On Thu, Mar 13, 2003 at 12:09:17PM -0500, Burton Windle wrote:
dpkg?
dpkg -i filename.deb
Not even close. For instance:
PKGLIST=modutils- another+ another2+
apt-get -y install $PKGLIST
will fail. If you you do it at the lower level:
PKGLIST1=modutils
also sprach Adrian 'Dagurashibanipal' von Bidder [EMAIL PROTECTED] [2003.03.15.0135
+0100]:
Hmmm. As long as you have specific protocols, you could always parse the
server logs. ftp and http should be no problem, most daemons write a
sensible log, I guess. Others (especially IMAP) I don't
Hello,
I have done again my chroot environment for ssh cleanest. I have had the same
error than before so i look after problem in my /etc/passwd and /etc/group
files.
I have modified this files :
# /etc/passwd
sshd:x:100:65534::/var/run/sshd:/bin/false
me:x:101:100:,,,:/home/me/./:/bin/bash
dpkg?
dpkg -i filename.deb
Not even close. For instance:
You may want to look at anna and udpkg, maybe.
regards,
junichi
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
unsubscribe
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Note that you must also prevent raw disk access by the superuser as
well.
If I were securing a system, I think I'd opt for offline storage of logs
(line printer, serial line, WORM/CDR driver, write-only network logging
to a secure machine.)
Trying to protect the local system from the superuser
On Thu, Mar 13, 2003 at 12:09:17PM -0500, Burton Windle wrote:
dpkg?
dpkg -i filename.deb
Not even close. For instance:
PKGLIST=modutils- another+ another2+
apt-get -y install $PKGLIST
will fail. If you you do it at the lower level:
PKGLIST1=modutils
also sprach Adrian 'Dagurashibanipal' von Bidder [EMAIL PROTECTED]
[2003.03.15.0135 +0100]:
Hmmm. As long as you have specific protocols, you could always parse the
server logs. ftp and http should be no problem, most daemons write a
sensible log, I guess. Others (especially IMAP) I don't
Hello,
I have done again my chroot environment for ssh cleanest. I have had the same
error than before so i look after problem in my /etc/passwd and /etc/group
files.
I have modified this files :
# /etc/passwd
sshd:x:100:65534::/var/run/sshd:/bin/false
me:x:101:100:,,,:/home/me/./:/bin/bash
dpkg?
dpkg -i filename.deb
Not even close. For instance:
You may want to look at anna and udpkg, maybe.
regards,
junichi
unsubscribe
Note that you must also prevent raw disk access by the superuser as
well.
If I were securing a system, I think I'd opt for offline storage of logs
(line printer, serial line, WORM/CDR driver, write-only network logging
to a secure machine.)
Trying to protect the local system from the superuser
12 matches
Mail list logo