Re: Syslog config file.

2001-12-05 Thread Yotam Rubin

On Wed, Dec 05, 2001 at 09:00:57AM +0100, Robert Magier wrote:
 On Wed, 5 Dec 2001, Yotam Rubin wrote:
 
  Nothing, it's a runtime argument. When invoking syslogd, use the -f
  argument to specify an alternative configuration file. This is documented in
  the man page.
 
  Regards, Yotam Rubin
 
 
 Yes, I know it is an runtime argument,but if you don't set this, and just
 type
 syslogd /etc/syslog.conf will be load by default.
 This is what I want to change.
 For example, I want my syslog to forward all logs to another server, but I
 don't want anyone who would compromise my system to get it know too easly.

A simple 'grep syslog\.conf' in the source tree revealed that the default
configuration file path is contained in paths. This does not provide any 
sort of protection. The intruder can strace syslogd and determine which 
file it opens. I'm against this sort of security, but you can try to obscure
the configuration file location in the following manner: 
Create a wrapper script which copies the real configuration file to some
temporary location, e.g. /tmp/zaboo.conf. Invoke syslogd in the wrapper 
specifying the temporary configuration file. After syslogd detaches, remove the 
temporary configuration file. Of course, you need to obscure the location of
the wrapper, so this is an endless game, unless you add some non-standard 
ACL features to your kernel.

Regards, Yotam Rubin

 
 
 --
 Robert Magier
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Re: How do I disable (close) ports?

2001-12-05 Thread J. Paul Bruns-Bielkowicz

Thanks for all the response, comments and suggestions. Moving portmapper
from /etc/init.d solved my issue. As for commenting our services in
/etc/services, I am surprised that this isn't supposed to work and that it
is not the proper way to disable services.

I have a restricted services file and a default (open) services file. Some
services are disabled, i.e.
9/tcp  opendiscard
13/tcp opendaytime
109/tcpopenpop-2
987/tcpopenunknown
by commenting them out of /etc/services.
Thanks,
J. Paul Bruns-Bielkowicz
http://www.america.prv.pl


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Re: How do I disable (close) ports?

2001-12-05 Thread Rolf Kutz

J. Paul Bruns-Bielkowicz ([EMAIL PROTECTED]) wrote:
 
 I have a restricted services file and a default (open) services file. Some
 services are disabled, i.e.
 9/tcp  opendiscard
 13/tcp opendaytime
 109/tcpopenpop-2
 987/tcpopenunknown
 by commenting them out of /etc/services.

Commenting out things in /etc/services doesn't
disable anything. If you want to disable services,
edit /etc/inetd.conf, /etc/hosts.allow,
/etc/hosts.deny and the scripts in /etc/init.d/,
but maybe that's what you meant.

Then portscan you maschine to make sure, the ports
are deactivated.

- Rolf


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Re: How do I disable (close) ports?

2001-12-05 Thread Rolf Kutz

J. Paul Bruns-Bielkowicz ([EMAIL PROTECTED]) wrote:
  Commenting out things in /etc/services doesn't
  disable anything.
 
 It seems to. The above ports were closed just by commenting them out of
 /etc/services  and then rebooting.

How did you verify?
 
 No, I just changed /etc/services

It's just mapping ports, so 

$ telnet 127.0.0.1 nntp 

works, if you have a newsserver installed, but 

$ telnet 127.0.0.1 119 

should still work.

- Rolf


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: How do I disable (close) ports?

2001-12-05 Thread Ralf Dreibrodt

Hi,

J. Paul Bruns-Bielkowicz wrote:
 
  Commenting out things in /etc/services doesn't
  disable anything.
 
 It seems to. The above ports were closed just by commenting them out of
 /etc/services  and then rebooting.

well, there are daemons which don't know on which port they should run.
they look in /etc/services for a special name and want to run on the specific port.
if they don't find the special name in /etc/services they abort with an error message.

so removing lines from /etc/services might help, but now, every time, when you are
booting, the daemon tries to start and generates an error message.

but who says, that if you do an apt-get update/upgrade, that newer versions of the same
daemon does not have a default port?
and why do you want to upgrade software, that you don't need?

well, it is just like installing mysql and never starting it...useless.

Bye
Ralf


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Re: How do I disable (close) ports?

2001-12-05 Thread Vegard Engen

On Wed, Dec 05, 2001 at 01:24:54PM +0100, J. Paul Bruns-Bielkowicz wrote:
 - Original Message -
 From: Rolf Kutz [EMAIL PROTECTED]
  Commenting out things in /etc/services doesn't
  disable anything.
 
 It seems to. The above ports were closed just by commenting them out of
 /etc/services  and then rebooting.
 

This is *purely* by coincidence, because the startup-scripts does indeed use
the NAME for the startup, and not the port. It's quite possible that some
package upgrade will change this, and suddenly, the services will start.

Trust us, this is *not* the way to disable services.

Did you even read all things said in this thread? I gave a rather lengthy
description in an earlier mail, and there's also been numerous good replys,
most of them telling you that editing /etc/services is not the correct way
to disable services. It might work, yes, but system changes may change that
later, and you'll have to use the *correct* way then. Just use the correct
way in the FIRST place, i.e. removing the startup scripts from the
correct /etc/rc?.d/-catalog, as I described, and commenting out from
/etc/inetd.conf

You're not going to become a good Linux-administrator before you realize
that you should UNDERSTAND what you do instead of just guessing and be
happy because it worked.
-- 
- Vegard Engen, member of the first RFC1149 implementation team.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Re: How do I disable (close) ports?

2001-12-05 Thread J. Paul Bruns-Bielkowicz

 How did you verify?

I'm using nmap  netstat.

J. Paul Bruns-Bielkowicz
http://www.america.prv.pl


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Fw: Re: How do I disable (close) ports?

2001-12-05 Thread J. Paul Bruns-Bielkowicz


 Did you even read all things said in this thread?

Of course I did (er, am reading) read it. All these comments are very
insightful and I am saying that I am surprised, because commenting out
services in /etc/services has been working for me for the most part. Not to
add that the ports I posted previously are closed by commenting them out of
/etc/services even though this is NOT the proper way to disable ports.

J. Paul Bruns-Bielkowicz
http://www.america.prv.pl


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Re: How do I disable (close) ports?

2001-12-05 Thread J. Paul Bruns-Bielkowicz

 You're not going to become a good Linux-administrator before you realize
 that you should UNDERSTAND what you do instead of just guessing and be
 happy because it worked.

Becoming a good administrator is making it work and keeping it working. It
seems there is an official way of closing the ports and an unofficial
(wrong?) way of doing it. Understanding is gained, among others through
experience, and this is quite an experience judging by quantity of replies

Thanks,
J. Paul Bruns-Bielkowicz
http://www.america.prv.pl


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Re: How do I disable (close) ports?

2001-12-05 Thread Vegard Engen

On Wed, Dec 05, 2001 at 02:04:32PM +0100, J. Paul Bruns-Bielkowicz wrote:
  You're not going to become a good Linux-administrator before you realize
  that you should UNDERSTAND what you do instead of just guessing and be
  happy because it worked.
 
 Becoming a good administrator is making it work and keeping it working. It
 seems there is an official way of closing the ports and an unofficial
 (wrong?) way of doing it. Understanding is gained, among others through
 experience, and this is quite an experience judging by quantity of replies
 

Yes, you are right, sorry about my rather harsh reply. Just that I've been
in the game some time, seeing too many people who refuse to learn, who
wants a simple way spoonfead to them, and refusing to even look at
documentation even when pointed at specific documents. Sometimes, you
jump to the wrong conclusions too early.

But listen to what has been said, restore the original /etc/services file,
and disable it the correct way instead. As has been pointed out, none of
the things you have done are guaranteed to work after your next package
update of Debian.
-- 
- Vegard Engen, member of the first RFC1149 implementation team.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: apache - bots

2001-12-05 Thread Johann Spies

On Tue, Dec 04, 2001 at 05:04:09PM +0200, Johann Botha wrote:

  I am also interested in this. I experience frequent visits from a web
  robot on our ftp-site (with a web front).  Going to the home page of
  this robot at www.inktomi.com there was a remark that the robot respects
  robot.txt-files.
  
  How do you set up those files?
 
 http://www.robotstxt.org/wc/robots.html

Thanks Johann!


-- 
Johann Spies  Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch

 Go ye therefore, and teach all nations, baptizing them
  in the name of the Father, and of the Son, and of the 
  Holy Ghost; Teaching them to observe all things  
  whatsoever I have commanded you; and, lo, I am with 
  you alway, even unto the end of the world. Amen. 
Matthew 28:19,20 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: [SECURITY] [DSA-090-1] xtel symlink vulnerabilities

2001-12-05 Thread Patrick Hsieh

Hello,
Is OpenSSH Version: 1:2.9p2-6 also vulernable?
-- 
Patrick Hsieh [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: [SECURITY] [DSA-090-1] xtel symlink vulnerabilities

2001-12-05 Thread Patrick Hsieh

sorry.

This is my mistake. I intended to ask the openssh problem but replied to
another thread. :-(
-- 
Patrick Hsieh [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




howto enable MD5 passwords after installation on woody

2001-12-05 Thread alexis bory

hi,

I would like to enable MD5 passwords on a remote woody
server.
I wonder if it could create trouble with user accounts
already configured and with the ssh package.

Also, I don't know how to do it :)

thanks for help,

Alexis


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




ssh: Packet integrity error

2001-12-05 Thread Igor Mozetic

Has anybody seen syslog msg like this:

sshd[30847]: Accepted password for XY from x.x.x.x port 1034
sshd[30847]: Packet integrity error (58 != 62) at sshd.c:1953
sshd[30847]: Disconnecting: Packet integrity error. (34)

Is this client side protocol incompatibility or net errors or ?
I'm running potato (ssh 1.2.3-9.3).

-Igor Mozetic


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: snorting bridges? [ Was: Re: iptables with a linux bridge ]

2001-12-05 Thread wes schreiner

martin f krafft wrote:
 
 * Rens Houben [EMAIL PROTECTED] [2001.12.03 13:02:50+0100]:
  Anyways, I've been following this thread and wondering: Is there any
  reason why snort would or would not work with a bridge?
 
 snort is a tool that primarily assesses ip, tcp, and application level
 protocols. if you run it on a bridge, it will have a hard time seeing
 any data because the bridge will relay before ip is touched. snort
 should still be able to get the data because while the bridging code
 may or may not rewrite the frame and send it out on another interface,
 it does not prevent the encapsulated data to be branched off for
 snort's use. but i am not sure actually.

They who post before searching deserve what they get.  Hogwash (see
http://hogwash.sourceforge.net/ ) is exactly the marriage of snort and a
bridge.  It works quite well, and doesn't have any sort of hard time
seeing data.  

wes


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Unidentified subject!

2001-12-05 Thread antonis

unsubsribe


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Packet integrity error

2001-12-05 Thread Udo Rietschel

 From: Igor Mozetic [mailto:[EMAIL PROTECTED]] 
 Sent: Mittwoch, 5. Dezember 2001 18:46
 To: [EMAIL PROTECTED]
 Subject: ssh: Packet integrity errorI saw the same 
 
 Has anybody seen syslog msg like this:
 
 sshd[30847]: Accepted password for XY from x.x.x.x port 1034
 sshd[30847]: Packet integrity error (58 != 62) at sshd.c:1953
 sshd[30847]: Disconnecting: Packet integrity error. (34)
 
 Is this client side protocol incompatibility or net errors or 
 ? I'm running potato (ssh 1.2.3-9.3).

I saw the same message as I tried to establish a ssh protocol-version
2 connection ... alas the ssh-daemon from potato supports ssh version 1
and 1.5 connections only ;/

-Udo


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




get in the action

2001-12-05 Thread get some
Title: Untitled Document





  
  





  





  





  





  





  





  





  










Re: How do I disable (close) ports?

2001-12-05 Thread Alexander Clouter

Dmitriy Kropivnitskiy [[EMAIL PROTECTED]] wrote:

 [snip stuff which is correct]

 can point out that portmap, https, https, mysql etc cannot be stopped this 
 way. As for the inetd managed services you should comment stuff out of 
 inetd.conf or better disable inetd altogether.
 
I my opinion inetd (and better still xinetd) is a Good Thing (TM).  It allows
you to add access control lists easily to services which may not a have a
good if even have a access control system.  It also allows you to write a
network program quickly without having to learning about network protocols
(really) and instead do everything through stdin/stdout.

Also it gives you a very nice way to add unpackaged services, cleanly and
securely to your machine.  Also the program you are running only runs as with
a certain user privilage and doesn't need to be root to bind to a port less
than 1024.

My preference is to use xinetd over statically loaded services.  However I do
only run linux on a laptop and small student flat server.  For services which
are being constantly being started and stopped then (x)inetd is a bad idea.
Another thing is that (x)inetd saves memory and resources if you are only
occasionly using the server as it only starts the service when it is needed.

Things not to run under inetd would be, apache, mysql, etc

have fun

Alex

-- 
 __ 
/ Money is a powerful aphrodisiac. But \
| flowers work almost as well. |
|  |
\ -- Lazarus Long  /
 -- 
\   ^__^
 \  (oo)\___
(__)\   )\/\
||w |
|| ||



msg04661/pgp0.pgp
Description: PGP signature


Re: per IP billing

2001-12-05 Thread Marcel Welschbillig

I have ip tables running and i did a test with the -c flag but i get the 
following response.

proxy:/home# iptables -A INPUT -s 10.10.1.31 -i eth0 -c ACCEPT
iptables v1.2.4: -c requires packet and byte counter

What am i missing ? where do i get a packet and byte counter ??

Marcel

Antropov Anton wrote:

 The simplest way - is to LOG packets using IPTABLES.
 My friends from Internet-provider are doing so.
 
 Another way is to use proxy-servers (like SQUID).
 
 
 Know this is a bit off subject but dose anybody know any good programs 
 to use for monitoring Megabytes per IP address. What i want to do is 
 have a LAN and be able to get data on how many MB each host downloaded 
 for billing purposes.
 



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Netscape running as root

2001-12-05 Thread Jor-el
Hi,

Why is running Netscape as root considered to be a security
problem? I just tried installing vmware on my system and it needs root to
install, and it searched for Netscape. The installer, fortunately, was an
intelligent one and proceeded with the install after I cancelled its
search for Netscape (it said the install help wouldnt be available without
Netscape).

If it is something really stupid to run Netscape as root, I'd like
to point out to VMWare that their requirement to have Netscape for the
install is bad. 

Thanks in advance for any enlightenment on this matter,
Jor-el



Re: Syslog config file.

2001-12-05 Thread Robert Magier
On Wed, 5 Dec 2001, Yotam Rubin wrote:

 Nothing, it's a runtime argument. When invoking syslogd, use the -f
 argument to specify an alternative configuration file. This is documented in
 the man page.

   Regards, Yotam Rubin


Yes, I know it is an runtime argument,but if you don't set this, and just
type
syslogd /etc/syslog.conf will be load by default.
This is what I want to change.
For example, I want my syslog to forward all logs to another server, but I
don't want anyone who would compromise my system to get it know too easly.


--
Robert Magier



Re: Syslog config file.

2001-12-05 Thread Yotam Rubin
On Wed, Dec 05, 2001 at 09:00:57AM +0100, Robert Magier wrote:
 On Wed, 5 Dec 2001, Yotam Rubin wrote:
 
  Nothing, it's a runtime argument. When invoking syslogd, use the -f
  argument to specify an alternative configuration file. This is documented in
  the man page.
 
  Regards, Yotam Rubin
 
 
 Yes, I know it is an runtime argument,but if you don't set this, and just
 type
 syslogd /etc/syslog.conf will be load by default.
 This is what I want to change.
 For example, I want my syslog to forward all logs to another server, but I
 don't want anyone who would compromise my system to get it know too easly.

A simple 'grep syslog\.conf' in the source tree revealed that the default
configuration file path is contained in paths. This does not provide any 
sort of protection. The intruder can strace syslogd and determine which 
file it opens. I'm against this sort of security, but you can try to obscure
the configuration file location in the following manner: 
Create a wrapper script which copies the real configuration file to some
temporary location, e.g. /tmp/zaboo.conf. Invoke syslogd in the wrapper 
specifying the temporary configuration file. After syslogd detaches, remove the 
temporary configuration file. Of course, you need to obscure the location of
the wrapper, so this is an endless game, unless you add some non-standard 
ACL features to your kernel.

Regards, Yotam Rubin

 
 
 --
 Robert Magier
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 



Re: VI wrapper for SUDO? - another bad way ??

2001-12-05 Thread Jules Bean
On Tue, Dec 04, 2001 at 08:44:34PM +0100, Gerfried Fuchs wrote:
  You have a misinformation/misinterpretation there.  It's not disabled,
 it's simply not possible in the way scripts are run.  They are passed to
 the program that is given in it's first line, after the #! - or to the
 current shell, if there is no such line.  As *argument*.

Of course it's possible.  Solaris does it, for example.

The security issues do require careful thought, though.

 
  Btw, why was this mailed to debian-security?  I don't see anything
 related to debian in that, some general linux (security)
 mailinglist/newsgroup would suit better.

Probably mismailed, intended for [EMAIL PROTECTED]

Jules



Re: Netscape running as root

2001-12-05 Thread Vegard Engen
On Tue, Dec 04, 2001 at 11:56:19PM -0600, Jor-el wrote:
 Hi,
 
   Why is running Netscape as root considered to be a security
 problem? I just tried installing vmware on my system and it needs root to
 install, and it searched for Netscape. The installer, fortunately, was an
 intelligent one and proceeded with the install after I cancelled its
 search for Netscape (it said the install help wouldnt be available without
 Netscape).

Well, it's stupid to surf as root, because there *might* be some uncovered
security holes in Netscape, and if you surf as root, any malicious things a
web-page abusing such a hole does, have the potential to do damage to the
whole machine, not only the user running it. In addition, you might revel
that a probable unix-machine is running at such and such IP, and there is
a root-user there. However, security by obscurity never was that effective,
so this is not that large a problem.

Running netscape as root to view some local html pages is not that much of
a security risk, but it depends whether or not you trust the source of the
web-pages.

   If it is something really stupid to run Netscape as root, I'd like
 to point out to VMWare that their requirement to have Netscape for the
 install is bad. 

Depends how they did it. If it was to render local web-pages, it can be
forgiven.

-- 
- Vegard Engen, member of the first RFC1149 implementation team.



Re: Re: How do I disable (close) ports?

2001-12-05 Thread J. Paul Bruns-Bielkowicz
Thanks for all the response, comments and suggestions. Moving portmapper
from /etc/init.d solved my issue. As for commenting our services in
/etc/services, I am surprised that this isn't supposed to work and that it
is not the proper way to disable services.

I have a restricted services file and a default (open) services file. Some
services are disabled, i.e.
9/tcp  opendiscard
13/tcp opendaytime
109/tcpopenpop-2
987/tcpopenunknown
by commenting them out of /etc/services.
Thanks,
J. Paul Bruns-Bielkowicz
http://www.america.prv.pl



Re: Re: How do I disable (close) ports?

2001-12-05 Thread Rolf Kutz
J. Paul Bruns-Bielkowicz ([EMAIL PROTECTED]) wrote:
 
 I have a restricted services file and a default (open) services file. Some
 services are disabled, i.e.
 9/tcp  opendiscard
 13/tcp opendaytime
 109/tcpopenpop-2
 987/tcpopenunknown
 by commenting them out of /etc/services.

Commenting out things in /etc/services doesn't
disable anything. If you want to disable services,
edit /etc/inetd.conf, /etc/hosts.allow,
/etc/hosts.deny and the scripts in /etc/init.d/,
but maybe that's what you meant.

Then portscan you maschine to make sure, the ports
are deactivated.

- Rolf



Re: Re: How do I disable (close) ports?

2001-12-05 Thread basilisk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Wed, 5 Dec 2001, Rolf Kutz wrote:

 J. Paul Bruns-Bielkowicz ([EMAIL PROTECTED]) wrote:
 
  I have a restricted services file and a default (open) services file. Some
  services are disabled, i.e.
  9/tcp  opendiscard
  13/tcp opendaytime
  109/tcpopenpop-2
  987/tcpopenunknown
  by commenting them out of /etc/services.

 Commenting out things in /etc/services doesn't
 disable anything. If you want to disable services,
 edit /etc/inetd.conf, /etc/hosts.allow,
 /etc/hosts.deny and the scripts in /etc/init.d/,
 but maybe that's what you meant.

 Then portscan you maschine to make sure, the ports
 are deactivated.

 - Rolf

If you do edit the init.d scripts don't forget to end the processes too.
Also don't just use a port scanner like nmap. have a look at lsof too

lsof -Pan -i tcp -i udp

It's quite useful.


-BEGIN PGP SIGNATURE-
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQA/AwUBPA4PktZK+ucCabUAEQIsCQCg50isGcNUXXF3gFn9OsOa9G1es/cAn1zX
bxOS4dEjRcAfKgK04DrvZkHm
=46SW
-END PGP SIGNATURE-



Re: Re: How do I disable (close) ports?

2001-12-05 Thread Rolf Kutz
basilisk ([EMAIL PROTECTED]) wrote:

 If you do edit the init.d scripts don't forget to end the processes too.

ACK.

 Also don't just use a port scanner like nmap. have a look at lsof too
 
 lsof -Pan -i tcp -i udp
 
 It's quite useful.

Right, but it doesn't help with hosts.[allow|deny]
entries, cause inetd will still listen to that
port. It's very useful to identify the process
listening, anyhow.

- Rolf



Re: Re: How do I disable (close) ports?

2001-12-05 Thread J. Paul Bruns-Bielkowicz
- Original Message -
From: Rolf Kutz [EMAIL PROTECTED]
 J. Paul Bruns-Bielkowicz ([EMAIL PROTECTED]) wrote:
 
  I have a restricted services file and a default (open) services file.
Some
  services are disabled, i.e.
  9/tcp  opendiscard
  13/tcp opendaytime
  109/tcpopenpop-2
  987/tcpopenunknown
  by commenting them out of /etc/services.

 Commenting out things in /etc/services doesn't
 disable anything.

It seems to. The above ports were closed just by commenting them out of
/etc/services  and then rebooting.

If you want to disable services,
 edit /etc/inetd.conf, /etc/hosts.allow,
 /etc/hosts.deny and the scripts in /etc/init.d/,
 but maybe that's what you meant.

No, I just changed /etc/services

J. Paul Bruns-Bielkowicz
http://www.america.prv.pl



Re: Re: How do I disable (close) ports?

2001-12-05 Thread Rolf Kutz
J. Paul Bruns-Bielkowicz ([EMAIL PROTECTED]) wrote:
  Commenting out things in /etc/services doesn't
  disable anything.
 
 It seems to. The above ports were closed just by commenting them out of
 /etc/services  and then rebooting.

How did you verify?
 
 No, I just changed /etc/services

It's just mapping ports, so 

$ telnet 127.0.0.1 nntp 

works, if you have a newsserver installed, but 

$ telnet 127.0.0.1 119 

should still work.

- Rolf



Re: How do I disable (close) ports?

2001-12-05 Thread Ralf Dreibrodt
Hi,

J. Paul Bruns-Bielkowicz wrote:
 
  Commenting out things in /etc/services doesn't
  disable anything.
 
 It seems to. The above ports were closed just by commenting them out of
 /etc/services  and then rebooting.

well, there are daemons which don't know on which port they should run.
they look in /etc/services for a special name and want to run on the specific 
port.
if they don't find the special name in /etc/services they abort with an error 
message.

so removing lines from /etc/services might help, but now, every time, when you 
are
booting, the daemon tries to start and generates an error message.

but who says, that if you do an apt-get update/upgrade, that newer versions of 
the same
daemon does not have a default port?
and why do you want to upgrade software, that you don't need?

well, it is just like installing mysql and never starting it...useless.

Bye
Ralf



Re: Re: How do I disable (close) ports?

2001-12-05 Thread Vegard Engen
On Wed, Dec 05, 2001 at 01:24:54PM +0100, J. Paul Bruns-Bielkowicz wrote:
 - Original Message -
 From: Rolf Kutz [EMAIL PROTECTED]
  Commenting out things in /etc/services doesn't
  disable anything.
 
 It seems to. The above ports were closed just by commenting them out of
 /etc/services  and then rebooting.
 

This is *purely* by coincidence, because the startup-scripts does indeed use
the NAME for the startup, and not the port. It's quite possible that some
package upgrade will change this, and suddenly, the services will start.

Trust us, this is *not* the way to disable services.

Did you even read all things said in this thread? I gave a rather lengthy
description in an earlier mail, and there's also been numerous good replys,
most of them telling you that editing /etc/services is not the correct way
to disable services. It might work, yes, but system changes may change that
later, and you'll have to use the *correct* way then. Just use the correct
way in the FIRST place, i.e. removing the startup scripts from the
correct /etc/rc?.d/-catalog, as I described, and commenting out from
/etc/inetd.conf

You're not going to become a good Linux-administrator before you realize
that you should UNDERSTAND what you do instead of just guessing and be
happy because it worked.
-- 
- Vegard Engen, member of the first RFC1149 implementation team.



Re: Re: How do I disable (close) ports?

2001-12-05 Thread J. Paul Bruns-Bielkowicz
 How did you verify?

I'm using nmap  netstat.

J. Paul Bruns-Bielkowicz
http://www.america.prv.pl



Fw: Re: How do I disable (close) ports?

2001-12-05 Thread J. Paul Bruns-Bielkowicz

 Did you even read all things said in this thread?

Of course I did (er, am reading) read it. All these comments are very
insightful and I am saying that I am surprised, because commenting out
services in /etc/services has been working for me for the most part. Not to
add that the ports I posted previously are closed by commenting them out of
/etc/services even though this is NOT the proper way to disable ports.

J. Paul Bruns-Bielkowicz
http://www.america.prv.pl



Re: Re: How do I disable (close) ports?

2001-12-05 Thread J. Paul Bruns-Bielkowicz
 You're not going to become a good Linux-administrator before you realize
 that you should UNDERSTAND what you do instead of just guessing and be
 happy because it worked.

Becoming a good administrator is making it work and keeping it working. It
seems there is an official way of closing the ports and an unofficial
(wrong?) way of doing it. Understanding is gained, among others through
experience, and this is quite an experience judging by quantity of replies

Thanks,
J. Paul Bruns-Bielkowicz
http://www.america.prv.pl



Re: apache - bots

2001-12-05 Thread Johann Spies
On Tue, Dec 04, 2001 at 05:04:09PM +0200, Johann Botha wrote:

  I am also interested in this. I experience frequent visits from a web
  robot on our ftp-site (with a web front).  Going to the home page of
  this robot at www.inktomi.com there was a remark that the robot respects
  robot.txt-files.
  
  How do you set up those files?
 
 http://www.robotstxt.org/wc/robots.html

Thanks Johann!


-- 
Johann Spies  Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch

 Go ye therefore, and teach all nations, baptizing them
  in the name of the Father, and of the Son, and of the 
  Holy Ghost; Teaching them to observe all things  
  whatsoever I have commanded you; and, lo, I am with 
  you alway, even unto the end of the world. Amen. 
Matthew 28:19,20 



Re: [SECURITY] [DSA-090-1] xtel symlink vulnerabilities

2001-12-05 Thread Patrick Hsieh
Hello,
Is OpenSSH Version: 1:2.9p2-6 also vulernable?
-- 
Patrick Hsieh [EMAIL PROTECTED]



Re: [SECURITY] [DSA-090-1] xtel symlink vulnerabilities

2001-12-05 Thread Patrick Hsieh
sorry.

This is my mistake. I intended to ask the openssh problem but replied to
another thread. :-(
-- 
Patrick Hsieh [EMAIL PROTECTED]



howto enable MD5 passwords after installation on woody

2001-12-05 Thread alexis bory
hi,

I would like to enable MD5 passwords on a remote woody
server.
I wonder if it could create trouble with user accounts
already configured and with the ssh package.

Also, I don't know how to do it :)

thanks for help,

Alexis



ssh: Packet integrity error

2001-12-05 Thread Igor Mozetic
Has anybody seen syslog msg like this:

sshd[30847]: Accepted password for XY from x.x.x.x port 1034
sshd[30847]: Packet integrity error (58 != 62) at sshd.c:1953
sshd[30847]: Disconnecting: Packet integrity error. (34)

Is this client side protocol incompatibility or net errors or ?
I'm running potato (ssh 1.2.3-9.3).

-Igor Mozetic



Re: snorting bridges? [ Was: Re: iptables with a linux bridge ]

2001-12-05 Thread wes schreiner
martin f krafft wrote:
 
 * Rens Houben [EMAIL PROTECTED] [2001.12.03 13:02:50+0100]:
  Anyways, I've been following this thread and wondering: Is there any
  reason why snort would or would not work with a bridge?
 
 snort is a tool that primarily assesses ip, tcp, and application level
 protocols. if you run it on a bridge, it will have a hard time seeing
 any data because the bridge will relay before ip is touched. snort
 should still be able to get the data because while the bridging code
 may or may not rewrite the frame and send it out on another interface,
 it does not prevent the encapsulated data to be branched off for
 snort's use. but i am not sure actually.

They who post before searching deserve what they get.  Hogwash (see
http://hogwash.sourceforge.net/ ) is exactly the marriage of snort and a
bridge.  It works quite well, and doesn't have any sort of hard time
seeing data.  

wes



Unidentified subject!

2001-12-05 Thread antonis
unsubsribe



Re: Packet integrity error

2001-12-05 Thread Udo Rietschel
 From: Igor Mozetic [mailto:[EMAIL PROTECTED] 
 Sent: Mittwoch, 5. Dezember 2001 18:46
 To: debian-security@lists.debian.org
 Subject: ssh: Packet integrity errorI saw the same 
 
 Has anybody seen syslog msg like this:
 
 sshd[30847]: Accepted password for XY from x.x.x.x port 1034
 sshd[30847]: Packet integrity error (58 != 62) at sshd.c:1953
 sshd[30847]: Disconnecting: Packet integrity error. (34)
 
 Is this client side protocol incompatibility or net errors or 
 ? I'm running potato (ssh 1.2.3-9.3).

I saw the same message as I tried to establish a ssh protocol-version
2 connection ... alas the ssh-daemon from potato supports ssh version 1
and 1.5 connections only ;/

-Udo



Re: How do I disable (close) ports?

2001-12-05 Thread Thomas Bushnell, BSG
J. Paul Bruns-Bielkowicz [EMAIL PROTECTED] writes:

  You're not going to become a good Linux-administrator before you realize
  that you should UNDERSTAND what you do instead of just guessing and be
  happy because it worked.
 
 Becoming a good administrator is making it work and keeping it working. It
 seems there is an official way of closing the ports and an unofficial
 (wrong?) way of doing it. Understanding is gained, among others through
 experience, and this is quite an experience judging by quantity of replies

Your method wil not keep it work.  The unofficial way will actually
fail to work if the demons in question are written correctly.



Re: How do I disable (close) ports?

2001-12-05 Thread Thomas Bushnell, BSG
Ralf Dreibrodt [EMAIL PROTECTED] writes:

 well, there are daemons which don't know on which port they should
 run.  they look in /etc/services for a special name and want to run
 on the specific port.  if they don't find the special name in
 /etc/services they abort with an error message.

Yeah, but that's really a bug.  Demons should be more graceful and
include a default port number to use in case /etc/services is broken.



Re: Fw: Re: How do I disable (close) ports?

2001-12-05 Thread Dmitriy Kropivnitskiy
The only thing you can accomplish by commenting stuff in /etc/services is 
that netstat and other programs will show the ports by number instead of by 
name ( you commented the translation entry ) :) The ports are still open.

On Wednesday 05 December 2001 07:59 am, J. Paul Bruns-Bielkowicz wrote:
  Did you even read all things said in this thread?

 Of course I did (er, am reading) read it. All these comments are very
 insightful and I am saying that I am surprised, because commenting out
 services in /etc/services has been working for me for the most part. Not to
 add that the ports I posted previously are closed by commenting them out of
 /etc/services even though this is NOT the proper way to disable ports.

 J. Paul Bruns-Bielkowicz
 http://www.america.prv.pl



Re: How do I disable (close) ports?

2001-12-05 Thread Dmitriy Kropivnitskiy
After reading the whole thread, I think I finally understand what is going on.

/etc/services really is only for mapping names to port numbers, but at least 
one daemon on your system uses service names instead of numbers. The daemon 
is inetd and it is that daemon that handles services such as chargen and echo 
and such. If you comment names out of /etc/services inetd gets confused and 
doesn't initialize the commented services. Effectively you did disable open 
ports. This is not an unofficial way of closing ports. This will work only 
with services managed by inetd and maybe for some other strange daemon that 
uses service names. It will not work even for inetd if it is configured 
properly. Effectively you are not stopping services. Instead you are 
confusing the hell out of your system forcing particular services crash on 
startup. It is the same as if you used winnuke to reboot your windows system.
Works, but is not a good administration technique. From your initial mail I 
can point out that portmap, https, https, mysql etc cannot be stopped this 
way. As for the inetd managed services you should comment stuff out of 
inetd.conf or better disable inetd altogether.



get in the action

2001-12-05 Thread get some
Title: Untitled Document





  
  





  





  





  





  





  





  





  










Re: How do I disable (close) ports?

2001-12-05 Thread Alexander Clouter
Dmitriy Kropivnitskiy [EMAIL PROTECTED] wrote:

 [snip stuff which is correct]

 can point out that portmap, https, https, mysql etc cannot be stopped this 
 way. As for the inetd managed services you should comment stuff out of 
 inetd.conf or better disable inetd altogether.
 
I my opinion inetd (and better still xinetd) is a Good Thing (TM).  It allows
you to add access control lists easily to services which may not a have a
good if even have a access control system.  It also allows you to write a
network program quickly without having to learning about network protocols
(really) and instead do everything through stdin/stdout.

Also it gives you a very nice way to add unpackaged services, cleanly and
securely to your machine.  Also the program you are running only runs as with
a certain user privilage and doesn't need to be root to bind to a port less
than 1024.

My preference is to use xinetd over statically loaded services.  However I do
only run linux on a laptop and small student flat server.  For services which
are being constantly being started and stopped then (x)inetd is a bad idea.
Another thing is that (x)inetd saves memory and resources if you are only
occasionly using the server as it only starts the service when it is needed.

Things not to run under inetd would be, apache, mysql, etc

have fun

Alex

-- 
 __ 
/ Money is a powerful aphrodisiac. But \
| flowers work almost as well. |
|  |
\ -- Lazarus Long  /
 -- 
\   ^__^
 \  (oo)\___
(__)\   )\/\
||w |
|| ||


pgpheFJ8CHIyn.pgp
Description: PGP signature


Re: per IP billing

2001-12-05 Thread Marcel Welschbillig
I have ip tables running and i did a test with the -c flag but i get the 
following response.


proxy:/home# iptables -A INPUT -s 10.10.1.31 -i eth0 -c ACCEPT
iptables v1.2.4: -c requires packet and byte counter

What am i missing ? where do i get a packet and byte counter ??

Marcel

Antropov Anton wrote:


The simplest way - is to LOG packets using IPTABLES.
My friends from Internet-provider are doing so.

Another way is to use proxy-servers (like SQUID).


Know this is a bit off subject but dose anybody know any good programs 
to use for monitoring Megabytes per IP address. What i want to do is 
have a LAN and be able to get data on how many MB each host downloaded 
for billing purposes.