Re: Pam module for hylafax

2006-04-19 Thread Christophe Chisogne
Adarsh V.P wrote:
 i am using hylafax with debian sarge.I can only use the fax
 utilites(sendfax,faxstat,...) while logging in as root.

Just man faxadduser can make you happy I guess :)

faxadduser and faxdelusers tools manage the hylafax auth files
/etc/hylafax/hosts.hfaxd
/var/spool/hylafax/etc/hosts.hfaxd

You can easily configure it to access it from other hosts.
Ex faxstat -h myfaxserver. Don't forget to define passwords.
Usernames defaults to the current (unix/linux) user.

I strongly recommend you to read the very usefull HylaFax Handbook
http://www.hylafax.org/content/Handbook

Ch.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Pam module for hylafax

2006-04-19 Thread Adarsh V.P
hi ch,
thank u for the reply.
I can work with hosts.hfaxd.But my real problem is i want to make use of
the pam support so that i can use the common authentication mechanism(such
as ldap edirectory etc)

Thanks  Regards
Adarsh



Debian Kernel security status?

2006-04-19 Thread Jan Luehr
Hello,

looking at the recent vanilla changes, there seem to be a rather rapid 
development at the moment ;-) and I've to confess, that I lost the overview, 
what sec-holes do affect debian and which don't.

I was frightend recently, then I noticed that 2.4.27 was fixing somecve-2004 
stuff other a month ago as well as 2.6.

Just take a look at CVE-2004-1017. It was fixed in red hat in january 2005 and 
fixed in debian in march 2006.

Therefore I suspect, that the debian kernel do have some security flaws, fixed 
in mainline kernel months ago. Am I wrong here?

This takes me to a difficult point:
- I can run 2.4 on my servers, what is considered to be depracted for etch.
- I can use the debian kernels and risk being compromised.
- I can say goodbye to linux and use Debian/kBSD
- I can use my own vanilla builds, building a new kernel every day. (Looking 
at the amount of patches since april 12th.)

Anyway, what do you recommend? 
And is there any public status / shape information on the debian kernels?

Thanks in advance, 
Keep smiling
yanosz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Debian Kernel security status?

2006-04-19 Thread Evgeni Golov
On Wed, 19 Apr 2006 16:50:27 +0200 Jan Luehr
[EMAIL PROTECTED] wrote:

 - I can use my own vanilla builds, building a new kernel every day.
 (Looking at the amount of patches since april 12th.)

That's what I'm doin. Not everyday, but faster than Debian ;-)
Plus some GRSec and other non-kernel security.

Just my $0.02

-- 
   ^^^| Evgeni -SargentD- Golov ([EMAIL PROTECTED])
 d(O_o)b  | PGP-Key-ID: 0xAC15B50C
  -|-   | WWW: http://www.die-welt.net   ICQ: 54116744
   / \| IRC: #sod @ irc.german-freakz.net

Frueher nahmen wir pr0n, um die Leitung vollzumachen. Heute tun's auch
KDE-updates (jjFux - IRCNet)


pgp64IqTXs6hD.pgp
Description: PGP signature


Re: Debian Kernel security status?

2006-04-19 Thread Michael Loftis



--On April 19, 2006 4:50:27 PM +0200 Jan Luehr 
[EMAIL PROTECTED] wrote:



Hello,

looking at the recent vanilla changes, there seem to be a rather rapid
development at the moment ;-) and I've to confess, that I lost the
overview,  what sec-holes do affect debian and which don't.

I was frightend recently, then I noticed that 2.4.27 was fixing
somecve-2004  stuff other a month ago as well as 2.6.

Just take a look at CVE-2004-1017. It was fixed in red hat in january
2005 and  fixed in debian in march 2006.

Therefore I suspect, that the debian kernel do have some security flaws,
fixed  in mainline kernel months ago. Am I wrong here?

This takes me to a difficult point:
- I can run 2.4 on my servers, what is considered to be depracted for
etch. - I can use the debian kernels and risk being compromised.
- I can say goodbye to linux and use Debian/kBSD
- I can use my own vanilla builds, building a new kernel every day.
(Looking  at the amount of patches since april 12th.)

Anyway, what do you recommend?
And is there any public status / shape information on the debian kernels?



Increasingly 2.6 is unsuitable for production use due to its huge amount of 
change and lack of stable tree.  There was a decision to do away with the 
old split development/odd numbered development model sometime after about 
2.6.11 so all hope of a stable 2.6 series is gone.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Debian Kernel security status?

2006-04-19 Thread Noah Meyerhans
On Wed, Apr 19, 2006 at 03:56:41PM -0600, Michael Loftis wrote:
 Increasingly 2.6 is unsuitable for production use due to its huge amount of 
 change and lack of stable tree.  There was a decision to do away with the 
 old split development/odd numbered development model sometime after about 
 2.6.11 so all hope of a stable 2.6 series is gone.

Speaking as the admin of a large (several hundred hosts) Debian
installation, I agree.  Hopefully something will come of
http://kerneltrap.org/node/6386

Speaking as a Security Team secretary, you should not treat all kernel
CVEs as equal.  Many of them are low priority information leaks, hard to
exploit DoS attacks, or only effect obscure hardware.  Many of them
affect only a very few users or are only exploitable in theory.  None of
them are being widely exploited.  Rest assured that, if a remote root
exploit is discovered in the kernel tomorrow, we'll have a fix out
promptly.

I don't mean for the above to be interpreted as though the Debian
security team does not take kernel security seriously.  That's quite the
opposite.  However, releasing a new kernel update for every CVE that
comes out is really not in anybody's interest.

noah



signature.asc
Description: Digital signature


Re: Re: postfix in qmail out proftpd in pureftpd

2006-04-19 Thread Diabella



I found you in a search and thought you could help. I am unable to get in 
touch with the webmaster at qmail. If you can answer this question it would be 
greatly appreciated. Many thanks for your help. diane
 
"We have been receiving mail from several people being sent under 
different screen names and we think they are all from the same person. When 
checking the "internet details" of each mail we find same information in all of 
them which isthe line below. Does this mean that all of the mails 
are originating from the same person? Does the "uid 60001" signify the qmail 
user? Thank you for your help. 


Received: (qmail 77869 invoked by uid 60001); 23 Mar 2006 
21:21:02"