[MailServer Notification]Attachment Blocking Notification

2006-03-14 Thread scanmail
The crypt-decrypt.pl has been blocked,
and Quarantine entire message has been taken on 14/03/2006 20:43:18.
Message details:
Server:CORREO
Sender: [EMAIL PROTECTED];
Recipient:[EMAIL PROTECTED];debian-security@lists.debian.org;
Subject:Serious bug in security update for Crypt::CBC
Attachment name:crypt-decrypt.pl


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Re: Re: Clear screen question

2006-03-14 Thread Nathan Garabedian
For the benefit of the readers, I found the original thread that I had
replied to.  And, I suppose my text appeared twice because that's how
microsoft likes it. ;)  I did try to set this email to plain text,
hopefully it will only appear once now.

Of all the days, it was on Sun, Jan 28, 2001 at 09:00:07AM -0600 that
wes schreiner quoth:
> "Sander Smeenk (CistroN Medewerker)" wrote:
> > 
> > Quoting wes schreiner ([EMAIL PROTECTED]):
> > 
> > > Not that I can see, though I'd love to know of a clean way to
clear the
> > > scroll-back buffer.  I agree it's a bit hackish.  Can anyone come
up
> > > with something better?
> > 
> > Ehm.. I did this:
> > 
> > knopje# echo -e "\033[2J\033[1;1H" > issue.new
> > knopje# cat /etc/issue >> issue.new
> > knopje# mv issue.new /etc/issue
> > 
> > And now when i log out from consoles the screen clears and the
scrollback
> > buffer is empty.. The \0332J is ANSI for Clear Screen and \033[1;1H
is ANSI
> > for place cursor on x1 y1...
> > 
> > Works for me...
> 
> Tried it, but this only clears the immediately visible screen for me,
> not the scroll-back buffer.  I'm using mgetty, are you using mingetty
or
> some other *getty?  Maybe that's the difference.  If so, then Ethan's
vt
> switching method is better because it doesn't depend on the getty.
> 

> These ANSI codes do only clear the screen when the user logs out,
> which was the original question.  At some point somebody interpreted
it
> to be about clearing the scrollback buffer, and things have been going
> off on that tangent ever since.  FWIW, I posted these ANSI codes about
> two days ago and also noted that they don't work at all if you don't
> have an ANSI terminal.

I know this post is from 2001, but I figured out a way to do it in case
someone reads it.

do the lines that were suggested on knopje, but then vi /etc/issue or
use your favorite editor and insert a ton of newlines before it.  the
filesize isn't very big and it clears the buffer.  You may have to
experiment with just how many newlines you need.



Re: No suitable pubkey ?

2006-03-14 Thread DeMZed
Thanks Mike :)

2006/3/14, Mike Hommey <[EMAIL PROTECTED]>:
> On Tue, Mar 14, 2006 at 10:32:55PM +0100, DeMZed <[EMAIL PROTECTED]> wrote:
> > Hi,
> >
> > When I launch apt-get update using http://ftp2.fr.debian.org, I get this
> > since a while :
> >
> > W: GPG error: http://ftp2.fr.debian.org testing Release: Les signatures
> > suivantes n'ont pas pu être vérifiées car la clé publique n'est pas
> > disponible : NO_PUBKEY 010908312D230C5F
> > W: GPG error: http://etc.inittab.org ./ Release: Les signatures suivantes
> > n'ont pas pu être vérifiées car la clé publique n'est pas disponible :
> > NO_PUBKEY C514AF8E4BA401C3
> > W: GPG error: http://security.debian.org stable/updates Release: Les
> > signatures suivantes n'ont pas pu être vérifiées car la clé publique n'est
> > pas disponible : NO_PUBKEY 010908312D230C5F
> > W: Vous pouvez lancer « apt-get update » pour corriger ces problèmes.
> >
> > If I translate, it says that public keys cannot be found.
> >
> > So if I do
> >
> > gpg --recv-keys 010908312D230C5F
> (...)
>
> apt-get install debian-archive-keyring
>
> Mike
>



Re: No suitable pubkey ?

2006-03-14 Thread Mike Hommey
On Tue, Mar 14, 2006 at 10:32:55PM +0100, DeMZed <[EMAIL PROTECTED]> wrote:
> Hi,
> 
> When I launch apt-get update using http://ftp2.fr.debian.org, I get this
> since a while :
> 
> W: GPG error: http://ftp2.fr.debian.org testing Release: Les signatures
> suivantes n'ont pas pu être vérifiées car la clé publique n'est pas
> disponible : NO_PUBKEY 010908312D230C5F
> W: GPG error: http://etc.inittab.org ./ Release: Les signatures suivantes
> n'ont pas pu être vérifiées car la clé publique n'est pas disponible :
> NO_PUBKEY C514AF8E4BA401C3
> W: GPG error: http://security.debian.org stable/updates Release: Les
> signatures suivantes n'ont pas pu être vérifiées car la clé publique n'est
> pas disponible : NO_PUBKEY 010908312D230C5F
> W: Vous pouvez lancer « apt-get update » pour corriger ces problèmes.
> 
> If I translate, it says that public keys cannot be found.
> 
> So if I do
> 
> gpg --recv-keys 010908312D230C5F
(...)

apt-get install debian-archive-keyring

Mike


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



No suitable pubkey ?

2006-03-14 Thread DeMZed
Hi,

When I launch apt-get update using http://ftp2.fr.debian.org, I get this
since a while :

W: GPG error: http://ftp2.fr.debian.org testing Release: Les signatures
suivantes n'ont pas pu être vérifiées car la clé publique n'est pas
disponible : NO_PUBKEY 010908312D230C5F
W: GPG error: http://etc.inittab.org ./ Release: Les signatures suivantes
n'ont pas pu être vérifiées car la clé publique n'est pas disponible :
NO_PUBKEY C514AF8E4BA401C3
W: GPG error: http://security.debian.org stable/updates Release: Les
signatures suivantes n'ont pas pu être vérifiées car la clé publique n'est
pas disponible : NO_PUBKEY 010908312D230C5F
W: Vous pouvez lancer « apt-get update » pour corriger ces problèmes.

If I translate, it says that public keys cannot be found.

So if I do

gpg --recv-keys 010908312D230C5F

I get this message :
gpg: requête de la clé 2D230C5F du serveur hkp subkeys.pgp.net
gpg: clé 2D230C5F: clé publique « Debian Archive Automatic Signing Key
(2006) <[EMAIL PROTECTED]> » importée
gpg: aucune clé de confiance ultime n'a été trouvée
gpg:Quantité totale traitée: 1
gpg:   importée: 1

Which says in summary that the imported key cannot be used because no "ultim
trust key" cannot be found ; I've got the same kind for C514AF8E4BA401C3.

Have you got any idea why it does this ? I saw something like, it this
mailing list, on January. Is it linked ?

Thanks a lot.

DeMZed

Here is my APT
deb http://security.debian.org/ stable/updates main
deb http://ftp2.fr.debian.org/debian/ stable main
deb-src http://ftp2.fr.debian.org/debian/ stable main
deb http://ftp2.fr.debian.org/debian/ testing main
deb-src http://ftp2.fr.debian.org/debian/ testing main
deb http://ftp2.fr.debian.org/debian/ unstable main
deb-src http://ftp2.fr.debian.org/debian/ unstable main
#DVD::RIP
deb ftp://ftp.nerim.net/debian-marillat sarge main
deb ftp://ftp.nerim.net/debian-marillat etch main
deb ftp://ftp.nerim.net/debian-marillat sid main
#libapache2-mod-security
deb http://etc.inittab.org/~agi/debian/libapache-mod-security ./
#PHP5
deb http://people.debian.org/~dexter/ php5.1 sarge
and my preferences :
Package: *
Pin: release a=testing
Pin-Priority: 990
Package: *
Pin: release a=unstable
Pin-Priority: 99






___
Nouveau : téléphonez moins cher avec Yahoo! Messenger ! Découvez les tarifs 
exceptionnels pour appeler la France et l'international.
Téléchargez sur http://fr.messenger.yahoo.com



Serious bug in security update for Crypt::CBC

2006-03-14 Thread Allard Hoeve


Dear Martin,


From: Martin Schulze <[EMAIL PROTECTED]>
Reply-To: debian-security@lists.debian.org
To: Debian Security Announcements 
Subject: [SECURITY] [DSA 996-1] New Crypt::CBC packages fix cryptographic
weakness

For the stable distribution (sarge) this problem has been fixed in
version 2.12-1sarge1.


I'm afraid this new package introduces some serious errors in software 
that depends on this package. I have tested the new package on three 
different Sarge machines with the following results. Please reproduce 
using attached perl script.


It is the simplest of perl scripts and it functions correctly with 
libcrypt-cbc-perl version 2.12-1:



[EMAIL PROTECTED]:~$ dpkg -l libcrypt-cbc-perl | grep '^ii'
ii  libcrypt-cbc-p 2.12-1 Implementation of cipher block 
[EMAIL PROTECTED]:~$ perl crypt-decrypt.pl

allard
[EMAIL PROTECTED]:~$


After the upgrade to libcrypt-cbc-perl version 2.12-1sarge1:


[EMAIL PROTECTED]:~$ sudo apt-get install libcrypt-cbc-perl=2.12-1sarge1
[..]
[EMAIL PROTECTED]:~$ dpkg -l libcrypt-cbc-perl | grep '^ii'
ii  libcrypt-cbc-p 2.12-1sarge1   Implementation of cipher block 
[EMAIL PROTECTED]:~$ perl crypt-decrypt.pl


[EMAIL PROTECTED]:~$


Please remove the update from the security archive.

Regards,

Allard Hoeve#!/usr/bin/perl
use strict;
use warnings;
use Crypt::CBC;

my $cbc   = new Crypt::CBC({ key => "abcdefghi", cipher => "Blowfish" });
my $encrypted = $cbc->encrypt("allard");

undef $cbc;

$cbc  = new Crypt::CBC({ key => "abcdefghi", cipher => "Blowfish" });
my $decrypted = $cbc->decrypt($encrypted);

print "$decrypted\n";


Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-14 Thread Michael Stone

On Mon, Mar 13, 2006 at 11:06:38PM -0500, Neal Murphy wrote:
The point is to obscure the ssh server from everyone, including those who are 
authorized to access it remotely. The point is to reduce brute-forace attacks 
to the point of nearly total ineffectiveness. 


No more so than simply configuring ssh with decent passwords or public 
key auth. These "brute force attacks" are succeeding with passwords like 
"password" or "guest", not "[EMAIL PROTECTED](". IMO, it's a lot more 
sensible to spend a little time preventing obviously poor system 
configuration than to erect complicated workarounds for same.


You seem to have this belief that someone contacting an ssh server is, 
in itself, bad. That's silly. At any rate, you seem enamoured of your 
scheme. Have fun with it, but don't expect it to take of.


Are you saying that anyone can generate a data packet that will correctly 
decode with *my* public key? 


It doesn't matter for an attack aimed at your decryption routine.  
Assuming that there are, and will never be, any vulnerability in the 
crypto itself you've done nothing more than reimplement ssh's public key 
auth in a byzantine fashion.


Mike Stone


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Thank you for contacting Mcafee Technical Support.

2006-03-14 Thread Florian Weimer
* STARCH:

> I have a Compaq 9.0 Security Edition SE XP 2000 and my firewall is blocking  
> my CallWave and some other items I attempt to download.  What can I do to  
> correct this problem?

debian-security@lists.debian.org is the wrong mailbox for this kind of
question.  We do not do Windows, and our products are not related to
the CallWave service, either, despite what a popular search engine
thinks.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Idea to secure ssh [was: howto block ssh brute-force]

2006-03-14 Thread Michel Messerschmidt
Neal Murphy said:
> The point is to obscure the ssh server from everyone, including those
who
> are authorized to access it remotely.

You're right, this is just the old idea of "security by obscurity".


> The point is to reduce brute-forace attacks to the point of nearly total
> ineffectiveness. The point is to require a small amount of
> pre-authentication before the server acknowledges the client's attempt
> to connect.

How small can any _reliable_ authentication protocol be?
Either it's at risk by brute-force or by denial-of-service.



Michel

-- 
$ rpm -q --whatrequires linux
no package requires linux


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]