Re: Have I been hacked?

2015-01-09 Thread scott
On 01/10/2015 12:01 AM, Jerry Stuckle wrote:
> On 1/9/2015 10:24 PM, scott wrote:
>> On 01/09/2015 09:19 PM, Jerry Stuckle wrote:
>>> On 1/9/2015 8:49 PM, Joel Rees wrote:
 On Fri, Jan 9, 2015 at 6:25 PM, Martin Steigerwald  
 wrote:
> Am Freitag, 9. Januar 2015, 00:24:06 schrieb Brian:
>> On Thu 08 Jan 2015 at 22:36:46 +0100, Martin Steigerwald wrote:
>>> Am Donnerstag, 8. Januar 2015, 14:20:27 schrieb Jerry Stuckle:
 Just ensure you're using good security practices - don't allow root
 login, use long, random passwords, etc.  I also use a random character
 strings for the login ids, as well as passwords  - just one more thing
 for the hackers to have to figure out how to get around.
>>>
>>> Only allow SSH key based logins. Of course, only after you copied a 
>>> public
>>> key onto the machine with ssh-copy-id.
>>>
>>> And have SSH keys with *strong* passphrases, to protect against someone
>>> stealing your key. Use ssh-agent wisely only on trusted machines.
>>
>> SSH password logins are just as safe. 20 characters gives a strong
>> password for use on trusted machines. There is no need to worry about
>> it being stolen because it is in your memory,
>
> I think SSH keys are safer, cause there is no password at all that can be
> brute forced.

 What do you mean by that?

> Okay, one can try to guess the key, but try that with a 4096 bit
> key.

 Hmm.

 10 characters, 6 to 7 bits per character, that's 60 bits.

 If the bits are truly random, straight brute-force will take, on
 average, half of 2^60 attempts.

 We can hold the integer 2^59 in a C variable on most recent desktops,
 but if we have bc (dc if you like post-fix), we can do this on even 32
 bit CPUs:

 576460752303423488 (base ten)

 At one milion attempts per second, that's 5764607523034 seconds, or
 182678 CPU-years.

 There's no way that's going to happen on-line, if the password is
 truly random, and not randomly a password that's a quick permutation
 of common memes or of entries in rainbow tables.

>>>
>>> Actually, 62 possible characters (upper case, lower case and digits), 10
>>> positions is 62^10 or 839,299,365,868,340,224 possible combinations.
>>>
>>> Adding in special characters obviously would increase that.
>>>
>>> But there is no way you'll hit a server 1,000,000 times a second trying
>>> to brute force a password.
>>>
>>>
 I currently use sixteen or more letters in my passwords, don't use
 simple permutations or common phrases (as for the first leter trick),
 use disconnected words from multiple languages. Or use 16 character
 true random passwords for the important stuff.

>>>
>>> All good suggestions.
>>>
 SSH keys are useful, but you have to keep them somewhere. The real
 danger to good passwords is the off-line attempts, and the passphrase
 you use for your private keystore is potentially subject to off-line
 if your password is.

>>>
>>> Yes, keys may actually be less secure than passwords.
>>>
>>> Jerry
>>>
>>>
>> If you have a dedicated hacker, or hackers, time is on their side. I
>> would much rather use a key with a passphrase.
>>
>>
> 
> That's fine, if you don't care about security.  Lose your laptop and
> your pass phrase can be broken at a rate of 1 billion attempts per
> second, since it is local to your machine.
> 
> There is no way you're going to get even 100 attempts per second into an
> SSH server.  And since the hacker doesn't have direct access to the
> encrypted password on the server, he can't break it on a local machine.
>  Using the same password/pass phrase for both systems, it would take
> 10,000,000 times longer to hack the SSH password than your local pass
> phrase.
> 
> And then there's the problem you can only access the server from a
> system with the key file.  And the more computers the key file resides
> on, the less secure it is.
> 
> Since a password is not stored on any machine (except the server), there
> is nothing to break.
> 
> Jerry
> 
> 
I replied to your post to me specifically, so I 'll do it here, also.
The fact is that if you have physical access to any machine, unfettered,
it's game over.
   Scotty


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/54b0b779.2010...@gmx.com



Re: Have I been hacked?

2015-01-09 Thread Jerry Stuckle
On 1/9/2015 10:24 PM, scott wrote:
> On 01/09/2015 09:19 PM, Jerry Stuckle wrote:
>> On 1/9/2015 8:49 PM, Joel Rees wrote:
>>> On Fri, Jan 9, 2015 at 6:25 PM, Martin Steigerwald  
>>> wrote:
 Am Freitag, 9. Januar 2015, 00:24:06 schrieb Brian:
> On Thu 08 Jan 2015 at 22:36:46 +0100, Martin Steigerwald wrote:
>> Am Donnerstag, 8. Januar 2015, 14:20:27 schrieb Jerry Stuckle:
>>> Just ensure you're using good security practices - don't allow root
>>> login, use long, random passwords, etc.  I also use a random character
>>> strings for the login ids, as well as passwords  - just one more thing
>>> for the hackers to have to figure out how to get around.
>>
>> Only allow SSH key based logins. Of course, only after you copied a 
>> public
>> key onto the machine with ssh-copy-id.
>>
>> And have SSH keys with *strong* passphrases, to protect against someone
>> stealing your key. Use ssh-agent wisely only on trusted machines.
>
> SSH password logins are just as safe. 20 characters gives a strong
> password for use on trusted machines. There is no need to worry about
> it being stolen because it is in your memory,

 I think SSH keys are safer, cause there is no password at all that can be
 brute forced.
>>>
>>> What do you mean by that?
>>>
 Okay, one can try to guess the key, but try that with a 4096 bit
 key.
>>>
>>> Hmm.
>>>
>>> 10 characters, 6 to 7 bits per character, that's 60 bits.
>>>
>>> If the bits are truly random, straight brute-force will take, on
>>> average, half of 2^60 attempts.
>>>
>>> We can hold the integer 2^59 in a C variable on most recent desktops,
>>> but if we have bc (dc if you like post-fix), we can do this on even 32
>>> bit CPUs:
>>>
>>> 576460752303423488 (base ten)
>>>
>>> At one milion attempts per second, that's 5764607523034 seconds, or
>>> 182678 CPU-years.
>>>
>>> There's no way that's going to happen on-line, if the password is
>>> truly random, and not randomly a password that's a quick permutation
>>> of common memes or of entries in rainbow tables.
>>>
>>
>> Actually, 62 possible characters (upper case, lower case and digits), 10
>> positions is 62^10 or 839,299,365,868,340,224 possible combinations.
>>
>> Adding in special characters obviously would increase that.
>>
>> But there is no way you'll hit a server 1,000,000 times a second trying
>> to brute force a password.
>>
>>
>>> I currently use sixteen or more letters in my passwords, don't use
>>> simple permutations or common phrases (as for the first leter trick),
>>> use disconnected words from multiple languages. Or use 16 character
>>> true random passwords for the important stuff.
>>>
>>
>> All good suggestions.
>>
>>> SSH keys are useful, but you have to keep them somewhere. The real
>>> danger to good passwords is the off-line attempts, and the passphrase
>>> you use for your private keystore is potentially subject to off-line
>>> if your password is.
>>>
>>
>> Yes, keys may actually be less secure than passwords.
>>
>> Jerry
>>
>>
> If you have a dedicated hacker, or hackers, time is on their side. I
> would much rather use a key with a passphrase.
> 
> 

That's fine, if you don't care about security.  Lose your laptop and
your pass phrase can be broken at a rate of 1 billion attempts per
second, since it is local to your machine.

There is no way you're going to get even 100 attempts per second into an
SSH server.  And since the hacker doesn't have direct access to the
encrypted password on the server, he can't break it on a local machine.
 Using the same password/pass phrase for both systems, it would take
10,000,000 times longer to hack the SSH password than your local pass
phrase.

And then there's the problem you can only access the server from a
system with the key file.  And the more computers the key file resides
on, the less secure it is.

Since a password is not stored on any machine (except the server), there
is nothing to break.

Jerry


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/54b0b23c.8060...@gmail.com



RE: Unable to join the Debian User Forum; appears that all IPs are being black-listed.

2015-01-09 Thread Wayne Hartell
Bob, 

Trying my best with the trimming; I'll keep observing how other people do it
and try to learn from that.

> > It does work in other Linux distros that I have tried.
> 
> If it works anywhere then it should be possible to learn why and/or why
not and
> to transfer that knowledge.
>
> The other distro may have done something unique and special there to make
it
> work.  The task is then to figure this out and make it available in
Debian.

That's what I would have thought.

> > Rhythm Box appears to work just fine.
> 
> How would Rhythm Box know what your smb username and password would
> be?

Good question. My guess is perhaps since it's part of Gnome it's more
integrated and since Gnome must know my credentials when I access the
Windows shares initially, it probably has a standard place to store that
information. But this is just a guess from a day 3 day old Debian user.

> I suggest that you post a new message to the mailing list.  
>[snip]
> Give it a go.  Good luck!

I was thinking that myself but wasn't sure on the best procedure there
either so thanks for filling me in. When I get a chance I'll do just that.
Cheers,
Wayne.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/008801d02c8f$97d839a0$c788ace0$@ozemail.com.au



Re: Have I been hacked?

2015-01-09 Thread scott
On 01/09/2015 09:19 PM, Jerry Stuckle wrote:
> On 1/9/2015 8:49 PM, Joel Rees wrote:
>> On Fri, Jan 9, 2015 at 6:25 PM, Martin Steigerwald  
>> wrote:
>>> Am Freitag, 9. Januar 2015, 00:24:06 schrieb Brian:
 On Thu 08 Jan 2015 at 22:36:46 +0100, Martin Steigerwald wrote:
> Am Donnerstag, 8. Januar 2015, 14:20:27 schrieb Jerry Stuckle:
>> Just ensure you're using good security practices - don't allow root
>> login, use long, random passwords, etc.  I also use a random character
>> strings for the login ids, as well as passwords  - just one more thing
>> for the hackers to have to figure out how to get around.
>
> Only allow SSH key based logins. Of course, only after you copied a public
> key onto the machine with ssh-copy-id.
>
> And have SSH keys with *strong* passphrases, to protect against someone
> stealing your key. Use ssh-agent wisely only on trusted machines.

 SSH password logins are just as safe. 20 characters gives a strong
 password for use on trusted machines. There is no need to worry about
 it being stolen because it is in your memory,
>>>
>>> I think SSH keys are safer, cause there is no password at all that can be
>>> brute forced.
>>
>> What do you mean by that?
>>
>>> Okay, one can try to guess the key, but try that with a 4096 bit
>>> key.
>>
>> Hmm.
>>
>> 10 characters, 6 to 7 bits per character, that's 60 bits.
>>
>> If the bits are truly random, straight brute-force will take, on
>> average, half of 2^60 attempts.
>>
>> We can hold the integer 2^59 in a C variable on most recent desktops,
>> but if we have bc (dc if you like post-fix), we can do this on even 32
>> bit CPUs:
>>
>> 576460752303423488 (base ten)
>>
>> At one milion attempts per second, that's 5764607523034 seconds, or
>> 182678 CPU-years.
>>
>> There's no way that's going to happen on-line, if the password is
>> truly random, and not randomly a password that's a quick permutation
>> of common memes or of entries in rainbow tables.
>>
> 
> Actually, 62 possible characters (upper case, lower case and digits), 10
> positions is 62^10 or 839,299,365,868,340,224 possible combinations.
> 
> Adding in special characters obviously would increase that.
> 
> But there is no way you'll hit a server 1,000,000 times a second trying
> to brute force a password.
> 
> 
>> I currently use sixteen or more letters in my passwords, don't use
>> simple permutations or common phrases (as for the first leter trick),
>> use disconnected words from multiple languages. Or use 16 character
>> true random passwords for the important stuff.
>>
> 
> All good suggestions.
> 
>> SSH keys are useful, but you have to keep them somewhere. The real
>> danger to good passwords is the off-line attempts, and the passphrase
>> you use for your private keystore is potentially subject to off-line
>> if your password is.
>>
> 
> Yes, keys may actually be less secure than passwords.
> 
> Jerry
> 
> 
If you have a dedicated hacker, or hackers, time is on their side. I
would much rather use a key with a passphrase.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/54b09b89.5060...@gmx.com



Re: Have I been hacked?

2015-01-09 Thread Jerry Stuckle
On 1/9/2015 8:49 PM, Joel Rees wrote:
> On Fri, Jan 9, 2015 at 6:25 PM, Martin Steigerwald  
> wrote:
>> Am Freitag, 9. Januar 2015, 00:24:06 schrieb Brian:
>>> On Thu 08 Jan 2015 at 22:36:46 +0100, Martin Steigerwald wrote:
 Am Donnerstag, 8. Januar 2015, 14:20:27 schrieb Jerry Stuckle:
> Just ensure you're using good security practices - don't allow root
> login, use long, random passwords, etc.  I also use a random character
> strings for the login ids, as well as passwords  - just one more thing
> for the hackers to have to figure out how to get around.

 Only allow SSH key based logins. Of course, only after you copied a public
 key onto the machine with ssh-copy-id.

 And have SSH keys with *strong* passphrases, to protect against someone
 stealing your key. Use ssh-agent wisely only on trusted machines.
>>>
>>> SSH password logins are just as safe. 20 characters gives a strong
>>> password for use on trusted machines. There is no need to worry about
>>> it being stolen because it is in your memory,
>>
>> I think SSH keys are safer, cause there is no password at all that can be
>> brute forced.
> 
> What do you mean by that?
> 
>> Okay, one can try to guess the key, but try that with a 4096 bit
>> key.
> 
> Hmm.
> 
> 10 characters, 6 to 7 bits per character, that's 60 bits.
> 
> If the bits are truly random, straight brute-force will take, on
> average, half of 2^60 attempts.
> 
> We can hold the integer 2^59 in a C variable on most recent desktops,
> but if we have bc (dc if you like post-fix), we can do this on even 32
> bit CPUs:
> 
> 576460752303423488 (base ten)
> 
> At one milion attempts per second, that's 5764607523034 seconds, or
> 182678 CPU-years.
> 
> There's no way that's going to happen on-line, if the password is
> truly random, and not randomly a password that's a quick permutation
> of common memes or of entries in rainbow tables.
>

Actually, 62 possible characters (upper case, lower case and digits), 10
positions is 62^10 or 839,299,365,868,340,224 possible combinations.

Adding in special characters obviously would increase that.

But there is no way you'll hit a server 1,000,000 times a second trying
to brute force a password.


> I currently use sixteen or more letters in my passwords, don't use
> simple permutations or common phrases (as for the first leter trick),
> use disconnected words from multiple languages. Or use 16 character
> true random passwords for the important stuff.
> 

All good suggestions.

> SSH keys are useful, but you have to keep them somewhere. The real
> danger to good passwords is the off-line attempts, and the passphrase
> you use for your private keystore is potentially subject to off-line
> if your password is.
> 

Yes, keys may actually be less secure than passwords.

Jerry


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/54b08c3d.4090...@gmail.com



Re: Have I been hacked?

2015-01-09 Thread Joel Rees
On Fri, Jan 9, 2015 at 6:25 PM, Martin Steigerwald  wrote:
> Am Freitag, 9. Januar 2015, 00:24:06 schrieb Brian:
>> On Thu 08 Jan 2015 at 22:36:46 +0100, Martin Steigerwald wrote:
>> > Am Donnerstag, 8. Januar 2015, 14:20:27 schrieb Jerry Stuckle:
>> > > Just ensure you're using good security practices - don't allow root
>> > > login, use long, random passwords, etc.  I also use a random character
>> > > strings for the login ids, as well as passwords  - just one more thing
>> > > for the hackers to have to figure out how to get around.
>> >
>> > Only allow SSH key based logins. Of course, only after you copied a public
>> > key onto the machine with ssh-copy-id.
>> >
>> > And have SSH keys with *strong* passphrases, to protect against someone
>> > stealing your key. Use ssh-agent wisely only on trusted machines.
>>
>> SSH password logins are just as safe. 20 characters gives a strong
>> password for use on trusted machines. There is no need to worry about
>> it being stolen because it is in your memory,
>
> I think SSH keys are safer, cause there is no password at all that can be
> brute forced.

What do you mean by that?

> Okay, one can try to guess the key, but try that with a 4096 bit
> key.

Hmm.

10 characters, 6 to 7 bits per character, that's 60 bits.

If the bits are truly random, straight brute-force will take, on
average, half of 2^60 attempts.

We can hold the integer 2^59 in a C variable on most recent desktops,
but if we have bc (dc if you like post-fix), we can do this on even 32
bit CPUs:

576460752303423488 (base ten)

At one milion attempts per second, that's 5764607523034 seconds, or
182678 CPU-years.

There's no way that's going to happen on-line, if the password is
truly random, and not randomly a password that's a quick permutation
of common memes or of entries in rainbow tables.

I currently use sixteen or more letters in my passwords, don't use
simple permutations or common phrases (as for the first leter trick),
use disconnected words from multiple languages. Or use 16 character
true random passwords for the important stuff.

SSH keys are useful, but you have to keep them somewhere. The real
danger to good passwords is the off-line attempts, and the passphrase
you use for your private keystore is potentially subject to off-line
if your password is.

> Anyway, I will unsubscribe now.
>
> Staying on this list has not been beneficial for me.
>
> The amount of traffic on this list, that is not related to Debian or is
> bickering like this is soo high that I find it too time consuming to find out
> the rare gems of threads where I can still learn something new about Debian or
> that I enjoy in engaging and replying to.
>
> Don´t bother to answer. I will likely delete it.
>
> Ciao,
> --
> Martin 'Helios' Steigerwald - http://www.Lichtvoll.de
> GPG: 03B0 0D6C 0040 0710 4AFA  B82F 991B EAAC A599 84C7

-- 
Joel Rees

Freedom costs in software, too.
How much, and what,
are you willing to pay for your freedom?


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/caar43imglrutsiitri17xotaz0qvwip5eymc1z-q+vsd_ss...@mail.gmail.com



Tip: Search Command Line Commands w/First Letters And Tab

2015-01-09 Thread Cindy-Sue Causey
On 5/2/14, Ralf Mardorf  wrote:
>
> Ok, if I don't remember the complete command name and I like to use the
> tab key to show me a list of available commands (r typing the complete
> command name is to much work, then I first type the first characters
> without sudo, push the tab key and after that I add sudo.
>
> [rocketmouse@archlinux ~]$ ch
> chacl chattrcheckdotdin   checkupdates  chfn
> chmod chpasswordchrt
> chage chcon checkgid  checkXML  chgpasswd
> chmorph   chromedriver  chsh
> charmap   chcp  check_hd  cheesechgrp
> chown chromium  chuser
> chat  chcpu check-regexp  chem  chktex
> chpasswd  chrootchvt
> [rocketmouse@archlinux ~]$ sudo ch



Am in my inbox digging around and came across this older post. Seemed
like a useful memory aid oriented tip to highlight. I just tried it,
and it works great in GNOME Terminal. I tried three letters, too. I
tried "deb" and received just "debconf" back at first for some reason.
For kicks and giggles since only one command came back, I hit the tab
key a couple more times again and ended up receiving a list of all
commands that begin with "debconf".

Very cool. My thoughts are always that maybe someone else doesn't know
it exists, and maybe they know of just the right wish list where this
feature or a tweak of it would be perfect for the next upgrade of
something else Debian out there. :)

Cindy :)

-- 
Cindy-Sue Causey
Talking Rock, Pickens County, Georgia, USA

* runs with plastic sporks *


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/CAO1P-kBf7mjVRi0u6cLv09XBQCycOEb=pjhdndn2lrcn3uf...@mail.gmail.com



Re: Have I been hacked?

2015-01-09 Thread Joel Rees
2015/01/09 23:46 "Danny" :
>
> >
> > You have completely failed to understand what fail2ban is telling you.
> >
> > > Anyway, I have decided to get new hardware and do a clean install of 
> > > everything
> > > ... as many of you have suggested ...
> >
> > It was heading that way so it is probably best for you.
> >
>
> You sound like a heartless Seargeant Major in the Marines ... ;) ...

I'm afraid you're going to like my comments here even less.

> > > However, as I fly a lot internationally, is there a way I can temporarily 
> > > block
> > > these country's IP's for a few days at most untill I have enough time on
> > > hand to do a fresh install ...
> >
> > What has flying got to do with it?
> >
> What I meant was that I fly a lot and don't have time in the immediate future 
> to
> do a fresh install ... So I wanted a temporary stop-gap solution for a few 
> days
> untill time would lend itself for the task ...

Which was why I was trying to tell you to quit wasting time looking
for shortcuts and consolation and re-install. Start with new hardware
if you can possibly afford it, to be safe and to save time.

Now it looks like your server needs to be off-line for a while until
you get back.

Also, once you're back up, you need a second, someone who can at least
pull the plug while you're out, preferably someone who can also help
you review your system design and implementation. Patience, and
willingness to listen while you ramble, can be more important than
technical expertise.

--
Joel Rees

Freedom costs in software, too.
How much, and what,
are you willing to pay for your freedom?

> > > Currently my iptables looks like this ...
> >
> > If you have resorted to using iptables you have lost it. A standard
> > Debian install doesn't need it.
> >
> Yip ... definately a Seargeant Major ...


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/caar43in7jyn-dg2tb29o6kkrmjloxpzxnq9nmq7iry5q+fq...@mail.gmail.com



Re: _COMPLETE_ instructions for debootstrap &/or multistrap

2015-01-09 Thread Joel Rees
2015/01/09 6:40 "Cindy-Sue Causey" :
>
> [...]
>
> As an aside and yet really directly related, my complaints and
> observations a while back about the seeming uptick in people having
> trouble with incompatibility became more clear in the last few weeks.
> There's some what *FEELS LIKE* bad advice running around out there
> about how to bind and mount while working with chroot to complete the
> rest of a system install. Won't explain everyone's incompatibility
> issues, but it sure as heck explained mine.

Free advice is worth what you pay for it.

Bad advice is part of the price.

So is learning to weed the bad out,

> [...] If you're new to this, don't to do what I've been
> doing. Instead work that page top to bottom, and research what you
> need to in order to do it as they've outlined there. In hindsight, I
> can see the benefit of following every single step in order as it
> applies to or needs altered slightly to fit each, our own singular
> install instances.
> [...]

Inside-out is sometimes the only way in.

Which is another of the costs of free advice.

There are other costs, including such things as enduring stupid
questions, flame wars, and social engineering attempts.

(Not to Cindy-Sue as much as to the entire list.)

-- 

Joel Rees

Freedom costs in software, too.
How much and what are you willing to pay
for your freedom?


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/caar43iozgdhungbur_692oky7n0tvuyge8bfc6x2aa1wq+2...@mail.gmail.com



Re: Unable to join the Debian User Forum; appears that all IPs are being black-listed.

2015-01-09 Thread Lisi Reisz
On Friday 09 January 2015 22:35:45 Bob Proulx wrote:
> And also good editor skills of trimming out unneeded excess quoting.
> Be brutal with removing excess quotes!  Personally I would rather see
> no previous quoted material rather than bad full quoting.  Want to see
> what the message looks like to other people?  Take a look at it in the
> mailing list archive.  If it is hard for you to read then it will be
> hard for other people to read too.
>
>   https://lists.debian.org/debian-user/2015/01/msg00288.html
>
> Contrast that to this message in the archive.  I have brutally trimmed
> the quotes to just the points to which I am replying.
>
>  
> https://lists.debian.org/20150109151004514416184.noccsple...@bob.proulx.com

Most of the bad trimming in the first of these is mine.  I am very bad at 
trimming.  I over-cut or cut the wrong thing so that when I read the nessage 
back later I can't follow it - so how can anyone else.  So then I cut too 
little.  But don't blame poor Wayne who made quite a good job of my hash.

I was told always to leave enough for someone new to the list/thread to be 
able to follow what the discussion is about just by reading your posting, and 
not a scrap more.  But I am not very good at it.

Lisi


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/201501092328.46242.lisi.re...@gmail.com



Re: Unable to join the Debian User Forum; appears that all IPs are being black-listed.

2015-01-09 Thread Joris Bolsens


On 01/09/2015 07:20 AM, Wayne Hartell wrote:
> [snip]
> Yes, you're right I am using Outlook since I've signed up to this list on a
> virtual machine that is configured for taking on the road for my work. I
> haven't yet taken a look at Evolution and others e-mail clients, but I fear
> that I'll be stuck on Outlook for a little while longer, until I convince
> myself to make a permanent switch. Hopefully this is a little better in
> terms of what is expected on the list. I edited a couple of settings to try
> to improve things.

I come from windows/outlook IMO Thunderbird is a wonderful alternative
and is very easy to configure to look/feel/behave the way you want,
might want to give it a try.

-Joris



signature.asc
Description: OpenPGP digital signature


Re: Unable to join the Debian User Forum; appears that all IPs are being black-listed.

2015-01-09 Thread Bob Proulx
Hi Wayne,

Wayne Hartell wrote:
> Thanks. I'm sure to violate some conventions here in reply format or what
> have you. Just let me know if I do and I'll try to remedy in future.

I see you have already exchanged mail concerning one of those
things. :-) There are 2,000+ subscribers on this mailing list.  If you
could imagine a town hall meeting with 2,000+ physical people in the
room all with voices you can imagine how difficult it can be to keep
discussion efficient.  That is why trimming excess words is so
important.  It makes it easier for people to read and understand the
message.  If they can read and understand then you are much more
likely to receive a high quality reply in return.

> With respect to reporting the issue as a bug I started down that path using
> Reportbug, but noticed that a similar issue (not quite the same, or maybe I
> just didn't understand it fully), so I wanted to discuss it first. Thanks
> for providing that opportunity.

Please feel welcome to discuss problems such as you have found on this
mailing list.  We are mostly all simple users of the Debian system.
A few are developers.  Have some patience.  You may get answers or
help that is better or worse on different days.

> It does work in other Linux distros that I have tried.

If it works anywhere then it should be possible to learn why and/or
why not and to transfer that knowledge.

The other distro may have done something unique and special there to
make it work.  The task is then to figure this out and make it
available in Debian.

> "VLC is unable to open the MRL" (I have more detailed debug output if
> needed).
> ...
> The work around is to edit the smb:.mp3 to be
> smb://user:password@//.mp3

That makes sense to me.  With the username and password it can then
access the media.

> When I do this, it will work, but I have to do it for every file I add to
> the play list.

I understand that can be quite the pain.  :-(

> Rhythm Box appears to work just fine.

How would Rhythm Box know what your smb username and password would be?

> I'm not overly concerned about the issue which is why I wanted to discuss it
> before I submitted any official bug (that would obviously be low priority).
> I noticed Debian bug #602985 appears quite similar (it's about getting VLC
> to prompt for smb credentials), but I'm not sure if it's exactly the same.
> 
> Anyway, I appreciate you taking the time to respond to my post. This may
> seem a little trivial, but it's my first serious foray into Linux, just a
> couple of days old, and rather than run from issues I want to learn not only
> how to tackle the issues, but the processes that go along with Debian in
> general.

I don't have any knowledge of either of the two areas needed.  I don't
know about smb shares.  I don't know about vlc using remote media
through smb shares.  Sorry I can't help there.  And I don't see other
help on this issue.  (At least not yet).

I suggest that you post a new message to the mailing list.  (I will be
specific about it being a NEW message.  If you reply to any mailing
list message then your reply will be threaded below it.  Since Outlook
does not handle message threads most Outlook users don't realize that
replying to start a new message causes threading problems.  That
creates a situation known as thread stealing or thread hijacking.  To
avoid that simply start a new message every time you have a new topic.)

I suggest that you post a new message to the mailing list.  Pick a
good short concise subject.  In this case I would definitely mention
both VLC and SMB shares and password in the subject.  There is no
right answer but just to get the thought processes going I will
suggest something like:

  VLC password in SMB shares URL?

You want to attract the attention of people who are knowledgeable
about those things.  It is in your interest to choose the subject to
make it clear to those people so that they will choose to read your
message.

This current thread is not good because those people not interested in
web forums have already skipped over it.  Remember that there are
2,000+ people on the list.  Meaning that there are a lot of postings.
Not every posting will interest everyone.  At some point everyone is
going to be skipping a lot of messages.  Connecting you and them
together needs good subject lines.

And also good editor skills of trimming out unneeded excess quoting.
Be brutal with removing excess quotes!  Personally I would rather see
no previous quoted material rather than bad full quoting.  Want to see
what the message looks like to other people?  Take a look at it in the
mailing list archive.  If it is hard for you to read then it will be
hard for other people to read too.

  https://lists.debian.org/debian-user/2015/01/msg00288.html

Contrast that to this message in the archive.  I have brutally trimmed
the quotes to just the points to which I am replying.

  https://lists.debian.org/20150109151004514416184.noccsple...@bob.proulx.com

Include

Re: Have I been hacked?

2015-01-09 Thread Jerry Stuckle
On 1/9/2015 4:37 PM, Bob Holtzman wrote:
> On Fri, Jan 09, 2015 at 10:49:49AM -0500, Jerry Stuckle wrote:
> 
>snip...
>>
>> SSH passwords are very safe, if they are long enough.  For instance, if
>> you have a 10 character password, mixed case and numbers (no special
>> characters), a brute force attack of 100 attempts per second would take
>> almost 266 million years to cover all possibilities.  11 characters
>> would take over 16 billion years - longer than the life of the universe.
> 
> That's the key phrase, "to cover all possibilities" Don't forget, it's
> possible to hit pay dirt on the first try...or the 3rd...or the 20th...
> or the 500th...or the 50,000th...or the last possibility. 
> 
> I constantly hear references to mind boggling lengths of time required
> to crack passwords/phrases. I think it's misleading, especially to a
> beginner. On the other hand I have to admit I can't come up with a
> better way.
> 
>...snip..
> 

That's true.  On average it will take 1/2 as long - or about 133 million
years for a 10 character password or 8 billion years for an 11 character
password.

But that's also assuming the hacker knows how long your password is.
He/she would also have to consider all possible combinations of 1-9
character passwords.  That alone would take almost 4.36 million years
just to ensure the password wasn't shorter.

Of course, the hacker could also probably skip 1 character passwords (<
1 second), 2 character passwords (38 seconds), etc.  But even going
through all the possibilities of 9 character passwords would take around
4.29 million years (without a hit because the password is 10 characters).

Of course, *anything* can be caught on the first, second or third try.
But the odds of hitting it on the first try are over 13 quadrillion (13
followed by 15 zeros) to 1.

You have a better chance of being struck by lightning while in an
elevator 300' underground!

Jerry


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/54b0530a.4020...@gmail.com



Re: Have I been hacked?

2015-01-09 Thread John Hasler
Bob Holtzman writes:
> That's the key phrase, "to cover all possibilities" Don't forget, it's
> possible to hit pay dirt on the first try

And it's about equally likely that a burst of cosmic rays of just the
right pattern will strike your computer so as to reconfigure it to allow
passwordless root logins via telnet.
-- 
John Hasler 
jhas...@newsguy.com
Elmwood, WI USA


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/87vbkfha85@thumper.dhh.gt.org



Re: test VMs

2015-01-09 Thread Bob Proulx
Bonno Bloksma wrote:
> I was thinking I could run something which Debian Install runs too
> but then later realized that probably depends on files like ssh keys
> not being present yet and only creating new keys when that is the
> case.

There isn't anything that runs later that does this in the
debian-installer.  Things are built up from nothing in place with the
settings as given by the user.

> > A very basic list of things that need to be changed are:
> 
> Thanks, that is enough for now. Just going to install a machine with
> only the system tools installed, need to do some basic routing /
> firewall testing.

I think you will do fine then.

Note that there are often some lingering places where a previous
hostname persists.  Mostly those are harmless.  But they do persist.
Therefore picking a neutral hostname for the initial installation that
won't do any harm later is good.  Such as "localhost" is typical.  But
otherwise something else innocuous is good too.

For example the mdadm tool encodes the system name into arrays
constructed by the debian-installer.

  mdadm --examine /dev/sda1

Bob


signature.asc
Description: Digital signature


Re: How can g++ (stable) be incompatible with a fresh stable install?

2015-01-09 Thread The Wanderer
On 01/09/2015 at 03:57 PM, Sven Hartge wrote:

> Kynn Jones  wrote:
> 
>> On Thu, Jan 8, 2015 at 7:18 PM, Sven Hartge 
>> wrote:
>> 
>>> Kynn Jones  wrote:

>>> Your priorities for the different versions seem off. Security
>>> should have to same priority as stable, not a higher one.
>>> 
>>> And security should not need a higher priority, because security
>>> updates (not already included via point-release) will always have
>>> a higher version than the non-security package from the normal
>>> repository.
> 
>> OK, I thought I understood what was going on, but it turns out
>> that I'm more baffled than ever.  (E.g. I don't understand why I'm
>> given the *option* of setting a priority for security when in fact,
>> if I understand you correctly, there's only one sensible setting
>> for it, namely "identical to stable"...)
> 
> The option exists because there might be a use case for someone 
> somewhere. Just because an option is useless for you does not mean it
> is useless for everybody.

(See also "root should be able to shoot itself in the foot".)

Also because the stable security updates repository is, in terms of
technical implementation, exactly like any other package repository. In
particular, it uses the same infrastructure - including tools which have
support for repository priorities built in, and have no way of knowing
that this particular repository is in any way special.

It's possible (and often desirable) to set a separate priority for an
ordinary package repository, and because the security-updates repository
uses the same infrastructure, it's necessarily possible (although rarely
desirable) to set one for the security-updates repository as well.

-- 
   The Wanderer

The reasonable man adapts himself to the world; the unreasonable one
persists in trying to adapt the world to himself. Therefore all
progress depends on the unreasonable man. -- George Bernard Shaw



signature.asc
Description: OpenPGP digital signature


Re: help in purging old packages

2015-01-09 Thread Gary Dale

On 09/01/15 11:23 AM, Comer Duncan wrote:

Hi,

I have a situation in which I am running wheezy 7.7 and for various 
reasons now want to purge all packages which for some reason are still 
present from etch, lenny, and squeeze.  What I would like to know is 
how can I purge all such packages using dpkg?  I can not seem to find 
how to select just those old packages for purging. Can those who know 
about this please help?


Thanks.


Check out aptitude autoclean and aptitude clean. Or you can install 
deborphan.



--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Archive: https://lists.debian.org/54b04b87.1020...@torfree.net



Re: Have I been hacked?

2015-01-09 Thread Bob Holtzman
On Fri, Jan 09, 2015 at 10:49:49AM -0500, Jerry Stuckle wrote:

   snip...
> 
> SSH passwords are very safe, if they are long enough.  For instance, if
> you have a 10 character password, mixed case and numbers (no special
> characters), a brute force attack of 100 attempts per second would take
> almost 266 million years to cover all possibilities.  11 characters
> would take over 16 billion years - longer than the life of the universe.

That's the key phrase, "to cover all possibilities" Don't forget, it's
possible to hit pay dirt on the first try...or the 3rd...or the 20th...
or the 500th...or the 50,000th...or the last possibility. 

I constantly hear references to mind boggling lengths of time required
to crack passwords/phrases. I think it's misleading, especially to a
beginner. On the other hand I have to admit I can't come up with a
better way.

   ...snip..

-- 
Bob Holtzman
Giant intergalactic brain-sucking hyperbacteria 
came to Earth to rape our women and create a race 
of mindless zombies.  Look!  It's working!


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150109213704.ga32...@cox.net



Re: How can g++ (stable) be incompatible with a fresh stable install?

2015-01-09 Thread Sven Hartge
Kynn Jones  wrote:
> On Thu, Jan 8, 2015 at 7:18 PM, Sven Hartge  wrote:
>> Kynn Jones  wrote:

>>> libc6-dev:
>>>   Installed: (none)
>>>   Candidate: 2.13-38+deb7u4
>>>   Version table:
>>>  2.19-13 0
>>> 750 http://debian.csail.mit.edu/debian/ testing/main amd64 
>>> Packages
>>> 750 http://ftp.us.debian.org/debian/ testing/main amd64 Packages
>>>  50 http://debian.csail.mit.edu/debian/ unstable/main amd64 
>>> Packages
>>>  50 http://ftp.us.debian.org/debian/ unstable/main amd64 
>>> Packages
>>>  2.13-38+deb7u6 0
>>> 995 http://debian.csail.mit.edu/debian/ stable/main amd64 
>>> Packages
>>> 995 http://ftp.us.debian.org/debian/ stable/main amd64 Packages
>>>  2.13-38+deb7u4 0
>>>1000 http://security.debian.org/ stable/updates/main amd64 
>>> Packages
>>
>> Your priorities for the different versions seem off. Security should
>> have to same priority as stable, not a higher one.
>>
>> And security should not need a higher priority, because security updates
>> (not already included via point-release) will always have a higher
>> version than the non-security package from the normal repository.

> OK, I thought I understood what was going on, but it turns out that
> I'm more baffled than ever.  (E.g. I don't understand why I'm given
> the *option* of setting a priority for security when in fact, if I
> understand you correctly, there's only one sensible setting for it,
> namely "identical to stable"...)

The option exists because there might be a use case for someone
somewhere. Just because an option is useless for you does not mean it is
useless for everybody.

>> Please post the content of /etc/apt/preferences and any file in
>> /etc/apt/preferences.d

> As I mentioned in my original post, my configs for
> /etc/apt/{sources.list,preferences}.d are based on those given here
> http://serverfault.com/a/382101.  

Ouch. Please do _not_ follow that guide. The pinnings shown there are
dangerous and wrong, as you have seen. Please remove them from your
system. Please also remove any sources.list files with testing/jessie or
unstable/sid from your configuration until you have configured the
preferences correctly.

> It may have been unwise of me to follow those recommendations, but
> they are the best (actually, the only) ones I was able to find when I
> searched for apt configuration "best practices".  (I will resume my
> search now, of course.)

It is true that the pinning feature is under-documented and a bit
"arcane" to use. This may be because the normal user never has any need
of changing them.

What do you want to accomplish? To have some packages from Testing but
the majority of the system to remain Stable?

Then just pin testing to a value between 0 and 100 to prevent an
automatic upgrade of every package to the testing version.

To do so, please delete every preferences fil from
/etc/apt/preferences.d and just put on file with the following content
inside:

Package: *
Pin: release n=jessie
Pin-Priority: 50

You then can reenable any apt-sources for jessie.

This has the following effects:

a) All packages from Stable will automatically get a prio of 500
b) All packages from Jessie will get a prio of 50

Packages with a priorioty lower than 100 will never be installed unless
1) a dependency requests this or 2) the admin tells apt-get to do so.

To install a package, you then use "apt-get -t jessie install package".

Grüße,
Sven.

-- 
Sigmentation fault. Core dumped.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/6b9s301ba...@mids.svenhartge.de



Re: Have I been hacked?

2015-01-09 Thread Ric Moore

On 01/09/2015 11:29 AM, Danny wrote:
 I am an Aircraft Engineer by trade not a Computer

Scientist


Have you considered that alone would make you a tasty bit to hack, and 
for that reason, if you have anything tasty on your machine, you REALLY 
need to clear it up soonest with a complete re-install. I'd add a 
measure of panic to that level of concern. No need for the black hats to 
have access at all. :) Ric




--
My father, Victor Moore (Vic) used to say:
"There are two Great Sins in the world...
..the Sin of Ignorance, and the Sin of Stupidity.
Only the former may be overcome." R.I.P. Dad.
Linux user# 44256


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Archive: https://lists.debian.org/54b021fc.6080...@gmail.com



Re: Have I been hacked?

2015-01-09 Thread Brian
On Fri 09 Jan 2015 at 16:19:39 +, Eduardo M KALINOWSKI wrote:

> On Sex, 09 Jan 2015, Jerry Stuckle wrote:
> >SSH passwords are very safe, if they are long enough.  For instance, if
> >you have a 10 character password, mixed case and numbers (no special
> >characters), a brute force attack of 100 attempts per second would take
> >almost 266 million years to cover all possibilities.  11 characters
> >would take over 16 billion years - longer than the life of the universe.
> 
> If the characters are random, that is.
> 
> The problem is that passwords are often not really random. So even
> seemingly secure passwords may be guessed relatively easy. This
> article gives a good overwiew about this topic:
> http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/

Please note that this excellent article describes off-line cracking. The
number of attempts per second is limited only by the machinery at hand.
The 100 attempts per second for on-line cracking isn't something which
can be increased to the same level. Jerry's argument still holds up.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/09012015175110.acd723095...@desktop.copernicus.demon.co.uk



Re: How can g++ (stable) be incompatible with a fresh stable install?

2015-01-09 Thread Kynn Jones
On Thu, Jan 8, 2015 at 7:18 PM, Sven Hartge  wrote:
> Kynn Jones  wrote:
>
>> libc6-dev:
>>   Installed: (none)
>>   Candidate: 2.13-38+deb7u4
>>   Version table:
>>  2.19-13 0
>> 750 http://debian.csail.mit.edu/debian/ testing/main amd64 
>> Packages
>> 750 http://ftp.us.debian.org/debian/ testing/main amd64 Packages
>>  50 http://debian.csail.mit.edu/debian/ unstable/main amd64 
>> Packages
>>  50 http://ftp.us.debian.org/debian/ unstable/main amd64 Packages
>>  2.13-38+deb7u6 0
>> 995 http://debian.csail.mit.edu/debian/ stable/main amd64 
>> Packages
>> 995 http://ftp.us.debian.org/debian/ stable/main amd64 Packages
>>  2.13-38+deb7u4 0
>>1000 http://security.debian.org/ stable/updates/main amd64 
>> Packages
>
> Your priorities for the different versions seem off. Security should
> have to same priority as stable, not a higher one.
>
> And security should not need a higher priority, because security updates
> (not already included via point-release) will always have a higher
> version than the non-security package from the normal repository.

OK, I thought I understood what was going on, but it turns out that
I'm more baffled than ever.  (E.g. I don't understand why I'm given
the *option* of setting a priority for security when in fact, if I
understand you correctly, there's only one sensible setting for it,
namely "identical to stable"...)

> Please post the content of /etc/apt/preferences and any file in
> /etc/apt/preferences.d

As I mentioned in my original post, my configs for
/etc/apt/{sources.list,preferences}.d are based on those given here
http://serverfault.com/a/382101.  It may have been unwise of me to
follow those recommendations, but they are the best (actually, the
only) ones I was able to find when I searched for apt configuration
"best practices".  (I will resume my search now, of course.)

As far as /etc/apt/preferences.d goes, my configs are exactly as
suggested in that post.  Specifically:

(no /etc/apt/preferences file)

==> /etc/apt/preferences.d/security.pref <==
Package: *
Pin: release l=Debian-Security
Pin-Priority: 1000

==> /etc/apt/preferences.d/stable.pref <==
Package: *
Pin: release a=stable
Pin-Priority: 995

==> /etc/apt/preferences.d/testing.pref <==
Package: *
Pin: release a=testing
Pin-Priority: 750

==> /etc/apt/preferences.d/unstable.pref <==
Package: *
Pin: release a=unstable
Pin-Priority: 50

==> /etc/apt/preferences.d/experimental.pref <==
Package: *
Pin: release a=experimental
Pin-Priority: 1



Thank you for your comments.  I much appreciate them.

kj


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/CAFvQaj4o0pYUHzJB87nwUQD=8orhHH3X5D=biwgGsQrRrE=r...@mail.gmail.com



Re: Have I been hacked?

2015-01-09 Thread Brian
On Fri 09 Jan 2015 at 10:41:02 -0500, Jerry Stuckle wrote:

> On 1/8/2015 3:02 PM, Brian wrote:
> > 
> > If you have resorted to using iptables you have lost it. A standard
> > Debian install doesn't need it.
> 
> I disagree.  iptables is a great tool for blocking unwanted connections.
> 
> What do you have against it?

I have nothing against it and, in fact, agree with you. I'll enlarge on
my sketchy remarks.

The OP installs Debian with (say) Gnome. There are no listening services
so there is no need to block any connections. If it happened that sshd
was installed at the same time (or later) the use of ssh keys or a very
strong password for authentication is sufficient to protect the service.

However, there can be a big annoyance factor when attempts to log on the
server take place. Software like fail2ban (which uses iptables) can be
some comfort here and will at least reduce the noise in auth.log. Last
year this machine saw about 4000 such random connections. I don't know
how typical that is but none of them caused me to lose any sleep.

Iptables can do a great job blocking unwanted connections. If someone
wants to use it as a way of obtaining peace of mind, that's fine. But
it doesn't add one iota of security to a well-set-up and well-managed
sshd.

With more services running the need is to understand their different
security needs. Substituting the use of iptables for understanding isn't
(IMO) something that needs to be top of the list.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150109175103.ga15...@copernicus.demon.co.uk



Re: help in purging old packages

2015-01-09 Thread Hans

> If you want to purge all packages which have been uninstalled but for
> which configuration remains: aptitude purge ?config-files
> 
> If you want to purge all packages which are installed but which no
> longer have a candidate in debian: aptitude purge ?obsolete
> 
> If you want to purge all packages which are installed and installable,
> but where the version is the same as in an earlier release... that's
> probably going to need some scripting :)
> 

Also a good way:
Install package deborphan, then run
aptitude purge `deborphan --guess-all`.

Be carefull, what it wants do deinstall. However, I am using it regularly and 
it did not deinstall accidently a package, I did not want to be deinstalled.
Ok, might be, I was lucky. If it does, I would just reinstall it.

I suggest, just to take a look and then decide for yourself.

Best regards

Hans 


signature.asc
Description: This is a digitally signed message part.


Re: Have I been hacked?

2015-01-09 Thread Jerry Stuckle
On 1/9/2015 11:19 AM, Eduardo M KALINOWSKI wrote:
> On Sex, 09 Jan 2015, Jerry Stuckle wrote:
>> SSH passwords are very safe, if they are long enough.  For instance, if
>> you have a 10 character password, mixed case and numbers (no special
>> characters), a brute force attack of 100 attempts per second would take
>> almost 266 million years to cover all possibilities.  11 characters
>> would take over 16 billion years - longer than the life of the universe.
> 
> If the characters are random, that is.
>

That's just good security practice.

> The problem is that passwords are often not really random. So even
> seemingly secure passwords may be guessed relatively easy. This article
> gives a good overwiew about this topic:
> http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/
> 
> 

If you don't follow good security practices, it's your own fault if you
get hacked.

Jerry


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/54b00528.2040...@gmail.com



Re: help in purging old packages

2015-01-09 Thread Darac Marjal
On Fri, Jan 09, 2015 at 11:23:17AM -0500, Comer Duncan wrote:
>Hi,
> 
>I have a situation in which I am running wheezy 7.7 and for various
>reasons now want to purge all packages which for some reason are still
>present from etch, lenny, and squeeze.  What I would like to know is how
>can I purge all such packages using dpkg?  I can not seem to find how to
>select just those old packages for purging. Can those who know about this
>please help?

If you want to purge all packages which have been uninstalled but for
which configuration remains: aptitude purge ?config-files

If you want to purge all packages which are installed but which no
longer have a candidate in debian: aptitude purge ?obsolete

If you want to purge all packages which are installed and installable,
but where the version is the same as in an earlier release... that's
probably going to need some scripting :)

> 
>Thanks.


signature.asc
Description: Digital signature


help in purging old packages

2015-01-09 Thread Comer Duncan
Hi,

I have a situation in which I am running wheezy 7.7 and for various reasons
now want to purge all packages which for some reason are still present from
etch, lenny, and squeeze.  What I would like to know is how can I purge all
such packages using dpkg?  I can not seem to find how to select just those
old packages for purging. Can those who know about this please help?

Thanks.


Re: Have I been hacked?

2015-01-09 Thread Eduardo M KALINOWSKI

On Sex, 09 Jan 2015, Jerry Stuckle wrote:

SSH passwords are very safe, if they are long enough.  For instance, if
you have a 10 character password, mixed case and numbers (no special
characters), a brute force attack of 100 attempts per second would take
almost 266 million years to cover all possibilities.  11 characters
would take over 16 billion years - longer than the life of the universe.


If the characters are random, that is.

The problem is that passwords are often not really random. So even  
seemingly secure passwords may be guessed relatively easy. This  
article gives a good overwiew about this topic:

http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/


--
Eduardo M KALINOWSKI
edua...@kalinowski.com.br



--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Archive: 
https://lists.debian.org/20150109161939.horde.0abxbzwnoqt8_zsbyxhd...@mail.kalinowski.com.br



Re: Have I been hacked?

2015-01-09 Thread Jerry Stuckle
On 1/9/2015 11:29 AM, Danny wrote:
>> If you want to inspect further, I would suggest you look at each of the
>> jobs being run.  See if they are what you expect them to be.  Also check
>> your /etc/crontab and /etc/anacrontab to see what is in them.
> 
> I would love to investigate further but I am afraid I am not inclined towards
> forensics ... lol ... I am an Aircraft Engineer by trade not a Computer
> Scientist ... :) ... I played around with sleuthkit but that confused the 
> living
> hell out of me ... lol ... I don't even know what to look for ... The server I
> have is a small community/family server that gives wireless access to poor
> families ... 
> 
>>
>> As for the attacks - I've seen a big uptake in the attacks over the last
>> couple of weeks.  The worst I've seen is > 100 IP's locked out in one 24
>> hour period.  They are coming from all over the world, although since
>> there are a lot of proxies (many of them from trojans/viruses installed
>> on unsuspecting machines), there's no easy way to tell what the real
>> origins are.
> 
> It's astonishing how quick they can find an IP ...
> 
>> I have permanently blocked the IP ranges of some of the worst offenders,
>> but the only real way to stop it is to take your machine off the
>> internet completely.
>>
>> Just ensure you're using good security practices - don't allow root
>> login, use long, random passwords, etc.  I also use a random character
>> strings for the login ids, as well as passwords  - just one more thing
>> for the hackers to have to figure out how to get around.
> 
> That's the problem right there ... random passwords ... lol ... but I will 
> have
> to adapt ...
> 
> Thank You
> 
> 

Yes, randomizing your passwords is important - as is not using the same
password on multiple systems.  One trick I use is to take a long phrase
and use the first (or second or third...) letter of each word.  Then
capitalize certain characters.  For instance, if you used "To be or not
to be, that is the question".  Your password could be something like
2bOn2BtiTq (capitalizing every 3rd character).

It's a lot easier to remember a phrase than a bunch of random characters.

Jerry


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/54aff9e5.1020...@gmail.com



Re: Have I been hacked?

2015-01-09 Thread Jerry Stuckle
On 1/9/2015 4:25 AM, Martin Steigerwald wrote:
> Am Freitag, 9. Januar 2015, 00:24:06 schrieb Brian:
>> On Thu 08 Jan 2015 at 22:36:46 +0100, Martin Steigerwald wrote:
>>> Am Donnerstag, 8. Januar 2015, 14:20:27 schrieb Jerry Stuckle:
 Just ensure you're using good security practices - don't allow root
 login, use long, random passwords, etc.  I also use a random character
 strings for the login ids, as well as passwords  - just one more thing
 for the hackers to have to figure out how to get around.
>>>
>>> Only allow SSH key based logins. Of course, only after you copied a public
>>> key onto the machine with ssh-copy-id.
>>>
>>> And have SSH keys with *strong* passphrases, to protect against someone
>>> stealing your key. Use ssh-agent wisely only on trusted machines.
>>
>> SSH password logins are just as safe. 20 characters gives a strong
>> password for use on trusted machines. There is no need to worry about
>> it being stolen because it is in your memory,
> 
> I think SSH keys are safer, cause there is no password at all that can be 
> brute forced. Okay, one can try to guess the key, but try that with a 4096 
> bit 
> key.
>

SSH passwords are very safe, if they are long enough.  For instance, if
you have a 10 character password, mixed case and numbers (no special
characters), a brute force attack of 100 attempts per second would take
almost 266 million years to cover all possibilities.  11 characters
would take over 16 billion years - longer than the life of the universe.

The biggest disadvantage of using keys is it limits the machines you can
access the server from.  That's not good if you need to access the
server and you're not near your machine.

> Anyway, I will unsubscribe now.
> 
> Staying on this list has not been beneficial for me.
> 
> The amount of traffic on this list, that is not related to Debian or is 
> bickering like this is soo high that I find it too time consuming to find out 
> the rare gems of threads where I can still learn something new about Debian 
> or 
> that I enjoy in engaging and replying to.
> 
> Don´t bother to answer. I will likely delete it.
> 
> Ciao,
> 

If a little off-topic discussion bothers you, then it probably is best
you unsubscribe.  Personally, I've learned a lot just from reading this
list.

Jerry


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/54aff89d.4000...@gmail.com



Re: Have I been hacked?

2015-01-09 Thread Jerry Stuckle
On 1/8/2015 3:02 PM, Brian wrote:
> 
> If you have resorted to using iptables you have lost it. A standard
> Debian install doesn't need it.
> 
> 

I disagree.  iptables is a great tool for blocking unwanted connections.

What do you have against it?

Jerry


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/54aff68e.8020...@gmail.com



Re: Are these Jessie installer images hybrid images?

2015-01-09 Thread Steve McIntyre
Lisi wrote:
>On Friday 09 January 2015 14:19:52 Steve McIntyre wrote:
>> In article <201501091406.08420.lisi.re...@gmail.com> you write:
>> >Are these Jessie installer images hybrid images?  It appears not, but I
>> >thought all Debian installer images were now.
>> >
>> >https://www.debian.org/devel/debian-installer/
>
>Thanks, Steve.  That's great.
>
>> All the bootable amd64 and i386 images are hybrid, yes. (i.e. disc 1
>> in each set and the netinst). What makes you think they're not, OOI?
>
>Purely that I could find no mention of it and it explicitly says "CD" 
>and "DVD", with no mention of anything else that I could see.  It may be my 
>sight that is at fault again!

No problem. :-)

I was just checking that we hadn't found a new bug, that's all!

-- 
Steve McIntyre, Cambridge, UK.st...@einval.com
"...In the UNIX world, people tend to interpret `non-technical user'
 as meaning someone who's only ever written one device driver." -- Daniel Pead


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1y9bzw-0004d8...@mail.einval.com



Re: Are these Jessie installer images hybrid images?

2015-01-09 Thread Lisi Reisz
On Friday 09 January 2015 14:19:52 Steve McIntyre wrote:
> In article <201501091406.08420.lisi.re...@gmail.com> you write:
> >Are these Jessie installer images hybrid images?  It appears not, but I
> >thought all Debian installer images were now.
> >
> >https://www.debian.org/devel/debian-installer/

Thanks, Steve.  That's great.

> All the bootable amd64 and i386 images are hybrid, yes. (i.e. disc 1
> in each set and the netinst). What makes you think they're not, OOI?

Purely that I could find no mention of it and it explicitly says "CD" 
and "DVD", with no mention of anything else that I could see.  It may be my 
sight that is at fault again!

Lisi.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/201501091522.21536.lisi.re...@gmail.com



RE: Unable to join the Debian User Forum; appears that all IPs are being black-listed.

2015-01-09 Thread Wayne Hartell
> Sorry, Wayne.  I have done it yet again.  Clicked "reply" in the Debian
list.
> I should have pressed "l" and replied to the list, not you personally.
> :-(
> Lisi
> 
> Hi, Wayne,
> 
> Welcome to Debian!   Good choice!  And also welcome to the list.


Thank you. So far I am liking what I see.
 

> On Friday 09 January 2015 06:07:52 Wayne Hartell wrote:
> > Thanks. I'm sure to violate some conventions here in reply format or
> > what have you. Just let me know if I do and I'll try to remedy in
future.
> 
> You have a basic underlying problem:  Your email client does not quote
> correctly.  I had a look.  You are running Outlook.  All I can say is: bad
luck!  But
> your quoting is a bit of a mess and I tried to sort it out for my reply,
but it is too
> early in the morning (I am on GMT and had a late night.).  So we all just
have to
> be patient.  Most of us have been there, done that and got the T-shirt.
There
> are lots of super Linux email clients out there.


Yes, you're right I am using Outlook since I've signed up to this list on a
virtual machine that is configured for taking on the road for my work. I
haven't yet taken a look at Evolution and others e-mail clients, but I fear
that I'll be stuck on Outlook for a little while longer, until I convince
myself to make a permanent switch. Hopefully this is a little better in
terms of what is expected on the list. I edited a couple of settings to try
to improve things.


> Once you are on a civilised email client, bottom posting, or even better,
> interleaving, is preferred.  With suitable trimming, of course. (Which I
am not
> very good at myself.)


I'm sure I'll take a while to look anything but amateur.


> > Now, the problem [snip] is that
> > when I attempt to play an mp3 file using vlc, where that mp3 file is
> > located on a password protected Windows share, vlc fails to play the
file.
> >
> > "VLC is unable to open the MRL" (I have more detailed debug output if
> > needed).
> >
> > Now, I have tried a newer version of VLC from the backports (2.1.2 I
> > think), and it did not help.
> >
> > The work around is to edit the smb:.mp3 to be
> > smb://user:password@//.mp3
> >
> > When I do this, it will work, but I have to do it for every file I add
> > to the play list.
> >
> > Rhythm Box appears to work just fine.
> [snip]
> >
> > Anyway, I appreciate you taking the time to respond to my post. This
> > may seem a little trivial,
> 
> If you use vlc frequently and it does this every time, that is not
trivial!!
> 
> I can't really be any help at all, since I don't use vlc and have no
Windows in the
> house so don't use Samba, but you only had one reply and it didn't feel
very
> welcoming.


Agreed; it's not trivial if that's what you are trying to do. Right now
listening to music is not high on my agenda; it just jumped out at me as
something that should probably work off the bat, especially when there seems
to be no other samba related issues. I may end up just logging the issue
when I am confident I understand the process and am not just wasting other
people's time.

Cheers,
Wayne.

> > but it's my first serious foray into Linux, just a couple of days old,
> > and rather than run from issues I want to learn not only how to tackle
> > the issues, but the processes that go along with Debian in general.
> 
> :-))
> 
> Lisi
> 
> > Wayne Hartell wrote:
> > > I'm a new Debian/Linux user and brand new to this mailing list.
> >
> > Welcome.
> >
> > > To that end I have been tinkering with various Linux distros and I
> > > have found a reproducible issue in Wheezy ...
> >
> > Please report it as a bug.
> >
> >   https://www.debian.org/Bugs/
> >
> > > that I wish to discuss on the Debian user Forums, but I appear to be
> > > unable to register. Every IP I try I appears to be black-listed. I
> > > even attempted using TOR and those IPs were also black-listed. The
> > > problem is I can't post to the forums to tell them I can't register.
> > > I can't find anything on Google about this
> >
> > problem.
> >
> > I for one don't like web forums.  Fortunately most of the real
> > activity takes place on the mailing lists.  You have subscribed to
> > this mailing list and so don't need any of the web forums.  Simply
discuss the
> problem here.
> >
> > > If there is a better way to report this issue please let me know.
> >
> > Please discuss your problem here.  What problem are you having?  What
> > reproducible issue have you found in Wheezy?
> >
> > Bob
> 
> 
> --
> To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact
listmas...@lists.debian.org
> Archive: https://lists.debian.org/201501091410.39304.lisi.re...@gmail.com


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/005701d02c1f$d4318d90$7c94a8b0$@ozemail.com.au



Re: Have I been hacked?

2015-01-09 Thread Danny
> 
> You have completely failed to understand what fail2ban is telling you.
> 
> > Anyway, I have decided to get new hardware and do a clean install of 
> > everything
> > ... as many of you have suggested ...
> 
> It was heading that way so it is probably best for you.
>

You sound like a heartless Seargeant Major in the Marines ... ;) ...
 
> > However, as I fly a lot internationally, is there a way I can temporarily 
> > block
> > these country's IP's for a few days at most untill I have enough time on
> > hand to do a fresh install ...
> 
> What has flying got to do with it?
>
What I meant was that I fly a lot and don't have time in the immediate future to
do a fresh install ... So I wanted a temporary stop-gap solution for a few days
untill time would lend itself for the task ...
 
> > Currently my iptables looks like this ...
> 
> If you have resorted to using iptables you have lost it. A standard
> Debian install doesn't need it.
>
Yip ... definately a Seargeant Major ... 


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150109164451.GE17386@fever.havannah.local



Re: Have I been hacked?

2015-01-09 Thread Danny
*me* < blushing
> 
> Why?
> 
> If you don't know anyone in China, don't pick up the phone. Why are
> your services responding to them?
> 
> You're not seriously telling us you're accepting user name and password
> for ssh authentication from the Internet, are you?
>

Uhm ... yes ... (looking down ashamed ...) 


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150109163909.GD17386@fever.havannah.local



Re: Have I been hacked?

2015-01-09 Thread Danny
> Blocking a country which is famous for producing chocolate and beer.
> What is the world coming to?

rofl :)


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150109163622.GC17386@fever.havannah.local



Re: Have I been hacked?

2015-01-09 Thread Danny
  So Many??
> For instance here is a list of the blocks for Belgium:
> http://www.nirsoft.net/countryip/be.html
> 
> -Joris
>
Feel sorry for iptables

;) 


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150109163429.GB17386@fever.havannah.local



Re: Have I been hacked?

2015-01-09 Thread Danny
> If you want to inspect further, I would suggest you look at each of the
> jobs being run.  See if they are what you expect them to be.  Also check
> your /etc/crontab and /etc/anacrontab to see what is in them.

I would love to investigate further but I am afraid I am not inclined towards
forensics ... lol ... I am an Aircraft Engineer by trade not a Computer
Scientist ... :) ... I played around with sleuthkit but that confused the living
hell out of me ... lol ... I don't even know what to look for ... The server I
have is a small community/family server that gives wireless access to poor
families ... 

> 
> As for the attacks - I've seen a big uptake in the attacks over the last
> couple of weeks.  The worst I've seen is > 100 IP's locked out in one 24
> hour period.  They are coming from all over the world, although since
> there are a lot of proxies (many of them from trojans/viruses installed
> on unsuspecting machines), there's no easy way to tell what the real
> origins are.

It's astonishing how quick they can find an IP ...

> I have permanently blocked the IP ranges of some of the worst offenders,
> but the only real way to stop it is to take your machine off the
> internet completely.
> 
> Just ensure you're using good security practices - don't allow root
> login, use long, random passwords, etc.  I also use a random character
> strings for the login ids, as well as passwords  - just one more thing
> for the hackers to have to figure out how to get around.

That's the problem right there ... random passwords ... lol ... but I will have
to adapt ...

Thank You


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20150109162948.GA17386@fever.havannah.local



Re: Are these Jessie installer images hybrid images?

2015-01-09 Thread Steve McIntyre
In article <201501091406.08420.lisi.re...@gmail.com> you write:
>Are these Jessie installer images hybrid images?  It appears not, but I 
>thought all Debian installer images were now.
>
>https://www.debian.org/devel/debian-installer/

All the bootable amd64 and i386 images are hybrid, yes. (i.e. disc 1
in each set and the netinst). What makes you think they're not, OOI?

-- 
Steve McIntyre, Cambridge, UK.st...@einval.com
"...In the UNIX world, people tend to interpret `non-technical user'
 as meaning someone who's only ever written one device driver." -- Daniel Pead


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1y9apo-0007vt...@mail.einval.com



Re: Unable to join the Debian User Forum; appears that all IPs are being black-listed.

2015-01-09 Thread Lisi Reisz
Sorry, Wayne.  I have done it yet again.  Clicked "reply" in the Debian list.  
I should have pressed "l" and replied to the list, not you personally.
:-(
Lisi

Hi, Wayne,

Welcome to Debian!   Good choice!  And also welcome to the list.

On Friday 09 January 2015 06:07:52 Wayne Hartell wrote:
> Thanks. I'm sure to violate some conventions here in reply format or what
> have you. Just let me know if I do and I'll try to remedy in future.

You have a basic underlying problem:  Your email client does not quote 
correctly.  I had a look.  You are running Outlook.  All I can say is: bad 
luck!  But your quoting is a bit of a mess and I tried to sort it out for my 
reply, but it is too early in the morning (I am on GMT and had a late 
night.).  So we all just have to be patient.  Most of us have been there, 
done that and got the T-shirt.  There are lots of super Linux email clients 
out there. 

Once you are on a civilised email client, bottom posting, or even better, 
interleaving, is preferred.  With suitable trimming, of course. (Which I am 
not very good at myself.)

[snip]

> Now, the problem [snip] is that
> when I attempt to play an mp3 file using vlc, where that mp3 file is
> located on a password protected Windows share, vlc fails to play the file.
>
> "VLC is unable to open the MRL" (I have more detailed debug output if
> needed).
>
> Now, I have tried a newer version of VLC from the backports (2.1.2 I
> think), and it did not help.
>
> The work around is to edit the smb:.mp3 to be
> smb://user:password@//.mp3
>
> When I do this, it will work, but I have to do it for every file I add to
> the play list.
>
> Rhythm Box appears to work just fine.
[snip]
>
> Anyway, I appreciate you taking the time to respond to my post. This may
> seem a little trivial,

If you use vlc frequently and it does this every time, that is not trivial!!

I can't really be any help at all, since I don't use vlc and have no Windows 
in the house so don't use Samba, but you only had one reply and it didn't 
feel very welcoming.

> but it's my first serious foray into Linux, just a 
> couple of days old, and rather than run from issues I want to learn not
> only how to tackle the issues, but the processes that go along with Debian
> in general.

:-))

Lisi

> Wayne Hartell wrote:
> > I'm a new Debian/Linux user and brand new to this mailing list.
>
> Welcome.
>
> > To that end I have been tinkering with various Linux distros and I
> > have found a reproducible issue in Wheezy ...
>
> Please report it as a bug.
>
>   https://www.debian.org/Bugs/
>
> > that I wish to discuss on the Debian
> > user Forums, but I appear to be unable to register. Every IP I try I
> > appears to be black-listed. I even attempted using TOR and those IPs
> > were also black-listed. The problem is I can't post to the forums to
> > tell them I can't register. I can't find anything on Google about this
>
> problem.
>
> I for one don't like web forums.  Fortunately most of the real activity
> takes place on the mailing lists.  You have subscribed to this mailing list
> and so don't need any of the web forums.  Simply discuss the problem here.
>
> > If there is a better way to report this issue please let me know.
>
> Please discuss your problem here.  What problem are you having?  What
> reproducible issue have you found in Wheezy?
>
> Bob


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/201501091410.39304.lisi.re...@gmail.com



Are these Jessie installer images hybrid images?

2015-01-09 Thread Lisi Reisz
Are these Jessie installer images hybrid images?  It appears not, but I 
thought all Debian installer images were now.

https://www.debian.org/devel/debian-installer/

Thanks,
Lisi


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/201501091406.08420.lisi.re...@gmail.com



Re: Have I been hacked?

2015-01-09 Thread Darac Marjal
On Thu, Jan 08, 2015 at 10:53:45PM +0200, Danny wrote:
> Hi guys,
> 
> My apologies for replying a little late ...

[cut]
> 
> As you can see ... I am already DROPping some of these IP's ... I just need
> something to block an ENTIRE country ...

Install xtables-addons-dkms (which will build the module for your
current kernel). You can then use instructions such as those at [1] to
set up xtables (basically, though, you use xt_geoip_dl to download the
GeoIP database and then do something akin to "iptables -A INPUT -m geoip
--src-cc CN -j DROP).



[1]: 
http://blog.jeshurun.ca/technology/block-countries-ubuntu-iptables-xtables-geoip

> 
> Thank you ... and thanks to everyone replying ... I apreciate it ...
> 
> Danny
> 
> 
> -- 
> To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
> with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
> Archive: https://lists.debian.org/20150108205345.GA4732@fever.havannah.local
> 


signature.asc
Description: Digital signature


Re: Have I been hacked?

2015-01-09 Thread Frédéric Marchal
On Thursday 08 January 2015 21:53:45, Danny wrote :
> Hi guys,
> 
> So what I did was do disable all startup scripts/servers/services and then
> enable only one at a time ... then I would reboot and wait and keep an eye
> on "/boot" (I deleted all randomly generated files, so I could see if a
> file was added or not, and it was also the only way I knew for certain
> that the culprit was active or not, hence that is how I could time it) ...
> 
> All went well untill I enabled cron ... I checked all cron jobs and they
> all "look" normal ... here is an "ls" of my cron directories ...
> 
> ###
> /etc/cron.d/
> anacron atop mrtg php5
> 
> /etc/cron.daily/
> anacron atop mrtg php5
> 
> /etc/cron.hourly/
> cron.sh sarg
> 
> /etc/cron.monthly
> 0anacron sarg
> 
> /etc/cron.weekly
> 0anacron apt-xapian-index man-db sarg
> ###

Have a look at /etc/crontab. The file contains commands to be run by cron.

The directory /var/spool/cron/crontabs also contains user's cron jobs.

If anacrontab is installed, /etc/anacrontab may contain more jobs.


> Since I killed cron at bootup everything seems fine ... network is back to
> normal ...

I don't get the transition between the above paragraph (network is normal if 
cron is killed) and the below paragraph (troubles begin when network is up). 
Do you have any evidence that cron is triggering the attack or am I misreading 
your mail?

 
> However, as soon as my network was up and running I got attacked ...
> here is an excerpt of one of the fail2ban mails ...
> 
> ###
> The IP 204.12.241.227 has just been banned by
> Fail2Ban after
> 3 attempts against ssh.
> 
> Jan  8 04:23:15 fever sshd[17406]: Connection from 204.12.241.227 port
> 38090 on 10.0.0.5 port 22 Jan  8 04:23:17 fever sshd[17406]: Invalid user
> zhangyan from 204.12.241.227 Jan  8 04:23:17 fever sshd[17406]:
> pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh
> ruser= rhost=204.12.241.227 Jan  8 04:23:20 fever sshd[17406]: Failed
> password for invalid user zhangyan from 204.12.241.227 port 38090 ssh2 Jan
>  8 04:23:20 fever sshd[17406]: Received disconnect from 204.12.241.227:
> 11: Bye Bye [preauth] Jan  8 04:23:20 fever sshd[17408]: Connection from
> 204.12.241.227 port 39800 on 10.0.0.5 port 22 Jan  8 04:23:22 fever
> sshd[17408]: Invalid user dff from 204.12.241.227 Jan  8 04:23:23 fever
> sshd[17408]: pam_unix(sshd:auth): authentication failure; logname= uid=0
> euid=0 tty=ssh ruser= rhost=204.12.241.227 Jan  8 04:23:24 fever
> sshd[17408]: Failed password for invalid user dff from 204.12.241.227 port
> 39800 ssh2
> ##

The mail is sent because someone is brute force attacking your ssh server.

Not starting fail2ban or your mail server would suppress those mails but not 
the attack. Turning off ssh or the network would stop the attack though :-)

If your line of reasoning is to correlate the mail arrival with starting cron, 
then maybe cron is the last link required to make the fail2ban alert 
functional.

 
> What is interesting to me is the user in the above excerpt "zhangyan" ...
> By using a username that is unfamiliar to the western world tells me that
> whatever is on my system had to respond to this username otherwise why
> would this guy use a username that only he is familiar with ... Other
> usernames that were used: 3D, ssht and ftfl ... Also, attempts were made
> from China, Hong Kong, Belgium and Canada ...

You cannot tell something is responding to that user name on your system based 
only on that fail2ban alert. On the contrary, the mail means fail2ban 
successfully thwarted that particular attempt.

Attackers can't know what names are valid login names unless they can find one 
by hacking into a legitimate user's computer or a user posted its login on the 
net.

What hackers do instead, is to try a long list of possible login names 
collected on servers they have hacked in the past. That's the reason this 
particular bot was trying to login with the "zhangyan" user name.

There is nothing to worry about unless you receive alerts about a valid login 
name.


 
> Currently my iptables looks like this ...
> 
> ###
> 
> -A INPUT -p tcp -s 122.0.0.0/8 -j DROP
> -A INPUT -p tcp -s 61.0.0.0/8 -j DROP
> -A INPUT -p tcp -s 117.0.0.0/8 -j DROP
> -A INPUT -p tcp -s 103.0.0.0/8 -j DROP
> -A INPUT -p tcp -s 82.0.0.0/8 -j DROP
> -A INPUT -p tcp -s 204.0.0.0/8 -j DROP
> -A INPUT -p tcp -s 218.0.0.0/8 -j DROP
> ###
> 
> As you can see ... I am already DROPping some of these IP's ... I just need
> something to block an ENTIRE country ...

You can't ban an enti

Re: Have I been hacked?

2015-01-09 Thread Martin Steigerwald
Am Freitag, 9. Januar 2015, 00:24:06 schrieb Brian:
> On Thu 08 Jan 2015 at 22:36:46 +0100, Martin Steigerwald wrote:
> > Am Donnerstag, 8. Januar 2015, 14:20:27 schrieb Jerry Stuckle:
> > > Just ensure you're using good security practices - don't allow root
> > > login, use long, random passwords, etc.  I also use a random character
> > > strings for the login ids, as well as passwords  - just one more thing
> > > for the hackers to have to figure out how to get around.
> > 
> > Only allow SSH key based logins. Of course, only after you copied a public
> > key onto the machine with ssh-copy-id.
> > 
> > And have SSH keys with *strong* passphrases, to protect against someone
> > stealing your key. Use ssh-agent wisely only on trusted machines.
> 
> SSH password logins are just as safe. 20 characters gives a strong
> password for use on trusted machines. There is no need to worry about
> it being stolen because it is in your memory,

I think SSH keys are safer, cause there is no password at all that can be 
brute forced. Okay, one can try to guess the key, but try that with a 4096 bit 
key.

Anyway, I will unsubscribe now.

Staying on this list has not been beneficial for me.

The amount of traffic on this list, that is not related to Debian or is 
bickering like this is soo high that I find it too time consuming to find out 
the rare gems of threads where I can still learn something new about Debian or 
that I enjoy in engaging and replying to.

Don´t bother to answer. I will likely delete it.

Ciao,
-- 
Martin 'Helios' Steigerwald - http://www.Lichtvoll.de
GPG: 03B0 0D6C 0040 0710 4AFA  B82F 991B EAAC A599 84C7


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/3714920.DLpo8KHxcl@merkaba