Re: iptables install

2001-07-20 Thread Jeff Coppock
Jim Breton, 2001-Jul-20 20:01 +:
> On Fri, Jul 20, 2001 at 12:37:49PM -0700, Jeff Coppock wrote:
> >Do I need to dist-upgrade to woody to use iptables?
> 
> Nope.
> 
> http://netfilter.samba.org
> 
> Compiles very easily from source.  HTH.
> 
   
   I was able to compile a good 2.4.6 kernel and then compiled
   iptables from source.
   
   I have all the netfilter stuff as modules, but I can't load
   any of them.  
   
   # modprobe ip_tables
   modprobe: Can't locate module ip_tables
   
   But, it's definitely there.  I can't figure out how to fix
   this.  Any help is very much appreciated.
   
   thanks,
   jc

-- 

Jeff CoppockNortel Networks
Systems Engineerhttp://nortelnetworks.com
Major Accts.Santa Clara, CA



Re: red worm amusement

2001-07-20 Thread Jon Nelson
> Wichert Akkerman was said to been seen saying:
...
> > we glad we all run Linux? :)
...
>   Scratch another win for Linux...

What you mean to say is:  "Aren't we all glad we don't run IIS" because
1) this has nothing to do with Linux.  Last I heard, *BSD, Solaris, etc..
weren't vulnerable to this.

2) Apache, Boa, thttpd, and others each deal with this differently.
   What way is the *correct* way?


-- 
Pound for pound, the amoeba is the most vicious animal on earth.

Jon Nelson
[EMAIL PROTECTED]




Re: iptables install

2001-07-20 Thread Jim Breton

On Fri, Jul 20, 2001 at 09:31:07PM -0700, Jeff Coppock wrote:
># modprobe ip_tables
>modprobe: Can't locate module ip_tables
>
>But, it's definitely there.  I can't figure out how to fix
>this.  Any help is very much appreciated.

Your version of modutils's 'modprobe' doesn't look in the correct
directories for modules (which are different in 2.4.x).

You can either upgrade some of your packages (including modutils) in the
manner suggested by others here (using Bunk's debs), or you can just use
'insmod' which will still work but you will have to specify the path to
each module.


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: iptables install

2001-07-20 Thread Jeff Coppock

Jim Breton, 2001-Jul-20 20:01 +:
> On Fri, Jul 20, 2001 at 12:37:49PM -0700, Jeff Coppock wrote:
> >Do I need to dist-upgrade to woody to use iptables?
> 
> Nope.
> 
> http://netfilter.samba.org
> 
> Compiles very easily from source.  HTH.
> 
   
   I was able to compile a good 2.4.6 kernel and then compiled
   iptables from source.
   
   I have all the netfilter stuff as modules, but I can't load
   any of them.  
   
   # modprobe ip_tables
   modprobe: Can't locate module ip_tables
   
   But, it's definitely there.  I can't figure out how to fix
   this.  Any help is very much appreciated.
   
   thanks,
   jc

-- 

Jeff CoppockNortel Networks
Systems Engineerhttp://nortelnetworks.com
Major Accts.Santa Clara, CA


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: red worm amusement

2001-07-20 Thread Jon Nelson

> Wichert Akkerman was said to been seen saying:
...
> > we glad we all run Linux? :)
...
>   Scratch another win for Linux...

What you mean to say is:  "Aren't we all glad we don't run IIS" because
1) this has nothing to do with Linux.  Last I heard, *BSD, Solaris, etc..
weren't vulnerable to this.

2) Apache, Boa, thttpd, and others each deal with this differently.
   What way is the *correct* way?


-- 
Pound for pound, the amoeba is the most vicious animal on earth.

Jon Nelson
[EMAIL PROTECTED]



--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: red worm amusement

2001-07-20 Thread Tim Uckun




Really? As if linux has not had it's worms?

I think blaming Windows here is a tad bit short sighted. What we
hopefully can be glad for is that most of the people on this list
(hopefully) is good at upgrading their systems.


Well yes and no.

First of all MS has to take some of the blame for advertising NT as an easy 
to use and administer system that does not need a competent sysadmin to set 
up and run. They hammer this point repeatedly whenever the subject of Linux 
VS Windows comes up. You really can not blame people for not hiring 
"expensive unix sysadmins" and letting some semi competent windows user run 
the NT network.


Secondly MS has to take the blame for creating an operating system that 
needs to be brought offline for even the most routine patch. People put off 
patching their windows systems because it means coming in at midnight after 
everybody else has gone home.


Finally It's very very important to remember that Windows is a PRODUCT not 
a PROJECT. NT costs a lot of money no matter how you slice it. You expect 
that something you paid for and which is supposedly guaranteed and backed 
by the largest and the richest company on the planet should actually be 
better then the PROJECT run by volunteers. In other words I would expect 
linux to be much worse then windows alas it's the other way around.



--
 Tim Uckun
  Mobile Intelligence Unit.
--
   "There are some who call me TIM?"
--



Re: red worm amusement

2001-07-20 Thread Andy Bastien

In the depths of that dark day Sat Jul 21, the words of Wichert Akkerman were 
the beacon:
> 
> For amusement I checked the web logs for a few debian machines to see
> if they had some red worm attempts. Seems we've been probed a fair
> bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> on www.debian.org. Almost all attempts were made on July 19. Aren't
> we glad we all run Linux? :)
> 

I've got nothing in my web logs, but I've gotten a whole lot of these
over the past couple of days:

Jul 19 12:00:47 router kernel: IN=eth1 OUT= 
MAC=00:00:00:00:00:00:00:00:00:00:00:00:00:00 SRC=64.152.168.173 
DST=123.456.789.012 LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=47979 DF PROTO=TCP 
SPT=1707 DPT=80 WINDOW=8760 RES=0x00 SYN URGP=0

Along with the normal crop of connection attempts to ports 111 and
27374.  That's life on Roadrunner.



Re: red worm amusement - redirect

2001-07-20 Thread Yotam Rubin

On Fri, Jul 20, 2001 at 09:33:21PM -0400, Noah L. Meyerhans wrote:
> On Fri, Jul 20, 2001 at 06:24:54PM -0700, Alvin Oga wrote:
> > if ya wrote a script... was thinking..wouldnt it be funny
> > to redirect that incoming attack with the cgi script to 
> > redirect it back to the incoming machine ???
> 
> It wouldn't get you anything exciting.  The source machine has already
> been cracked, and chances are it will get hit again by the worm anyway.
> From what I've read about the "random" IP address generator used by the
> worm, the same sets of hosts get hit again and again. 

The intense increase in probes can be attributed to a new worm variant, 
which supposedly has the correct random seed generation code. I think you 
can safely assume that the probes we're seeing now are coming from the 
new worm variant.  I guess one could devise a script which cleans the
probing host from the worm and creates the file c:\noworm (or something 
similar), but it's probably too late anyway. 

-- Yotam Rubin

> 
> noah
> 
> -- 
>  ___
> | Web: http://web.morgul.net/~frodo/
> | PGP Public Key: http://web.morgul.net/~frodo/mail.html 




Re: red worm amusement

2001-07-20 Thread Romanenko M.A.
I got such attempts from 21 distinct addresses against my server in Russia
since
July 19 through July 20. I was able to resolve some of the addresses into
hostnames.

It is forged addresses, isn't it, and we cannot blame this hosts for the
attacks?

Mikhail.

- Original Message -
From: Yotam Rubin <[EMAIL PROTECTED]>
To: 
Sent: Saturday, July 21, 2001 7:06 AM
Subject: Re: red worm amusement


> On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
> >
> > For amusement I checked the web logs for a few debian machines to see
> > if they had some red worm attempts. Seems we've been probed a fair
> > bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> > on www.debian.org. Almost all attempts were made on July 19. Aren't
> > we glad we all run Linux? :)
>
> That's pretty low, actually. I got attempts from 22 distinct addresses
against
> one server located in Israel and 36 distinct attempts against a server
located
> somewhere in the US. I think I'll add this to my advocacy toolkit now.
>
>   -- Yotam Rubin
>
> >
> >
> > Wichert.
> >
> > --
> >   _
> >  /   Nothing is fool-proof to a sufficiently talented fool \
> > | [EMAIL PROTECTED]   http://www.liacs.nl/~wichert/ |
> > | 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0  2805 3CB8 9250 2FA3 BC2D |
> >
> >
> > --
> > To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> > with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]
> >
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]
>



Re: red worm amusement - redirect

2001-07-20 Thread Noah L. Meyerhans
On Fri, Jul 20, 2001 at 06:24:54PM -0700, Alvin Oga wrote:
> if ya wrote a script... was thinking..wouldnt it be funny
> to redirect that incoming attack with the cgi script to 
> redirect it back to the incoming machine ???

It wouldn't get you anything exciting.  The source machine has already
been cracked, and chances are it will get hit again by the worm anyway.
From what I've read about the "random" IP address generator used by the
worm, the same sets of hosts get hit again and again.  Everybody that's
reported seeing the worm has reported many attempts at the exploit from
many different hosts.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 


pgp8JQXMAkuKf.pgp
Description: PGP signature


Re: red worm amusement

2001-07-20 Thread Jeremy T. Bouse
Wichert Akkerman was said to been seen saying:
> 
> For amusement I checked the web logs for a few debian machines to see
> if they had some red worm attempts. Seems we've been probed a fair
> bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> on www.debian.org. Almost all attempts were made on July 19. Aren't
> we glad we all run Linux? :)
> 
My one web server has over 40 logged attempts all from unique
host addresses/IP addresses... Makes me laugh at the stupid IIS exploits
that so many execs order unwilling admins to install :)

Scratch another win for Linux...

Respectfully,
Jeremy T. Bouse

-- 
,-,
|Jeremy T. Bouse, CCNA - UnderGrid Network Services, LLC -  www.UnderGrid.net |
|Public PGP/GPG fingerprint and location in headers of message|
| If received unsigned (without requesting as such) DO NOT trust it!  |
| [EMAIL PROTECTED]   -   NIC Whois: JB5713   -   [EMAIL PROTECTED]  |
`-'


pgpDGvl7sIgKv.pgp
Description: PGP signature


Re: red worm amusement - redirect

2001-07-20 Thread Alvin Oga


hi ya Alson..

if ya wrote a script... was thinking..wouldnt it be funny
to redirect that incoming attack with the cgi script to 
redirect it back to the incoming machine ???

c ya
alvin

On Sat, 21 Jul 2001, Alson van der Meulen wrote:

> On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
> > 
> > For amusement I checked the web logs for a few debian machines to see
> > if they had some red worm attempts. Seems we've been probed a fair
> > bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> > on www.debian.org. Almost all attempts were made on July 19. Aren't
> > we glad we all run Linux? :)
> 
> I first saw it while tailing my access.log at home, grepping
> access.log's of other servers showed indeed around 20 hits per server.
> 
> Made some funny cgi script called /default.ida for fun :), apache
> didn't appear to like the HTTP request though, but thttpd passed it
> nicely to the cgi script. I even set up a temporary thttpd on a box
> just for fun of logging, wondered what would happen if I would adjust
> the router config at school to forward port 80 to an win2k server
> running IIS (prolly wouldn't have worked with Dutch localized IIS :( )
> 
> Linux people having fun with win2k-exploits ;)



Re: red worm amusement

2001-07-20 Thread Yotam Rubin
On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
> 
> For amusement I checked the web logs for a few debian machines to see
> if they had some red worm attempts. Seems we've been probed a fair
> bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> on www.debian.org. Almost all attempts were made on July 19. Aren't
> we glad we all run Linux? :)

That's pretty low, actually. I got attempts from 22 distinct addresses against
one server located in Israel and 36 distinct attempts against a server located
somewhere in the US. I think I'll add this to my advocacy toolkit now.

  -- Yotam Rubin

> 
> 
> Wichert.
> 
> -- 
>   _
>  /   Nothing is fool-proof to a sufficiently talented fool \
> | [EMAIL PROTECTED]   http://www.liacs.nl/~wichert/ |
> | 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0  2805 3CB8 9250 2FA3 BC2D |
> 
> 
> --  
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 



Re: red worm amusement

2001-07-20 Thread Sigurd Urdahl
Wichert Akkerman <[EMAIL PROTECTED]> writes:

> For amusement I checked the web logs for a few debian machines to see
> if they had some red worm attempts. Seems we've been probed a fair
> bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> on www.debian.org. Almost all attempts were made on July 19. Aren't
> we glad we all run Linux? :)

Really? As if linux has not had it's worms? 

I think blaming Windows here is a tad bit short sighted. What we
hopefully can be glad for is that most of the people on this list
(hopefully) is good at upgrading their systems.

Code Red's success should as far as I can see mostly be contributed to
stupid admins, and unfortunatly we also have stupid admins running
Linux.

But of course, we're all glad we are running Linux:) But maybe not
because of that (quite well written) piece of malware...

(is it fair to say that we have the better system, and that they have
the better worms? :)

-sig

-- 
Sigurd Urdahl   [EMAIL PROTECTED]
Systemkonsulent | Systems consultant
Linpro A/S   www.linpro.no



Re: red worm amusement

2001-07-20 Thread Ethan Benson
On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
> 
> For amusement I checked the web logs for a few debian machines to see
> if they had some red worm attempts. Seems we've been probed a fair
> bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> on www.debian.org. Almost all attempts were made on July 19. Aren't
> we glad we all run Linux? :)

otoh i get nearly a dozen ftp and dns connection attempts a week at a
minimum, no doubt looking for vulnerable versions of bind and
wu-ftpd.  also a dozen portmap connection attempts per day, no doubt
looking for vulnerable rpc.statd.

incompetant `morons with root password' (i won't call them sysadmins)
who won't install security updates are really the worse problem.

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgpDDr9QPRj2q.pgp
Description: PGP signature


Re: red worm amusement

2001-07-20 Thread Mike Fedyk
On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
> 
> For amusement I checked the web logs for a few debian machines to see
> if they had some red worm attempts. Seems we've been probed a fair
> bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> on www.debian.org. Almost all attempts were made on July 19. Aren't
> we glad we all run Linux? :)

So that's what I get on my Birthday?  I wonder what I'll get next
year... ;)

Mike



Re: red worm amusement

2001-07-20 Thread Alson van der Meulen
On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
> 
> For amusement I checked the web logs for a few debian machines to see
> if they had some red worm attempts. Seems we've been probed a fair
> bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> on www.debian.org. Almost all attempts were made on July 19. Aren't
> we glad we all run Linux? :)

I first saw it while tailing my access.log at home, grepping
access.log's of other servers showed indeed around 20 hits per server.

Made some funny cgi script called /default.ida for fun :), apache
didn't appear to like the HTTP request though, but thttpd passed it
nicely to the cgi script. I even set up a temporary thttpd on a box
just for fun of logging, wondered what would happen if I would adjust
the router config at school to forward port 80 to an win2k server
running IIS (prolly wouldn't have worked with Dutch localized IIS :( )

Linux people having fun with win2k-exploits ;)
-- 
,---.
> Name:   Alson van der Meulen  <
> Personal:[EMAIL PROTECTED]<
> School:   [EMAIL PROTECTED]<
`---'
What's this switch for anyways...?
-



red worm amusement

2001-07-20 Thread Wichert Akkerman

For amusement I checked the web logs for a few debian machines to see
if they had some red worm attempts. Seems we've been probed a fair
bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
on www.debian.org. Almost all attempts were made on July 19. Aren't
we glad we all run Linux? :)


Wichert.

-- 
  _
 /   Nothing is fool-proof to a sufficiently talented fool \
| [EMAIL PROTECTED]   http://www.liacs.nl/~wichert/ |
| 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0  2805 3CB8 9250 2FA3 BC2D |



Re: red worm amusement

2001-07-20 Thread Tim Uckun


>
>Really? As if linux has not had it's worms?
>
>I think blaming Windows here is a tad bit short sighted. What we
>hopefully can be glad for is that most of the people on this list
>(hopefully) is good at upgrading their systems.

Well yes and no.

First of all MS has to take some of the blame for advertising NT as an easy 
to use and administer system that does not need a competent sysadmin to set 
up and run. They hammer this point repeatedly whenever the subject of Linux 
VS Windows comes up. You really can not blame people for not hiring 
"expensive unix sysadmins" and letting some semi competent windows user run 
the NT network.

Secondly MS has to take the blame for creating an operating system that 
needs to be brought offline for even the most routine patch. People put off 
patching their windows systems because it means coming in at midnight after 
everybody else has gone home.

Finally It's very very important to remember that Windows is a PRODUCT not 
a PROJECT. NT costs a lot of money no matter how you slice it. You expect 
that something you paid for and which is supposedly guaranteed and backed 
by the largest and the richest company on the planet should actually be 
better then the PROJECT run by volunteers. In other words I would expect 
linux to be much worse then windows alas it's the other way around.


--
  Tim Uckun
   Mobile Intelligence Unit.
--
"There are some who call me TIM?"
--


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: red worm amusement

2001-07-20 Thread Andy Bastien


In the depths of that dark day Sat Jul 21, the words of Wichert Akkerman were the 
beacon:
> 
> For amusement I checked the web logs for a few debian machines to see
> if they had some red worm attempts. Seems we've been probed a fair
> bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> on www.debian.org. Almost all attempts were made on July 19. Aren't
> we glad we all run Linux? :)
> 

I've got nothing in my web logs, but I've gotten a whole lot of these
over the past couple of days:

Jul 19 12:00:47 router kernel: IN=eth1 OUT= 
MAC=00:00:00:00:00:00:00:00:00:00:00:00:00:00 SRC=64.152.168.173 DST=123.456.789.012 
LEN=48 TOS=0x00 PREC=0x00 TTL=116 ID=47979 DF PROTO=TCP SPT=1707 DPT=80 WINDOW=8760 
RES=0x00 SYN URGP=0

Along with the normal crop of connection attempts to ports 111 and
27374.  That's life on Roadrunner.


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: red worm amusement - redirect

2001-07-20 Thread Yotam Rubin


On Fri, Jul 20, 2001 at 09:33:21PM -0400, Noah L. Meyerhans wrote:
> On Fri, Jul 20, 2001 at 06:24:54PM -0700, Alvin Oga wrote:
> > if ya wrote a script... was thinking..wouldnt it be funny
> > to redirect that incoming attack with the cgi script to 
> > redirect it back to the incoming machine ???
> 
> It wouldn't get you anything exciting.  The source machine has already
> been cracked, and chances are it will get hit again by the worm anyway.
> From what I've read about the "random" IP address generator used by the
> worm, the same sets of hosts get hit again and again. 

The intense increase in probes can be attributed to a new worm variant, 
which supposedly has the correct random seed generation code. I think you 
can safely assume that the probes we're seeing now are coming from the 
new worm variant.  I guess one could devise a script which cleans the
probing host from the worm and creates the file c:\noworm (or something 
similar), but it's probably too late anyway. 

-- Yotam Rubin

> 
> noah
> 
> -- 
>  ___
> | Web: http://web.morgul.net/~frodo/
> | PGP Public Key: http://web.morgul.net/~frodo/mail.html 



--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: red worm amusement

2001-07-20 Thread Romanenko M.A.

I got such attempts from 21 distinct addresses against my server in Russia
since
July 19 through July 20. I was able to resolve some of the addresses into
hostnames.

It is forged addresses, isn't it, and we cannot blame this hosts for the
attacks?

Mikhail.

- Original Message -
From: Yotam Rubin <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Saturday, July 21, 2001 7:06 AM
Subject: Re: red worm amusement


> On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
> >
> > For amusement I checked the web logs for a few debian machines to see
> > if they had some red worm attempts. Seems we've been probed a fair
> > bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> > on www.debian.org. Almost all attempts were made on July 19. Aren't
> > we glad we all run Linux? :)
>
> That's pretty low, actually. I got attempts from 22 distinct addresses
against
> one server located in Israel and 36 distinct attempts against a server
located
> somewhere in the US. I think I'll add this to my advocacy toolkit now.
>
>   -- Yotam Rubin
>
> >
> >
> > Wichert.
> >
> > --
> >   _
> >  /   Nothing is fool-proof to a sufficiently talented fool \
> > | [EMAIL PROTECTED]   http://www.liacs.nl/~wichert/ |
> > | 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0  2805 3CB8 9250 2FA3 BC2D |
> >
> >
> > --
> > To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> > with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]
> >
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]
>


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: red worm amusement - redirect

2001-07-20 Thread Noah L. Meyerhans

On Fri, Jul 20, 2001 at 06:24:54PM -0700, Alvin Oga wrote:
> if ya wrote a script... was thinking..wouldnt it be funny
> to redirect that incoming attack with the cgi script to 
> redirect it back to the incoming machine ???

It wouldn't get you anything exciting.  The source machine has already
been cracked, and chances are it will get hit again by the worm anyway.
From what I've read about the "random" IP address generator used by the
worm, the same sets of hosts get hit again and again.  Everybody that's
reported seeing the worm has reported many attempts at the exploit from
many different hosts.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 

 PGP signature


Re: red worm amusement

2001-07-20 Thread Jeremy T. Bouse

Wichert Akkerman was said to been seen saying:
> 
> For amusement I checked the web logs for a few debian machines to see
> if they had some red worm attempts. Seems we've been probed a fair
> bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> on www.debian.org. Almost all attempts were made on July 19. Aren't
> we glad we all run Linux? :)
> 
My one web server has over 40 logged attempts all from unique
host addresses/IP addresses... Makes me laugh at the stupid IIS exploits
that so many execs order unwilling admins to install :)

Scratch another win for Linux...

Respectfully,
Jeremy T. Bouse

-- 
,-,
|Jeremy T. Bouse, CCNA - UnderGrid Network Services, LLC -  www.UnderGrid.net |
|Public PGP/GPG fingerprint and location in headers of message|
| If received unsigned (without requesting as such) DO NOT trust it!  |
| [EMAIL PROTECTED]   -   NIC Whois: JB5713   -   [EMAIL PROTECTED]  |
`-'

 PGP signature


Re: red worm amusement - redirect

2001-07-20 Thread Alvin Oga



hi ya Alson..

if ya wrote a script... was thinking..wouldnt it be funny
to redirect that incoming attack with the cgi script to 
redirect it back to the incoming machine ???

c ya
alvin

On Sat, 21 Jul 2001, Alson van der Meulen wrote:

> On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
> > 
> > For amusement I checked the web logs for a few debian machines to see
> > if they had some red worm attempts. Seems we've been probed a fair
> > bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> > on www.debian.org. Almost all attempts were made on July 19. Aren't
> > we glad we all run Linux? :)
> 
> I first saw it while tailing my access.log at home, grepping
> access.log's of other servers showed indeed around 20 hits per server.
> 
> Made some funny cgi script called /default.ida for fun :), apache
> didn't appear to like the HTTP request though, but thttpd passed it
> nicely to the cgi script. I even set up a temporary thttpd on a box
> just for fun of logging, wondered what would happen if I would adjust
> the router config at school to forward port 80 to an win2k server
> running IIS (prolly wouldn't have worked with Dutch localized IIS :( )
> 
> Linux people having fun with win2k-exploits ;)


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: red worm amusement

2001-07-20 Thread Yotam Rubin

On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
> 
> For amusement I checked the web logs for a few debian machines to see
> if they had some red worm attempts. Seems we've been probed a fair
> bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> on www.debian.org. Almost all attempts were made on July 19. Aren't
> we glad we all run Linux? :)

That's pretty low, actually. I got attempts from 22 distinct addresses against
one server located in Israel and 36 distinct attempts against a server located
somewhere in the US. I think I'll add this to my advocacy toolkit now.

  -- Yotam Rubin

> 
> 
> Wichert.
> 
> -- 
>   _
>  /   Nothing is fool-proof to a sufficiently talented fool \
> | [EMAIL PROTECTED]   http://www.liacs.nl/~wichert/ |
> | 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0  2805 3CB8 9250 2FA3 BC2D |
> 
> 
> --  
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




RE: iptables install

2001-07-20 Thread Pat Moffitt
I am using the packages from Adrian Bunk, they work great.

Add the following to /etc/apt/source.list:

deb http://people.debian.org/~bunk/debian potato main
deb-src http://people.debian.org/~bunk/debian potato main

With this you can then use apt, capt or dselect.  (The tools that make me so
fond of debian.)

I hope this helps.

Pat Moffitt
MIS Administrator
Western Recreational Vehicles, Inc.


> -Original Message-
> From: Vineet Kumar [mailto:[EMAIL PROTECTED]
> Sent: Friday, July 20, 2001 1:05 PM
> To: debian security list
> Subject: Re: iptables install
>
>
> * Jeff Coppock ([EMAIL PROTECTED]) [010720 12:54]:
> >Dilemna:
> >I want to run iptables, but I'm running stable.  I have a
> >clean, bootable 2.4.6 kernel (took awhile, but I got it), and
> >then realized that the iptable package in not in stable, but
> >is in testing and unstable.  I looked for deb-src, but
> >couldn't find any.  I figured I could compile it on my stable
> >machine.
> >
> >Do I need to dist-upgrade to woody to use iptables?
> >
>
> No. Adrian Bunk has created great resources for running kernel 2.4.x
> on potato. I haven't used it myself, but reports are that it works
> great. Please see the website he has set up at
>
> http://www.fs.tum.de/~bunk/kernel-24.html
>
> He also has deb repositories with all the upgraded/new packages you'll
> need to run a 2.4 kernel with potato.
>
> Good luck.
>
> Vineet
>



Re: red worm amusement

2001-07-20 Thread Sigurd Urdahl

Wichert Akkerman <[EMAIL PROTECTED]> writes:

> For amusement I checked the web logs for a few debian machines to see
> if they had some red worm attempts. Seems we've been probed a fair
> bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> on www.debian.org. Almost all attempts were made on July 19. Aren't
> we glad we all run Linux? :)

Really? As if linux has not had it's worms? 

I think blaming Windows here is a tad bit short sighted. What we
hopefully can be glad for is that most of the people on this list
(hopefully) is good at upgrading their systems.

Code Red's success should as far as I can see mostly be contributed to
stupid admins, and unfortunatly we also have stupid admins running
Linux.

But of course, we're all glad we are running Linux:) But maybe not
because of that (quite well written) piece of malware...

(is it fair to say that we have the better system, and that they have
the better worms? :)

-sig

-- 
Sigurd Urdahl   [EMAIL PROTECTED]
Systemkonsulent | Systems consultant
Linpro A/S   www.linpro.no


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: red worm amusement

2001-07-20 Thread Ethan Benson

On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
> 
> For amusement I checked the web logs for a few debian machines to see
> if they had some red worm attempts. Seems we've been probed a fair
> bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> on www.debian.org. Almost all attempts were made on July 19. Aren't
> we glad we all run Linux? :)

otoh i get nearly a dozen ftp and dns connection attempts a week at a
minimum, no doubt looking for vulnerable versions of bind and
wu-ftpd.  also a dozen portmap connection attempts per day, no doubt
looking for vulnerable rpc.statd.

incompetant `morons with root password' (i won't call them sysadmins)
who won't install security updates are really the worse problem.

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

 PGP signature


Re: red worm amusement

2001-07-20 Thread Mike Fedyk

On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
> 
> For amusement I checked the web logs for a few debian machines to see
> if they had some red worm attempts. Seems we've been probed a fair
> bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> on www.debian.org. Almost all attempts were made on July 19. Aren't
> we glad we all run Linux? :)

So that's what I get on my Birthday?  I wonder what I'll get next
year... ;)

Mike


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: red worm amusement

2001-07-20 Thread Alson van der Meulen

On Sat, Jul 21, 2001 at 02:10:42AM +0200, Wichert Akkerman wrote:
> 
> For amusement I checked the web logs for a few debian machines to see
> if they had some red worm attempts. Seems we've been probed a fair
> bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
> on www.debian.org. Almost all attempts were made on July 19. Aren't
> we glad we all run Linux? :)

I first saw it while tailing my access.log at home, grepping
access.log's of other servers showed indeed around 20 hits per server.

Made some funny cgi script called /default.ida for fun :), apache
didn't appear to like the HTTP request though, but thttpd passed it
nicely to the cgi script. I even set up a temporary thttpd on a box
just for fun of logging, wondered what would happen if I would adjust
the router config at school to forward port 80 to an win2k server
running IIS (prolly wouldn't have worked with Dutch localized IIS :( )

Linux people having fun with win2k-exploits ;)
-- 
,---.
> Name:   Alson van der Meulen  <
> Personal:[EMAIL PROTECTED]<
> School:   [EMAIL PROTECTED]<
`---'
What's this switch for anyways...?
-


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




red worm amusement

2001-07-20 Thread Wichert Akkerman


For amusement I checked the web logs for a few debian machines to see
if they had some red worm attempts. Seems we've been probed a fair
bit: 16 times on www.spi-inc.org, 22 on non-us.debian.org and 18
on www.debian.org. Almost all attempts were made on July 19. Aren't
we glad we all run Linux? :)


Wichert.

-- 
  _
 /   Nothing is fool-proof to a sufficiently talented fool \
| [EMAIL PROTECTED]   http://www.liacs.nl/~wichert/ |
| 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0  2805 3CB8 9250 2FA3 BC2D |


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: iptables install

2001-07-20 Thread Tim Haynes
Jeff Coppock <[EMAIL PROTECTED]> writes:

>I want to run iptables, but I'm running stable. I have a clean,
>bootable 2.4.6 kernel (took awhile, but I got it), and then realized
>that the iptable package in not in stable, but is in testing and
>unstable. I looked for deb-src, but couldn't find any. I figured I
>could compile it on my stable machine.
> 
>Do I need to dist-upgrade to woody to use iptables?

Not a whole dist-upgrade, no, but you might be best off putting a deb-src
entry for testing in sources.list, `apt-get update'-ing, and then doing an
apt-get source iptables
cd iptables-*
dpkg-buildpackage -rfakeroot
sudo dpkg -i ../iptables*deb

and you'll be away in one. Probably. :8)

~Tim
-- 
9:38pm  up 7 days, 21:13,  5 users,  load average: 0.17, 0.16, 0.13
[EMAIL PROTECTED] |You take your message to the waters,
http://piglet.is.dreaming.org |And you watch the ripples flow



Re: iptables install

2001-07-20 Thread Matthias Richter
Jeff Coppock wrote on Fri Jul 20, 2001 at 12:37:49PM:
> 
>Dilemna:
>I want to run iptables, but I'm running stable.  I have a
>clean, bootable 2.4.6 kernel (took awhile, but I got it), and
>then realized that the iptable package in not in stable, but
>is in testing and unstable.  I looked for deb-src, but
>couldn't find any.  I figured I could compile it on my stable
>machine.
> 
>Do I need to dist-upgrade to woody to use iptables?

No you don't have to, http://www.fs.tum.de/~bunk/kernel-24.html tells
you how to upgrade stable to kernel 2.4.x --- including iptables. Works
fine here.

Matth¡as
-- 
Matthias Richter --+- stud. soz. & inf. -+-- http://www.uni-leipzig.de
-->GPG Public Key: http://www.matthias-richter.de/gpg.ascii<--

· Projekt Deutscher Wortschatz: http://wortschatz.uni-leipzig.de>


pgpPJF0rzaEE0.pgp
Description: PGP signature


Re: iptables install

2001-07-20 Thread Robert Mognet
Hello,

On Fri, Jul 20, 2001 at 12:37:27PM -0700, Jeff Coppock wrote:
>Dilemna:
>I want to run iptables, but I'm running stable.  I have a
>clean, bootable 2.4.6 kernel (took awhile, but I got it), and
>then realized that the iptable package in not in stable, but
>is in testing and unstable. 

http://netfilter.filewatcher.org

Have been using iptables on potato with no problems.  
Downloaded source and compiled.

Check that you've included iptables support in your kernel, or have
compiled the correct modules.

Regards,
Robert



Re: iptables install

2001-07-20 Thread Vineet Kumar
* Jeff Coppock ([EMAIL PROTECTED]) [010720 12:54]:
>Dilemna:
>I want to run iptables, but I'm running stable.  I have a
>clean, bootable 2.4.6 kernel (took awhile, but I got it), and
>then realized that the iptable package in not in stable, but
>is in testing and unstable.  I looked for deb-src, but
>couldn't find any.  I figured I could compile it on my stable
>machine.
> 
>Do I need to dist-upgrade to woody to use iptables?
>

No. Adrian Bunk has created great resources for running kernel 2.4.x
on potato. I haven't used it myself, but reports are that it works
great. Please see the website he has set up at

http://www.fs.tum.de/~bunk/kernel-24.html

He also has deb repositories with all the upgraded/new packages you'll
need to run a 2.4 kernel with potato.

Good luck.

Vineet


pgpYHhZfbtmzQ.pgp
Description: PGP signature


Re: iptables install

2001-07-20 Thread Jim Breton
On Fri, Jul 20, 2001 at 12:37:49PM -0700, Jeff Coppock wrote:
>Do I need to dist-upgrade to woody to use iptables?

Nope.

http://netfilter.samba.org

Compiles very easily from source.  HTH.



RE: iptables install

2001-07-20 Thread Magus Ba'al
Someone spammed this out a while back. I just used this a few days ago,
worked just fine

http://www.debian.org/News/2001/20010415


HTH,



Steven Beverly
IS Technician - PHX
IS Operations
EarthLink, Inc.
Cell: 602.723.4485
Pager: [EMAIL PROTECTED]


"I am the Illustrious Postmaster and Grand Poobah of Electronic
Transmissions" -Mary Jo Pehl, MST3K

"He who fights with monsters should look to it that he himself does not
become a monster...when you gaze long into the abyss the abyss also
gazes
into you." -Friedrich Nietzsche



-Original Message-
From: Jeff Coppock [mailto:[EMAIL PROTECTED] 
Sent: Friday, July 20, 2001 12:38 PM
To: debian security list
Subject: iptables install


   Dilemna:
   I want to run iptables, but I'm running stable.  I have a
   clean, bootable 2.4.6 kernel (took awhile, but I got it), and
   then realized that the iptable package in not in stable, but
   is in testing and unstable.  I looked for deb-src, but
   couldn't find any.  I figured I could compile it on my stable
   machine.

   Do I need to dist-upgrade to woody to use iptables?
   
   seeking help,
   jc   
   

-- 

Jeff CoppockNortel Networks
Systems Engineerhttp://nortelnetworks.com
Major Accts.Santa Clara, CA


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]




RE: iptables install

2001-07-20 Thread Pat Moffitt

I am using the packages from Adrian Bunk, they work great.

Add the following to /etc/apt/source.list:

deb http://people.debian.org/~bunk/debian potato main
deb-src http://people.debian.org/~bunk/debian potato main

With this you can then use apt, capt or dselect.  (The tools that make me so
fond of debian.)

I hope this helps.

Pat Moffitt
MIS Administrator
Western Recreational Vehicles, Inc.


> -Original Message-
> From: Vineet Kumar [mailto:[EMAIL PROTECTED]]
> Sent: Friday, July 20, 2001 1:05 PM
> To: debian security list
> Subject: Re: iptables install
>
>
> * Jeff Coppock ([EMAIL PROTECTED]) [010720 12:54]:
> >Dilemna:
> >I want to run iptables, but I'm running stable.  I have a
> >clean, bootable 2.4.6 kernel (took awhile, but I got it), and
> >then realized that the iptable package in not in stable, but
> >is in testing and unstable.  I looked for deb-src, but
> >couldn't find any.  I figured I could compile it on my stable
> >machine.
> >
> >Do I need to dist-upgrade to woody to use iptables?
> >
>
> No. Adrian Bunk has created great resources for running kernel 2.4.x
> on potato. I haven't used it myself, but reports are that it works
> great. Please see the website he has set up at
>
> http://www.fs.tum.de/~bunk/kernel-24.html
>
> He also has deb repositories with all the upgraded/new packages you'll
> need to run a 2.4 kernel with potato.
>
> Good luck.
>
> Vineet
>


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




iptables install

2001-07-20 Thread Jeff Coppock
   Dilemna:
   I want to run iptables, but I'm running stable.  I have a
   clean, bootable 2.4.6 kernel (took awhile, but I got it), and
   then realized that the iptable package in not in stable, but
   is in testing and unstable.  I looked for deb-src, but
   couldn't find any.  I figured I could compile it on my stable
   machine.

   Do I need to dist-upgrade to woody to use iptables?
   
   seeking help,
   jc   
   

-- 

Jeff CoppockNortel Networks
Systems Engineerhttp://nortelnetworks.com
Major Accts.Santa Clara, CA



Re: iptables install

2001-07-20 Thread Tim Haynes

Jeff Coppock <[EMAIL PROTECTED]> writes:

>I want to run iptables, but I'm running stable. I have a clean,
>bootable 2.4.6 kernel (took awhile, but I got it), and then realized
>that the iptable package in not in stable, but is in testing and
>unstable. I looked for deb-src, but couldn't find any. I figured I
>could compile it on my stable machine.
> 
>Do I need to dist-upgrade to woody to use iptables?

Not a whole dist-upgrade, no, but you might be best off putting a deb-src
entry for testing in sources.list, `apt-get update'-ing, and then doing an
apt-get source iptables
cd iptables-*
dpkg-buildpackage -rfakeroot
sudo dpkg -i ../iptables*deb

and you'll be away in one. Probably. :8)

~Tim
-- 
9:38pm  up 7 days, 21:13,  5 users,  load average: 0.17, 0.16, 0.13
[EMAIL PROTECTED] |You take your message to the waters,
http://piglet.is.dreaming.org |And you watch the ripples flow


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: iptables install

2001-07-20 Thread Matthias Richter

Jeff Coppock wrote on Fri Jul 20, 2001 at 12:37:49PM:
> 
>Dilemna:
>I want to run iptables, but I'm running stable.  I have a
>clean, bootable 2.4.6 kernel (took awhile, but I got it), and
>then realized that the iptable package in not in stable, but
>is in testing and unstable.  I looked for deb-src, but
>couldn't find any.  I figured I could compile it on my stable
>machine.
> 
>Do I need to dist-upgrade to woody to use iptables?

No you don't have to, http://www.fs.tum.de/~bunk/kernel-24.html tells
you how to upgrade stable to kernel 2.4.x --- including iptables. Works
fine here.

Matth¡as
-- 
Matthias Richter --+- stud. soz. & inf. -+-- http://www.uni-leipzig.de
-->GPG Public Key: http://www.matthias-richter.de/gpg.ascii<--

· Projekt Deutscher Wortschatz: http://wortschatz.uni-leipzig.de>

 PGP signature


Re: iptables install

2001-07-20 Thread Robert Mognet

Hello,

On Fri, Jul 20, 2001 at 12:37:27PM -0700, Jeff Coppock wrote:
>Dilemna:
>I want to run iptables, but I'm running stable.  I have a
>clean, bootable 2.4.6 kernel (took awhile, but I got it), and
>then realized that the iptable package in not in stable, but
>is in testing and unstable. 

http://netfilter.filewatcher.org

Have been using iptables on potato with no problems.  
Downloaded source and compiled.

Check that you've included iptables support in your kernel, or have
compiled the correct modules.

Regards,
Robert


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: iptables install

2001-07-20 Thread Vineet Kumar

* Jeff Coppock ([EMAIL PROTECTED]) [010720 12:54]:
>Dilemna:
>I want to run iptables, but I'm running stable.  I have a
>clean, bootable 2.4.6 kernel (took awhile, but I got it), and
>then realized that the iptable package in not in stable, but
>is in testing and unstable.  I looked for deb-src, but
>couldn't find any.  I figured I could compile it on my stable
>machine.
> 
>Do I need to dist-upgrade to woody to use iptables?
>

No. Adrian Bunk has created great resources for running kernel 2.4.x
on potato. I haven't used it myself, but reports are that it works
great. Please see the website he has set up at

http://www.fs.tum.de/~bunk/kernel-24.html

He also has deb repositories with all the upgraded/new packages you'll
need to run a 2.4 kernel with potato.

Good luck.

Vineet

 PGP signature


Re: iptables install

2001-07-20 Thread Jim Breton

On Fri, Jul 20, 2001 at 12:37:49PM -0700, Jeff Coppock wrote:
>Do I need to dist-upgrade to woody to use iptables?

Nope.

http://netfilter.samba.org

Compiles very easily from source.  HTH.


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




RE: iptables install

2001-07-20 Thread Magus Ba'al

Someone spammed this out a while back. I just used this a few days ago,
worked just fine

http://www.debian.org/News/2001/20010415


HTH,



Steven Beverly
IS Technician - PHX
IS Operations
EarthLink, Inc.
Cell: 602.723.4485
Pager: [EMAIL PROTECTED]


"I am the Illustrious Postmaster and Grand Poobah of Electronic
Transmissions" -Mary Jo Pehl, MST3K

"He who fights with monsters should look to it that he himself does not
become a monster...when you gaze long into the abyss the abyss also
gazes
into you." -Friedrich Nietzsche



-Original Message-
From: Jeff Coppock [mailto:[EMAIL PROTECTED]] 
Sent: Friday, July 20, 2001 12:38 PM
To: debian security list
Subject: iptables install


   Dilemna:
   I want to run iptables, but I'm running stable.  I have a
   clean, bootable 2.4.6 kernel (took awhile, but I got it), and
   then realized that the iptable package in not in stable, but
   is in testing and unstable.  I looked for deb-src, but
   couldn't find any.  I figured I could compile it on my stable
   machine.

   Do I need to dist-upgrade to woody to use iptables?
   
   seeking help,
   jc   
   

-- 

Jeff CoppockNortel Networks
Systems Engineerhttp://nortelnetworks.com
Major Accts.Santa Clara, CA


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]



--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




iptables install

2001-07-20 Thread Jeff Coppock

   Dilemna:
   I want to run iptables, but I'm running stable.  I have a
   clean, bootable 2.4.6 kernel (took awhile, but I got it), and
   then realized that the iptable package in not in stable, but
   is in testing and unstable.  I looked for deb-src, but
   couldn't find any.  I figured I could compile it on my stable
   machine.

   Do I need to dist-upgrade to woody to use iptables?
   
   seeking help,
   jc   
   

-- 

Jeff CoppockNortel Networks
Systems Engineerhttp://nortelnetworks.com
Major Accts.Santa Clara, CA


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: read-write to stdin-stdout or to a file?

2001-07-20 Thread Pedro Zorzenon Neto
On Fri, Jul 20, 2001 at 12:42:13PM +0100, David Wright wrote:
> Do you mean this package?
> 
> "Programmer for Atmel AVR microcontrolers that uses PC parallel port

Yes.

> If so, I'm not sure why you think it needs to be setuid. Just
> chgrp somegroup /dev/lp0 (or whichever port) and put yourself
> (and any others) into somegroup.

I tried /dev/lp* and couldn't make the program work with it.

This program uses a specific hardware connected to the printer port. It has to 
read some bits of the port and write other bits in patterns which has to change 
in some microseconds.

That is why it uses lowlevel ioperm, inb, outb to IO 0x378 (or other IO, at 
user option[1]) and runs setuid root.

I think (not sure about all architectures) that because of this, it will run 
only in i386 machines. If I used /dev/lp* it would run in all machines. If 
someone knows how to use lp device for this specific purpose, please write me.

  Thanks,
  Pedro

[1] root must edit a config file to say which ports the user can choose.



Re: read-write to stdin-stdout or to a file?

2001-07-20 Thread Colin Phipps
On Fri, Jul 20, 2001 at 08:28:54AM -0300, Pedro Zorzenon Neto wrote:
>I could use some options like this:
> 
>   $ avrprog -i input.data -o output.data
> 
>But I chose to use stdin/stdout instead.
> 
>   $ avrprog < input.data > output.data
> 
>Than I don't need to check if the user has permission to read/write that 
> file, don't need to check for symlink... because the shell will do this for 
> me.

To be accurate, the kernel does it for you. The unprivileged shell does the open
calls and the kernel validates them.

>Is this right? Did I make the right option when I decided to use
>stdin/stdout.

It should be safe.

On Fri, Jul 20, 2001 at 04:42:16AM -0700, Vladislav wrote:
> I think, the better way is to use freopen() function
> to reassign stdin, stdout and stderr.
> This is more secure and shell-independant desision...

No, that would defeat the entire point of using stdin/stdout, which was to avoid
the privileged process having to open anything.

-- 
Colin Phipps PGP 0x689E463E http://www.netcraft.com/



Re: read-write to stdin-stdout or to a file?

2001-07-20 Thread David Wright
Quoting Pedro Zorzenon Neto ([EMAIL PROTECTED]):

>I wrote a program that needs to run setuid root due to direct hardware 
> access (Package: avrprog).

Do you mean this package?

"Programmer for Atmel AVR microcontrolers that uses PC parallel port
 to program the device in serial mode. The device can be programmed
 "in-system". It comes with a schematic of the hardware required.
 The hardware was designed to be efficient and unexpensive."

If so, I'm not sure why you think it needs to be setuid. Just
chgrp somegroup /dev/lp0 (or whichever port) and put yourself
(and any others) into somegroup.

Cheers,

-- 
Email:  [EMAIL PROTECTED]   Tel: +44 1908 653 739  Fax: +44 1908 655 151
Snail:  David Wright, Earth Science Dept., Milton Keynes, England, MK7 6AA
Disclaimer:   These addresses are only for reaching me, and do not signify
official stationery. Views expressed here are either my own or plagiarised.



Re: read-write to stdin-stdout or to a file?

2001-07-20 Thread Vladislav
Hola!

--- Pedro Zorzenon Neto <[EMAIL PROTECTED]> wrote:

>This program needs to read data from a file and
> also write to other file.
> 
>I could use some options like this:
> 
>   $ avrprog -i input.data -o output.data
> 
>But I chose to use stdin/stdout instead.
> 
>   $ avrprog < input.data > output.data
> 
>Than I don't need to check if the user has
> permission to read/write that file, don't need to
> check for symlink... because the shell will do this
> for me.
>
>Is this right? Did I make the right option when I
> decided to use stdin/stdout.

I think, the better way is to use freopen() function
to reassign stdin, stdout and stderr.
This is more secure and shell-independant desision...


=
Regards, Vladislav. ---> http://cybervlad.port5.com

__
Do You Yahoo!?
Get personalized email addresses from Yahoo! Mail
http://personal.mail.yahoo.com/



read-write to stdin-stdout or to a file?

2001-07-20 Thread Pedro Zorzenon Neto
Hi list,

   I wrote a program that needs to run setuid root due to direct hardware 
access (Package: avrprog).

   This program needs to read data from a file and also write to other file.

   I could use some options like this:

  $ avrprog -i input.data -o output.data

   But I chose to use stdin/stdout instead.

  $ avrprog < input.data > output.data

   Than I don't need to check if the user has permission to read/write that 
file, don't need to check for symlink... because the shell will do this for me.
   
   Is this right? Did I make the right option when I decided to use 
stdin/stdout.

   Thanks in advance,
   Pedro

Note: user messages and error messages go to stderr.



Re: read-write to stdin-stdout or to a file?

2001-07-20 Thread Pedro Zorzenon Neto

On Fri, Jul 20, 2001 at 12:42:13PM +0100, David Wright wrote:
> Do you mean this package?
> 
> "Programmer for Atmel AVR microcontrolers that uses PC parallel port

Yes.

> If so, I'm not sure why you think it needs to be setuid. Just
> chgrp somegroup /dev/lp0 (or whichever port) and put yourself
> (and any others) into somegroup.

I tried /dev/lp* and couldn't make the program work with it.

This program uses a specific hardware connected to the printer port. It has to read 
some bits of the port and write other bits in patterns which has to change in some 
microseconds.

That is why it uses lowlevel ioperm, inb, outb to IO 0x378 (or other IO, at user 
option[1]) and runs setuid root.

I think (not sure about all architectures) that because of this, it will run only in 
i386 machines. If I used /dev/lp* it would run in all machines. If someone knows how 
to use lp device for this specific purpose, please write me.

  Thanks,
  Pedro

[1] root must edit a config file to say which ports the user can choose.


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: read-write to stdin-stdout or to a file?

2001-07-20 Thread Colin Phipps

On Fri, Jul 20, 2001 at 08:28:54AM -0300, Pedro Zorzenon Neto wrote:
>I could use some options like this:
> 
>   $ avrprog -i input.data -o output.data
> 
>But I chose to use stdin/stdout instead.
> 
>   $ avrprog < input.data > output.data
> 
>Than I don't need to check if the user has permission to read/write that file, 
>don't need to check for symlink... because the shell will do this for me.

To be accurate, the kernel does it for you. The unprivileged shell does the open
calls and the kernel validates them.

>Is this right? Did I make the right option when I decided to use
>stdin/stdout.

It should be safe.

On Fri, Jul 20, 2001 at 04:42:16AM -0700, Vladislav wrote:
> I think, the better way is to use freopen() function
> to reassign stdin, stdout and stderr.
> This is more secure and shell-independant desision...

No, that would defeat the entire point of using stdin/stdout, which was to avoid
the privileged process having to open anything.

-- 
Colin Phipps PGP 0x689E463E http://www.netcraft.com/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: read-write to stdin-stdout or to a file?

2001-07-20 Thread David Wright

Quoting Pedro Zorzenon Neto ([EMAIL PROTECTED]):

>I wrote a program that needs to run setuid root due to direct hardware access 
>(Package: avrprog).

Do you mean this package?

"Programmer for Atmel AVR microcontrolers that uses PC parallel port
 to program the device in serial mode. The device can be programmed
 "in-system". It comes with a schematic of the hardware required.
 The hardware was designed to be efficient and unexpensive."

If so, I'm not sure why you think it needs to be setuid. Just
chgrp somegroup /dev/lp0 (or whichever port) and put yourself
(and any others) into somegroup.

Cheers,

-- 
Email:  [EMAIL PROTECTED]   Tel: +44 1908 653 739  Fax: +44 1908 655 151
Snail:  David Wright, Earth Science Dept., Milton Keynes, England, MK7 6AA
Disclaimer:   These addresses are only for reaching me, and do not signify
official stationery. Views expressed here are either my own or plagiarised.


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: read-write to stdin-stdout or to a file?

2001-07-20 Thread Vladislav

Hola!

--- Pedro Zorzenon Neto <[EMAIL PROTECTED]> wrote:

>This program needs to read data from a file and
> also write to other file.
> 
>I could use some options like this:
> 
>   $ avrprog -i input.data -o output.data
> 
>But I chose to use stdin/stdout instead.
> 
>   $ avrprog < input.data > output.data
> 
>Than I don't need to check if the user has
> permission to read/write that file, don't need to
> check for symlink... because the shell will do this
> for me.
>
>Is this right? Did I make the right option when I
> decided to use stdin/stdout.

I think, the better way is to use freopen() function
to reassign stdin, stdout and stderr.
This is more secure and shell-independant desision...


=
Regards, Vladislav. ---> http://cybervlad.port5.com

__
Do You Yahoo!?
Get personalized email addresses from Yahoo! Mail
http://personal.mail.yahoo.com/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




RE: CGI Buffer Overflow?

2001-07-20 Thread Johan Segernas
Title: RE: CGI Buffer Overflow?





It's a worm called Code Red, spreading thru IIS-servers. Nothing
you have to worry about if you're only running Apache.
We dont, so we should have worried yesterday. =)


There are info on cert.org, eeya.com and probably /. and
so on..


I've seen 100 of this on one server, around 70
on another. Plus the IIS we got infected (not
my area =)).



> -Original Message-
> From: Brian Rectanus [mailto:[EMAIL PROTECTED]]
> Sent: den 19 juli 2001 23:17
> To: debian-security@lists.debian.org
> Subject: CGI Buffer Overflow?
> 
> 
> Anyone seen this before?  I have looked around for similar 
> attacks, but
> cannot find any info.  I assume that is a unicode string 
> padded out with
> Ns.  How would I go about finding out what is in the string?
> 
> 
> xxx.xxx.xxx.xxx - - [19/Jul/2001:14:28:23 -0400] "GET
> /default.ida?N
> NN
> NN
> NN
> NN
> NN
> N%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd
> 3%u7801%u9
> 090%u6858%ucbd3%u7801%u9090%u9090%u8190%u00c3%u0003%u8b00%u531
> b%u53ff%u0
> 078%u%u00=a  HTTP/1.0" 400 328
> 
> 
> --Brian
> 
> 
> --  
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact 
> [EMAIL PROTECTED]
> 
###

This message has been scanned by F-Secure Anti-Virus for Microsoft Exchange.
For more information, connect to http://www.F-Secure.com/





read-write to stdin-stdout or to a file?

2001-07-20 Thread Pedro Zorzenon Neto

Hi list,

   I wrote a program that needs to run setuid root due to direct hardware access 
(Package: avrprog).

   This program needs to read data from a file and also write to other file.

   I could use some options like this:

  $ avrprog -i input.data -o output.data

   But I chose to use stdin/stdout instead.

  $ avrprog < input.data > output.data

   Than I don't need to check if the user has permission to read/write that file, 
don't need to check for symlink... because the shell will do this for me.
   
   Is this right? Did I make the right option when I decided to use stdin/stdout.

   Thanks in advance,
   Pedro

Note: user messages and error messages go to stderr.


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: CGI Buffer Overflow?

2001-07-20 Thread Tamas TEVESZ
On Thu, 19 Jul 2001, Brian Rectanus wrote:

 > xxx.xxx.xxx.xxx - - [19/Jul/2001:14:28:23 -0400] "GET
 > /default.ida?NNN

http://www.eeye.com/html/Research/Advisories/AL20010717.html

-- 
[-]
"you're wasting my time, chatterbox."



Re: non-US security fixes URL

2001-07-20 Thread Warren Turkal
Try
http://security.debian.org/dists/potato/updates/main/*
http://security.debian.org/dists/potato/updates/contrib/*
http://security.debian.org/dists/potato/updates/non-free/*

On Friday 20 July 2001 03:33, Jason Thomas wrote:
> On Fri, Jul 20, 2001 at 09:39:55AM +0300, Juha J?ykk? wrote:
> > > deb http://security.debian.org potato/updates main contrib
> > > non-free
>
> does this actually work from what I can tell it ends up being
> http://security.debian.org/potato/updates/main/*
> http://security.debian.org/potato/updates/contrib/*
> http://security.debian.org/potato/updates/non-free/*
>
> I am unable to look at any of them, leaving off the '*' of course.



Re: non-US security fixes URL

2001-07-20 Thread Jason Thomas
On Fri, Jul 20, 2001 at 09:39:55AM +0300, Juha J?ykk? wrote:
> > deb http://security.debian.org potato/updates main contrib non-free

does this actually work from what I can tell it ends up being 
http://security.debian.org/potato/updates/main/*
http://security.debian.org/potato/updates/contrib/*
http://security.debian.org/potato/updates/non-free/*

I am unable to look at any of them, leaving off the '*' of course.

-- 
Jason Thomas   Phone:  +61 2 6257 7111
System Administrator  -  UID 0 Fax:+61 2 6257 7311
tSA Consulting Group Pty. Ltd. Mobile: 0418 29 66 81
1 Hall Street Lyneham ACT 2602 http://www.topic.com.au/


pgpc8rOg6aKX3.pgp
Description: PGP signature


Apologies - previous was accidental post.

2001-07-20 Thread Alan McNatty
Improvements always welcome ;-) 



Unidentified subject!

2001-07-20 Thread Alan McNatty

-- 

Alan McNatty 
Catalyst IT Ltd
Level 22 - 105 The Terrace, 
Wellington

phone: 4 4992267 x705
mob: 21 2661571
email: [EMAIL PROTECTED] 


test.pl
Description: Perl program


RE: CGI Buffer Overflow?

2001-07-20 Thread Johan Segernas
Title: RE: CGI Buffer Overflow?





It's a worm called Code Red, spreading thru IIS-servers. Nothing
you have to worry about if you're only running Apache.
We dont, so we should have worried yesterday. =)


There are info on cert.org, eeya.com and probably /. and
so on..


I've seen 100 of this on one server, around 70
on another. Plus the IIS we got infected (not
my area =)).



> -Original Message-
> From: Brian Rectanus [mailto:[EMAIL PROTECTED]]
> Sent: den 19 juli 2001 23:17
> To: [EMAIL PROTECTED]
> Subject: CGI Buffer Overflow?
> 
> 
> Anyone seen this before?  I have looked around for similar 
> attacks, but
> cannot find any info.  I assume that is a unicode string 
> padded out with
> Ns.  How would I go about finding out what is in the string?
> 
> 
> xxx.xxx.xxx.xxx - - [19/Jul/2001:14:28:23 -0400] "GET
> /default.ida?N
> NN
> NN
> NN
> NN
> NN
> N%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd
> 3%u7801%u9
> 090%u6858%ucbd3%u7801%u9090%u9090%u8190%u00c3%u0003%u8b00%u531
> b%u53ff%u0
> 078%u%u00=a  HTTP/1.0" 400 328
> 
> 
> --Brian
> 
> 
> --  
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact 
> [EMAIL PROTECTED]
> 
###

This message has been scanned by F-Secure Anti-Virus for Microsoft Exchange.
For more information, connect to http://www.F-Secure.com/





Re: non-US security fixes URL

2001-07-20 Thread Juha Jäykkä
> deb http://security.debian.org/debian-security potato/updates main contrib 
> non-
> free
> deb http://security.debian.org/debian-non-US potato/non-US main contrib 
> non-fre
> e
> deb http://security.debian.org potato/updates main contrib non-free

  Someone administering the www.debian.org security pages might want to
add that non-US security fix URL to the pages. Currently it is not
mentioned there.

-- 
 ---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/  |
 ---



Re: CGI Buffer Overflow?

2001-07-20 Thread Tamas TEVESZ

On Thu, 19 Jul 2001, Brian Rectanus wrote:

 > xxx.xxx.xxx.xxx - - [19/Jul/2001:14:28:23 -0400] "GET
 > /default.ida?NNN

http://www.eeye.com/html/Research/Advisories/AL20010717.html

-- 
[-]
"you're wasting my time, chatterbox."


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: non-US security fixes URL

2001-07-20 Thread Warren Turkal

Try
http://security.debian.org/dists/potato/updates/main/*
http://security.debian.org/dists/potato/updates/contrib/*
http://security.debian.org/dists/potato/updates/non-free/*

On Friday 20 July 2001 03:33, Jason Thomas wrote:
> On Fri, Jul 20, 2001 at 09:39:55AM +0300, Juha J?ykk? wrote:
> > > deb http://security.debian.org potato/updates main contrib
> > > non-free
>
> does this actually work from what I can tell it ends up being
> http://security.debian.org/potato/updates/main/*
> http://security.debian.org/potato/updates/contrib/*
> http://security.debian.org/potato/updates/non-free/*
>
> I am unable to look at any of them, leaving off the '*' of course.


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: It's speading nicely.

2001-07-20 Thread Bob Bernstein
On Thu, Jul 19, 2001 at 08:43:43PM -0500, xbud wrote:

> 'Nicely' probably isn't a prefered word but you all know what I mean.
> 
> Here are some numbers. 

Is this thing known to point itself at the private IP blocks?, i.e.

# 10.0.0.0  10.255.255.255
# 172.16.0.0172.31.255.255
# 192.168.0.0   192.168.255.255

I'm wondering about those cable internet companies that use huge NAT'ed nets
for their customers. Not that those customers would be running IIS, but just
curious.

-- 
Bob Bernstein
at
Esmond, R.I., USA



Re: non-US security fixes URL

2001-07-20 Thread Jason Thomas

On Fri, Jul 20, 2001 at 09:39:55AM +0300, Juha J?ykk? wrote:
> > deb http://security.debian.org potato/updates main contrib non-free

does this actually work from what I can tell it ends up being 
http://security.debian.org/potato/updates/main/*
http://security.debian.org/potato/updates/contrib/*
http://security.debian.org/potato/updates/non-free/*

I am unable to look at any of them, leaving off the '*' of course.

-- 
Jason Thomas   Phone:  +61 2 6257 7111
System Administrator  -  UID 0 Fax:+61 2 6257 7311
tSA Consulting Group Pty. Ltd. Mobile: 0418 29 66 81
1 Hall Street Lyneham ACT 2602 http://www.topic.com.au/

 PGP signature


Apologies - previous was accidental post.

2001-07-20 Thread Alan McNatty

Improvements always welcome ;-) 


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Unidentified subject!

2001-07-20 Thread Alan McNatty


-- 

Alan McNatty 
Catalyst IT Ltd
Level 22 - 105 The Terrace, 
Wellington

phone: 4 4992267 x705
mob: 21 2661571
email: [EMAIL PROTECTED] 

 test.pl