On 1/9/21 9:48 AM, Christoph Pflügler wrote:
On 08.01.21 23:40, Michael Stone wrote:
On Fri, Jan 08, 2021 at 10:48:30PM +0100, Christoph Pflügler wrote:
On 08.01.21 22:34, Michael Stone wrote:
On Fri, Jan 08, 2021 at 09:12:53PM +0100, Christoph Pflügler wrote:
Installing package
Imagemagick sucks... thanks for looking into this!
> On Aug 25, 2016, at 1:53 PM, Moritz Muehlenhoff wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> - -
> Debian Security Advisory DSA-3652-1
Oooo
On 21 Apr 2016 11:53 pm, "Notice" <s...@debian.org> wrote:
> Smile James The Address jamesdor...@gmail.com has been Selected We're
> giving our customers a 500 Morrison's Voucher Gift FeelingLucky?
&
Hi Michael, I have literally been trying to unsubscribe from this list for
years. Sending unsubscribe to debian-security-requ...@lists.debian.org
returns me an email saying that my email address isn't in the list, and yet
here we are. I continue to receive these emails. Can you please fix
whatever
Why am I still receiving these emails? I unsubscribed.
On Mar 1, 2016 10:28 AM, "Salvatore Bonaccorso" wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> - -
> Debian Security Advisory
Please stop sending me these emails.
On Jan 19, 2016 7:40 AM, "Salvatore Bonaccorso" wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> - -
> Debian Security Advisory DSA-3448-1
Olsen <
debian-secur...@stderr.dk> wrote:
> On Tue, 19 Jan 2016, James Barrett wrote:
>
>> It has been requested that the following address:
>>
>>xuc...@gmail.com
>>
>> should be deleted from the debian-security mailing list.
>>
>>
-
--
To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact
listmas...@lists.debian.org
Archive:
https://lists.debian.org/55c5d759.0986c20a.f35c5.c...@mx.google.com
--
James Perkins ja...@loowit.net KN1X
developers -- any
interesting/novel application of Linux security or research is welcome.
We're also looking for round-table discussion topics, and people to lead
those discussions.
Get your proposals in soon!
- James
--
James Morris
jmor...@namei.org
--
To UNSUBSCRIBE, email to debian-security
UNSUBSCRIBE
On Wed, May 20, 2015 at 5:37 AM, David Prévot da...@tilapin.org wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3265-1 secur...@debian.org
Sheeps!
On 5 Dec 2011, at 19:28, Florian Weimer f...@deneb.enyo.de wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2358-1 secur...@debian.org
On Mon, 13 Dec 2010, Chris Wadge wrote:
Well, you have my apologies, for whatever that's worth. I hate seeing
exchanges like this. In the time it takes to tell somebody to Google it,
one could have simply replied with the correct answer. It's also worth noting
that while search engines
Unsubscribe
On 7/4/10, th...@loeki.tv th...@loeki.tv wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-2059-2 secur...@debian.org
http://www.debian.org/security/
Sorry for the top post.
Can beat Oskar Andreasson's IPTables Tutorial
http://iptables-tutorial.frozentux.net/
Jim
Pierre Chifflier wrote:
On Wed, Jan 28, 2009 at 12:20:27PM +0100, cyril franke wrote:
Hello list,
I just started learning firewall setup with iptables
and found the
Carlos Carrero Gutierrez wrote:
Hi, i would like to freeze my linux in order to freeze the OS, then,
when I reboot the computer all changes that i made in the computer
dissapears and it returns to the previous OS freezed.
In windows there is something similar, called Deep Freeze (it's
.
Furthermore, root is also ALWAYS the first account to be attacked by
script kiddies. If it is locked, you are sure they will not be able to
connect to this account.
Francois Cerbelle
Thank you,
--
James Shupe
HermeTek Network Solutions
http//www.hermetek.com
1.866.325.6207
. It
...^^^
Try to login as a single user and change your root password
FYI, single-user asks for root pword. However, he's solved his
problem now.
Thank you,
--
James Shupe
HermeTek Network Solutions
http//www.hermetek.com
Hi everyone,
If I am sending this to the wrong list please let me know!
I have a server, details below, that I've updated to address the ssl
random number generator issue but after generating the new ssh_host rsa
and ssh_host_dsa keys, ssh still complains they're still vulnerable. I
would
A n d i k a Triwidada wrote:
On Thu, Jun 5, 2008 at 1:29 AM, James Miller [EMAIL PROTECTED] wrote:
libssl0.9.8:
Installed: 0.9.8e-4
Candidate: 0.9.8e-4
Version table:
*** 0.9.8e-4 0
100 /var/lib/dpkg/status
0.9.8c-4etch3 0
500 http://security.debian.org etch/updates/main
Alex Samad wrote:
On Thu, May 15, 2008 at 07:43:13PM -0400, Chris Adams wrote:
On May 15, 2008, at 6:25 PM, Alex Samad wrote:
is there away to check x509 certs with these tools ?
Yes - the wiki has one (http://wiki.debian.org/SSLkeys) but you might
prefer the
of this list.
--
James Shupe
HermeTek Network Solutions
http://www.hermetek.com
1.866.325.6207
This Email is covered by the Electronic Communications Privacy Act,
18 U.S.C. 2510-2521 and is legally privileged
was brought up
on the wrong list in
http://lists.debian.org/debian-security/2008/03/msg00051.html
The comment on the site was well justified, and yes, opinionated. If
you don't agree with it, disregard it and go on with your life. You've
apparently disregarded the topic of this list.
--
James Shupe
think this is worth the effort.)
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]
- --
James Shupe
HermeTek Network Solutions
http://www.hermetek.com
1.866.325.6207
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU
updated packages, and that we should make it reasonably convinent for
these sites to verify package integrity via other means.
noah
- --
James Shupe
HermeTek Network Solutions
http://www.hermetek.com
1.866.325.6207
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux
Yes this could be perfectly normal.
Are you behind a bridge ?
-Original Message-
From: Lestat V [mailto:[EMAIL PROTECTED]
Sent: 18 October 2006 04:10
To: debian-security@lists.debian.org
Subject: help: duplicate MAC address
I encouter an fake MAC address problem:
I found that
In which way are they able to reboot the system ?
-Original Message-
From: Mario Fux [mailto:[EMAIL PROTECTED]
Sent: 16 September 2006 13:31
To: debian-security@lists.debian.org
Subject: harden-doc: chapter 4.8 Restricting system reboots through the
console
Good morning
I
that hosts many different
domains, causes one to be displayed when any is requested.
James
--
James Tappin, O__ I forget the punishment for using
[EMAIL PROTECTED] -- \/`Microsoft --- Something lingering
http://www.tappin.me.uk/with data loss in it I fancy
Hi,
Have a look at snoopy.
It is a execve wrapper that prints out the commands run to syslog
James
-Original Message-
From: Mart Frauenlob [mailto:[EMAIL PROTECTED]
Sent: 21 June 2006 09:25
To: debian-security@lists.debian.org
Subject: Re: Command history log for audit
No mention of if this is exploitable when spamassassin is used by
MailScanner?
James
-Original Message-
From: Martin Schulze [mailto:[EMAIL PROTECTED]
Sent: Tuesday, 6 June 2006 19:18
To: Debian Security Announcements
Subject: [SECURITY] [DSA 1090-1] New spamassassin packages fix
that Thunderbird
1.5.0.2 should be available.
I e-mailed Mozilla's security team yesterday and they said that it
should be released shortly (within a day or so).
James
- --
James Davis +44 1235 822 229PGP: 0xC7C92EB7
JANET-CERT 0870 850 2340 (+44 1235 822 340
Hello everyone,
I hope I'm not doing something 'dumb' on my account here but I get the
following error when I run 'apt-get update'.
W: GPG error: http://mirrors.kernel.org testing Release: The following
signatures couldn't be verified because the public key is not available:
NO_PUBKEY
. Is this an oversight in the changelog or
was the patch not included?
Thanks
--
James Strandboge
[EMAIL PROTECTED]
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
this issue. :-)
Thanks,
james
--
http://www.freecharity.org.uk/ - Free hosting for charities
http://jamesd.ukgeeks.co.uk/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
On Mon, 2005-10-17 at 15:50 -0700, Stephan Wehner wrote:
I'm wondering about having
systrace
available in debian. All I could find it used to be available in
unstable, but is now orphaned with Thorsten Sauter being the last
maintainer. Debian is mentioned at
probably standard. I am, of course, assuming U.S. law here.
Hope this helps. :) The largest problem, I think, would be identifying the
intruder with enough certainty to sue them.
- --
James Renken, System Administrator [EMAIL PROTECTED]
Sandwich.Net Internet Services http
Greetings,
I noticed the message below on BUGTRAQ last weekend, reporting a remote
root compromise in telnetd. I haven't seen any discussion of this on the
list archives, nor a new DSA. Am I missing something?
Thanks!
--
James Renken, System Administrator [EMAIL PROTECTED
think this should be
looked at, no matter how rare the package's usage may be.
--
James Renken, System Administrator [EMAIL PROTECTED]
Sandwich.Net Internet Services http://www.sandwich.net/ 1-877-HUBWICH
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject
--
Chris James
http://www.chrisjames.me.uk
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Greetings,
It's been a long time, but IIRC, the NIS uses it's own dbm files which are
built from those in /etc. The test account must have existed when you set
it up.
G'day,
sjames
-steven james, director of research, linux labs
Greetings,
It's been a long time, but IIRC, the NIS uses it's own dbm files which are
built from those in /etc. The test account must have existed when you set
it up.
G'day,
sjames
-steven james, director of research, linux labs
On Tue, 6 Apr 2004 16:02:42 +0200, Craig Schneider [EMAIL PROTECTED]
wrote:
Hi Guys
Is there any way of changing the banner in Apache like you can for
proftpd lets say?
If you specify:
ServerTokens ProductOnly
in httpd.conf it'll just say Apache instead of giving out version numbers
etc. You
Positive press for Debian's security team.
Using numbers from a pair of metrics, Forrester Research's
recommendation was businesses that value quick patches look to
Microsoft and Debian.
Full article at
http://story.news.yahoo.com/news?tmpl=storycid=1738e=2u=/zd/200
40330/tc_zd/123143
Positive press for Debian's security team.
Using numbers from a pair of metrics, Forrester Research's
recommendation was businesses that value quick patches look to
Microsoft and Debian.
Full article at
http://story.news.yahoo.com/news?tmpl=storycid=1738e=2u=/zd/200
40330/tc_zd/123143
I'm on the Debian security list to get Debian related security notifications
and info. Could you please take this discussion elsewhere?!
-Original Message-
From: Jonathan Walther [mailto:[EMAIL PROTECTED]
Sent: Wednesday, February 25, 2004 9:56 AM
To: [EMAIL PROTECTED]
Subject:
I'm on the Debian security list to get Debian related security notifications
and info. Could you please take this discussion elsewhere?!
-Original Message-
From: Jonathan Walther [mailto:[EMAIL PROTECTED]
Sent: Wednesday, February 25, 2004 9:56 AM
To:
You didn't mention what the file server daemon is. Samba? NFS? I
suspect Samba. If so, please include the relevant part of your
smb.conf... probably you just need to correct a mask setting in the share
config. If it is something else, please be more specific.
On Tue, 17 Feb 2004, Hhayes
If memory serves.. AXFR is a zone transfer... So, at your firewall, would
want to only allowing TCP queries from your backup (secondary,
trinary..etc.) dns servers (on the outside of your firewall) and limit
everyone else to UDP queries. And for your bind9 config something like
this:
On Tue, 25 Nov 2003 12:09:11 +0100, Kjetil Kjernsmo [EMAIL PROTECTED]
wrote:
I bet there are a lot of users running around scared, not knowing what
to do really... Any advices for us??
Keep your eye on http://www.wiggy.net/debian/status/
Expect more details to appear there in a day or two.
On Tue, 25 Nov 2003 12:09:11 +0100, Kjetil Kjernsmo [EMAIL PROTECTED]
wrote:
I bet there are a lot of users running around scared, not knowing what
to do really... Any advices for us??
Keep your eye on http://www.wiggy.net/debian/status/
Expect more details to appear there in a day or two.
Will the package maintainers of BIND be integrating the patches from
ISC-BIND to negate Verisign's recent shenanigans?
--from ISC's web site --
In response to high demand from our users, ISC is releasing a patch for BIND
to support the declaration of delegation-only zones in caching/recursive
Will the package maintainers of BIND be integrating the patches from
ISC-BIND to negate Verisign's recent shenanigans?
--from ISC's web site --
In response to high demand from our users, ISC is releasing a patch for BIND
to support the declaration of delegation-only zones in caching/recursive
On Tue, 2003-08-26 at 16:23, Alan W. Irwin wrote:
As I am sure most of you on this list are aware, GNU recently discovered
that their ftp file server was owned for many months by a cracker.
Indeed, I was the one who did a bulk-check of the easy MD5 sums and
posted it to the list :-)
On Tue, 2003-08-26 at 17:38, Alan W. Irwin wrote:
On 26 Aug 2003, Scott James Remnant wrote:
The Debian package is actually Libtool 1.5.0a and is taken from their
CVS repository, which wasn't compromised.
I agree it takes extreme care to leave no tracks behind so it is fairly
On Tue, 2003-08-26 at 17:38, Alan W. Irwin wrote:
On 26 Aug 2003, Scott James Remnant wrote:
The Debian package is actually Libtool 1.5.0a and is taken from their
CVS repository, which wasn't compromised.
I agree it takes extreme care to leave no tracks behind so it is fairly
On Wed, 06 Aug 2003 16:01:39 +0200, Thijs Welman [EMAIL PROTECTED]
wrote:
My loganalyzer showed four Did not receive identification string from
w.x.y.z logentries from sshd. This happens all the time and i certainly
don't check all of them out, but i happen to do so this time.
That's probably
On Wed, 06 Aug 2003 16:01:39 +0200, Thijs Welman [EMAIL PROTECTED]
wrote:
My loganalyzer showed four Did not receive identification string from
w.x.y.z logentries from sshd. This happens all the time and i certainly
don't check all of them out, but i happen to do so this time.
That's probably
On Mon, 28 Jul 2003 09:18:31 -0500, Andrés Roldán [EMAIL PROTECTED]
wrote:
Is there any way, a tool or something to do that?
You could install apt-listchanges. You'll get an email with the relevant
changelog entries when something is upgraded.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
On Mon, 28 Jul 2003 09:18:31 -0500, Andrés Roldán [EMAIL PROTECTED]
wrote:
Is there any way, a tool or something to do that?
You could install apt-listchanges. You'll get an email with the relevant
changelog entries when something is upgraded.
On Mon, 7 Jul 2003 11:08:38 +0200, [EMAIL PROTECTED] wrote:
The problem is that I can only login to the ssh-machine
when I enter the IP-address to the hosts.allow file.
Specifying the hosts DNS-name does not work!
Thats probably because it does a reverse lookup on the connecting ip to see
if it
On Mon, 7 Jul 2003 11:08:38 +0200, [EMAIL PROTECTED] wrote:
The problem is that I can only login to the ssh-machine
when I enter the IP-address to the hosts.allow file.
Specifying the hosts DNS-name does not work!
Thats probably because it does a reverse lookup on the connecting ip to see
if it
Hi all,
My manager just came in asking questions about sudo. We use sudo here as a
replacement for hacing to know root passwords - in general there are
around 5 of us who need root access to the machines we maintain. we
typically have just fallen back to a ALL=ALL for ourselves so we can just
On Wed, 23 Apr 2003, Stefan Neufeind wrote:
what is the best way to remotely syslog? In
RE: HELP, my Debian Server was hacked! by James Duncan he wrote to
use syslog to log locally AND remotely. This is a good idea. But I
wonder how to make it safe. Let's say I have two servers. Each could
On Thu, 24 Apr 2003, Dale Amon wrote:
On Wed, Apr 23, 2003 at 10:44:34AM -0400, James Duncan wrote:
Obviously steps should be in place to mitigate the damage of these sorts
of acts. Have steps in place to quickly replace machines that have to be
removed from production quickly and without
On Wed, 23 Apr 2003, DEFFONTAINES Vincent wrote:
What to do
---
The first 3 basic steps to handling a situation (roughly taken from
the wonderful Criminalistics, An Introduction to Forensic Science, by
Saferstein (see the bibliography file) are:
o Secure and isolate
On Thu, 20 Feb 2003 05:35:01 +, Dale Amon [EMAIL PROTECTED] wrote:
or maybe a FreeS/WAN implementation for cygwin (is there a native win
implementation?)
... but thats a different problem ...
I doubt it. FreeSWAN uses Linux kernel patches and
kernel crypto.
You'd be suprised:
On Thu, 20 Feb 2003 05:35:01 +, Dale Amon [EMAIL PROTECTED] wrote:
or maybe a FreeS/WAN implementation for cygwin (is there a native win
implementation?)
... but thats a different problem ...
I doubt it. FreeSWAN uses Linux kernel patches and
kernel crypto.
You'd be suprised:
to have a clear Security section and I havent seen it
mentioned in any of the faq's
Thanks for any assistance,
Stewart James
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
]
To: 'Stewart James' [EMAIL PROTECTED],
[EMAIL PROTECTED]
Subject: RE: DHCP
Resent-Date: Mon, 28 Oct 2002 17:24:16 -0600 (CST)
Resent-From: [EMAIL PROTECTED]
u could set dhcp to give out a fixed address dependant on a mac address,
this would stop just anybody plugging a box into a network
to have a clear Security section and I havent seen it
mentioned in any of the faq's
Thanks for any assistance,
Stewart James
]
To: 'Stewart James' [EMAIL PROTECTED],
debian-security@lists.debian.org
Subject: RE: DHCP
Resent-Date: Mon, 28 Oct 2002 17:24:16 -0600 (CST)
Resent-From: debian-security@lists.debian.org
u could set dhcp to give out a fixed address dependant on a mac address,
this would stop just anybody
Launched 9th March!
Introduced by
We are a 100% Cheat Proof E-Gold Income Program where you get paid $1 on 5
levels.
The cost to join is only $5!
What you get with your membership of $5
5 level deep income machine, getting paid $1 per level
Instant payments
All money goes straight into your
Launched 9th March!
Introduced by
We are a 100% Cheat Proof E-Gold Income Program where you get paid $1 on 5 levels.
The cost to join is only $5!
What you get with your membership of $5
5 level deep income machine, getting paid $1 per level
Instant payments
All money goes straight into your
Launched 9th March!
Introduced by
We are a 100% Cheat Proof E-Gold Income Program where you get paid $1 on 5
levels.
The cost to join is only $5!
What you get with your membership of $5
5 level deep income machine, getting paid $1 per level
Instant payments
All money goes straight into your
On Mon, 30 Sep 2002 14:02:54 +0200, Massimiliano Mirra
[EMAIL PROTECTED] wrote:
Yes, non-US source is there now (that was the reason apt-get source
libpam-sfs was not working in the first place). The problem with
libsfscrypt happens at configure time: the lib is there but configure
can't seem
On Mon, 30 Sep 2002 14:02:54 +0200, Massimiliano Mirra
[EMAIL PROTECTED] wrote:
Yes, non-US source is there now (that was the reason apt-get source
libpam-sfs was not working in the first place). The problem with
libsfscrypt happens at configure time: the lib is there but configure
can't seem to
On Sat, 2002-08-17 at 19:30, Cedric Ware wrote:
[...]
change in the description to warn about libfam0 being useless w/o a fam
daemon somewhere would be a welcome addition :-).
I would heartfully deinstall libfam0 if KDE did not depend on it. :-)
Now, I realize that there is a problem
On Thu, 22 Aug 2002 11:05:23 +1000, Geoff Crompton
[EMAIL PROTECTED] wrote:
I can't remember, but does FreeSwan support specifying connections
with domain names?
It does, but it seems to learn the ip address at startup and not bother to
look it up again before bringing up the connection.
Apparently it is possible with Firebox 2 using ipsec manual:
http://lists.freeswan.org/pipermail/users/2001-June/000566.html
to be?
--
James (Jay) Treacy
[EMAIL PROTECTED]
On Tue, Aug 06, 2002 at 10:21:22PM -0400, James A. Treacy wrote:
On Tue, Aug 06, 2002 at 10:43:00AM +0200, Denis Barbier wrote:
On Mon, Aug 05, 2002 at 04:59:13PM +0200, Wichert Akkerman wrote:
Previously Javier Fern?ndez-Sanguino Pe?a wrote:
Are the advisories themselves in rdf
:
*.=notice;*.=warn |/dev/xconsole
to
*.=notice;*.=warn |/dev/tty8
Does the trick for me.
Alan.
--
Alan James
PGP: 0x66EB09FC
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
that
will guide me?
You should be able to cascade the X forwarding.
Did you try,
[EMAIL PROTECTED] ssh -X [EMAIL PROTECTED]
[EMAIL PROTECTED] ssh -X [EMAIL PROTECTED]
?
/James
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
an attacker get a chrooted shell with no privs instead of root access to the entire system.
In which case you just need a local exploit to go with your remote exploit.
makes it harder but not impossible.
/James
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe
/main/a/apache/apache-common_1.3.26-0
woody1_i386.deb
dpkg -i on both of them and everything updated smooth.
- James
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
On Wed, 19 Jun 2002 13:46:14 +1000, Shane Machon [EMAIL PROTECTED]
wrote:
Does anyone know if this effects potato's apache-ssl package also?
Yes it does.
Is anyone able to confirm this?
The maintainer ?
http://lists.debian.org/debian-apache/2002/debian-apache-200206/msg00024.html
--
To
I use: netstat -vat | grep LISTEN
That will tell you everything that is really listening on your server.
You should be able to use lsof to find out what is actually listening
on those ports.
- James
-Original Message-
From: Ryan J Goss [mailto:[EMAIL PROTECTED]
Sent: Monday, June
Are you sure they are open and nmap isn't just returning a false
positive?
Try a #netstat -vatn on the local server and see if those ports really
are open.
- James
-Original Message-
From: Jacques Lav!gnotte [mailto:[EMAIL PROTECTED]]
Sent: Monday, June 03, 2002 4:40 PM
To: [EMAIL
Can anybody try this from elsewhere :
# nmap -sU -p 1996-1997 news.pcl.fr
I'm not seeing it open. Perhaps some weird internet quirkiness? :)
- James
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Are you sure they are open and nmap isn't just returning a false
positive?
Try a #netstat -vatn on the local server and see if those ports really
are open.
- James
-Original Message-
From: Jacques Lav!gnotte [mailto:[EMAIL PROTECTED]
Sent: Monday, June 03, 2002 4:40 PM
To: debian
Can anybody try this from elsewhere :
# nmap -sU -p 1996-1997 news.pcl.fr
I'm not seeing it open. Perhaps some weird internet quirkiness? :)
- James
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
What to do?
If you really are cracked, wipe the system and start fresh, with recent
copies of ssh and exim.
If I had to make a bet between what is listed, I'd say it was ssh
exploited, because those have been floating around for quite a while.
- James
-Original Message-
From: Kjetil
What to do?
If you really are cracked, wipe the system and start fresh, with recent
copies of ssh and exim.
If I had to make a bet between what is listed, I'd say it was ssh
exploited, because those have been floating around for quite a while.
- James
-Original Message-
From: Kjetil
On Wed, 15 May 2002 11:37:32 +0200, Simon Langhof [EMAIL PROTECTED] wrote:
I wrote:
Well, a towel could be your chance to get away from the earth when it
is destroyed. So is _is_ a form of security :)
Oops, time to read it again. It is obviously not the towel, that gets you away.
No, but it
On Wed, 15 May 2002 11:37:32 +0200, Simon Langhof [EMAIL PROTECTED] wrote:
I wrote:
Well, a towel could be your chance to get away from the earth when it
is destroyed. So is _is_ a form of security :)
Oops, time to read it again. It is obviously not the towel, that gets you away.
No, but it
At 15:38 2002-05-08 -0600, Tim Uckun wrote:
The situation right now is that for production you run an ancient system
or cross your fingers, hold your breath and run unstable.
Coming from a corporate environment I hardly feel that stable is ancient.
With most commercial operating systems the
Regards,
/James
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Regards,
/James
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
It's a cron job belonging to root that changes its user before it goes to work.
At 11:21 2002-04-05 +0600, Kirill Zverev wrote:
Hi!
I found that in my logs:
Apr 4 06:25:01 cmss su[30315]: + ??? root-nobody
Apr 4 06:25:01 cmss PAM_unix[30315]: (su) session opened for user nobody
by (uid=0)
It's a cron job belonging to root that changes its user before it goes to work.
At 11:21 2002-04-05 +0600, Kirill Zverev wrote:
Hi!
I found that in my logs:
Apr 4 06:25:01 cmss su[30315]: + ??? root-nobody
Apr 4 06:25:01 cmss PAM_unix[30315]: (su) session opened for user nobody
by (uid=0)
On Tue, 2 Apr 2002 13:25:18 +0100, Jose Manuel dos Santos Calhariz
[EMAIL PROTECTED] wrote:
Where I can more information about Trin00?
Well google of course:
http://www.google.com/search?hl=enq=Trin00btnG=Google+Search
First hit:
http://staff.washington.edu/dittrich/misc/trinoo.analysis
1 - 100 of 158 matches
Mail list logo