 
leaked. While debian may have released patched ssh packages right away, how 
many thousands of users of other vendors out there wouldn't have had a patch?
The apache announcement was just a mess though...
-Greg
 *raises hand*
 
 Both the Apache and OpenSSH announcements were done poorly, without
 any reasonable thought given to the user community.
 
 They should be taken out and shot ;-) (IMHO).
 
 -Anne
-- 
--SupplyEdge---
Greg Hunt
800-733-3380 x 107
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: DSA-134-1

2002-06-25 Thread Greg Hunt
Theo de Raadt said in a post to Bugtraq the exploit won't work on sshd with 
privilege seperation enabled, however even if it did work it'd be better to 
have an attacker get a chrooted shell with no privs instead of root access to 
the entire system. 
  i unterstand it as remote chrooted nobody exploit, this is much more
  better than a remote root-exploit.
 
 better in what way?



-- 
--SupplyEdge---
Greg Hunt
800-733-3380 x 107
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: DSA-134-1

2002-06-25 Thread Greg Hunt
Yes it's still not a good thing for sometime to have a shell with no priv's but 
someone asked better how?, I'm pretty sure if most admins had a choice 
between an attacker having root access or an attacker having a chrooted shell 
with no privs they would choose the latter. Seeing as how there isn't a patch 
yet for the bug, it's this or nothing. 
-Greg

 Theo de Raadt said in a post to Bugtraq the exploit won't work on sshd with 
 privilege seperation enabled, however even if it did work it'd be better to 
 have an attacker get a chrooted shell with no privs instead of root access 
 to the entire system. 
 
 In which case you just need a local exploit to go with your remote exploit.
 
 makes it harder but not impossible.
 

-- 
--SupplyEdge---
Greg Hunt
800-733-3380 x 107
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: DSA-134-1

2002-06-25 Thread Greg Hunt
Well I'm not an open-bsd developer nor have I looked through the privilege 
seperation code so I only know what I read at 
http://www.citi.umich.edu/u/provos/ssh/privsep.html but according to that site 
(linked to from openssh.com) the privileged process (process 1) forks the 
unprivileged child (process 2) when a connection is made, this child talks to 
the client and requests authentication from the parent. If the authentication 
is sucessfull the parent passes the child a PTY, if not there's not much the 
child process can do. 
The child itself is never able to say give me a root shell,  or give me a 
shell for user xyz so the child becoming corrupted doesn't compromise the 
security of the whole system (that's the point of priv seperation).
-Greg

PS: the site linked to above does a much better job of explaining this

 this shellcode is executed as user ralf, not as user root.
 
 I'm not worried about a shell spawned by the chrooted process.
 
 Chroot and su to some undangerous user helps if that's one-way only, 
 i.e. the process doesn't have any connection to sensitive areas 
 anymore. But in the case of sshd, it's not one-way: as far as I 
 understand, the process running in the chroot as 'sshd' (say process 
 2) user does the communication with the client, but, and that's the 
 problem, it does have a connection with a sister process running as 
 root (say process 1) which it tells to launch a login shell for the 
 user requested by the client. Normally, process 2 would of course 
 only advise process 1 to do that if the remote client correctly 
 identifies itself/gives the password. But if a malicious client 
 submits data that corrupts process 2, he could make it to tell 
 process 1 to launch a login shell for root. How should process 1 find 
 out whether process 2 has been corrupted?
 
 (Well, it would be easy if logins are username/password only: if the 
 check for correct username/password is done by process 1, process 2 
 has to provide them which it can't if the cracker doesn't know them 
 anyway. But since ssh also allows public-key based logins, and I 
 would guess that the key check is done by process 2, it looks 
 different. Sorry if this starts to be OT.)
 
 Christian.
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 

-- 
--SupplyEdge---
Greg Hunt
800-733-3380 x 107
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: ssh authentication configuration? = better use OTP method

2002-05-29 Thread Greg Norris

libpam-opie seems to be working great here.

On Wed, May 29, 2002 at 10:58:50AM +0700, Jean Christophe ANDRÃ? wrote:
   Hello Joshua and all,
 
 Joshua Goodall wrote :
  Personally I recommend neither and tell everyone to prefer keys
  and one-time passwords, but that's another story :)
 
 Any hint for the best OTP method on Debian? libpam-opie??
 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]





Re: ssh authentication configuration? = better use OTP method

2002-05-29 Thread Greg Norris
libpam-opie seems to be working great here.

On Wed, May 29, 2002 at 10:58:50AM +0700, Jean Christophe ANDRÃ? wrote:
   Hello Joshua and all,
 
 Joshua Goodall wrote :
  Personally I recommend neither and tell everyone to prefer keys
  and one-time passwords, but that's another story :)
 
 Any hint for the best OTP method on Debian? libpam-opie??
 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: syn flood attacked?

2002-05-17 Thread Greg Hunt

echo 1  /proc/sys/net/ipv4/tcp_syncookies
to turn on syn cookie support once it's compiled into the kernel.

 In this case you are probably a target of a SYN Flood atack.
 What you have to do is to compile your kernel with option with
 protect_against_synflood (or something like this, but for sure in network
 submenu). Make sure to read the help for this option because compiling it into
 kernel isn't enough... (you have to issue a command 
 echo 1  /don't/remember/where ;) )

-- 
--SupplyEdge---
Greg Hunt
800-733-3380 x 107
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: syn flood attacked?

2002-05-17 Thread Greg Hunt
echo 1  /proc/sys/net/ipv4/tcp_syncookies
to turn on syn cookie support once it's compiled into the kernel.

 In this case you are probably a target of a SYN Flood atack.
 What you have to do is to compile your kernel with option with
 protect_against_synflood (or something like this, but for sure in network
 submenu). Make sure to read the help for this option because compiling it into
 kernel isn't enough... (you have to issue a command 
 echo 1  /don't/remember/where ;) )

-- 
--SupplyEdge---
Greg Hunt
800-733-3380 x 107
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: is this an attack on my sendmail?

2002-05-10 Thread Greg Hunt

It looks like one of your users (the ctladdr= one) is trying to email 
[EMAIL PROTECTED] company.com doesn't appear to be online right now, which is why 
the connection is timing out.

For the SYN_SENT when doing a netstat, it's likely that your mail server is trying to 
connect to those mail servers, which are either not online or have some firewall rules 
blocking you - nothing to worry about.

(sending a TCP packet with the SYN flag set is the first step to making a connection, 
if those servers were online and responding they would reply with a packet with SYN + 
ACK set, since your server can't get to them the connection is stuck in the SYN_SENT 
state until it times out)

-Greg

 hi guys in my maillog I am receiving many strange message on sendmail like 
 that:
 May 10 18:52:50 xserver sendmail[]: g4AIRfa02119: 
 to=[EMAIL PROTECTED], ctladdr=one of my user mail (638/45), 
 delay=03:25:09, xdelay=00:00:00, mailer=esmtp, pri=607606, 
 relay=company.com., dsn=4.0.0, stat=Deferred: Connection timed out with 
 company.com.
 
 and the other strange thing is that when i try to check the 
 conections(netstat -at) there are one strange like that:
 tcp0  1 myserver:35169   mywebos.com:smtpSYN_SENT
 when I use netstat -atn looks like that:
 tcp0  1 myserver:35169208.49.229.140:25   SYN_SENT

-- 
--SupplyEdge---
Greg Hunt
800-733-3380 x 107
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: is this an attack on my sendmail?

2002-05-10 Thread Greg Hunt
It looks like one of your users (the ctladdr= one) is trying to email [EMAIL 
PROTECTED] company.com doesn't appear to be online right now, which is why the 
connection is timing out.

For the SYN_SENT when doing a netstat, it's likely that your mail server is 
trying to connect to those mail servers, which are either not online or have 
some firewall rules blocking you - nothing to worry about.

(sending a TCP packet with the SYN flag set is the first step to making a 
connection, if those servers were online and responding they would reply with a 
packet with SYN + ACK set, since your server can't get to them the connection 
is stuck in the SYN_SENT state until it times out)

-Greg

 hi guys in my maillog I am receiving many strange message on sendmail like 
 that:
 May 10 18:52:50 xserver sendmail[]: g4AIRfa02119: 
 to=[EMAIL PROTECTED], ctladdr=one of my user mail (638/45), 
 delay=03:25:09, xdelay=00:00:00, mailer=esmtp, pri=607606, 
 relay=company.com., dsn=4.0.0, stat=Deferred: Connection timed out with 
 company.com.
 
 and the other strange thing is that when i try to check the 
 conections(netstat -at) there are one strange like that:
 tcp0  1 myserver:35169   mywebos.com:smtpSYN_SENT
 when I use netstat -atn looks like that:
 tcp0  1 myserver:35169208.49.229.140:25   SYN_SENT

-- 
--SupplyEdge---
Greg Hunt
800-733-3380 x 107
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: A more secure form of .htaccess?

2002-04-22 Thread Greg Hunt

You might want to take a look at using digest authentication, which sends a MD5 digest 
of the pasword instead of the actual password.

http://httpd.apache.org/docs/howto/auth.html

 I have written some php-based internal systems for our users.  Users are
 required to authenticate to access this system, and their login
 determines what they are allowed to do within the system.  I am
 concerned that their logging in with cleartext passwords is a security
 risk.  I work in a K-12 school enviroment, and many of these students
 are rather devious and resourceful (as I was at that age :) ).  My fear
 is some bright student setting a sniffer up on my network and gleaning
 passwords from it.
 
 I am wondering if any of you have had similar problems.  What is a more
 secure way for people to login?  Is SSL an option, and if so, how do I
 go about using it?  Do I have to purchase a certificate?  Or is there
 some other option?  Finally, should I be using .htaccess at all, or is
 there a better way?  Thank you in advance for your advice.

-- 
--SupplyEdge---
Greg Hunt
800-733-3380 x 107
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Stack protection

2002-01-28 Thread Greg Hunt

According to the Openwall kernel patch FAQ, JDK 1.3 and XFree86 4.0.1 both require an 
executable stack, but the openwall patch lets you allow certain programs to have an 
executable stack (from what I've gathered, I don't use it).

Also, remember that a non-executable stack means very little in stopping exploits.

 I'm going to bore you with stack attacks once again ! :)
 
 I am testing some kernel patches which prevent the system from being
 vulnerable to stack overflows, and I am wondering : are there many languages
 which require an executable stack ?
 
 I think Ada needs it, but do you know more ? ie, are there such reasons to
 refuse a non-executable stack ?

-- 
--SupplyEdge---
Greg Hunt
800-733-3380 x 107
[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Stack protection

2002-01-28 Thread Greg Hunt
According to the Openwall kernel patch FAQ, JDK 1.3 and XFree86 4.0.1 both 
require an executable stack, but the openwall patch lets you allow certain 
programs to have an executable stack (from what I've gathered, I don't use it).

Also, remember that a non-executable stack means very little in stopping 
exploits.

 I'm going to bore you with stack attacks once again ! :)
 
 I am testing some kernel patches which prevent the system from being
 vulnerable to stack overflows, and I am wondering : are there many languages
 which require an executable stack ?
 
 I think Ada needs it, but do you know more ? ie, are there such reasons to
 refuse a non-executable stack ?

-- 
--SupplyEdge---
Greg Hunt
800-733-3380 x 107
[EMAIL PROTECTED]



Unidentified subject!

2001-04-04 Thread Greg Hookey
subscribe

-- 
==
Signatures suck...

[EMAIL PROTECTED]
==



Re: Unknown open ports

2000-06-05 Thread Greg Olszewski
On Tue, Jun 06, 2000 at 12:22:33AM +0200, Ron Rademaker wrote:
 I've just run a portscan to my computer that is connected to the internet
 (permanently) and there were a few ports open of which I don't know what
 they are for (all ports under 1024) and neither did the portscanner, these
 are the ports: 686 698 708
 If I use telnet to go to one of those ports, the connection isn't closed
 by the remote host (only after I've typed a few things and pressed enter a
 few times).
 
 Anybody got any ideas on what these ports are for?


Not off the top of my head. The most convienent way I've found to
determine is lsof (apt-get install lsof-2.2 or lsof-2.0.36 depending on
kernel). 

Just do a lsof | grep TCP as root and you'll get a list with names
pids, and open ports down the right. It's nice.

Someone else suggested it was rpc, but if you are actually 
neo.rademaker.dhs.org (That's what your headers say), that's not it.


Oh well. 

hope this helps

greg