[fixed] Re: cryptoloop confusion

2002-08-31 Thread Jeff
Peter Cordes, 2002-Aug-30 22:16 -0300:
> On Fri, Aug 30, 2002 at 02:20:36PM -0700, Jeff wrote:
> > 
> > Does anyone know how I can create an encrypted filesystem on a file in
> > my home directory, non-root?  I'm using the loop-aes system and I can
> > create everything but I have to chown the file and mount point to
> > change the owner and group to my user.  But, when I mount the
> > filesystem the mount point directory is changed back to owner=root and
> > group=root and I can't create directories and files in the mounted
> > filesystem since I don't have permission.
> 
>  Are you aware that when you mount a filesystem on a directory, the
> mountpoint is hidden, so not only are files in it not accessable by name,
> the ownership and permissions are hidden as well?  The new filesystem's root
> directory ownership and permissions are what you see when you ls -ld /mnt/foo
> (after mounting something on /mnt/foo).
> 
>  mke2fs creates the root directory with ownership=0:0, so you need to change
> it.  If you mount the filesystem and chmod it to what you want it to be, it
> will stay that way across mounts and unmounts, just like /usr stays owned by
> root.
> 
>  If you already knew that, and the problem is something else, then I don't
> know how to help.

I didn't know that this was the caseq.  After your explanation above I
went back and mounted the filesystem and then chown'd it and now it is
retaining the proper ownership through umount/mount.  I was doing the
chown prior to mounting it, so as you explain above I was chown'ing
the hidden mountpoint.

Thanks alot...jc

--
Jeff CoppockSystems Engineer
Diggin' Debian  Admin and User



Re: Converting Users from Solaris to (Debian-)Linux

2002-08-31 Thread Mike Renfro
On Fri, Aug 30, 2002 at 06:16:09PM +0200, Jan-Hendrik Palic wrote:

> >Your solaris hashes arent MD5.
> 
> is it not possible to upgrade to MD5 on Solaris?

Whether or not it is possible, it's not a good solution to the
original problem (migrating users from Solaris to Debian). Remember,
we want the users to have the exact same password that they've already
set. We can't decrypt the crypt() hash and retrieve the cleartext
password so that we can automatically convert it to an MD5 hash.

Now, if one system or the other *did* support MD5, I'd think any
existing crypt() passwords would be converted to MD5 as soon as the
user changed their password. But that's not the current problem: if
they were willing to change their passwords as part of the migration,
why worry about the format of the password files at all?

-- 
Mike Renfro  / R&D Engineer, Center for Manufacturing Research,
931 372-3601 / Tennessee Technological University -- [EMAIL PROTECTED]



UNSUBSCRIBE

2002-08-31 Thread draak



-
Mit der GREENCARD nach Amerika! Anmelden, mitmachen und gewinnen!
Wir helfen deinem Glück auf die Sprünge - zum Sonderpreis!
Nutze diese Chance! Alles weitere unter: http://www.firstcampus.de



Re: Virus Alert - ScanMail for Lotus Notes-->A very nice game

2002-08-31 Thread Philippe Teuwen

[EMAIL PROTECTED] wrote:


ScanMail has detected a virus during a real-time scan of the email traffic.

Date:  8/31/2002 10:27:8
Subject:  A very  nice game
Virus:  WORM_KLEZ.H
File:picacu.exe
From: debian-security 
To:  [EMAIL PROTECTED];
Action:   Uncleanable, Deleted;

Scanned by ScanMail for Lotus Notes 2.5
with scanengine 6.150-1001
and patternfile lpt$vpn.339


http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_KLEZ.H&VSect=T
Abstract:
Similar to the other KLEZ variants, this worm can change or spoof the 
original
email address in the FROM: field. It obtains the email addresses that it 
places

in the FROM: field from the infected user's address book.
This causes a non-infected user to appear as the person who has sent this
worm's malicious email. It does this to hide the real sender of the 
infected email.

The actual email address of the sender is found in the Envelope From field.

So it doesn't come from debian-security, sorry.
Phil






Virus Alert - ScanMail for Lotus Notes-->A very nice game

2002-08-31 Thread administ
ScanMail has detected a virus during a real-time scan of the email traffic.

Date:  8/31/2002 10:27:8
Subject:  A very  nice game
Virus:  WORM_KLEZ.H
File:picacu.exe
From: debian-security 
To:  [EMAIL PROTECTED];
Action:   Uncleanable, Deleted;

Scanned by ScanMail for Lotus Notes 2.5
with scanengine 6.150-1001
and patternfile lpt$vpn.339