configuration problem with interaction of krb5 and kde screensaver

2002-09-19 Thread Dietrich Schroff


Greetings,

our institute network uses afs and krb5 for home directories and 
user authentication.
I got everything working, like logging as user (net) or root (local) in
with wdm or ssh or on console, getting AFS-tokens automatically (for
net-user, not for root).

Here my problem:
If i log in as user in KDE and then use the screensaver, i can not
unlock my screen. As root this is possible. 
I think the configuration file is /etc/pam.d/kde. It looks like this:

auth  required /lib/security/pam_nologin.so
auth  sufficient   /lib/security/pam_unix.so shadow md5 nullok likeauth
auth  required /lib/security/pam_krb5.so use_first_pass


Can anybody tell me the right configuration to cure this last problem,
so that every computer on our institute can be upgraded to AFS and
Kerberos ?

Any pointers to documentation or suggestions on how to troubleshoot will
be much appreciated.

Please CC me as I am not subscribed.

Many thanks,
-- 
 \|/
(o o)
oOO**(_)**OOo---
Dietrich Schroff
  Institut fuer Physik
   Universitaet Mainz

Tel.:  +496131 3924075
Tel.:  +496135 934917 (priv)
WWW:   www.uni-mainz.de/~dschroff
Mail:  [EMAIL PROTECTED]

-- 
 \|/
(o o)
oOO**(_)**OOo---
Dietrich Schroff
  Institut fuer Physik
   Universitaet Mainz

Tel.:  +496131 3924075
Tel.:  +496135 934917 (priv)
WWW:   www.uni-mainz.de/~dschroff
Mail:  [EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Kernel image 2.4.18-bf2.4

2002-09-19 Thread Douglas Wheet

Greetings,

 I may have missed something on the lists, but I was doing my usual 
nightly reading and saw there are some vulnerabilities in kernel 2.4.18 on 
security focus, I was wondering if there is or will be patches for these 
vulnerabilities? 


http://online.securityfocus.com/bid/5539 

http://online.securityfocus.com/bid/5178 

http://online.securityfocus.com/bid/4259 

Thanks. 

 -doug


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: slapper countermeasures

2002-09-19 Thread Emil Pedersen


[...]

 Indeed. A similar case to this is the Good Samaritan Act was abolished, or
 at least changed in Australia to the point that if some one was mown down by
 a bus and you pulled them off the road and they still died, you could be
 sued by the family for killing them. It's a load of crud, but it happens.

Damn, I was hoping Australia could be a nice place to live in (when I
get rich:-) _without_ the (imo) far to common:
 lets-take-all-the-bad-things-from-usa-and-implement-it-here-attitude.

Hmm, why do I even bother...  I've probably read to many mail about
dmca,macrovision,... in to short time, sorry.

Sincerely,
Emil


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: SSL update.. still giving me a Vulnerable status

2002-09-19 Thread Florian Weimer

Jeroen de Leeuw den Bouter [EMAIL PROTECTED] writes:

 No, it checks a large and a small overflow. Jeroen, have you restarted
 the httpd? If not, it is still running with the old library.

 I shut the whole apache down (both http and http-ssl).

Oh, in this case, I am really interested in the data Lupe suggested to
collect.  There might be a false positive here.  However, a clean
woody installation results in the expected answer (even if Apache-SSL
is used), so this is really worth close inspection.

So far I've seen two other reports of such an inconsistency.  The
first one could be tracked down to a self-compiled Apache running on
the machine, the second one is still open.

-- 
Florian Weimer[EMAIL PROTECTED]
University of Stuttgart   http://CERT.Uni-Stuttgart.DE/people/fw/
RUS-CERT  fax +49-711-685-5898


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: configuration problem with interaction of krb5 and kde screensaver

2002-09-19 Thread Will Aoki

On Thu, Sep 19, 2002 at 08:44:18AM +0200, Dietrich Schroff wrote:

 Here my problem:
 If i log in as user in KDE and then use the screensaver, i can not
 unlock my screen. As root this is possible. 
 I think the configuration file is /etc/pam.d/kde. It looks like this:
 
 auth  required /lib/security/pam_nologin.so
 auth  sufficient   /lib/security/pam_unix.so shadow md5 nullok likeauth
 auth  required /lib/security/pam_krb5.so use_first_pass

Try this instead:

auth  required /lib/security/pam_nologin.so
auth  sufficient   /lib/security/pam_krb5.so
auth  required /lib/security/pam_unix.so shadow md5 nullok likeauth use_first_pass

 Can anybody tell me the right configuration to cure this last problem,
 so that every computer on our institute can be upgraded to AFS and
 Kerberos ?
 
 Any pointers to documentation or suggestions on how to troubleshoot will
 be much appreciated.
 
 Please CC me as I am not subscribed.

-- 
William Aoki [EMAIL PROTECTED]   /\  ASCII Ribbon Campaign
B1FB C169 C7A6 238B 280B  - key change\ /  No HTML in mail or news!
99AF A093 29AE 0AE1 9734   prev. expiredX
   / \


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




a.out apache exploit known?

2002-09-19 Thread Michael Renzmann

Hi.

Is there any known issue to a http request for a file named a.out? I 
was just wondering, because I had such a request today from a box which 
was in a .mil domain... he/she downloaded the source of slapper there, 
watched the index file (which is quite boring so far :)) and then tried 
to access a file a.out in the root of the webserver. Accident? Or 
anything that one should know of?

Bye, Mike


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: slapper countermeasures

2002-09-19 Thread thing
Geoff Crompton wrote:

   (I've been trying to think of a reason that the owner of an infected
   box would not appreciate efforts to sanitize the box).

simple

gross stupidity

I mean they didnt patch it on the first place...

Mind you if you did fix it for them they would probably never notice.

I have built machines for companies who refuse to pay me a small monthly 
retainer
to patch (in one case a two year old box), as they see it Im just trying to make
money on them.

Conclusion they get what they deserve.

Add that some moron like a public prosecutor would see you as easy
meat/vigilanty  and do you for all the crimes under the Sun he/she could think
of.

What happens if your patching breaks the box? or someone hi jacks your code and
inserts a nasty payload?

Conclusion, I often think sensible ppl are in a minority and getting smaller.

regards

Thing




Re: slapper countermeasures

2002-09-19 Thread Jason Clarke
- Original Message -
From: thing [EMAIL PROTECTED]
Subject: Re: slapper countermeasures


 Geoff Crompton wrote:

(I've been trying to think of a reason that the owner of an infected
box would not appreciate efforts to sanitize the box).


 Mind you if you did fix it for them they would probably never notice.

Granted.

 I have built machines for companies who refuse to pay me a small monthly
retainer
 to patch (in one case a two year old box), as they see it Im just trying
to make
 money on them.

I've had that happen to me a lot, but since Nimda / Code Red etc, most have
changed their minds.

 Add that some moron like a public prosecutor would see you as easy
 meat/vigilanty  and do you for all the crimes under the Sun he/she could
think
 of.

Indeed. A similar case to this is the Good Samaritan Act was abolished, or
at least changed in Australia to the point that if some one was mown down by
a bus and you pulled them off the road and they still died, you could be
sued by the family for killing them. It's a load of crud, but it happens.


 Conclusion, I often think sensible ppl are in a minority and getting
smaller.


It's a matter of survival of the fittest. Touching another users machine
without the authority or permission to do so, while it might be a good thing
tm, is still too open to dangerous consequences. You've got to look after
number 1, so just keep yourself patched, keep in contact with [EMAIL PROTECTED]
and just keep plodding on :-)



Re: slapper countermeasures

2002-09-19 Thread Alan Shutko
Geoff Crompton [EMAIL PROTECTED] writes:

   (I've been trying to think of a reason that the owner of an infected
   box would not appreciate efforts to sanitize the box).

The big problem is that it's possible your efforts actually damage
important services or data that the virus didn't.

Machines which are vulnerable to viruses are likely also set up in
rather interesting ways.  Unless you had detailed knowledge of how it
was set up, you might break things while disabling the virus.

-- 
Alan Shutko [EMAIL PROTECTED] - In a variety of flavors!
Dedicated to better living through computers.



Re: slapper countermeasures

2002-09-19 Thread thing
someone needs to fix thier anti-spam filter

regards

Thing

Jaroslaw Tabor wrote:

 Your mail has been rejected by anti-spam filter



configuration problem with interaction of krb5 and kde screensaver

2002-09-19 Thread Dietrich Schroff

Greetings,

our institute network uses afs and krb5 for home directories and 
user authentication.
I got everything working, like logging as user (net) or root (local) in
with wdm or ssh or on console, getting AFS-tokens automatically (for
net-user, not for root).

Here my problem:
If i log in as user in KDE and then use the screensaver, i can not
unlock my screen. As root this is possible. 
I think the configuration file is /etc/pam.d/kde. It looks like this:

auth  required /lib/security/pam_nologin.so
auth  sufficient   /lib/security/pam_unix.so shadow md5 nullok likeauth
auth  required /lib/security/pam_krb5.so use_first_pass


Can anybody tell me the right configuration to cure this last problem,
so that every computer on our institute can be upgraded to AFS and
Kerberos ?

Any pointers to documentation or suggestions on how to troubleshoot will
be much appreciated.

Please CC me as I am not subscribed.

Many thanks,
-- 
 \|/
(o o)
oOO**(_)**OOo---
Dietrich Schroff
  Institut fuer Physik
   Universitaet Mainz

Tel.:  +496131 3924075
Tel.:  +496135 934917 (priv)
WWW:   www.uni-mainz.de/~dschroff
Mail:  [EMAIL PROTECTED]

-- 
 \|/
(o o)
oOO**(_)**OOo---
Dietrich Schroff
  Institut fuer Physik
   Universitaet Mainz

Tel.:  +496131 3924075
Tel.:  +496135 934917 (priv)
WWW:   www.uni-mainz.de/~dschroff
Mail:  [EMAIL PROTECTED]




Kernel image 2.4.18-bf2.4

2002-09-19 Thread Douglas Wheet

Greetings,

I may have missed something on the lists, but I was doing my usual 
nightly reading and saw there are some vulnerabilities in kernel 2.4.18 on 
security focus, I was wondering if there is or will be patches for these 
vulnerabilities? 



http://online.securityfocus.com/bid/5539 

http://online.securityfocus.com/bid/5178 

http://online.securityfocus.com/bid/4259 

Thanks. 


-doug



Re: slapper countermeasures

2002-09-19 Thread Emil Pedersen

[...]

 Indeed. A similar case to this is the Good Samaritan Act was abolished, or
 at least changed in Australia to the point that if some one was mown down by
 a bus and you pulled them off the road and they still died, you could be
 sued by the family for killing them. It's a load of crud, but it happens.

Damn, I was hoping Australia could be a nice place to live in (when I
get rich:-) _without_ the (imo) far to common:
 lets-take-all-the-bad-things-from-usa-and-implement-it-here-attitude.

Hmm, why do I even bother...  I've probably read to many mail about
dmca,macrovision,... in to short time, sorry.

Sincerely,
Emil



Re: SSL update.. still giving me a Vulnerable status

2002-09-19 Thread Florian Weimer
Jeroen de Leeuw den Bouter [EMAIL PROTECTED] writes:

 No, it checks a large and a small overflow. Jeroen, have you restarted
 the httpd? If not, it is still running with the old library.

 I shut the whole apache down (both http and http-ssl).

Oh, in this case, I am really interested in the data Lupe suggested to
collect.  There might be a false positive here.  However, a clean
woody installation results in the expected answer (even if Apache-SSL
is used), so this is really worth close inspection.

So far I've seen two other reports of such an inconsistency.  The
first one could be tracked down to a self-compiled Apache running on
the machine, the second one is still open.

-- 
Florian Weimer[EMAIL PROTECTED]
University of Stuttgart   http://CERT.Uni-Stuttgart.DE/people/fw/
RUS-CERT  fax +49-711-685-5898



Re: configuration problem with interaction of krb5 and kde screensaver

2002-09-19 Thread Will Aoki
On Thu, Sep 19, 2002 at 08:44:18AM +0200, Dietrich Schroff wrote:

 Here my problem:
 If i log in as user in KDE and then use the screensaver, i can not
 unlock my screen. As root this is possible. 
 I think the configuration file is /etc/pam.d/kde. It looks like this:
 
 auth  required /lib/security/pam_nologin.so
 auth  sufficient   /lib/security/pam_unix.so shadow md5 nullok likeauth
 auth  required /lib/security/pam_krb5.so use_first_pass

Try this instead:

auth  required /lib/security/pam_nologin.so
auth  sufficient   /lib/security/pam_krb5.so
auth  required /lib/security/pam_unix.so shadow md5 nullok likeauth 
use_first_pass

 Can anybody tell me the right configuration to cure this last problem,
 so that every computer on our institute can be upgraded to AFS and
 Kerberos ?
 
 Any pointers to documentation or suggestions on how to troubleshoot will
 be much appreciated.
 
 Please CC me as I am not subscribed.

-- 
William Aoki [EMAIL PROTECTED]   /\  ASCII Ribbon Campaign
B1FB C169 C7A6 238B 280B  - key change\ /  No HTML in mail or news!
99AF A093 29AE 0AE1 9734   prev. expiredX
   / \



a.out apache exploit known?

2002-09-19 Thread Michael Renzmann

Hi.

Is there any known issue to a http request for a file named a.out? I 
was just wondering, because I had such a request today from a box which 
was in a .mil domain... he/she downloaded the source of slapper there, 
watched the index file (which is quite boring so far :)) and then tried 
to access a file a.out in the root of the webserver. Accident? Or 
anything that one should know of?


Bye, Mike



Re: SSL update.. still giving me a Vulnerable status

2002-09-19 Thread Jeroen de Leeuw den Bouter
  No, it checks a large and a small overflow. Jeroen, have you restarted
  the httpd? If not, it is still running with the old library.

  I shut the whole apache down (both http and http-ssl).

 Oh, in this case, I am really interested in the data Lupe suggested to
 collect.  There might be a false positive here.  However, a clean
 woody installation results in the expected answer (even if Apache-SSL
 is used), so this is really worth close inspection.

 So far I've seen two other reports of such an inconsistency.  The
 first one could be tracked down to a self-compiled Apache running on
 the machine, the second one is still open.
The following was happening :

1) the packages where the right version (dpkg reported them correct
installed).
2) but the libs of the ssl packages where from the wrong version.
3) I did an apt-get dist-upgrade   (again, even do I already had done that).
4) And there it went, catching the same ssl packages that he already
installed.
5) I restarted apache / ssl  just to be sure.
6) When checking the libs they were the correct version, when running the
test
 program he gave the correct answere.

So to analyse what could have been wrong. is that dpkg might have
thought
everything went ok for installation but it didn't

But it is working correct, so I am a  happy man !!

Thanks for all the help,

Jeroen de Leeuw den Bouter
the world downunder.. but still on top.

Net Ventures... the mayor league for internet broadcasts.
www.netventures.com.au