Re: Debian GNU/Linux 2.2r3 vulnerabilities ?

2001-10-24 Thread Sebastiaan

Hi,

On Thu, 25 Oct 2001, Petre Daniel wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: MD5
> 
> Heya,
>  I run a potato at home and i will set the computer at work
>   with potato as well.Since that will be a 24h internet connected
>  pc,i am wondering what are the 2.2 release 3 vulnerabilities for
>   the sistem installed from the cds without any online update.
>  Is the ssh package in potato vulnerable?
>  I'd appreciate it if you can give me some urls.
>  thx,
>  Dani,
>  hackers unsupport.
> 

add security lines for apt as suggested before and if the box is going to
work as a firewall of some kind upgrade to kernel 2.4 to use iptables (and
install modutils-2.4!). 

Greetz,
Sebastiaan

--
  NT is the OS of the future. The main engine is the 16-bit Subsystem
  (also called MS-DOS Subsystem). Above that, there is the windoze 95/98
  16-bit Subsystem. Anyone can see that 16+16=32, so windoze NT is a 
  *real* 32-bit system.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Debian GNU/Linux 2.2r3 vulnerabilities ?

2001-10-24 Thread Osamu Aoki
On Thu, Oct 25, 2001 at 04:31:05AM +0200, Petre Daniel wrote:
>  I run a potato at home and i will set the computer at work
>   with potato as well.Since that will be a 24h internet connected
>  pc,i am wondering what are the 2.2 release 3 vulnerabilities for
>   the sistem installed from the cds without any online update.
>  Is the ssh package in potato vulnerable?
OOps.  You need security updates.  This is bad!!

Add following to /etc/apt/sources.list

deb http://security.debian.org/ stable/updates main contrib non-free

Then 
# apt-get -u upgrade

-- 
~\^o^/~~~ ~\^.^/~~~ ~\^*^/~~~ ~\^_^/~~~ ~\^+^/~~~ ~\^:^/~~~ ~\^v^/~~~ 
+  Osamu Aoki <[EMAIL PROTECTED]>, GnuPG-key: 1024D/D5DE453D  +
+  My debian quick-reference, http://www.aokiconsulting.com/quick/+



Debian GNU/Linux 2.2r3 vulnerabilities ?

2001-10-24 Thread Petre Daniel
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5

Heya,
 I run a potato at home and i will set the computer at work
  with potato as well.Since that will be a 24h internet connected
 pc,i am wondering what are the 2.2 release 3 vulnerabilities for
  the sistem installed from the cds without any online update.
 Is the ssh package in potato vulnerable?
 I'd appreciate it if you can give me some urls.
 thx,
 Dani,
 hackers unsupport.

-BEGIN PGP SIGNATURE-
Version: 2.6

iQCVAwUAO9d5bcw1CXXrWGBbAQED7gQAmoKv0NVCTKa2MuEiPcVBHg27TMu58WCa
IcmoCDe9BAgq9VDQUENPzlRiFceFQQkK1skoO0+sCn8I4SXu+cO2vdVuaPyHtdlg
UpLpI5mx0BBYavLmQ1AmdUp0z4aTFkpMneTiXV1GEwvz6xzFXGRFqBkNbQGOnvvO
bjMyDw60aT4=
=wDVj
-END PGP SIGNATURE-


_
Do You Yahoo!?
Get your free @yahoo.com address at http://mail.yahoo.com




Re: Is ident secure?

2001-10-24 Thread Adam Olsen
On Thu, Oct 25, 2001 at 09:45:49AM +1000, Malcolm Herbert wrote:
> ... don't know if it's happening to others, however I seem to be
> receiving mail from the 'Is Ident secure' thread of earlier in September
> (with the idiot who was subscribed and who wouldn't/couldn't unsubscribe
> himself) ... is anyone else seeing this replay?

I saw two posts myself.  After looked at the headers, I think
somebody's mailer was broken and backlogged the replies, and is only
now clearing the backlog.  Or perhaps it's something else, but unless
they continue it doesn't really matter.

-- 
Adam Olsen, aka Rhamphoryncus



Re[2]: FUCK YOU

2001-10-24 Thread victor
Hello Nicolas,

Sunday, September 02, 2001, 5:31:01 PM, you wrote:

NMM> Hello Layne,
NMM> if you have'nt subscribed, why do you think do you receive mails from
NMM> debian-security?, maybe you're too stupid to remember but you receive a
NMM> confirmation email before being added to a mailing lists, so shut up and
NMM> unsubscribe *** !



hehehehe layne case was sometime ago ;

-- 
Best regards,
 victormailto:[EMAIL PROTECTED]



Re: Debian GNU/Linux 2.2r3 vulnerabilities ?

2001-10-24 Thread Osamu Aoki

On Thu, Oct 25, 2001 at 04:31:05AM +0200, Petre Daniel wrote:
>  I run a potato at home and i will set the computer at work
>   with potato as well.Since that will be a 24h internet connected
>  pc,i am wondering what are the 2.2 release 3 vulnerabilities for
>   the sistem installed from the cds without any online update.
>  Is the ssh package in potato vulnerable?
OOps.  You need security updates.  This is bad!!

Add following to /etc/apt/sources.list

deb http://security.debian.org/ stable/updates main contrib non-free

Then 
# apt-get -u upgrade

-- 
~\^o^/~~~ ~\^.^/~~~ ~\^*^/~~~ ~\^_^/~~~ ~\^+^/~~~ ~\^:^/~~~ ~\^v^/~~~ 
+  Osamu Aoki <[EMAIL PROTECTED]>, GnuPG-key: 1024D/D5DE453D  +
+  My debian quick-reference, http://www.aokiconsulting.com/quick/+


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Is ident secure?

2001-10-24 Thread Malcolm Herbert
... don't know if it's happening to others, however I seem to be
receiving mail from the 'Is Ident secure' thread of earlier in September
(with the idiot who was subscribed and who wouldn't/couldn't unsubscribe
himself) ... is anyone else seeing this replay?

I have the original in my mailbox if anyone wants it for header trawling
...

On Sun, Sep 02, 2001 at 11:38:01AM -0400, Nicolas M . M wrote:
|do you know what the word sollicitors mean? i don't think so, you should
|go to school you lil' brainless.
|-- 
|"La bonne humeur est une vertue,
|   celle qui différencie l'humain de l'animal."
|
|-- 
|To UNSUBSCRIBE, email to [EMAIL PROTECTED]
|with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
|

-- 
Malcolm HerbertThis brain intentionally
[EMAIL PROTECTED]left blank



Re: Connection problem

2001-10-24 Thread Jason Thomas
On Wed, Oct 24, 2001 at 02:35:51PM +0200, Emmanuel Lacour wrote:
> Ok , to close this message (out of list topics), I just explain how I
> solved my problem.
> 
> A few days ago I was playing with ipsec and adsl pppoe. This was a mtu
> problem so I played with clampmss fragicmp overridemtu in rp-pppoe and
> ipsec.conf.
> And I leaved pppoe.conf with a clampmss=no.
> I set it to 1412 and now all works perfectly.

what was it before, we have ours set to 1452.
adsl uses a size of 1492 but you need to allow for a 40 byte tcp header
(I think), which is where 1452 comes from.

-- 
Jason Thomas   Phone:  +61 2 6257 7111
System Administrator  -  UID 0 Fax:+61 2 6257 7311
tSA Consulting Group Pty. Ltd. Mobile: 0418 29 66 81
1 Hall Street Lyneham ACT 2602 http://www.topic.com.au/


pgpW0vDmNpNk6.pgp
Description: PGP signature


Debian GNU/Linux 2.2r3 vulnerabilities ?

2001-10-24 Thread Petre Daniel

-BEGIN PGP SIGNED MESSAGE-
Hash: MD5

Heya,
 I run a potato at home and i will set the computer at work
  with potato as well.Since that will be a 24h internet connected
 pc,i am wondering what are the 2.2 release 3 vulnerabilities for
  the sistem installed from the cds without any online update.
 Is the ssh package in potato vulnerable?
 I'd appreciate it if you can give me some urls.
 thx,
 Dani,
 hackers unsupport.

-BEGIN PGP SIGNATURE-
Version: 2.6

iQCVAwUAO9d5bcw1CXXrWGBbAQED7gQAmoKv0NVCTKa2MuEiPcVBHg27TMu58WCa
IcmoCDe9BAgq9VDQUENPzlRiFceFQQkK1skoO0+sCn8I4SXu+cO2vdVuaPyHtdlg
UpLpI5mx0BBYavLmQ1AmdUp0z4aTFkpMneTiXV1GEwvz6xzFXGRFqBkNbQGOnvvO
bjMyDw60aT4=
=wDVj
-END PGP SIGNATURE-


_
Do You Yahoo!?
Get your free @yahoo.com address at http://mail.yahoo.com



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Is ident secure?

2001-10-24 Thread Adam Olsen

On Thu, Oct 25, 2001 at 09:45:49AM +1000, Malcolm Herbert wrote:
> ... don't know if it's happening to others, however I seem to be
> receiving mail from the 'Is Ident secure' thread of earlier in September
> (with the idiot who was subscribed and who wouldn't/couldn't unsubscribe
> himself) ... is anyone else seeing this replay?

I saw two posts myself.  After looked at the headers, I think
somebody's mailer was broken and backlogged the replies, and is only
now clearing the backlog.  Or perhaps it's something else, but unless
they continue it doesn't really matter.

-- 
Adam Olsen, aka Rhamphoryncus


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Is ident secure?

2001-10-24 Thread Nicolas M . M
do you know what the word sollicitors mean? i don't think so, you should
go to school you lil' brainless.
-- 
"La bonne humeur est une vertue,
celle qui différencie l'humain de l'animal."



Re: FUCK YOU

2001-10-24 Thread Nicolas M . M
Hello Layne,
if you have'nt subscribed, why do you think do you receive mails from
debian-security?, maybe you're too stupid to remember but you receive a
confirmation email before being added to a mailing lists, so shut up and
unsubscribe *** !


-- 
"La bonne humeur est une vertue,
celle qui différencie l'humain de l'animal."



Re[2]: FUCK YOU

2001-10-24 Thread victor

Hello Nicolas,

Sunday, September 02, 2001, 5:31:01 PM, you wrote:

NMM> Hello Layne,
NMM> if you have'nt subscribed, why do you think do you receive mails from
NMM> debian-security?, maybe you're too stupid to remember but you receive a
NMM> confirmation email before being added to a mailing lists, so shut up and
NMM> unsubscribe *** !



hehehehe layne case was sometime ago ;

-- 
Best regards,
 victormailto:[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Is ident secure?

2001-10-24 Thread Malcolm Herbert

... don't know if it's happening to others, however I seem to be
receiving mail from the 'Is Ident secure' thread of earlier in September
(with the idiot who was subscribed and who wouldn't/couldn't unsubscribe
himself) ... is anyone else seeing this replay?

I have the original in my mailbox if anyone wants it for header trawling
...

On Sun, Sep 02, 2001 at 11:38:01AM -0400, Nicolas M . M wrote:
|do you know what the word sollicitors mean? i don't think so, you should
|go to school you lil' brainless.
|-- 
|"La bonne humeur est une vertue,
|   celle qui différencie l'humain de l'animal."
|
|-- 
|To UNSUBSCRIBE, email to [EMAIL PROTECTED]
|with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
|

-- 
Malcolm HerbertThis brain intentionally
[EMAIL PROTECTED]left blank


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Question about BugTraq and Debian-Security Mailing Lists

2001-10-24 Thread victor
Hello eim,

Wednesday, October 24, 2001, 7:58:15 PM, you wrote:

e> Actually I'm subscribed to the famous bugtraq Mailing List
e> and of course the Debian Security Mailing List.

i dont think that buqtraq bugtraq@securityfocus.com ... i understand
you refer that make a high volume, i recieve 9 mail at day normaly, in
buqtracq sais bugs that can affect your debian like de php-nuke if you
have it (there were a bug which you can do all)
decide you but have the bugtraq which you have some bugs of all kind
of systems, and you can only read the bugs that you want is ok ;)

e> Bugtraq is a 'high volume' Mailing List which forwards to me
e> many important mails about security in General and not only 
e> Debian Specific

e> Because I really work only with Debian GNU/Linux as Linux Distribution
e> many informations on Bugtraq, like SUN, MS Windows, MacOS, etc related
e> Mails are not really important for me but I spend anyway bandwith for
e> recieving them, I pay every 'single byte' on my connection.

e> My question is: Is it convenient to subscirbe _only_ to the Debian
e> Security Mailing List keeping in mind only security related to this
e> Distribution and Server Platform, or are there maybe some 'important'
e> informations on BugTraq which maybe will never be posted on the Debian
e> Security List ? 

e> For now I think many Debian Developers and Users read everyday BugTraq,
e> too, and may see if there are common problems which could affect
e> also Debian Security, and post them in a second time here.

e> I hope my ideas are right and thanks for any suggestions...

e> Have fun,
e> Ivo Marino




-- 
Best regards,
 victormailto:[EMAIL PROTECTED]



Re: Does Debian need to enforce a better Security policy for packages?

2001-10-24 Thread Patrice Neff
Michael Robinson <[EMAIL PROTECTED]> writes:

> FreeBSD does it for their ports tree.  In fact, this has been a
> matter of controversy, as the FreeBSD team issues a huge number of
> security advisories for software that really has nothing to do with
> FreeBSD. This has caused casual observers to erroneously believe
> FreeBSD is less secure than other less carefully managed operating
> system projects.

I believe this would not be reasonable for the Debian distribution,
but you could create a customized and secure Debian version where you
do a source code audit before accepting any package. Or maybe it could
be done with another APT tree?

well, just my 2 cents
patrice



Re: Question about BugTraq and Debian-Security Mailing Lists

2001-10-24 Thread Stefano Canepa
mercoledì 24 ottobre 2001, alle 19:58, eim:
: Actually I'm subscribed to the famous bugtraq Mailing List
: and of course the Debian Security Mailing List.
: 
: Bugtraq is a 'high volume' Mailing List which forwards to me
: many important mails about security in General and not only 
: Debian Specific
: 
: Because I really work only with Debian GNU/Linux as Linux Distribution
: many informations on Bugtraq, like SUN, MS Windows, MacOS, etc related
: Mails are not really important for me but I spend anyway bandwith for
: recieving them, I pay every 'single byte' on my connection.
: 
: My question is: Is it convenient to subscirbe _only_ to the Debian
: Security Mailing List keeping in mind only security related to this
: Distribution and Server Platform, or are there maybe some 'important'
: informations on BugTraq which maybe will never be posted on the Debian
: Security List ? 
: 
Dear Evo,
I was subscribed to Buqtraq but I think it is not so usefull if
you use only Debian (as I do). When I was repsonsible for the security
of a mostly Windows NT based network I need Buqtraq. I think it is
better to invest you time in reading security programming mailing-list
(cannot remember the correct address) or security and firewall mailing
lists where you can find general exploit advice. Look at security Focus
web site.

Regards
Stefano

-- 
Stefano Canepa e-mail: [EMAIL PROTECTED]

To follow the path: look at the master, follow the master, walk with the
master, see trough the master, become the master.



Re: Connection problem

2001-10-24 Thread Jason Thomas

On Wed, Oct 24, 2001 at 02:35:51PM +0200, Emmanuel Lacour wrote:
> Ok , to close this message (out of list topics), I just explain how I
> solved my problem.
> 
> A few days ago I was playing with ipsec and adsl pppoe. This was a mtu
> problem so I played with clampmss fragicmp overridemtu in rp-pppoe and
> ipsec.conf.
> And I leaved pppoe.conf with a clampmss=no.
> I set it to 1412 and now all works perfectly.

what was it before, we have ours set to 1452.
adsl uses a size of 1492 but you need to allow for a 40 byte tcp header
(I think), which is where 1452 comes from.

-- 
Jason Thomas   Phone:  +61 2 6257 7111
System Administrator  -  UID 0 Fax:+61 2 6257 7311
tSA Consulting Group Pty. Ltd. Mobile: 0418 29 66 81
1 Hall Street Lyneham ACT 2602 http://www.topic.com.au/

 PGP signature


Re: Question about BugTraq and Debian-Security Mailing Lists

2001-10-24 Thread Henrique de Moraes Holschuh
On Wed, 24 Oct 2001, eim wrote:
> My question is: Is it convenient to subscirbe _only_ to the Debian
> Security Mailing List keeping in mind only security related to this
> Distribution and Server Platform, or are there maybe some 'important'
> informations on BugTraq which maybe will never be posted on the Debian
> Security List ? 

It has happened in the past that important information from bugtrack was
never relayed to d-security, even if they did concern Debian.

> For now I think many Debian Developers and Users read everyday BugTraq,
> too, and may see if there are common problems which could affect
> also Debian Security, and post them in a second time here.

That has also happened in the past :-) and I think it is a very good idea.
However, only _verified_ hazards should be relayed here, if at all possible.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



Re: Is ident secure?

2001-10-24 Thread Nicolas M . M

do you know what the word sollicitors mean? i don't think so, you should
go to school you lil' brainless.
-- 
"La bonne humeur est une vertue,
celle qui différencie l'humain de l'animal."


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: FUCK YOU

2001-10-24 Thread Nicolas M . M

Hello Layne,
if you have'nt subscribed, why do you think do you receive mails from
debian-security?, maybe you're too stupid to remember but you receive a
confirmation email before being added to a mailing lists, so shut up and
unsubscribe *** !


-- 
"La bonne humeur est une vertue,
celle qui différencie l'humain de l'animal."


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Question about BugTraq and Debian-Security Mailing Lists

2001-10-24 Thread victor

Hello eim,

Wednesday, October 24, 2001, 7:58:15 PM, you wrote:

e> Actually I'm subscribed to the famous bugtraq Mailing List
e> and of course the Debian Security Mailing List.

i dont think that buqtraq [EMAIL PROTECTED] ... i understand
you refer that make a high volume, i recieve 9 mail at day normaly, in
buqtracq sais bugs that can affect your debian like de php-nuke if you
have it (there were a bug which you can do all)
decide you but have the bugtraq which you have some bugs of all kind
of systems, and you can only read the bugs that you want is ok ;)

e> Bugtraq is a 'high volume' Mailing List which forwards to me
e> many important mails about security in General and not only 
e> Debian Specific

e> Because I really work only with Debian GNU/Linux as Linux Distribution
e> many informations on Bugtraq, like SUN, MS Windows, MacOS, etc related
e> Mails are not really important for me but I spend anyway bandwith for
e> recieving them, I pay every 'single byte' on my connection.

e> My question is: Is it convenient to subscirbe _only_ to the Debian
e> Security Mailing List keeping in mind only security related to this
e> Distribution and Server Platform, or are there maybe some 'important'
e> informations on BugTraq which maybe will never be posted on the Debian
e> Security List ? 

e> For now I think many Debian Developers and Users read everyday BugTraq,
e> too, and may see if there are common problems which could affect
e> also Debian Security, and post them in a second time here.

e> I hope my ideas are right and thanks for any suggestions...

e> Have fun,
e> Ivo Marino




-- 
Best regards,
 victormailto:[EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Does Debian need to enforce a better Security policy for packages?

2001-10-24 Thread Patrice Neff

Michael Robinson <[EMAIL PROTECTED]> writes:

> FreeBSD does it for their ports tree.  In fact, this has been a
> matter of controversy, as the FreeBSD team issues a huge number of
> security advisories for software that really has nothing to do with
> FreeBSD. This has caused casual observers to erroneously believe
> FreeBSD is less secure than other less carefully managed operating
> system projects.

I believe this would not be reasonable for the Debian distribution,
but you could create a customized and secure Debian version where you
do a source code audit before accepting any package. Or maybe it could
be done with another APT tree?

well, just my 2 cents
patrice


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Question about BugTraq and Debian-Security Mailing Lists

2001-10-24 Thread Stefano Canepa

mercoledì 24 ottobre 2001, alle 19:58, eim:
: Actually I'm subscribed to the famous bugtraq Mailing List
: and of course the Debian Security Mailing List.
: 
: Bugtraq is a 'high volume' Mailing List which forwards to me
: many important mails about security in General and not only 
: Debian Specific
: 
: Because I really work only with Debian GNU/Linux as Linux Distribution
: many informations on Bugtraq, like SUN, MS Windows, MacOS, etc related
: Mails are not really important for me but I spend anyway bandwith for
: recieving them, I pay every 'single byte' on my connection.
: 
: My question is: Is it convenient to subscirbe _only_ to the Debian
: Security Mailing List keeping in mind only security related to this
: Distribution and Server Platform, or are there maybe some 'important'
: informations on BugTraq which maybe will never be posted on the Debian
: Security List ? 
: 
Dear Evo,
I was subscribed to Buqtraq but I think it is not so usefull if
you use only Debian (as I do). When I was repsonsible for the security
of a mostly Windows NT based network I need Buqtraq. I think it is
better to invest you time in reading security programming mailing-list
(cannot remember the correct address) or security and firewall mailing
lists where you can find general exploit advice. Look at security Focus
web site.

Regards
Stefano

-- 
Stefano Canepa e-mail: [EMAIL PROTECTED]

To follow the path: look at the master, follow the master, walk with the
master, see trough the master, become the master.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Question about BugTraq and Debian-Security Mailing Lists

2001-10-24 Thread eim
Actually I'm subscribed to the famous bugtraq Mailing List
and of course the Debian Security Mailing List.

Bugtraq is a 'high volume' Mailing List which forwards to me
many important mails about security in General and not only 
Debian Specific

Because I really work only with Debian GNU/Linux as Linux Distribution
many informations on Bugtraq, like SUN, MS Windows, MacOS, etc related
Mails are not really important for me but I spend anyway bandwith for
recieving them, I pay every 'single byte' on my connection.

My question is: Is it convenient to subscirbe _only_ to the Debian
Security Mailing List keeping in mind only security related to this
Distribution and Server Platform, or are there maybe some 'important'
informations on BugTraq which maybe will never be posted on the Debian
Security List ? 

For now I think many Debian Developers and Users read everyday BugTraq,
too, and may see if there are common problems which could affect
also Debian Security, and post them in a second time here.

I hope my ideas are right and thanks for any suggestions...

Have fun,
Ivo Marino

-- 

 
 Ivo Marino[EMAIL PROTECTED]
 UN*X Developer, running Debian GNU/Linux
 DALnet #flex
 http://eimbox.org
 



Re: Question about BugTraq and Debian-Security Mailing Lists

2001-10-24 Thread Henrique de Moraes Holschuh

On Wed, 24 Oct 2001, eim wrote:
> My question is: Is it convenient to subscirbe _only_ to the Debian
> Security Mailing List keeping in mind only security related to this
> Distribution and Server Platform, or are there maybe some 'important'
> informations on BugTraq which maybe will never be posted on the Debian
> Security List ? 

It has happened in the past that important information from bugtrack was
never relayed to d-security, even if they did concern Debian.

> For now I think many Debian Developers and Users read everyday BugTraq,
> too, and may see if there are common problems which could affect
> also Debian Security, and post them in a second time here.

That has also happened in the past :-) and I think it is a very good idea.
However, only _verified_ hazards should be relayed here, if at all possible.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Firewall Related Question

2001-10-24 Thread J.R. Blain
Using kernel 2.2, I run a bridge, that handles packet filtering with
ipchains.

Patches are available here:
http://www.ac2i.tzo.com/bridge_filter/


James wrote:
> 
> That link might help...
> http://www.linuxdoc.org/HOWTO/mini/Bridge+Firewall.html
> 
> - James
> 
> -Original Message-
> From: Alson van der Meulen [mailto:[EMAIL PROTECTED]
> Sent: Monday, October 22, 2001 1:31 PM
> To: Debian Security List
> Subject: Re: Firewall Related Question
> 
> On Mon, Oct 22, 2001 at 10:17:59AM -0700, tony mancill wrote:
> > I'd recommend the former (firewalling on each server).  This will let you
> > customize the firewall for that server alone, and spread the packet
> > filtering load and logging.  Also, with no access the Cisco box, you'd
> > have to either MASQ or SNAT with proxy arps if you do insert a firewall
> > into the packet path to get the traffic to cross the firewall.  (The Cisco
> > is going to assume that the subnet with the DMZ address space is still
> > directly attached.)
> With FreeBSD/OpenBSD, you could use a packet filtering bridge (quit nice
> IMO), put two ethernet cards in a box, one to cisco, second to switch
> with Debian servers, no need for an IP address at the bridge, just
> bridge and firewall.
> 
> I'm not sure if Linux can do this, maybe there are some patches for
> iptables to do it?
> 
> > On Mon, 22 Oct 2001, James wrote:
> >
> > > Yes, you could definitely do a firewall on each server.
> > >
> > > Also, have you considered setting up a 4th machine between the Cisco and
> 3
> > > servers?  That could work also.  You wouldn't make it a masq box, just
> > > configure it to pass packets based on the rules.
> > >
> > > - James
> > >
> > > -Original Message-
> > > From: Alson van der Meulen [mailto:[EMAIL PROTECTED]
> > > Sent: Monday, October 22, 2001 6:58 AM
> > > To: Debian Security List
> > > Subject: Re: Firewall Related Question
> > >
> > >
> > > On Mon, Oct 22, 2001 at 12:44:03PM +0200, eim wrote:
> > > > I've got some simple questions related to using a Firewall on
> > > > some single pubblic Debian Boxes, I choose to post my questions
> > > > here because I've always securitty in mind during the Developing
> > > > time of my Network Services.
> > > >
> > > > Let me asume I've got a simple Network with 3 Pubblic Debian
> > > > Servers and 1 Cisco Router (Internet Gateway).
> > > >
> > > > The router belongs to my Connection ISP so I can't configure it,
> > > > but onlu use it for Internet connectivity.
> > > >
> > > > The 3 Debian Boxes are under my full control.
> > > >
> > > > The best way to protect my Debian Servers would be to install
> > > > a Firewall on my Gateway (Cisco Router) but actually I can't,
> > > > so my question is: Can I install a Firewall on each of my Debian
> > > > Boxes to filter/block incoming and outgoing Network Traffic ?
> > > >
> > > > Is this a good choice ? or should I put another machine in my
> > > > Network, between the Gateway and the Servers, which acts as Firewall ?
> > > You can just configure a packet filter on all your servers, the main
> > > disadvantage is that it's more difficult to administer
> --
> ,---.
> > Name:   Alson van der Meulen  <
> > Personal:[EMAIL PROTECTED]<
> > School:   [EMAIL PROTECTED]<
> `---'
> I remember the last time I saw it do that...
> -
> 
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact
> [EMAIL PROTECTED]
> 
>   
>  Name: Linux 
> Bridge+Firewall Mini-HOWTO version 1.2.0.url
>Linux Bridge+Firewall Mini-HOWTO version 1.2.0.urlType: unspecified 
> type (application/octet-stream)
>  Encoding: 
> quoted-printable


J.R. Blain
http://www.clockmedia.com/
-- 
Real programmers use chmod +x /dev/random and cross their fingers
-- Comment found in a vi/emacs flamewar on slashdot.



Re: Intro - Design, Engineering, Manufacturing, and more

2001-10-24 Thread Richard Ibbotson
Dear All


> Igoework.com is represented by a group that includes:


Pardon me for wasting bandwidth but am I the only person who is 
getting a bounced multiple repeated message of this sort from the 
Debian security list  ?

Thank you



-- 
Richard



Intro - Design, Engineering, Manufacturing, and more

2001-10-24 Thread Igoework.com Inc.
Please allow us to introduce ourselves,

Igoework.com is represented by a group that includes:

- Talented engineers(Mechanical and Electrical)
- Software solutions(CAD, FEA)
- Manufacturing vendors (Castings, Sheet Metal, Plastics, SLA, etc)
- Technical placement   (Direct placement of talent)

Our company has put together all these resources to bring you a complete
integrated solution to all of your technical needs. Our engineers are
experienced with Pro/Engineer and Solidworks suite of products. Also, our
Electrical engineers are prepared to handle any type of project. In
addition, we supervise the quality and delivery  of all of our
manufacturing from proven and qualified vendors. Our software and
technical placement solutions will be introduced depending on your needs. 

More information is available from our website.

We would appreciate your consideration or referral to any interested
party. Please contact us at your convenience.

Best Regards,

Manuel Paez, President
Igoework.com Inc.
http://www.igoework.com
Cell: 847-477-1367
Fax: 847-745-0348 
Illinois, USA

Confidentiality Note: This message is confidential and intended only for
the use of the addressee(s) named above. It may contain legally privileged
material. Dissemination, distribution or copying of this message, other
than by such addressee(s), is strictly prohibited. If you have received
this message in error, please immediately notify us by reply and delete
this message and all its attachments.



Question about BugTraq and Debian-Security Mailing Lists

2001-10-24 Thread eim

Actually I'm subscribed to the famous bugtraq Mailing List
and of course the Debian Security Mailing List.

Bugtraq is a 'high volume' Mailing List which forwards to me
many important mails about security in General and not only 
Debian Specific

Because I really work only with Debian GNU/Linux as Linux Distribution
many informations on Bugtraq, like SUN, MS Windows, MacOS, etc related
Mails are not really important for me but I spend anyway bandwith for
recieving them, I pay every 'single byte' on my connection.

My question is: Is it convenient to subscirbe _only_ to the Debian
Security Mailing List keeping in mind only security related to this
Distribution and Server Platform, or are there maybe some 'important'
informations on BugTraq which maybe will never be posted on the Debian
Security List ? 

For now I think many Debian Developers and Users read everyday BugTraq,
too, and may see if there are common problems which could affect
also Debian Security, and post them in a second time here.

I hope my ideas are right and thanks for any suggestions...

Have fun,
Ivo Marino

-- 

 
 Ivo Marino[EMAIL PROTECTED]
 UN*X Developer, running Debian GNU/Linux
 DALnet #flex
 http://eimbox.org
 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Firewall Related Question

2001-10-24 Thread J.R. Blain

Using kernel 2.2, I run a bridge, that handles packet filtering with
ipchains.

Patches are available here:
http://www.ac2i.tzo.com/bridge_filter/


James wrote:
> 
> That link might help...
> http://www.linuxdoc.org/HOWTO/mini/Bridge+Firewall.html
> 
> - James
> 
> -Original Message-
> From: Alson van der Meulen [mailto:[EMAIL PROTECTED]]
> Sent: Monday, October 22, 2001 1:31 PM
> To: Debian Security List
> Subject: Re: Firewall Related Question
> 
> On Mon, Oct 22, 2001 at 10:17:59AM -0700, tony mancill wrote:
> > I'd recommend the former (firewalling on each server).  This will let you
> > customize the firewall for that server alone, and spread the packet
> > filtering load and logging.  Also, with no access the Cisco box, you'd
> > have to either MASQ or SNAT with proxy arps if you do insert a firewall
> > into the packet path to get the traffic to cross the firewall.  (The Cisco
> > is going to assume that the subnet with the DMZ address space is still
> > directly attached.)
> With FreeBSD/OpenBSD, you could use a packet filtering bridge (quit nice
> IMO), put two ethernet cards in a box, one to cisco, second to switch
> with Debian servers, no need for an IP address at the bridge, just
> bridge and firewall.
> 
> I'm not sure if Linux can do this, maybe there are some patches for
> iptables to do it?
> 
> > On Mon, 22 Oct 2001, James wrote:
> >
> > > Yes, you could definitely do a firewall on each server.
> > >
> > > Also, have you considered setting up a 4th machine between the Cisco and
> 3
> > > servers?  That could work also.  You wouldn't make it a masq box, just
> > > configure it to pass packets based on the rules.
> > >
> > > - James
> > >
> > > -Original Message-
> > > From: Alson van der Meulen [mailto:[EMAIL PROTECTED]]
> > > Sent: Monday, October 22, 2001 6:58 AM
> > > To: Debian Security List
> > > Subject: Re: Firewall Related Question
> > >
> > >
> > > On Mon, Oct 22, 2001 at 12:44:03PM +0200, eim wrote:
> > > > I've got some simple questions related to using a Firewall on
> > > > some single pubblic Debian Boxes, I choose to post my questions
> > > > here because I've always securitty in mind during the Developing
> > > > time of my Network Services.
> > > >
> > > > Let me asume I've got a simple Network with 3 Pubblic Debian
> > > > Servers and 1 Cisco Router (Internet Gateway).
> > > >
> > > > The router belongs to my Connection ISP so I can't configure it,
> > > > but onlu use it for Internet connectivity.
> > > >
> > > > The 3 Debian Boxes are under my full control.
> > > >
> > > > The best way to protect my Debian Servers would be to install
> > > > a Firewall on my Gateway (Cisco Router) but actually I can't,
> > > > so my question is: Can I install a Firewall on each of my Debian
> > > > Boxes to filter/block incoming and outgoing Network Traffic ?
> > > >
> > > > Is this a good choice ? or should I put another machine in my
> > > > Network, between the Gateway and the Servers, which acts as Firewall ?
> > > You can just configure a packet filter on all your servers, the main
> > > disadvantage is that it's more difficult to administer
> --
> ,---.
> > Name:   Alson van der Meulen  <
> > Personal:[EMAIL PROTECTED]<
> > School:   [EMAIL PROTECTED]<
> `---'
> I remember the last time I saw it do that...
> -
> 
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact
> [EMAIL PROTECTED]
> 
>   
>  Name: Linux Bridge+Firewall 
>Mini-HOWTO version 1.2.0.url
>Linux Bridge+Firewall Mini-HOWTO version 1.2.0.urlType: unspecified type 
>(application/octet-stream)
>  Encoding: quoted-printable


J.R. Blain
http://www.clockmedia.com/
-- 
Real programmers use chmod +x /dev/random and cross their fingers
-- Comment found in a vi/emacs flamewar on slashdot.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Intro - Design, Engineering, Manufacturing, and more

2001-10-24 Thread Richard Ibbotson

Dear All


> Igoework.com is represented by a group that includes:


Pardon me for wasting bandwidth but am I the only person who is 
getting a bounced multiple repeated message of this sort from the 
Debian security list  ?

Thank you



-- 
Richard


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Intro - Design, Engineering, Manufacturing, and more

2001-10-24 Thread Igoework.com Inc.

Please allow us to introduce ourselves,

Igoework.com is represented by a group that includes:

- Talented engineers(Mechanical and Electrical)
- Software solutions(CAD, FEA)
- Manufacturing vendors (Castings, Sheet Metal, Plastics, SLA, etc)
- Technical placement   (Direct placement of talent)

Our company has put together all these resources to bring you a complete
integrated solution to all of your technical needs. Our engineers are
experienced with Pro/Engineer and Solidworks suite of products. Also, our
Electrical engineers are prepared to handle any type of project. In
addition, we supervise the quality and delivery  of all of our
manufacturing from proven and qualified vendors. Our software and
technical placement solutions will be introduced depending on your needs. 

More information is available from our website.

We would appreciate your consideration or referral to any interested
party. Please contact us at your convenience.

Best Regards,

Manuel Paez, President
Igoework.com Inc.
http://www.igoework.com
Cell: 847-477-1367
Fax: 847-745-0348 
Illinois, USA

Confidentiality Note: This message is confidential and intended only for
the use of the addressee(s) named above. It may contain legally privileged
material. Dissemination, distribution or copying of this message, other
than by such addressee(s), is strictly prohibited. If you have received
this message in error, please immediately notify us by reply and delete
this message and all its attachments.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Firewall Related Question

2001-10-24 Thread Alson van der Meulen
On Wed, Oct 24, 2001 at 01:36:10AM -0400, James wrote:
> That link might help...
> http://www.linuxdoc.org/HOWTO/mini/Bridge+Firewall.html

Note also that until recently (kernel 2.0.25) the 3c509 driver could not
be used for more than one card if used as a module. I
have seen a patch floating around that fixes the oversight. It may be in
the kernel when you read this.
...
ipfwadm -I -l ipfwadm -O -l ipfwadm -F -l

Looks like quite outdated to me, are there any more recent documents?
(Not that I really have to setup such bridging firewall for now, but
still...)
-- 
,---.
> Name:   Alson van der Meulen  <
> Personal:[EMAIL PROTECTED]<
> School:   [EMAIL PROTECTED]<
`---'
Do you smell something?
-



Re: Connection problem

2001-10-24 Thread Emmanuel Lacour
On Tue, Oct 23, 2001 at 12:09:36PM +0200, Emmanuel Lacour wrote:
> Hi,
> 
> It's maybe a little bit off topic, but I think someone in this list can
> help me:
> 
> I've got a firewall debian potato, kernel 2.2.17pre6, doing masquerading
> and other rules over an adsl pppoe line. All worked perfectly but since
> two weeks ( without doing any changes ) I'm unable to go to certain
> sites. Tcpdump show me that the connection close in the middle.
> Something like this:
> 
> 
> 11:36:16.439327 a.b.c.26.https > d.e.f.36.62968: P
> 1269:1340(71) ack 214 win 17307 (DF)
> 11:36:16.495429 d.e.f.36.62969 > a.b.c.21.www: S
> 10634093:10634093(0) win 8192  (DF)
> 11:36:16.571944 d.e.f.36.62968 > a.b.c.26.https: . ack 1340
> win 7421 (DF)
> 11:36:16.591005 a.b.c.21.www > d.e.f.36.62969: S
> 3660606280:3660606280(0) ack 10634094 win 17520  1460,nop,nop,sackOK> (DF)
> 11:36:16.591218 d.e.f.36.62969 > a.b.c.21.www: . ack 1 win
> 8760 (DF)
> 11:36:16.591569 d.e.f.36.62969 > a.b.c.21.www: P 1:267(266)
-Snip--


Ok , to close this message (out of list topics), I just explain how I
solved my problem.

A few days ago I was playing with ipsec and adsl pppoe. This was a mtu
problem so I played with clampmss fragicmp overridemtu in rp-pppoe and
ipsec.conf.
And I leaved pppoe.conf with a clampmss=no.
I set it to 1412 and now all works perfectly.


The end.


-- 
Easter-eggsSpécialiste GNU/Linux
44-46 rue de l'Ouest  -  75014 Paris   -   France -  Métro Gaité
Phone: +33 (0) 1 43 35 00 37- Fax: +33 (0) 1 41 35 00 76
mailto:[EMAIL PROTECTED]   -http://www.easter-eggs.com


pgpiLhScogeEI.pgp
Description: PGP signature


Re: Firewall Related Question

2001-10-24 Thread Alson van der Meulen

On Wed, Oct 24, 2001 at 01:36:10AM -0400, James wrote:
> That link might help...
> http://www.linuxdoc.org/HOWTO/mini/Bridge+Firewall.html

Note also that until recently (kernel 2.0.25) the 3c509 driver could not
be used for more than one card if used as a module. I
have seen a patch floating around that fixes the oversight. It may be in
the kernel when you read this.
...
ipfwadm -I -l ipfwadm -O -l ipfwadm -F -l

Looks like quite outdated to me, are there any more recent documents?
(Not that I really have to setup such bridging firewall for now, but
still...)
-- 
,---.
> Name:   Alson van der Meulen  <
> Personal:[EMAIL PROTECTED]<
> School:   [EMAIL PROTECTED]<
`---'
Do you smell something?
-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




qmail ERR- authorization

2001-10-24 Thread skubij
I have problem with authorization qmail pop3 clients. I don't know why 
qmail-pop3 not authorize my users on all accounts. When we use client from 
WWW that is goot. 



Re: Does Debian need to enforce a better Security policy for packages?

2001-10-24 Thread Paul Haesler
> > The alternative is the "ostrich" method of security management.
>
> What's that kind of method? I never heared about that name.

It was once a widespread belief that the ostrich's method of "hiding"
from predators was to bury it's head in the sand. This is obviously
untrue, but the concept has worked its way into the english 
language.  It's an idiom for dealing with problems by pretending 
they aren't there. 

I don't feel the metaphor was particularly valid in this case however.

If you want an audited O/S, use OpenBSD, but be prepared for
a very small distribution by Debian standards.

And even OpenBSD don't audit every single line of code in every 
package - they audit "every critical software component".  That
word "critical" wouldn't be there if it didn't mean something.

--
Paul Haesler[EMAIL PROTECTED]
ICQ: 124547085



Re: Does Debian need to enforce a better Security policy for packages?

2001-10-24 Thread Christian Kurz
On 23/10/01, Michael Robinson wrote:
> On Tue, Oct 23, 2001 at 09:55:04AM +0200, Christian Kurz wrote:
> > Do you know how difficult and time-consuming it really is to do a manual
> > source code audit? Also the available programs for source code audits
> > can only give you hints which parts of a program might be suspicious, but
> > you still would have to verify everything by hand to be really sure. 

> FreeBSD does it for their ports tree.  In fact, this has been a matter of

Does what? Just look for some suspicous functions or code-fragments or
do a full audiit for the whole source? 

> Yes, source-code audits are time-consuming.  Time-consuming is different
> from "not possible", however.

Why the hell do you try to interpret into my previous e-Mail that I'm
saying they would be "not possible"? Maybe you need to read it again,
but it clearly states, that a full audit of the code for one package
takes an enourmous account of time and that you also need quite lots of
knowledge for such a task. And especially since we talked about having
an audit _before_ having the package be included as a debian package
into the archive, a full audit of all new packages would decrease the
number of packages entering the archive and also take a very long time,
since everyone here is a volunteer. Also you still have the problem left
with about 8000 packages being already included in debian and having
mostly never had a full audit. So for really auditing debian and
ensuring that every malicous code is found and either removed or fixed,
you would have to drop all packages and start with for example init and
audit it. After that once if full audit, you can move on to for example
login and so on, until you audited every package from the current number
of packages completely. Until such an effort has been made to ensure,
that there's currently no malicous code included in debian, a full audit
of new packages would only be the tip of an iceberg.

> The alternative is the "ostrich" method of security management.

What's that kind of method? I never heared about that name.

Christian
-- 
   Debian Developer (http://www.debian.org)
1024/26CC7853 31E6 A8CA 68FC 284F 7D16  63EC A9E6 67FF 26CC 7853


pgp0U8rBFQHYh.pgp
Description: PGP signature


Re: Connection problem

2001-10-24 Thread Emmanuel Lacour

On Tue, Oct 23, 2001 at 12:09:36PM +0200, Emmanuel Lacour wrote:
> Hi,
> 
> It's maybe a little bit off topic, but I think someone in this list can
> help me:
> 
> I've got a firewall debian potato, kernel 2.2.17pre6, doing masquerading
> and other rules over an adsl pppoe line. All worked perfectly but since
> two weeks ( without doing any changes ) I'm unable to go to certain
> sites. Tcpdump show me that the connection close in the middle.
> Something like this:
> 
> 
> 11:36:16.439327 a.b.c.26.https > d.e.f.36.62968: P
> 1269:1340(71) ack 214 win 17307 (DF)
> 11:36:16.495429 d.e.f.36.62969 > a.b.c.21.www: S
> 10634093:10634093(0) win 8192  (DF)
> 11:36:16.571944 d.e.f.36.62968 > a.b.c.26.https: . ack 1340
> win 7421 (DF)
> 11:36:16.591005 a.b.c.21.www > d.e.f.36.62969: S
> 3660606280:3660606280(0) ack 10634094 win 17520  1460,nop,nop,sackOK> (DF)
> 11:36:16.591218 d.e.f.36.62969 > a.b.c.21.www: . ack 1 win
> 8760 (DF)
> 11:36:16.591569 d.e.f.36.62969 > a.b.c.21.www: P 1:267(266)
-Snip--


Ok , to close this message (out of list topics), I just explain how I
solved my problem.

A few days ago I was playing with ipsec and adsl pppoe. This was a mtu
problem so I played with clampmss fragicmp overridemtu in rp-pppoe and
ipsec.conf.
And I leaved pppoe.conf with a clampmss=no.
I set it to 1412 and now all works perfectly.


The end.


-- 
Easter-eggsSpécialiste GNU/Linux
44-46 rue de l'Ouest  -  75014 Paris   -   France -  Métro Gaité
Phone: +33 (0) 1 43 35 00 37- Fax: +33 (0) 1 41 35 00 76
mailto:[EMAIL PROTECTED]   -http://www.easter-eggs.com

 PGP signature


Re: Potato 2.2r3 and Kernel 2.2.19 Questions

2001-10-24 Thread Blars Blarson
In article <[EMAIL PROTECTED]> [EMAIL PROTECTED] writes:
>On Wed, Oct 24, 2001 at 01:18:52AM +, Martin WHEELER wrote:
>> On Tue, 23 Oct 2001, Ethan Benson wrote:

>> > kernels are never upgraded automatically by apt, you have to do it
>> > yourself:

>> That's not quite true -- should you recompile your own kernel, and for
>> whatever reason, NOT give that new kernel a debian-style name which
>> conforms *exactly* to the debian naming conventions, you will be
>> pestered for evermore with attempts by apt to 'upgrade' to the latest
>> (plain vanilla) version.

Watch out when dselect (and I assume apt) desides to upgrade a kernel
image -- I just had the 2.2.19 kernel image upgraded on my testing box
and it made the /vmlinuz link point to the 2.2.19 kernel, when it had
been 2.4.9 before.  Since the 2.4.9 needed initrd, I assume neither
would have had trouble booting if I hadn't fixed things.  (Fortunatly,
I had a third kernel not using the links as the default to boot, and I
noticed and fixed things up.)
-- 
Blars Blarson   [EMAIL PROTECTED]
http://www.blars.org/blars.html
"Text is a way we cheat time." -- Patrick Nielsen Hayden



qmail ERR- authorization

2001-10-24 Thread skubij

I have problem with authorization qmail pop3 clients. I don't know why 
qmail-pop3 not authorize my users on all accounts. When we use client from 
WWW that is goot. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Does Debian need to enforce a better Security policy for packages?

2001-10-24 Thread Paul Haesler

> > The alternative is the "ostrich" method of security management.
>
> What's that kind of method? I never heared about that name.

It was once a widespread belief that the ostrich's method of "hiding"
from predators was to bury it's head in the sand. This is obviously
untrue, but the concept has worked its way into the english 
language.  It's an idiom for dealing with problems by pretending 
they aren't there. 

I don't feel the metaphor was particularly valid in this case however.

If you want an audited O/S, use OpenBSD, but be prepared for
a very small distribution by Debian standards.

And even OpenBSD don't audit every single line of code in every 
package - they audit "every critical software component".  That
word "critical" wouldn't be there if it didn't mean something.

--
Paul Haesler[EMAIL PROTECTED]
ICQ: 124547085


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Does Debian need to enforce a better Security policy for packages?

2001-10-24 Thread Christian Kurz

On 23/10/01, Michael Robinson wrote:
> On Tue, Oct 23, 2001 at 09:55:04AM +0200, Christian Kurz wrote:
> > Do you know how difficult and time-consuming it really is to do a manual
> > source code audit? Also the available programs for source code audits
> > can only give you hints which parts of a program might be suspicious, but
> > you still would have to verify everything by hand to be really sure. 

> FreeBSD does it for their ports tree.  In fact, this has been a matter of

Does what? Just look for some suspicous functions or code-fragments or
do a full audiit for the whole source? 

> Yes, source-code audits are time-consuming.  Time-consuming is different
> from "not possible", however.

Why the hell do you try to interpret into my previous e-Mail that I'm
saying they would be "not possible"? Maybe you need to read it again,
but it clearly states, that a full audit of the code for one package
takes an enourmous account of time and that you also need quite lots of
knowledge for such a task. And especially since we talked about having
an audit _before_ having the package be included as a debian package
into the archive, a full audit of all new packages would decrease the
number of packages entering the archive and also take a very long time,
since everyone here is a volunteer. Also you still have the problem left
with about 8000 packages being already included in debian and having
mostly never had a full audit. So for really auditing debian and
ensuring that every malicous code is found and either removed or fixed,
you would have to drop all packages and start with for example init and
audit it. After that once if full audit, you can move on to for example
login and so on, until you audited every package from the current number
of packages completely. Until such an effort has been made to ensure,
that there's currently no malicous code included in debian, a full audit
of new packages would only be the tip of an iceberg.

> The alternative is the "ostrich" method of security management.

What's that kind of method? I never heared about that name.

Christian
-- 
   Debian Developer (http://www.debian.org)
1024/26CC7853 31E6 A8CA 68FC 284F 7D16  63EC A9E6 67FF 26CC 7853

 PGP signature


Re: Potato 2.2r3 and Kernel 2.2.19 Questions

2001-10-24 Thread Ethan Benson
On Wed, Oct 24, 2001 at 01:18:52AM +, Martin WHEELER wrote:
> On Tue, 23 Oct 2001, Ethan Benson wrote:
> 
> > kernels are never upgraded automatically by apt, you have to do it
> > yourself:
> 
> That's not quite true -- should you recompile your own kernel, and for
> whatever reason, NOT give that new kernel a debian-style name which
> conforms *exactly* to the debian naming conventions, you will be
> pestered for evermore with attempts by apt to 'upgrade' to the latest
> (plain vanilla) version.

well yes, the reason kernel images are not automatically upgraded from
r2 -> r3 is because its a different package

r2: kernel-image-2.2.18 Version: 2.2.18-1
r3: kernel-image-2.2.19 Version: 2.2.19-1

different package so why would apt upgrade it.  (and yes i know its
actually a pre-something in r2, thats beside the point).

if you create your own kernel-image-2.2.19 package and your version
number is not greater then the debian one then yes apt will try to
upgrade it like any other package, and this in fact occurs sometimes
in unstable dists since the kernel version is the same, but a few
debian revisions will be done (-2 -3 -4 etc), this very rarly to never
effects the stable release since by the time a new stable is released
a much newer kernel is available and used.

its also possible the 2.2.19 images will get a backported security
patch which would cause an automatic apt upgrade for anyone with the
2.2.19 image already installed.

as for your custom kernel problem the solution is trivial:

make-kpkg --revision=5:2.2.19-1

or --revision=5:2.2.19-`hostname`.1  is something i use.  the 5: is an
epoch which will make your version number always newwer then any
debian version (unless a debian kernel somehow gets an epoch larger
then 5, a very unlikly scenerio).

one last point, if you never actually install a kernel-image package
after you install a new system from boot-floppies apt will never
upgrade you kernel, since boot-floppies don't install any kernel-image
they simply untar the modules into /lib/modules and cp the vmlinux
files to /boot and symlink it to /  dpkg never knows about it.

-- 
Ethan Benson
http://www.alaska.net/~erbenson/


pgpQxQRBWO2Ev.pgp
Description: PGP signature


RE: Unidentified subject!

2001-10-24 Thread James



I've 
been told that usually means just a corrupt/damaged packet and shouldn't be much 
to worry about, unless you are getting lots of them (Might be an 
attack).
 
- 
James

  -Original Message-From: sonam dukda 
  [mailto:[EMAIL PROTECTED]Sent: Tuesday, October 23, 2001 4:52 
  AMTo: debian-security@lists.debian.orgSubject: 
  Unidentified subject!
  Hi!
   
  The message on our server is " IP-MASQ:reverse 
  ICMP:failed checksum from 202.144.129.2!". What does this mean? Also the 
  internet access has become very slow. We are connected at 64 Kbps leased 
  line.
   
  sonam


Re: Potato 2.2r3 and Kernel 2.2.19 Questions

2001-10-24 Thread Blars Blarson

In article <[EMAIL PROTECTED]> [EMAIL PROTECTED] writes:
>On Wed, Oct 24, 2001 at 01:18:52AM +, Martin WHEELER wrote:
>> On Tue, 23 Oct 2001, Ethan Benson wrote:

>> > kernels are never upgraded automatically by apt, you have to do it
>> > yourself:

>> That's not quite true -- should you recompile your own kernel, and for
>> whatever reason, NOT give that new kernel a debian-style name which
>> conforms *exactly* to the debian naming conventions, you will be
>> pestered for evermore with attempts by apt to 'upgrade' to the latest
>> (plain vanilla) version.

Watch out when dselect (and I assume apt) desides to upgrade a kernel
image -- I just had the 2.2.19 kernel image upgraded on my testing box
and it made the /vmlinuz link point to the 2.2.19 kernel, when it had
been 2.4.9 before.  Since the 2.4.9 needed initrd, I assume neither
would have had trouble booting if I hadn't fixed things.  (Fortunatly,
I had a third kernel not using the links as the default to boot, and I
noticed and fixed things up.)
-- 
Blars Blarson   [EMAIL PROTECTED]
http://www.blars.org/blars.html
"Text is a way we cheat time." -- Patrick Nielsen Hayden


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




RE: Firewall Related Question

2001-10-24 Thread James
That link might help...
http://www.linuxdoc.org/HOWTO/mini/Bridge+Firewall.html

- James

-Original Message-
From: Alson van der Meulen [mailto:[EMAIL PROTECTED]
Sent: Monday, October 22, 2001 1:31 PM
To: Debian Security List
Subject: Re: Firewall Related Question


On Mon, Oct 22, 2001 at 10:17:59AM -0700, tony mancill wrote:
> I'd recommend the former (firewalling on each server).  This will let you
> customize the firewall for that server alone, and spread the packet
> filtering load and logging.  Also, with no access the Cisco box, you'd
> have to either MASQ or SNAT with proxy arps if you do insert a firewall
> into the packet path to get the traffic to cross the firewall.  (The Cisco
> is going to assume that the subnet with the DMZ address space is still
> directly attached.)
With FreeBSD/OpenBSD, you could use a packet filtering bridge (quit nice
IMO), put two ethernet cards in a box, one to cisco, second to switch
with Debian servers, no need for an IP address at the bridge, just
bridge and firewall.

I'm not sure if Linux can do this, maybe there are some patches for
iptables to do it?

> On Mon, 22 Oct 2001, James wrote:
>
> > Yes, you could definitely do a firewall on each server.
> >
> > Also, have you considered setting up a 4th machine between the Cisco and
3
> > servers?  That could work also.  You wouldn't make it a masq box, just
> > configure it to pass packets based on the rules.
> >
> > - James
> >
> > -Original Message-
> > From: Alson van der Meulen [mailto:[EMAIL PROTECTED]
> > Sent: Monday, October 22, 2001 6:58 AM
> > To: Debian Security List
> > Subject: Re: Firewall Related Question
> >
> >
> > On Mon, Oct 22, 2001 at 12:44:03PM +0200, eim wrote:
> > > I've got some simple questions related to using a Firewall on
> > > some single pubblic Debian Boxes, I choose to post my questions
> > > here because I've always securitty in mind during the Developing
> > > time of my Network Services.
> > >
> > > Let me asume I've got a simple Network with 3 Pubblic Debian
> > > Servers and 1 Cisco Router (Internet Gateway).
> > >
> > > The router belongs to my Connection ISP so I can't configure it,
> > > but onlu use it for Internet connectivity.
> > >
> > > The 3 Debian Boxes are under my full control.
> > >
> > > The best way to protect my Debian Servers would be to install
> > > a Firewall on my Gateway (Cisco Router) but actually I can't,
> > > so my question is: Can I install a Firewall on each of my Debian
> > > Boxes to filter/block incoming and outgoing Network Traffic ?
> > >
> > > Is this a good choice ? or should I put another machine in my
> > > Network, between the Gateway and the Servers, which acts as Firewall ?
> > You can just configure a packet filter on all your servers, the main
> > disadvantage is that it's more difficult to administer
--
,---.
> Name:   Alson van der Meulen  <
> Personal:[EMAIL PROTECTED]<
> School:   [EMAIL PROTECTED]<
`---'
I remember the last time I saw it do that...
-


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]


Linux Bridge+Firewall Mini-HOWTO version 1.2.0.url
Description: Binary data


Re: Potato 2.2r3 and Kernel 2.2.19 Questions

2001-10-24 Thread Nicole Zimmerman
I would suggest adding the testing source to your /etc/apt/sources.list
and grabbing kernel-source-2.2.19 (version 2.2.19.1-1 has the security
patches in question).

Edit /etc/apt/sources.list
Add deb http://http.us.debian.org/debian/ testing main 
Save the file.
apt-get update
apt-get install kernel-source-2.2.19

Once you are done, you can take the testing source out.

Unpack the source:
cd /usr/src; tar xIvf kernel-source-2.2.19.tar.bz2
[if you are using a version of bzip2 later than what is in stable, you
will need j instead of I]

Configure your kernel as you usually would (make menuconfig, make xconfig,
whatever).

Install kernel-package:
apt-get install kernel-package

Use make-kpkg to build your kernel instead of doing it by hand.
make-kpkg buildpackage
[you can pass the --revision and --flavour arguments to make it appear as
something other than Custom_1.00]

Using make-kpkg takes out all of the inbetween steps and leaves you with
a customized kernel-image-2.2.19.

Go up to the parent directory and install your kernel image with dpkg. It
will handle moving your old kernel to a vmlinuz.old link and your new
kernel to a vmlinuz link. The default configuration of lilo knows how to
handle them both and they will both be bootable should you need to revert
to the old kernel. dpkg of course also handles the proper placement of
modules and such as well.

make-kpkg always seemed to be the best way to make your own kernel but
stay debian-friendly to me. It makes a LOT of sense if you have a lot of
boxes that are very similar in hardware.

-nicole

At 19:09 on Oct 23, eim combined all the right letters to say:

> Actually I'm runnning Potato 2.2r2 on some Debian Boxes which
> I've upgraded to 2.2r3, the Kernel which powers the system is
> still 2.2.18pre21 while for the 2.2r3 Release of Potato it should
> be version 2.2.19
> 
> So, correct me if I'm wrong but Debian Potato 2.2r3 comes out
> with Kernel 2.2.19, right ?
> 
> Well, if so, I want to upgrade from 2.2.18pre21 to 2.2.19, apply
> the "new RAID Style" Patch and the latest security Patch.
> 
> My question is this: Debian's 2.2.19 kernel-source package is
> allready avaiable with the latest Kernel security patch or should
> I download the patch form openwall.com and apply externaly ?
> 
> Thank you for suggestions,
> have a good work !
> 
> Ivo Marino
>