Re: on potato's proftpd

2002-04-06 Thread Petro

On Sat, Apr 06, 2002 at 08:48:59AM +, Martin WHEELER wrote:
 On Fri, 5 Apr 2002, Petro wrote:
 
  You *like* upgrading 100 servers every few days?
 
 You'll have to ask the scripts that do that stuff for me  :)

So you don't mind verifying ever couple days that none of your
quantity one software is going to break because a security fix
changed something? 



-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: on potato's proftpd

2002-04-06 Thread Petro
On Sat, Apr 06, 2002 at 08:48:59AM +, Martin WHEELER wrote:
 On Fri, 5 Apr 2002, Petro wrote:
 
  You *like* upgrading 100 servers every few days?
 
 You'll have to ask the scripts that do that stuff for me  :)

So you don't mind verifying ever couple days that none of your
quantity one software is going to break because a security fix
changed something? 



-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: on potato's proftpd

2002-04-05 Thread Petro
On Thu, Apr 04, 2002 at 06:24:18PM +, Martin WHEELER wrote:
 On Wed, Apr 03, 2002 at 09:22:34AM +, Martin WHEELER wrote:
  Release early; release often.
 
 On Wed, 3 Apr 2002, Petro wrote:
 
  bemfont size=7blinkNO/font/em/b
 
  Measure twice, cut once.
 
 Fine.  You wear the same size suit from birth to death; me, I'll adjust
 according to circumstances.

You *like* upgrading 100 servers every few days? 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: on potato's proftpd

2002-04-03 Thread Petro

On Wed, Apr 03, 2002 at 10:56:32AM +0900, Howland, Curtis wrote:
 I would bet that the vast majority of flame wars begin because someone mistakes 
terse or concise for hostility.
 
 The reverse, being the endless spewing of meaningless words, all the while saying 
nothing at all or even the opposite of what it sounds like, is the art of politicians 
and diplomats.
 
 I'll take a flame war any day, when compared to the alternative.

aol

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: on potato's proftpd

2002-04-03 Thread Petro

On Wed, Apr 03, 2002 at 09:22:34AM +, Martin WHEELER wrote:
 Release early; release often.

bemfont size=7blinkNO/font/em/b

Measure twice, cut once. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: on potato's proftpd

2002-04-03 Thread Petro
On Wed, Apr 03, 2002 at 10:56:32AM +0900, Howland, Curtis wrote:
 I would bet that the vast majority of flame wars begin because someone 
 mistakes terse or concise for hostility.
 
 The reverse, being the endless spewing of meaningless words, all the while 
 saying nothing at all or even the opposite of what it sounds like, is the art 
 of politicians and diplomats.
 
 I'll take a flame war any day, when compared to the alternative.

aol

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Re: iptables filtering rules

2002-03-27 Thread Petro

On Mon, Mar 25, 2002 at 06:01:45AM -0300, Luiz Carlos Santos de Alencar wrote:
 Andrew Tait wrote:
 I've checked up one of that IPs; it's being used right now by a web
 server pretty much infected with I-Worm.Nimda.A! AVG identification.
 The standard page delivers a readme.eml file in a pop-up  window;
 less then a minute to have an infected readme.exe being executed.
 I've heard about it, but never had seen until then.
 From a Linux box is safe to acess http  216.72.135.102  and  verify
 that the host is infecting all the Window$ based visitors machines,
 using X/wav OE vulnerability, so far I know (*Atention* Do not try
 from a Win box; it's vulnerable).
 By the way, what to do about it...

The polite thing to do is to inform the owner of the machine. 

If that is not possible, or you feel particularly bastardly, hack
the freaken thing and wipe it's drives.

And/or contact their upstream provider to get their IP feed pulled. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Re: iptables filtering rules

2002-03-27 Thread Petro
On Mon, Mar 25, 2002 at 06:01:45AM -0300, Luiz Carlos Santos de Alencar wrote:
 Andrew Tait wrote:
 I've checked up one of that IPs; it's being used right now by a web
 server pretty much infected with I-Worm.Nimda.A! AVG identification.
 The standard page delivers a readme.eml file in a pop-up  window;
 less then a minute to have an infected readme.exe being executed.
 I've heard about it, but never had seen until then.
 From a Linux box is safe to acess http  216.72.135.102  and  verify
 that the host is infecting all the Window$ based visitors machines,
 using X/wav OE vulnerability, so far I know (*Atention* Do not try
 from a Win box; it's vulnerable).
 By the way, what to do about it...

The polite thing to do is to inform the owner of the machine. 

If that is not possible, or you feel particularly bastardly, hack
the freaken thing and wipe it's drives.

And/or contact their upstream provider to get their IP feed pulled. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: failed ssh breakins on my exposed www box ..

2002-03-25 Thread Petro

On Mon, Mar 25, 2002 at 04:50:17PM -0500, Gary MacDougall wrote:
 Agreed.
 I'll never understand why people will let crackers reap havoc
 on a network without issue, but if someone comes up and tries
 to break into my house, the police will be there in 2 seconds.

Hate to break it to you, but in normal circumstances, the cops
aren't even going to want to show up for a normal burglary (well,
if the person is *in the act* they may head that way). For a BE
where the young socialists are no longer on-scene, you have to fight
with them (the police) to get them to come out at all. 

Went through this twice in Chicago. 

Oh, and be there in 2 seconds. 

Call for a pizza, call the cops. You'll be well fed when the cops
show up. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: failed ssh breakins on my exposed www box ..

2002-03-25 Thread Petro
On Mon, Mar 25, 2002 at 04:50:17PM -0500, Gary MacDougall wrote:
 Agreed.
 I'll never understand why people will let crackers reap havoc
 on a network without issue, but if someone comes up and tries
 to break into my house, the police will be there in 2 seconds.

Hate to break it to you, but in normal circumstances, the cops
aren't even going to want to show up for a normal burglary (well,
if the person is *in the act* they may head that way). For a BE
where the young socialists are no longer on-scene, you have to fight
with them (the police) to get them to come out at all. 

Went through this twice in Chicago. 

Oh, and be there in 2 seconds. 

Call for a pizza, call the cops. You'll be well fed when the cops
show up. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: failed ssh breakins on my exposed www box ..

2002-03-24 Thread Petro

On Sun, Mar 24, 2002 at 12:28:17PM -0500, timothy bauscher wrote:
  We seriouslly need a US branch of the law-enforcement to deal
  with this sort of stuff.
 I respect your opinion, but i would hate to
 have a new branch of government wasting my
 tax dollars. If these types of attacks can
 be stopped on the software side, than that
 be much more effective than government intervention.

How far are you willing to take that attitude? 

 If they cannot be stopped, than we simply report
 the abuse to an already existing branch of
 government. That probably won't help capture the
 criminal, but neither would a *new* branch of
 government.

100% agreement. 

  I think if more people got prosecuted for
  trying to crack into a site, the level of BS would drop to zero.
 
 That reminds me of a threat from the DOJ to
 prosecute a cracker as a criminal with a
 possibility of life in prison. When i heard that
 statement, it sent chills down my back.

It depends on the systems they hack. If you've got someone trying to
hack e.g. an Air Traffic Control system, and they know it, then they
do belong behind bars for life. They deserve it--they have, by their
deliberate actions, shown either (a) a callous disregard for the
lives and saftey of others or (b) an utter inability to see
potential problems of their actions. Either way, they should be put
some place where they cannot harm innocent people. 

 I think this way of reasoning is flawed. The government
 uses capital punishment as a deterrent for committing
 murder, but that has hardly stopped murders.

There's your mistake. 

Capital punishment is not meant as a deterrent, we know that doesn't
work. It's a punishment for a heinous crime, and a 100% assurance
that the individual so punished never does it again (modulo
reincarnation). 

I'm not going to take one side or the other on Capital Punishment
other than to say: 

(1) There is almost nothing a hacker can do with a computer to
deserve capital punishment that isn't covered under other laws, 

and
(2) Recedivism amounst those recieving the death penalty is about
0%. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: failed ssh breakins on my exposed www box ..

2002-03-24 Thread Petro

On Sun, Mar 24, 2002 at 07:24:18PM +0100, andreas mayer wrote:
  We seriouslly need a US branch of the law-enforcement to deal
  with this sort of stuff. ?I think if more people got prosecuted for
  trying to crack into a site, the level of BS would drop to zero.
 Yeah!  And what if the attacker is from a other country?
 You cannot just bomb 'em for terrorist action, can you?

Well, can, and should are different things. 

Yes, you can, and IMO if you can limit the destruction to the
fsckwit that tried to hack your system, you should. Collaterial
damage is not acceptable in these cases. 

Of course, it's not bombing them for terrorism, it's simply doing
your best to clean out the gene pool. 

 I think the net is freedom, and that is good...

Then you aren't paying attention. 

 ...you are responsable for your own security!

This is, and always has been true, both IRL and on the net. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: failed ssh breakins on my exposed www box ..

2002-03-24 Thread Petro
On Sun, Mar 24, 2002 at 12:28:17PM -0500, timothy bauscher wrote:
  We seriouslly need a US branch of the law-enforcement to deal
  with this sort of stuff.
 I respect your opinion, but i would hate to
 have a new branch of government wasting my
 tax dollars. If these types of attacks can
 be stopped on the software side, than that
 be much more effective than government intervention.

How far are you willing to take that attitude? 

 If they cannot be stopped, than we simply report
 the abuse to an already existing branch of
 government. That probably won't help capture the
 criminal, but neither would a *new* branch of
 government.

100% agreement. 

  I think if more people got prosecuted for
  trying to crack into a site, the level of BS would drop to zero.
 
 That reminds me of a threat from the DOJ to
 prosecute a cracker as a criminal with a
 possibility of life in prison. When i heard that
 statement, it sent chills down my back.

It depends on the systems they hack. If you've got someone trying to
hack e.g. an Air Traffic Control system, and they know it, then they
do belong behind bars for life. They deserve it--they have, by their
deliberate actions, shown either (a) a callous disregard for the
lives and saftey of others or (b) an utter inability to see
potential problems of their actions. Either way, they should be put
some place where they cannot harm innocent people. 

 I think this way of reasoning is flawed. The government
 uses capital punishment as a deterrent for committing
 murder, but that has hardly stopped murders.

There's your mistake. 

Capital punishment is not meant as a deterrent, we know that doesn't
work. It's a punishment for a heinous crime, and a 100% assurance
that the individual so punished never does it again (modulo
reincarnation). 

I'm not going to take one side or the other on Capital Punishment
other than to say: 

(1) There is almost nothing a hacker can do with a computer to
deserve capital punishment that isn't covered under other laws, 

and
(2) Recedivism amounst those recieving the death penalty is about
0%. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: failed ssh breakins on my exposed www box ..

2002-03-24 Thread Petro
On Sun, Mar 24, 2002 at 07:24:18PM +0100, andreas mayer wrote:
  We seriouslly need a US branch of the law-enforcement to deal
  with this sort of stuff. ?I think if more people got prosecuted for
  trying to crack into a site, the level of BS would drop to zero.
 Yeah!  And what if the attacker is from a other country?
 You cannot just bomb 'em for terrorist action, can you?

Well, can, and should are different things. 

Yes, you can, and IMO if you can limit the destruction to the
fsckwit that tried to hack your system, you should. Collaterial
damage is not acceptable in these cases. 

Of course, it's not bombing them for terrorism, it's simply doing
your best to clean out the gene pool. 

 I think the net is freedom, and that is good...

Then you aren't paying attention. 

 ...you are responsable for your own security!

This is, and always has been true, both IRL and on the net. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: [SECURITY] [DSA 122-1] New zlib other packages fix buffer overflow

2002-03-13 Thread Petro

On Wed, Mar 13, 2002 at 10:36:15AM +, David Hart wrote:
 On Wed, Mar 13, 2002 at 01:47:57AM +, David Hart wrote:
 Duh, sorry.  As someone else has kindly pointed out,
 'potato/woody'/'stable/testing' should be transposed :)  (I really
 shouldn't post at 1:45 in the morning)

Why? Haven't had your 10th cup of coffee yet? 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Problems with tripwire:

2002-03-13 Thread Petro

On Wed, Mar 13, 2002 at 04:31:01PM +0100, Michel Verdier wrote:
 Petro [EMAIL PROTECTED] a écrit :
 
 |  The last match is used, try to switch these ones
 | 
 |  I did, that is the second. I'll try it again. 
 
 In fact you have 3 /var statements, the order should refine matching like
 this :
 
 /var
 /var/log
 /var/log/ksymoops

/var@@AW
/var/log@@LOGSEARCH
!/var/log/ksymoops/

It's now like this and it's still doing the same thing. 
-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: [SECURITY] [DSA 122-1] New zlib other packages fix buffer overflow

2002-03-13 Thread Petro
On Wed, Mar 13, 2002 at 10:36:15AM +, David Hart wrote:
 On Wed, Mar 13, 2002 at 01:47:57AM +, David Hart wrote:
 Duh, sorry.  As someone else has kindly pointed out,
 'potato/woody'/'stable/testing' should be transposed :)  (I really
 shouldn't post at 1:45 in the morning)

Why? Haven't had your 10th cup of coffee yet? 

-- 
Share and Enjoy. 



Re: Problems with tripwire:

2002-03-13 Thread Petro
On Wed, Mar 13, 2002 at 04:31:01PM +0100, Michel Verdier wrote:
 Petro [EMAIL PROTECTED] a ?crit :
 
 |  The last match is used, try to switch these ones
 | 
 |  I did, that is the second. I'll try it again. 
 
 In fact you have 3 /var statements, the order should refine matching like
 this :
 
 /var
 /var/log
 /var/log/ksymoops

/var@@AW
/var/log@@LOGSEARCH
!/var/log/ksymoops/

It's now like this and it's still doing the same thing. 
-- 
Share and Enjoy. 



Re: Problems with tripwire:

2002-03-12 Thread Petro

On Tue, Mar 12, 2002 at 08:59:08AM +0100, Martin Peikert wrote:
 Petro wrote:
 
 Is there a file-security scanner like tripwire (or like AIDE) that
 works across a network? I'm envisioning something that does local
 file scanning, then transmits the resulting table to a remote (more
 secure) host where the verification is done. 
 
 Try samhain or freeveracity:
 
 http://samhain.sourceforge.net/surround.html?main_q.html2

This seems to be exactly what I'm looking for. 

These guys are paranoid. That is good. That stealth option
looks...interesting. 

 http://www.freeveracity.org/
 
 GTi
 -- 
 For encrypted messages please use my public key, key-ID:  0xA9E35B01
 The fingerprint is A684 87F3 C7AA 9728 3C1B 85BF 0500 B2C7 A9E3 5B01
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact 
 [EMAIL PROTECTED]

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Problems with tripwire:

2002-03-12 Thread Petro

On Tue, Mar 12, 2002 at 08:57:40PM +0100, Michel Verdier wrote:
 Petro [EMAIL PROTECTED] a écrit :
 
 | !/var/log/ksymoops/ 
 | /var/log@@LOGSEARCH
 | 
 | Now, according to my understanding, the ! in front of /var/log/ksymoops/
 | should be telling tripwire to ignore things under there, right? 
 | 
 | Obviously, it's not. 
 The last match is used, try to switch these ones

 I did, that is the second. I'll try it again. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Problems with tripwire:

2002-03-12 Thread Petro
On Tue, Mar 12, 2002 at 08:59:08AM +0100, Martin Peikert wrote:
 Petro wrote:
 
 Is there a file-security scanner like tripwire (or like AIDE) that
 works across a network? I'm envisioning something that does local
 file scanning, then transmits the resulting table to a remote (more
 secure) host where the verification is done. 
 
 Try samhain or freeveracity:
 
 http://samhain.sourceforge.net/surround.html?main_q.html2

This seems to be exactly what I'm looking for. 

These guys are paranoid. That is good. That stealth option
looks...interesting. 

 http://www.freeveracity.org/
 
 GTi
 -- 
 For encrypted messages please use my public key, key-ID:  0xA9E35B01
 The fingerprint is A684 87F3 C7AA 9728 3C1B 85BF 0500 B2C7 A9E3 5B01
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact 
 [EMAIL PROTECTED]

-- 
Share and Enjoy. 



Re: Problems with tripwire:

2002-03-12 Thread Petro
On Tue, Mar 12, 2002 at 08:57:40PM +0100, Michel Verdier wrote:
 Petro [EMAIL PROTECTED] a ?crit :
 
 | !/var/log/ksymoops/ 
 | /var/log@@LOGSEARCH
 | 
 | Now, according to my understanding, the ! in front of /var/log/ksymoops/
 | should be telling tripwire to ignore things under there, right? 
 | 
 | Obviously, it's not. 
 The last match is used, try to switch these ones

 I did, that is the second. I'll try it again. 

-- 
Share and Enjoy. 



Problems with tripwire:

2002-03-11 Thread Petro

I have tripwire installed on one of my servers (Debian Stable), and I've
managed to get the configuration pretty quiet, but I'm having a little
problem with one or two of them. 

The particular section of tw.config looks like: 
/var@@AW
!/var/log/ksymoops/ 
/var/log@@LOGSEARCH
/var/lib@@LOGSEARCH
/var/backups@@LOGSEARCH
!/var/spool
!/var/run
!/var/cache
!/var/lock 
!/var/state/ 

where @@AW is:
@@define AW +pinugsm17-ac2345689 

The problem is that I still get: 

Changed files/directories include:
added:   -r--r--r-- root32630 Mar 10 06:25:03 2002 
/var/log/ksymoops/20020310062503.ksyms
added:   -r--r--r-- root   78 Mar 10 06:25:03 2002 
/var/log/ksymoops/20020310062503.modules
added:   -r--r--r-- root32630 Mar 11 06:25:02 2002 
/var/log/ksymoops/20020311062502.ksyms
added:   -r--r--r-- root   78 Mar 11 06:25:02 2002 
/var/log/ksymoops/20020311062502.modules
deleted: -r--r--r-- root32630 Mar  8 06:25:01 2002 
/var/log/ksymoops/20020308062501.ksyms
deleted: -r--r--r-- root   78 Mar  8 06:25:01 2002 
/var/log/ksymoops/20020308062501.modules
deleted: -r--r--r-- root32630 Mar  5 06:25:02 2002 
/var/log/ksymoops/20020305062502.ksyms
deleted: -r--r--r-- root   78 Mar  5 06:25:02 2002 
/var/log/ksymoops/20020305062502.modules
deleted: -r--r--r-- root32630 Mar  7 06:25:02 2002 
/var/log/ksymoops/20020307062502.ksyms
deleted: -r--r--r-- root   78 Mar  7 06:25:02 2002 
/var/log/ksymoops/20020307062502.modules
changed: -rw-r--r-- root   52 Mar 11 06:25:02 2002 /var/state/logrotate/status

Now, according to my understanding, the ! in front of /var/log/ksymoops/
should be telling tripwire to ignore things under there, right? 

Obviously, it's not. 

Additionally:

Is there a file-security scanner like tripwire (or like AIDE) that
works across a network? I'm envisioning something that does local
file scanning, then transmits the resulting table to a remote (more
secure) host where the verification is done. 



-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Problems with tripwire:

2002-03-11 Thread Petro
I have tripwire installed on one of my servers (Debian Stable), and I've
managed to get the configuration pretty quiet, but I'm having a little
problem with one or two of them. 

The particular section of tw.config looks like: 
/var@@AW
!/var/log/ksymoops/ 
/var/log@@LOGSEARCH
/var/lib@@LOGSEARCH
/var/backups@@LOGSEARCH
!/var/spool
!/var/run
!/var/cache
!/var/lock 
!/var/state/ 

where @@AW is:
@@define AW +pinugsm17-ac2345689 

The problem is that I still get: 

Changed files/directories include:
added:   -r--r--r-- root32630 Mar 10 06:25:03 2002 
/var/log/ksymoops/20020310062503.ksyms
added:   -r--r--r-- root   78 Mar 10 06:25:03 2002 
/var/log/ksymoops/20020310062503.modules
added:   -r--r--r-- root32630 Mar 11 06:25:02 2002 
/var/log/ksymoops/20020311062502.ksyms
added:   -r--r--r-- root   78 Mar 11 06:25:02 2002 
/var/log/ksymoops/20020311062502.modules
deleted: -r--r--r-- root32630 Mar  8 06:25:01 2002 
/var/log/ksymoops/20020308062501.ksyms
deleted: -r--r--r-- root   78 Mar  8 06:25:01 2002 
/var/log/ksymoops/20020308062501.modules
deleted: -r--r--r-- root32630 Mar  5 06:25:02 2002 
/var/log/ksymoops/20020305062502.ksyms
deleted: -r--r--r-- root   78 Mar  5 06:25:02 2002 
/var/log/ksymoops/20020305062502.modules
deleted: -r--r--r-- root32630 Mar  7 06:25:02 2002 
/var/log/ksymoops/20020307062502.ksyms
deleted: -r--r--r-- root   78 Mar  7 06:25:02 2002 
/var/log/ksymoops/20020307062502.modules
changed: -rw-r--r-- root   52 Mar 11 06:25:02 2002 
/var/state/logrotate/status

Now, according to my understanding, the ! in front of /var/log/ksymoops/
should be telling tripwire to ignore things under there, right? 

Obviously, it's not. 

Additionally:

Is there a file-security scanner like tripwire (or like AIDE) that
works across a network? I'm envisioning something that does local
file scanning, then transmits the resulting table to a remote (more
secure) host where the verification is done. 



-- 
Share and Enjoy. 



Re: CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Petro

On Thu, Feb 28, 2002 at 08:37:45AM -, Jeff wrote:
 I received this CERT Advisory about 6 hours ago, regarding PHP. 
 The php website confirms the details: www.php.net
 I think this is going to be a problem for us, due to the way
 the Debian packaging works - 
 I guess that the immediate solution in this case is for us to
 try to get the unstable Apache 1.3.23 package + an updated
 PHP4 4.2.1 package + MySQL, SSL etc to work.  - aint
 going to be quick to test this and roll it out into production, 
 and in the mean time, we have production servers running
 a PHP4 that has a now widely known security issue. Oh - and 
 yes, we could go out of business and not accept data, but
 methinks my tenure would be somewhat shortened if I propose
 that at our emergency security meeting in an hours time!
 Help?

Grab the php4.05 source package, patch and rebuild the package, then 
distribute.

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Security implications of chpasswd.

2002-02-28 Thread Petro

For some very good reasons I had to do a mass change of passwords
on one of our exposed login machines (no breach/hack, different
reason). 

There is a utility included in Debian Stable (and the others) to do
this called chpasswd. 

I believe there may be some security issues with this utility:

1) This utility does DES passwords instead of MD5, even tho' the
rest of the system does/understands MD5. 

2) when doing a mass password change, the first 2 characters are the
same for every password. This could be an information leak
indicating mass-password changes, and displaying *which passwords
are still at the set default*. For a better example of what I mean,
consider this case:

A college campus creates 2k accounts and passwords at once. JR
hacker gains access a week later through his account w/out changing
the password, then somehow gets ahold of the shadow file. In it he
can determine (with some margin of error) which accounts have or
haven't been changed. Since many universities use some stupid
pattern for their passwords, or hand out cards with the account
passwords on them (later found in the trash), he now has a pool of
accounts to attack. 

3) chpasswd provides no facility to use MD5 rather than (I suspect)
DES. DES is unacceptable these days. 

Also, where is the source for this utility, and the passwd utility?
I can't seem to find it in my local mirror. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: CERT Advisory CA-2002-05 Multiple Vulnerabilities in PHP fileupload

2002-02-28 Thread Petro
On Thu, Feb 28, 2002 at 08:37:45AM -, Jeff wrote:
 I received this CERT Advisory about 6 hours ago, regarding PHP. 
 The php website confirms the details: www.php.net
 I think this is going to be a problem for us, due to the way
 the Debian packaging works - 
 I guess that the immediate solution in this case is for us to
 try to get the unstable Apache 1.3.23 package + an updated
 PHP4 4.2.1 package + MySQL, SSL etc to work.  - aint
 going to be quick to test this and roll it out into production, 
 and in the mean time, we have production servers running
 a PHP4 that has a now widely known security issue. Oh - and 
 yes, we could go out of business and not accept data, but
 methinks my tenure would be somewhat shortened if I propose
 that at our emergency security meeting in an hours time!
 Help?

Grab the php4.05 source package, patch and rebuild the package, then 
distribute.

-- 
Share and Enjoy. 



Security implications of chpasswd.

2002-02-28 Thread Petro
For some very good reasons I had to do a mass change of passwords
on one of our exposed login machines (no breach/hack, different
reason). 

There is a utility included in Debian Stable (and the others) to do
this called chpasswd. 

I believe there may be some security issues with this utility:

1) This utility does DES passwords instead of MD5, even tho' the
rest of the system does/understands MD5. 

2) when doing a mass password change, the first 2 characters are the
same for every password. This could be an information leak
indicating mass-password changes, and displaying *which passwords
are still at the set default*. For a better example of what I mean,
consider this case:

A college campus creates 2k accounts and passwords at once. JR
hacker gains access a week later through his account w/out changing
the password, then somehow gets ahold of the shadow file. In it he
can determine (with some margin of error) which accounts have or
haven't been changed. Since many universities use some stupid
pattern for their passwords, or hand out cards with the account
passwords on them (later found in the trash), he now has a pool of
accounts to attack. 

3) chpasswd provides no facility to use MD5 rather than (I suspect)
DES. DES is unacceptable these days. 

Also, where is the source for this utility, and the passwd utility?
I can't seem to find it in my local mirror. 

-- 
Share and Enjoy. 



Re: webhosting

2002-02-25 Thread Petro

On Mon, Feb 25, 2002 at 02:18:29PM -0700, Jerry Lynde wrote:
 True, true...
 But Michael was asking for secure, not non-anal licensing... I don't expect 
 he was gonna
 try and hack BIND or djbdns or anything else... shrug
 I just wouldn't suggest anyone use BIND is the same sense that I wouldn't 
 suggest they
 ride a Harley naked on snow-packed icy roads... something bad's bound to 
 happen...

Does it have to be a Harley? 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: webhosting

2002-02-25 Thread Petro
On Mon, Feb 25, 2002 at 02:18:29PM -0700, Jerry Lynde wrote:
 True, true...
 But Michael was asking for secure, not non-anal licensing... I don't expect 
 he was gonna
 try and hack BIND or djbdns or anything else... shrug
 I just wouldn't suggest anyone use BIND is the same sense that I wouldn't 
 suggest they
 ride a Harley naked on snow-packed icy roads... something bad's bound to 
 happen...

Does it have to be a Harley? 

-- 
Share and Enjoy. 



Re: Un-installing inetd on Woody.

2002-02-14 Thread Petro
On Wed, Feb 13, 2002 at 09:39:02PM -0800, Ted Cabeen wrote:
 You shouldn't use the update-rc.d script to remove init.d scripts.  If you
 do, when you upgrade the package, all of the scripts should be reinstalled.
 Read the man page for update-rc.d for info on how to turn off a service and
 ensure that it won't be re-enabled on upgrade.  A lot of people seem to do
 this, but it will eventually cause problems.  update-rc.d was written for
 scripts to use, not administrators.

Um. 

Then what should one use (other than manual intervention) to manage
init.d symlinks?

-- 
Share and Enjoy. 



Re: securid logins

2002-01-21 Thread Petro

On Mon, Jan 21, 2002 at 06:16:34AM -0800, martin f krafft wrote:
 assuming i have SecurID tokens with licenses, can i make linux
 authenticate based on these *without* the use of external or commercial
 software (like ACE/Server)? any experience anyone?

I don't think so. 

But I'd be interested in the responses as well.

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: securid logins

2002-01-21 Thread Petro
On Mon, Jan 21, 2002 at 06:16:34AM -0800, martin f krafft wrote:
 assuming i have SecurID tokens with licenses, can i make linux
 authenticate based on these *without* the use of external or commercial
 software (like ACE/Server)? any experience anyone?

I don't think so. 

But I'd be interested in the responses as well.

-- 
Share and Enjoy. 



Re: Secure 2.4.x kernel

2001-12-28 Thread Petro
On Fri, Dec 28, 2001 at 11:18:35AM +0300, Nyarlathotep wrote:
 On Fri, 2001-12-28 at 03:22, Howland, Curtis wrote:
  Naa, it's simian posturing. It happens with humans everywhere. I 
  enjoyed watching it in Good Will Hunting, and two days ago rented 
  Finding Forrester (same movie, different actors), and sure enough 
  lots of simian posturing. You dare to challenge me in MY classroom? etc.
 Oh yes. The alpha chimp syndrome. Second-circuit through and through. 

No, more of locking horns. 

  I can suggest the writings of Jeff Cooper for a better exploration of the 
  kinds of attitudes and processes that are now missing, and R.A.Heinlein for 
  lots of fictional explorations of the issue. 
 May I humbly say anything by Tim Leary or Robert Anton Wilson you can
 lay your hands on? 

Also the book The War Against Boys, Christina Hoff Sommers, ISBN
0-684-84956-9.

Relevance to security? 

Well, a lot of the script kiddies, having been denied traditional
means of locking horns turn to other means. 

-- 
Share and Enjoy. 



cdimages.debian.org

2001-12-20 Thread Petro

Is this host offline for good? 

Shouldn't there be an obvious mirror of this somewhere? 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: cdimages.debian.org

2001-12-20 Thread Petro

On Thu, Dec 20, 2001 at 04:54:01PM -0800, Brian Bilbrey wrote:
 On Thu, Dec 20, 2001 at 12:42:17PM -0800, Petro wrote:
  Is this host offline for good? 
 h. Try cdimage.debian.org (there's no 's' in the url as you put it
 in the subject: line). However, right now, I'm timing out on the correct
 host.
 A traceroute to the host appears to reveal a router problem someplace in
 XO's network, in the UK:
 fe0-llb-x-many.RL2-HE.access.rtr.uk.xo.net (195.224.254.198)
 I'd counsel patience. I'd also wonder why you posted this to
 debian-security? But neither here nor there.

Well, it's the only debian list I read--which is a bad reason, and 
I wanted the CDs to build a replacement for our current secure entry
point into our network--which is a bad reason, but mostly because
the people here are the ones I know who know most about debian and
assocaited web sites. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




cdimages.debian.org

2001-12-20 Thread Petro
Is this host offline for good? 

Shouldn't there be an obvious mirror of this somewhere? 

-- 
Share and Enjoy. 



Re: cdimages.debian.org

2001-12-20 Thread Petro
On Thu, Dec 20, 2001 at 04:54:01PM -0800, Brian Bilbrey wrote:
 On Thu, Dec 20, 2001 at 12:42:17PM -0800, Petro wrote:
  Is this host offline for good? 
 h. Try cdimage.debian.org (there's no 's' in the url as you put it
 in the subject: line). However, right now, I'm timing out on the correct
 host.
 A traceroute to the host appears to reveal a router problem someplace in
 XO's network, in the UK:
 fe0-llb-x-many.RL2-HE.access.rtr.uk.xo.net (195.224.254.198)
 I'd counsel patience. I'd also wonder why you posted this to
 debian-security? But neither here nor there.

Well, it's the only debian list I read--which is a bad reason, and 
I wanted the CDs to build a replacement for our current secure entry
point into our network--which is a bad reason, but mostly because
the people here are the ones I know who know most about debian and
assocaited web sites. 

-- 
Share and Enjoy. 



Re: cdimages.debian.org

2001-12-20 Thread Petro
On Thu, Dec 20, 2001 at 12:42:17PM -0800, Petro wrote:
 Is this host offline for good? 
 Shouldn't there be an obvious mirror of this somewhere? 

I got my answer to the obvious mirror part, and found the
information (if not the file) that I was looking for.

thanks for all the responses.

And yes, I acknowlege that I should have asked elsewhere.

-- 
Share and Enjoy. 



Re: Spam?!?

2001-12-17 Thread Petro

On Mon, Dec 17, 2001 at 11:48:13PM +0900, Yooseong Yang wrote:
 can you speak korean? if so give them a call or a nasty email for us.
 I am be shameful of this kinda spam stuffs as a korean. 
 I send an email to hanmail mail administrator about this kinda
 problem. If I got some mails from whom is concerned, I'll get posted of it. 
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Don't be ashamed, there are plently of people in every country with
internet access who are spammers.

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Spam?!?

2001-12-17 Thread Petro
On Mon, Dec 17, 2001 at 11:48:13PM +0900, Yooseong Yang wrote:
 can you speak korean? if so give them a call or a nasty email for us.
 I am be shameful of this kinda spam stuffs as a korean. 
 I send an email to hanmail mail administrator about this kinda
 problem. If I got some mails from whom is concerned, I'll get posted of it. 
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Don't be ashamed, there are plently of people in every country with
internet access who are spammers.

-- 
Share and Enjoy. 



Re: Exim mail

2001-12-14 Thread Petro

On Fri, Dec 14, 2001 at 06:22:03PM -0600, Daniel Rychlik wrote:
 How do I stop this from happening.  Apparently my bud telented to port 25
 and somehow sent mail from my root account.  Any suggestions, white papers
 or links?  Id would like to block the telnet application all together, but I
 dont think thats possible.

It's not possible to block telnet access to port 25, unless you just
want to stop getting mail altogther. 

 Thanks in advance,
 Daniel
 
 im a newbie so please send flame mail to [EMAIL PROTECTED]null   thanks.
 
 Heres what he sent to me...
 
 - Original Message -
 From: [EMAIL PROTECTED]
 Sent: Thursday, December 13, 2001 10:03 PM
 
 
  hehe this wasnt so hard either, i guess that makes me a pimp? lmfao,
 anyway learn to call a brotha damnit! and dont act like you dont know who
 dis be! foo! hehehe later..
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Exim mail

2001-12-14 Thread Petro
On Fri, Dec 14, 2001 at 06:22:03PM -0600, Daniel Rychlik wrote:
 How do I stop this from happening.  Apparently my bud telented to port 25
 and somehow sent mail from my root account.  Any suggestions, white papers
 or links?  Id would like to block the telnet application all together, but I
 dont think thats possible.

It's not possible to block telnet access to port 25, unless you just
want to stop getting mail altogther. 

 Thanks in advance,
 Daniel
 
 im a newbie so please send flame mail to [EMAIL PROTECTED]null   thanks.
 
 Heres what he sent to me...
 
 - Original Message -
 From: [EMAIL PROTECTED]
 Sent: Thursday, December 13, 2001 10:03 PM
 
 
  hehe this wasnt so hard either, i guess that makes me a pimp? lmfao,
 anyway learn to call a brotha damnit! and dont act like you dont know who
 dis be! foo! hehehe later..
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

-- 
Share and Enjoy. 



Re: Deducing key from encrypted original data

2001-12-11 Thread Petro

On Tue, Dec 11, 2001 at 01:33:41AM +, Andrew Bolt wrote:
 ...unless you are from Hollywood - in which case a good encryption
 scheme is one that can be cracked by having lots of digits flash
 up on the screen, and gradually have individual digits lock into
 the correct key.

Some wierd variant of working Quantum Computer. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Deducing key from encrypted original data

2001-12-11 Thread Petro
On Tue, Dec 11, 2001 at 01:33:41AM +, Andrew Bolt wrote:
 ...unless you are from Hollywood - in which case a good encryption
 scheme is one that can be cracked by having lots of digits flash
 up on the screen, and gradually have individual digits lock into
 the correct key.

Some wierd variant of working Quantum Computer. 

-- 
Share and Enjoy. 



Re: Can a daemon listen only on some interfaces?

2001-12-08 Thread Petro

On Sat, Dec 08, 2001 at 01:40:06AM -0800, [EMAIL PROTECTED] wrote:
 After reading a previous thread about stopping services from listening
 on certains ports, I decided to investigate things a little further for
 my system.
 So, what I can figure out is that it seems that I have only the
 following daemons listening: postfix, sshd, cupsd, XF86_SVGA, portmap.
 I have only deliberately decided to run postfix, sshd and cupsd.
 Everything in /etc/inetd.conf is hashed out.  In fact I renamed the file
 so that it is not accessed at all.

Better just not to start inetd at all. man inetd and update-rc.d 

 The only ones I didn't know about in this list are portmap and
 XF86_SVGA.  Firstly, I can't seem to find the config file for X where
 you set the --nolisten parameter - but I have not unset this at any
 stage and I thought Debian did this by default.  Secondly, I guess
 everyone needs portmap it seems, so I can't turn this off or some things
 won't work.  Someone please educate me here.

Can't help with the X thing, IMO nothing running X should be talking
directly to an untrusted network (clarification, X runs on
workstations, workstations should not be run directly on untrusted
networks as they have *users* on them, and users do stupid things,
even sysadmins do stupid things as users sometimes). 

But, as far as portmap, well, man portmap to start, but if you're
not using NIS, NFS and the like (anything that would need portmap)
then disable it. (hint: /etc/init.d/portmap, man update-rc.d).  

 
 So my question is:
 Is there some way to make certain daemons, (say postfix) listen only on
 some interfaces?  For example, I have everything firewalled from

This is per-daemon. Some can (named, apache, IIRC postfix) some
cannot (I assume, but I don't know any off the top of my head). 

 outside, so I really only need postfix to listen on the loopback
 interface for local connections.  Is this possible?

If postfix isn't dealing with incoming mail (i.e. from another
machine) then it doesn't need to run as a daemon at all. At least
sendmail didn't, and I assume postfix could mimick this behavior.
Just run it out of cron for delivery. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Can a daemon listen only on some interfaces?

2001-12-08 Thread Petro
On Sat, Dec 08, 2001 at 01:40:06AM -0800, [EMAIL PROTECTED] wrote:
 After reading a previous thread about stopping services from listening
 on certains ports, I decided to investigate things a little further for
 my system.
 So, what I can figure out is that it seems that I have only the
 following daemons listening: postfix, sshd, cupsd, XF86_SVGA, portmap.
 I have only deliberately decided to run postfix, sshd and cupsd.
 Everything in /etc/inetd.conf is hashed out.  In fact I renamed the file
 so that it is not accessed at all.

Better just not to start inetd at all. man inetd and update-rc.d 

 The only ones I didn't know about in this list are portmap and
 XF86_SVGA.  Firstly, I can't seem to find the config file for X where
 you set the --nolisten parameter - but I have not unset this at any
 stage and I thought Debian did this by default.  Secondly, I guess
 everyone needs portmap it seems, so I can't turn this off or some things
 won't work.  Someone please educate me here.

Can't help with the X thing, IMO nothing running X should be talking
directly to an untrusted network (clarification, X runs on
workstations, workstations should not be run directly on untrusted
networks as they have *users* on them, and users do stupid things,
even sysadmins do stupid things as users sometimes). 

But, as far as portmap, well, man portmap to start, but if you're
not using NIS, NFS and the like (anything that would need portmap)
then disable it. (hint: /etc/init.d/portmap, man update-rc.d).  

 
 So my question is:
 Is there some way to make certain daemons, (say postfix) listen only on
 some interfaces?  For example, I have everything firewalled from

This is per-daemon. Some can (named, apache, IIRC postfix) some
cannot (I assume, but I don't know any off the top of my head). 

 outside, so I really only need postfix to listen on the loopback
 interface for local connections.  Is this possible?

If postfix isn't dealing with incoming mail (i.e. from another
machine) then it doesn't need to run as a daemon at all. At least
sendmail didn't, and I assume postfix could mimick this behavior.
Just run it out of cron for delivery. 

-- 
Share and Enjoy. 



Re: shutdown user and accountability

2001-11-29 Thread Petro

On Thu, Nov 29, 2001 at 05:59:40PM +, Niall Walsh wrote:
 Carel Fellinger wrote:
 On Thu, Nov 29, 2001 at 10:37:24AM +, Niall Walsh wrote:
 I can't resist it!
 me too:)
 Add a usb digital camera to the box and only allow people who are not 
 I've thought of this too, but rejected it because it's s easy to
 circumvent, just place your hand in front of the camera.
 Not if they don't know where it is or even that it exists :-)   I'd be 
 sneeking it into the case perhaps so it looks out a drive bay or else 
 building it into something.   Also you could use a capture card hooked 
 up to a pin hole camera and for completeness (but system performance 
 thrashing) use motion detection to make sure you get them before they 
 get the hand in place!

Have the camera take 1 shot every second (or .5 seconds) and save
them in a round-robin naming fashion e.g.:

shot1.jpg, shot2.jpg, shot3.jpg...shot10.jpg, shot1.jpg, and then
have an init-script move the directory they are in to something like
pic.old/.

That way you have the last 5-10 seconds on the machines life. 

Yeah, this is getting seriously rube-goldberg. 

 Seriously crazy, but what else can you do if you really want to supply 
 anyone with the ability to shut it down AND know who did it!   Maybe put 
 the password with the security guard so he can record who took the 
 passwd to reset it (obviously you need to reset the password then etc.)

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: shutdown user and accountability

2001-11-29 Thread Petro
On Thu, Nov 29, 2001 at 05:59:40PM +, Niall Walsh wrote:
 Carel Fellinger wrote:
 On Thu, Nov 29, 2001 at 10:37:24AM +, Niall Walsh wrote:
 I can't resist it!
 me too:)
 Add a usb digital camera to the box and only allow people who are not 
 I've thought of this too, but rejected it because it's s easy to
 circumvent, just place your hand in front of the camera.
 Not if they don't know where it is or even that it exists :-)   I'd be 
 sneeking it into the case perhaps so it looks out a drive bay or else 
 building it into something.   Also you could use a capture card hooked 
 up to a pin hole camera and for completeness (but system performance 
 thrashing) use motion detection to make sure you get them before they 
 get the hand in place!

Have the camera take 1 shot every second (or .5 seconds) and save
them in a round-robin naming fashion e.g.:

shot1.jpg, shot2.jpg, shot3.jpg...shot10.jpg, shot1.jpg, and then
have an init-script move the directory they are in to something like
pic.old/.

That way you have the last 5-10 seconds on the machines life. 

Yeah, this is getting seriously rube-goldberg. 

 Seriously crazy, but what else can you do if you really want to supply 
 anyone with the ability to shut it down AND know who did it!   Maybe put 
 the password with the security guard so he can record who took the 
 passwd to reset it (obviously you need to reset the password then etc.)

-- 
Share and Enjoy. 



Re: shutdown user and accountability

2001-11-28 Thread Petro

On Wed, Nov 28, 2001 at 10:58:47AM +0900, Olaf Meeuwissen wrote:
 Blake Barnett [EMAIL PROTECTED] writes:
 
  Can't you give a group sudo access?  If so, just add everyone to a group
  and give that group sudo /sbin/halt or sudo /sbin/shutdown or both.
 
 That's exactly what my sudo setup does right now.  The problem is that
 apparently *everyone* needs to be able to shut down the machine (for
 reasons that are beyond me).  Added accounts on an as needed basis is
 fine with me, but I don't fancy creating, oh, 250+ password protected
 accounts just to meet policy.

Put a small APC on the machine that talks to the serial port. Run
the APC shutdown daemon, then to shut the machine down, pull the
plug from the wall--or have it hooked to a power strip and trip the
switch on the power strip.

APC loses power, triggers daemon, daemon shuts machine down. 

Note: this also works if there is a power-outage during a time when
no one is in the office.

This doesn't give accountability, but you put a big axe near the
machine... 


-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: shutdown user and accountability

2001-11-28 Thread Petro
On Wed, Nov 28, 2001 at 10:58:47AM +0900, Olaf Meeuwissen wrote:
 Blake Barnett [EMAIL PROTECTED] writes:
 
  Can't you give a group sudo access?  If so, just add everyone to a group
  and give that group sudo /sbin/halt or sudo /sbin/shutdown or both.
 
 That's exactly what my sudo setup does right now.  The problem is that
 apparently *everyone* needs to be able to shut down the machine (for
 reasons that are beyond me).  Added accounts on an as needed basis is
 fine with me, but I don't fancy creating, oh, 250+ password protected
 accounts just to meet policy.

Put a small APC on the machine that talks to the serial port. Run
the APC shutdown daemon, then to shut the machine down, pull the
plug from the wall--or have it hooked to a power strip and trip the
switch on the power strip.

APC loses power, triggers daemon, daemon shuts machine down. 

Note: this also works if there is a power-outage during a time when
no one is in the office.

This doesn't give accountability, but you put a big axe near the
machine... 


-- 
Share and Enjoy. 



Re: is 3des secure??

2001-11-27 Thread Petro

On Tue, Nov 27, 2001 at 12:44:23PM +0100, Janusz A. Urbanowicz wrote:
 Petro wrote/napisa?[a]/schrieb:
  On Mon, Nov 26, 2001 at 12:17:32PM +1100, Steve Smith wrote:
   3DES is generally considered strong enough.  However, it is slow, and
   can effect performance.  Try doing large 'scp's and switch between
  DES/3DES was designed to be implemented in hardware, doing a
  software-only implementation is going to be slow. 
 Current DES implementations aren't so slow, they reach millions of
 encryptions per sencond on current hardware.

It's relative. Encrypt x amount of data with 3des, do the same with
blowfish or one of the other AES canidates, using a comparable
keylength. Which is faster? 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: is 3des secure??

2001-11-27 Thread Petro
On Tue, Nov 27, 2001 at 12:44:23PM +0100, Janusz A. Urbanowicz wrote:
 Petro wrote/napisa?[a]/schrieb:
  On Mon, Nov 26, 2001 at 12:17:32PM +1100, Steve Smith wrote:
   3DES is generally considered strong enough.  However, it is slow, and
   can effect performance.  Try doing large 'scp's and switch between
  DES/3DES was designed to be implemented in hardware, doing a
  software-only implementation is going to be slow. 
 Current DES implementations aren't so slow, they reach millions of
 encryptions per sencond on current hardware.

It's relative. Encrypt x amount of data with 3des, do the same with
blowfish or one of the other AES canidates, using a comparable
keylength. Which is faster? 

-- 
Share and Enjoy. 



Re: is 3des secure??

2001-11-26 Thread Petro

On Mon, Nov 26, 2001 at 12:17:32PM +1100, Steve Smith wrote:
 3DES is generally considered strong enough.  However, it is slow, and
 can effect performance.  Try doing large 'scp's and switch between

DES/3DES was designed to be implemented in hardware, doing a
software-only implementation is going to be slow. 

 3DES and blowfish.
 Personally I prefer blowfish, as it has performance, is
 'secure-enough' to my (less-than-expert) eye, and frankly I doubt
 anybody capable of defeating it is interested in what I have to say.

Yup. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: is 3des secure??

2001-11-26 Thread Petro
On Mon, Nov 26, 2001 at 12:17:32PM +1100, Steve Smith wrote:
 3DES is generally considered strong enough.  However, it is slow, and
 can effect performance.  Try doing large 'scp's and switch between

DES/3DES was designed to be implemented in hardware, doing a
software-only implementation is going to be slow. 

 3DES and blowfish.
 Personally I prefer blowfish, as it has performance, is
 'secure-enough' to my (less-than-expert) eye, and frankly I doubt
 anybody capable of defeating it is interested in what I have to say.

Yup. 

-- 
Share and Enjoy. 



Re: is 3des secure??

2001-11-25 Thread Petro

On Mon, Nov 26, 2001 at 09:04:59AM +0900, Howland, Curtis wrote:
 
 While this may be whipping a greasy stain on the road, it is true that
 3DES was created by the government back when private cryptology was
 difficult or unknown. I believe it is prudent to consider that it was
 allowed to be used because of practical cracking available to the crypto
 experts.
 
It wasn't allowed to be used, the government promulgated DES as a
standard for banks and other high security industries because it was
the best they could find at the time to do the job. 

It has withstood a great deal of cryptoanalysis over the last couple
decades, and has held up fairly well. It's only real weakness has
been it's key-length. 

While there may be some people in the government who would be happy
to promulgate a broken standard to make their data-collection
easier, wiser heads realize that if it's broken for our side (note
quotes) it's broken for the other side as well.

3DES effectively triples the key-length for DES, and for SSH
sessions, it's quite good enough. 
 
 I'm not referring to a back-door, just a known method such as a hardware
 based method for cracking in near-real time.

3DES is more than strong enough for *today*, it's just that in the
near future it won't be. 

 However, 3DES is likely strong enough for normal people. If you're
 trying to keep things from them, they are already reading your screen
 and keyboard strokes directly by their radion emissions from accross the
 street.

No, they've tapped your machine, and theres a minature camera
looking over your shoulder from the air-vent in the room. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: is 3des secure??

2001-11-25 Thread Petro
On Mon, Nov 26, 2001 at 09:04:59AM +0900, Howland, Curtis wrote:
 
 While this may be whipping a greasy stain on the road, it is true that
 3DES was created by the government back when private cryptology was
 difficult or unknown. I believe it is prudent to consider that it was
 allowed to be used because of practical cracking available to the crypto
 experts.
 
It wasn't allowed to be used, the government promulgated DES as a
standard for banks and other high security industries because it was
the best they could find at the time to do the job. 

It has withstood a great deal of cryptoanalysis over the last couple
decades, and has held up fairly well. It's only real weakness has
been it's key-length. 

While there may be some people in the government who would be happy
to promulgate a broken standard to make their data-collection
easier, wiser heads realize that if it's broken for our side (note
quotes) it's broken for the other side as well.

3DES effectively triples the key-length for DES, and for SSH
sessions, it's quite good enough. 
 
 I'm not referring to a back-door, just a known method such as a hardware
 based method for cracking in near-real time.

3DES is more than strong enough for *today*, it's just that in the
near future it won't be. 

 However, 3DES is likely strong enough for normal people. If you're
 trying to keep things from them, they are already reading your screen
 and keyboard strokes directly by their radion emissions from accross the
 street.

No, they've tapped your machine, and theres a minature camera
looking over your shoulder from the air-vent in the room. 

-- 
Share and Enjoy. 



Re: Mail-server config

2001-11-21 Thread Petro

On Wed, Nov 21, 2001 at 04:34:46PM +0100, Johannes Weiss wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 Hi @all,
 I plan to install a mailserver for ca. 800 users, now I planned to make 800 
 users with shell /bin/bash, home /dev/nul,...
 So, I ask you ;)), if this is a good solution, to make 800 UNIX-users for a 
 mailserver and if not what's the best solution (security reason)

Most modern MTAs have support for some sort of non-system based user
database (LDAP etc.). I know postfix has support for virtual maps
and such, see www.postfix.org 
http://kummefryser.dk/HOWTO/mail/postfix_mysql.html. 

You would then need to find an imap/pop server that could use the
same thing. 

This would be much easier to maintain securely.

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: In Praise of Dos (RE: Mutt tmp files)

2001-11-21 Thread Petro
On Tue, Nov 20, 2001 at 08:25:36PM -0800, Nathan E Norman wrote:
 On Tue, Nov 20, 2001 at 12:01:32PM -0800, J C Lawrence wrote:
  On Mon, 19 Nov 2001 21:57:05 -0600 
  Nathan E Norman Nathan wrote:
   On Mon, Nov 19, 2001 at 03:26:50PM -0800, Petro wrote:
   But his is hugely off topic, and I'll go no futher down this
   road.
   Could you at least honor my Mail-Followup-To: header?
  Mail-Followup-To is a non-standard, un-RFC documented, generally
  unsupported header.  
 The guy is using mutt.  mutt supports M-F-T.  You figure it out.
 M-F-T is generally used on debian mailing lists.

Sometimes I see it (now that I'm looking for it) sometimes I don't. 

This post didn't have it. Others do. 

Some posts come through (for another debian list) matching 
^X-Mailing-List:[EMAIL PROTECTED], others don't. 

I don't know if exchange is randomly changing the headers (it
wouldn't surprise me) or if sometimes the original poster puts them
in and sometimes not. 


-- 
Share and Enjoy. 



Re: Mail-server config

2001-11-21 Thread Petro
On Wed, Nov 21, 2001 at 04:34:46PM +0100, Johannes Weiss wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 Hi @all,
 I plan to install a mailserver for ca. 800 users, now I planned to make 800 
 users with shell /bin/bash, home /dev/nul,...
 So, I ask you ;)), if this is a good solution, to make 800 UNIX-users for a 
 mailserver and if not what's the best solution (security reason)

Most modern MTAs have support for some sort of non-system based user
database (LDAP etc.). I know postfix has support for virtual maps
and such, see www.postfix.org 
http://kummefryser.dk/HOWTO/mail/postfix_mysql.html. 

You would then need to find an imap/pop server that could use the
same thing. 

This would be much easier to maintain securely.

-- 
Share and Enjoy. 



Re: Mutt tmp files -- Root is not my Enemy

2001-11-20 Thread Petro

On Tue, Nov 20, 2001 at 02:47:56PM +0100, Florian Bantner wrote:
 On Die, 20 Nov 2001, Rolf Kutz wrote:
  Florian Bantner ([EMAIL PROTECTED]) wrote:
   A fact about which I'm concerned
   even more than about a hack from outside via the internet etc. is
   real physical access to the box. Something hackers normaly don't pay
   enough attention is that just somebody steps - let's say 6 o'clock
   in the morning - into your room, shows you his police card - or what ever
   govermental id card - and tells you that your computer is now his.
  Use TMPFS. Encrypt your disk or do everything in
  RAM (maybe set up a diskless system booting from
  cd. See the bootcd-package). They might still be
  bugging your hardware.
 I don't know tmpfs. What I'm currently thinging about is:
 * Create for every user a directory under his home.
 * Use some kind of ram-disk device.
 * Perhaps (just to be sure) encrypt it. Perhaps that's where I need
   some kind of encrypting filesystem (do I?). I'm not experienced in
   fs encryption. How do I mount such devices. Which encryption is
   used? When to enter passphrase?

Several years ago Matt Blaze published a bit of code that mounted
encrypted files via the loop interface as home directories. It was
fairly resource intensive, and hence not really scaleable. It is
good for protecting against casual browsing, but while you're logged
in to the machine (and hence have your home dir mounted) then it's
just like a normal home directory. 

Found it
http://www.ibiblio.org/pub/Linux/docs/faqs/security/Cryptographic-File-System

Seems I mis-remember bits of it. 

 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Mutt tmp files -- Root is not my Enemy

2001-11-20 Thread Petro

On Tue, Nov 20, 2001 at 03:34:54PM +0100, Rolf Kutz wrote:
 Alexander Clouter ([EMAIL PROTECTED]) wrote:
 
  I am the root guy of my own laptop and I can trust myself :)  However a lot
  of countries (uk/us and probably others, lots in the eu I would imagine) have
  encryption laws, not preventing it but permiting them to throw you in jail
  unless you hand over your encryption codes.  If you don't you get a nice big
 What, if I someone gets an email encrypted with a
 bogus key claiming to, but not belonging to the
 recipient? What if I lost the key? Silly law.

Many these days are. 

Not to get all Religious (cause I'm not), but that Moses guy pretty
much summed everything up in those 10 laws (well 9 of 'em are ok,
there's one that a little off), and ever since politicians have been
trying to prove their worth by making things worse. 



-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: WAY OT (Re: In Praise of Dos (RE: Mutt tmp files))

2001-11-20 Thread Petro

On Tue, Nov 20, 2001 at 01:00:58PM -0800, Vineet Kumar wrote:
 * J C Lawrence ([EMAIL PROTECTED]) [011120 12:04]:
  On Mon, 19 Nov 2001 21:57:05 -0600 
  Nathan E Norman Nathan wrote:
   On Mon, Nov 19, 2001 at 03:26:50PM -0800, Petro wrote:
   But his is hugely off topic, and I'll go no futher down this
   road.
   Could you at least honor my Mail-Followup-To: header?
  Mail-Followup-To is a non-standard, un-RFC documented, generally
  unsupported header.  
 So are please and thank you, but it's generally considered polite.

To carry your analogy forward into the absurd, to be useful please
and thank you have to be heard and recognized as such. 

If you use a header that is not universally supported, or even
supported by a fairly popular mail client (Mutt in this case) or
frequently used (if not popular) MTA (Exchange in this case), then
you can't really complain if it gets ignored. 

As I said earlier, Mutt never saw it. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: In Praise of Dos (RE: Mutt tmp files)

2001-11-20 Thread Petro

On Tue, Nov 20, 2001 at 08:25:36PM -0800, Nathan E Norman wrote:
 On Tue, Nov 20, 2001 at 12:01:32PM -0800, J C Lawrence wrote:
  On Mon, 19 Nov 2001 21:57:05 -0600 
  Nathan E Norman Nathan wrote:
   On Mon, Nov 19, 2001 at 03:26:50PM -0800, Petro wrote:
   But his is hugely off topic, and I'll go no futher down this
   road.
   Could you at least honor my Mail-Followup-To: header?
  Mail-Followup-To is a non-standard, un-RFC documented, generally
  unsupported header.  
 The guy is using mutt.  mutt supports M-F-T.  You figure it out.
 M-F-T is generally used on debian mailing lists.

Sometimes I see it (now that I'm looking for it) sometimes I don't. 

This post didn't have it. Others do. 

Some posts come through (for another debian list) matching 
^X-Mailing-List:.*debian-user@.*, others don't. 

I don't know if exchange is randomly changing the headers (it
wouldn't surprise me) or if sometimes the original poster puts them
in and sometimes not. 


-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: In Praise of Dos (RE: Mutt tmp files)

2001-11-20 Thread Petro
On Mon, Nov 19, 2001 at 07:57:05PM -0800, Nathan E Norman wrote:
 On Mon, Nov 19, 2001 at 03:26:50PM -0800, Petro wrote:
  But his is hugely off topic, and I'll go no futher down this road.
 
 Could you at least honor my Mail-Followup-To: header?

I would have if I saw it. 

Mutt didn't notice it, and I don't see it in my backups. There is a
possibility that $exchange elided it.

Either way, if you'd stuck it in there, I apologize for not being
able to follow it, since it didn't make it here. 

-- 
Share and Enjoy. 



Re: Mutt tmp files -- Root is not my Enemy

2001-11-20 Thread Petro
On Tue, Nov 20, 2001 at 12:13:05PM +0100, Rolf Kutz wrote:
 Florian Bantner ([EMAIL PROTECTED]) wrote:
 
  A fact about which I'm concerned
  even more than about a hack from outside via the internet etc. is
  real physical access to the box. Something hackers normaly don't pay
  enough attention is that just somebody steps - let's say 6 o'clock
  in the morning - into your room, shows you his police card - or what ever
  govermental id card - and tells you that your computer is now his.
 
 Use TMPFS. Encrypt your disk or do everything in
 RAM (maybe set up a diskless system booting from
 cd. See the bootcd-package). They might still be
 bugging your hardware.

If this kind of attack is in your threat model, you need to
seriously re-evaluate what you are doing. 

Not saying that you should stop doing it, but there really isn't
much you can do to stop it. 

Quite frankly local encryption isn't going to help much against
government agencies--even local police. The quickest way to break
encryption is to use a rubber hose, and while they may apologize
afterwards--if local law requires it, they still have access to your
files and you are in pain. 

This starts to get into magnesium strips taped to the HD and other
such destructive foolishness--that, depending on what you're trying
to hid and from whom may be necessary, but is still *really* ugly. 

  You have to experience that for yourself to believe how easy this
  could happen. Just be in the wrong place to the wrong time. 
  It happend to me once, just because I lived that time in a
  flat-sharing community. I didn't see my computers for about a year
  and then all harddisk had been removed and where broken. 
 Did they replace the damage?



-- 
Share and Enjoy. 



Re: Mutt tmp files -- Root is not my Enemy

2001-11-20 Thread Petro
On Tue, Nov 20, 2001 at 02:47:56PM +0100, Florian Bantner wrote:
 On Die, 20 Nov 2001, Rolf Kutz wrote:
  Florian Bantner ([EMAIL PROTECTED]) wrote:
   A fact about which I'm concerned
   even more than about a hack from outside via the internet etc. is
   real physical access to the box. Something hackers normaly don't pay
   enough attention is that just somebody steps - let's say 6 o'clock
   in the morning - into your room, shows you his police card - or what ever
   govermental id card - and tells you that your computer is now his.
  Use TMPFS. Encrypt your disk or do everything in
  RAM (maybe set up a diskless system booting from
  cd. See the bootcd-package). They might still be
  bugging your hardware.
 I don't know tmpfs. What I'm currently thinging about is:
 * Create for every user a directory under his home.
 * Use some kind of ram-disk device.
 * Perhaps (just to be sure) encrypt it. Perhaps that's where I need
   some kind of encrypting filesystem (do I?). I'm not experienced in
   fs encryption. How do I mount such devices. Which encryption is
   used? When to enter passphrase?

Several years ago Matt Blaze published a bit of code that mounted
encrypted files via the loop interface as home directories. It was
fairly resource intensive, and hence not really scaleable. It is
good for protecting against casual browsing, but while you're logged
in to the machine (and hence have your home dir mounted) then it's
just like a normal home directory. 

Found it

http://www.ibiblio.org/pub/Linux/docs/faqs/security/Cryptographic-File-System

Seems I mis-remember bits of it. 

 

-- 
Share and Enjoy. 



Re: Mutt tmp files -- Root is not my Enemy

2001-11-20 Thread Petro
On Tue, Nov 20, 2001 at 03:34:54PM +0100, Rolf Kutz wrote:
 Alexander Clouter ([EMAIL PROTECTED]) wrote:
 
  I am the root guy of my own laptop and I can trust myself :)  However a lot
  of countries (uk/us and probably others, lots in the eu I would imagine) 
  have
  encryption laws, not preventing it but permiting them to throw you in jail
  unless you hand over your encryption codes.  If you don't you get a nice big
 What, if I someone gets an email encrypted with a
 bogus key claiming to, but not belonging to the
 recipient? What if I lost the key? Silly law.

Many these days are. 

Not to get all Religious (cause I'm not), but that Moses guy pretty
much summed everything up in those 10 laws (well 9 of 'em are ok,
there's one that a little off), and ever since politicians have been
trying to prove their worth by making things worse. 



-- 
Share and Enjoy. 



Re: WAY OT (Re: In Praise of Dos (RE: Mutt tmp files))

2001-11-20 Thread Petro
On Tue, Nov 20, 2001 at 01:00:58PM -0800, Vineet Kumar wrote:
 * J C Lawrence ([EMAIL PROTECTED]) [011120 12:04]:
  On Mon, 19 Nov 2001 21:57:05 -0600 
  Nathan E Norman Nathan wrote:
   On Mon, Nov 19, 2001 at 03:26:50PM -0800, Petro wrote:
   But his is hugely off topic, and I'll go no futher down this
   road.
   Could you at least honor my Mail-Followup-To: header?
  Mail-Followup-To is a non-standard, un-RFC documented, generally
  unsupported header.  
 So are please and thank you, but it's generally considered polite.

To carry your analogy forward into the absurd, to be useful please
and thank you have to be heard and recognized as such. 

If you use a header that is not universally supported, or even
supported by a fairly popular mail client (Mutt in this case) or
frequently used (if not popular) MTA (Exchange in this case), then
you can't really complain if it gets ignored. 

As I said earlier, Mutt never saw it. 

-- 
Share and Enjoy. 



Re: In Praise of Dos (RE: Mutt tmp files)

2001-11-19 Thread Petro

On Mon, Nov 19, 2001 at 12:30:34AM -0800, Martin Christensen wrote:
  Petro == Petro  [EMAIL PROTECTED] writes:
 Petro On Mon, Nov 19, 2001 at 10:24:05AM +0900, Howland, Curtis
 Petro wrote:
  ps: From a personal perspective, I think Linux is about where
  Windows 3.0 was. This is not a troll, just a usability thing.
 Petro No, it's about where win3.11 was in a lot of ways. Modulo
 Petro the stability etc.
 
 I am just dying to find out why this is so. I find the unices I work
 with to be much more usable than any incarnation of Windows. So what
 exactly do you put into 'usability'?

Consistency of UI, availibility and integration of applications,
slickness of look and feel. 

Under 3.1[1] applications had widely varying look and feel, and
were not well integrated, nor was the windowing system well
integrated with the underlying OS (it didn't provide proper
abstraction of things like file-systems, processes etc.). 

With Windows 95, Microsoft changed a lot of that. Not that they did
it *well* (the Win95 style interface gives me hives), but they
provided a fairly consistent (if awful) interface, and a good deal
of abstraction of the underlying hardware/OS. 

Linux is still at the Win3.11 level in those regards. 

Does this mean Linux isn't useable? Well, considering I've had at
least one Linux box running at home since late 1993/94 (and had it
installed on and off for about a year before that), I would have to
say it's perfectly usable for those inclined to learn, those who
have specific tasks it needs done. But I wouldn't put it on my
mother-in-laws computer, or my moms. Then again, I wouldn't give my
Mom a windows machine either (I gave her a Mac about 3/4 years ago,
and she hasn't bothered to plug it in yet). 

I like Linux, I think it's a *good* OS, and it's coming along quite
nicely, but that doesn't mean I think it's easy to use. IMO, one of
the biggest problems Linux is facing in it's quest to take the
desktop is that (1) there are too many different groups working on
UI stuff, and (2) Most of them think that the Win95 LOOK is right,
but don't bother trying for the consistency. 

Of course, my primary desk-top machine at home right now is a Mac
running OS X. Which has some UI issues as well. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: In Praise of Dos (RE: Mutt tmp files)

2001-11-19 Thread Petro

On Mon, Nov 19, 2001 at 12:46:21PM -0800, James Hamilton wrote:
 My Gnome/X/Debian GNU/Linux Desktop is much slicker than 
 anything I have ever been able to do with Windows.  The Gnome
 apps have a fairly consistent interface as well.  There is a steeper and
 longer learning curve to learn how to really use X and Unix, but I would
 say that is an asset for members of the technocracy rather than a 
 drawback.  I honestly don't know what you are talking about.  Using 

No, you are not listening. 

The slickness of the UI isn't what you can accomplish with the OS,
but rather about how things look. Look at the icons, look at the
buttons that gnome provides. Simple and functional, but not nearly
the degree of sophistication that Windows/MacOS provide. Look at the
integration of the application UI into the OS UI, it all looks the
same. 

Now maybe if I used FVWM2, or KDE, I would see more of this, but
frankly they act too much like windows (hit people, having the
minimize, maximize and KILL WINDOW buttons so close together is
wrong. This is one of the many UI issues Apple got right in OS 6-9,
but broke in X, and that windows got wrong with the 95 style UI). so
and use too much screen realestate for their icons and task bar, so
I use a different window manager (one of what, 20? available). 

 the NT box I am using now to post this message is sheer torture, but 

Outhouse huh. What's the Free Replacement for that? 

 I have to have one Windows desktop and support one Windows server
 here at work.  I would say the functionality of Linux is currently and 

Functionality is not useability. 

The Functionality of Linux is far superior to Windows in every area
except common desktop applications (Word processors, spread sheets,
Graphic Design (which is the only reason I still use MacOS at home,
there is simply nothing in the Open Source world that is any where
near Illustrator and Quark X-Press, and while the GIMP comes close
to PhotoShop, I've been using Photoshop for over 10 years now, and
I'm used to it). 

Yes, I've used Star Office and OO, and they are good, but not quite
ready. 

 rapidly surpassing that of Microsoft OSes, and that perhaps you haven't 
 found or learned the right environment and apps.  With Windows,
 everthing gets set up and it works the way MS decrees it will.  With 
 GNU/Linux, you have a huge number of choices.  Part of becoming
 a real user of open source is spending a lot of time evaluating different 

Stop right there. 

Do *NOT* assume because I criticize Linux that I don't know Linux.
I'm not going to get in a DSW with you, but I started using Linux
with kernel .99p6. I've built X from scratch (once). I use Linux on
my desk at work, and I'm one of like 2 or 3 in my office to do
so. I've used Slackware, DeadRat, Debian, and SuSE. I am the team
lead for a small SA team that maintains a 100+ server site,
primarily (and if testing goes well this week, soon to be almost
completely) Linux based. We're pusing an average (24 hour average)
of around 60 Mbits a second, and our front end is entirely Linux. 

I spent my weekend fighting with kernels and LVM to get snap shots
working properly 

I've used Linux as a desktop OS for 5 or 6 years, either primarily,
or in conjunction with my Mac.  I've used Star Office, Open Office, 
SAIG, Lyx, and WordPerfect on Linux (among others) for word processing. 

I've used or tried just about every mail application out there for
Linux, and (check the headers) use Mutt daily at work--with Exchange
no less. 

I don't criticize Linux because I know windows better, I criticize
Linux because it's not as good as it *could* be. 

In fact, I don't know windows better. I've only had 2 machines of
mine that run windows--one is a work laptop used for Word and
accessing a shared mailbox on Exchange, the other is my
Counter-Strike box. That's all that's on it. Windows, and the files
needed for Counter-Strike. 

 enviroments and applications to figure out what it takes to make a 
 system really consistent and usable for you.  Even if you pick some 
 things that aren't quite finished as part of your enviroment, if they 
 are part of an active project, they will be working much better soon.  

Go into Netscape, open up some random web page. What's the key
command for find? 

Now open Lyx. What's the key command for find? Mutt? Opera?
OpenOffice? 

Just like Windows 3.11. 

Which was my point. 

 Once I set up my box, my roomates (non-tech) can use it to surf the 
 web, read their email, write papers, browse newsgroups etc with a 
 fairly consistent and truly complete suite of free applications.

I did that 5 years ago for my wife. 

Of course, that was also true of Windows 3.11, with the exception
that the underlying OS wasn't free. 


-- 

Re: In Praise of Dos (RE: Mutt tmp files)

2001-11-19 Thread Petro

On Mon, Nov 19, 2001 at 02:14:54PM -0800, Nathan E Norman wrote:
 On Mon, Nov 19, 2001 at 01:47:40PM -0800, Petro wrote:
   enviroments and applications to figure out what it takes to make a 
   system really consistent and usable for you.  Even if you pick some 
   things that aren't quite finished as part of your enviroment, if
 they 
   are part of an active project, they will be working much better
 soon.  
  Go into Netscape, open up some random web page. What's the key
  command for find? 
  Now open Lyx. What's the key command for find? Mutt? Opera?
  OpenOffice? 
  Just like Windows 3.11. 
  Which was my point. 
 Install Netscape 4.x, 6.x, Mozilla, and IE on a windows box.
 
 Good luck expecting the same key strokes to do the same thing in each
 application.

I don't have Netscape for my windows laptop, but on Opera, IE,
Pegasus Mail, Star Office, and Office the  Select All, Cut, Copy, Paste,
and Find options all had the exact same key commands. Most of them
(were applicable) had the same key command for undo. All of them
used ctrl-n for new, whatever new meant in their context. Even
WinCVS, a port of a Unix App uses most of these. Ctrl-p is almost
always print etc. 

Beyond those basics, there will (and arguably should) be differences
in what keys do, but the basics should (were applicable) be
consistent across an interface. 

But his is hugely off topic, and I'll go no futher down this road.



-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: In Praise of Dos (RE: Mutt tmp files)

2001-11-19 Thread Petro

On Mon, Nov 19, 2001 at 07:57:05PM -0800, Nathan E Norman wrote:
 On Mon, Nov 19, 2001 at 03:26:50PM -0800, Petro wrote:
  But his is hugely off topic, and I'll go no futher down this road.
 
 Could you at least honor my Mail-Followup-To: header?

I would have if I saw it. 

Mutt didn't notice it, and I don't see it in my backups. There is a
possibility that $exchange elided it.

Either way, if you'd stuck it in there, I apologize for not being
able to follow it, since it didn't make it here. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: In Praise of Dos (RE: Mutt tmp files)

2001-11-19 Thread Petro
On Mon, Nov 19, 2001 at 12:30:34AM -0800, Martin Christensen wrote:
  Petro == Petro  [EMAIL PROTECTED] writes:
 Petro On Mon, Nov 19, 2001 at 10:24:05AM +0900, Howland, Curtis
 Petro wrote:
  ps: From a personal perspective, I think Linux is about where
  Windows 3.0 was. This is not a troll, just a usability thing.
 Petro No, it's about where win3.11 was in a lot of ways. Modulo
 Petro the stability etc.
 
 I am just dying to find out why this is so. I find the unices I work
 with to be much more usable than any incarnation of Windows. So what
 exactly do you put into 'usability'?

Consistency of UI, availibility and integration of applications,
slickness of look and feel. 

Under 3.1[1] applications had widely varying look and feel, and
were not well integrated, nor was the windowing system well
integrated with the underlying OS (it didn't provide proper
abstraction of things like file-systems, processes etc.). 

With Windows 95, Microsoft changed a lot of that. Not that they did
it *well* (the Win95 style interface gives me hives), but they
provided a fairly consistent (if awful) interface, and a good deal
of abstraction of the underlying hardware/OS. 

Linux is still at the Win3.11 level in those regards. 

Does this mean Linux isn't useable? Well, considering I've had at
least one Linux box running at home since late 1993/94 (and had it
installed on and off for about a year before that), I would have to
say it's perfectly usable for those inclined to learn, those who
have specific tasks it needs done. But I wouldn't put it on my
mother-in-laws computer, or my moms. Then again, I wouldn't give my
Mom a windows machine either (I gave her a Mac about 3/4 years ago,
and she hasn't bothered to plug it in yet). 

I like Linux, I think it's a *good* OS, and it's coming along quite
nicely, but that doesn't mean I think it's easy to use. IMO, one of
the biggest problems Linux is facing in it's quest to take the
desktop is that (1) there are too many different groups working on
UI stuff, and (2) Most of them think that the Win95 LOOK is right,
but don't bother trying for the consistency. 

Of course, my primary desk-top machine at home right now is a Mac
running OS X. Which has some UI issues as well. 

-- 
Share and Enjoy. 



Re: In Praise of Dos (RE: Mutt tmp files)

2001-11-19 Thread Petro
On Mon, Nov 19, 2001 at 12:46:21PM -0800, James Hamilton wrote:
 My Gnome/X/Debian GNU/Linux Desktop is much slicker than 
 anything I have ever been able to do with Windows.  The Gnome
 apps have a fairly consistent interface as well.  There is a steeper and
 longer learning curve to learn how to really use X and Unix, but I would
 say that is an asset for members of the technocracy rather than a 
 drawback.  I honestly don't know what you are talking about.  Using 

No, you are not listening. 

The slickness of the UI isn't what you can accomplish with the OS,
but rather about how things look. Look at the icons, look at the
buttons that gnome provides. Simple and functional, but not nearly
the degree of sophistication that Windows/MacOS provide. Look at the
integration of the application UI into the OS UI, it all looks the
same. 

Now maybe if I used FVWM2, or KDE, I would see more of this, but
frankly they act too much like windows (hit people, having the
minimize, maximize and KILL WINDOW buttons so close together is
wrong. This is one of the many UI issues Apple got right in OS 6-9,
but broke in X, and that windows got wrong with the 95 style UI). so
and use too much screen realestate for their icons and task bar, so
I use a different window manager (one of what, 20? available). 

 the NT box I am using now to post this message is sheer torture, but 

Outhouse huh. What's the Free Replacement for that? 

 I have to have one Windows desktop and support one Windows server
 here at work.  I would say the functionality of Linux is currently and 

Functionality is not useability. 

The Functionality of Linux is far superior to Windows in every area
except common desktop applications (Word processors, spread sheets,
Graphic Design (which is the only reason I still use MacOS at home,
there is simply nothing in the Open Source world that is any where
near Illustrator and Quark X-Press, and while the GIMP comes close
to PhotoShop, I've been using Photoshop for over 10 years now, and
I'm used to it). 

Yes, I've used Star Office and OO, and they are good, but not quite
ready. 

 rapidly surpassing that of Microsoft OSes, and that perhaps you haven't 
 found or learned the right environment and apps.  With Windows,
 everthing gets set up and it works the way MS decrees it will.  With 
 GNU/Linux, you have a huge number of choices.  Part of becoming
 a real user of open source is spending a lot of time evaluating different 

Stop right there. 

Do *NOT* assume because I criticize Linux that I don't know Linux.
I'm not going to get in a DSW with you, but I started using Linux
with kernel .99p6. I've built X from scratch (once). I use Linux on
my desk at work, and I'm one of like 2 or 3 in my office to do
so. I've used Slackware, DeadRat, Debian, and SuSE. I am the team
lead for a small SA team that maintains a 100+ server site,
primarily (and if testing goes well this week, soon to be almost
completely) Linux based. We're pusing an average (24 hour average)
of around 60 Mbits a second, and our front end is entirely Linux. 

I spent my weekend fighting with kernels and LVM to get snap shots
working properly 

I've used Linux as a desktop OS for 5 or 6 years, either primarily,
or in conjunction with my Mac.  I've used Star Office, Open Office, 
SAIG, Lyx, and WordPerfect on Linux (among others) for word processing. 

I've used or tried just about every mail application out there for
Linux, and (check the headers) use Mutt daily at work--with Exchange
no less. 

I don't criticize Linux because I know windows better, I criticize
Linux because it's not as good as it *could* be. 

In fact, I don't know windows better. I've only had 2 machines of
mine that run windows--one is a work laptop used for Word and
accessing a shared mailbox on Exchange, the other is my
Counter-Strike box. That's all that's on it. Windows, and the files
needed for Counter-Strike. 

 enviroments and applications to figure out what it takes to make a 
 system really consistent and usable for you.  Even if you pick some 
 things that aren't quite finished as part of your enviroment, if they 
 are part of an active project, they will be working much better soon.  

Go into Netscape, open up some random web page. What's the key
command for find? 

Now open Lyx. What's the key command for find? Mutt? Opera?
OpenOffice? 

Just like Windows 3.11. 

Which was my point. 

 Once I set up my box, my roomates (non-tech) can use it to surf the 
 web, read their email, write papers, browse newsgroups etc with a 
 fairly consistent and truly complete suite of free applications.

I did that 5 years ago for my wife. 

Of course, that was also true of Windows 3.11, with the exception
that the underlying OS wasn't free. 


-- 
Share 

Re: In Praise of Dos (RE: Mutt tmp files)

2001-11-19 Thread Petro
On Mon, Nov 19, 2001 at 02:14:54PM -0800, Nathan E Norman wrote:
 On Mon, Nov 19, 2001 at 01:47:40PM -0800, Petro wrote:
   enviroments and applications to figure out what it takes to make a 
   system really consistent and usable for you.  Even if you pick some 
   things that aren't quite finished as part of your enviroment, if
 they 
   are part of an active project, they will be working much better
 soon.  
  Go into Netscape, open up some random web page. What's the key
  command for find? 
  Now open Lyx. What's the key command for find? Mutt? Opera?
  OpenOffice? 
  Just like Windows 3.11. 
  Which was my point. 
 Install Netscape 4.x, 6.x, Mozilla, and IE on a windows box.
 
 Good luck expecting the same key strokes to do the same thing in each
 application.

I don't have Netscape for my windows laptop, but on Opera, IE,
Pegasus Mail, Star Office, and Office the  Select All, Cut, Copy, Paste,
and Find options all had the exact same key commands. Most of them
(were applicable) had the same key command for undo. All of them
used ctrl-n for new, whatever new meant in their context. Even
WinCVS, a port of a Unix App uses most of these. Ctrl-p is almost
always print etc. 

Beyond those basics, there will (and arguably should) be differences
in what keys do, but the basics should (were applicable) be
consistent across an interface. 

But his is hugely off topic, and I'll go no futher down this road.



-- 
Share and Enjoy. 



Re: In Praise of Dos (RE: Mutt tmp files)

2001-11-18 Thread Petro

On Mon, Nov 19, 2001 at 10:24:05AM +0900, Howland, Curtis wrote:
 ps: From a personal perspective, I think Linux is about where Windows
 3.0 was. This is not a troll, just a usability thing.

No, it's about where win3.11 was in a lot of ways. Modulo the
stability etc. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: In Praise of Dos (RE: Mutt tmp files)

2001-11-18 Thread Petro
On Mon, Nov 19, 2001 at 10:24:05AM +0900, Howland, Curtis wrote:
 ps: From a personal perspective, I think Linux is about where Windows
 3.0 was. This is not a troll, just a usability thing.

No, it's about where win3.11 was in a lot of ways. Modulo the
stability etc. 

-- 
Share and Enjoy. 



Re: Root is God? (was: Mutt tmp files)

2001-11-16 Thread Petro

On Fri, Nov 16, 2001 at 02:36:30PM +0100, Mathias Gygax wrote:
 On Fre, Nov 16, 2001 at 04:13:16AM -0900, Ethan Benson wrote:
Root is God. Anything you do on the system is potentially visible to
root.
 this is, with the right patches applied, not true.

And who has to apply those patches...


-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Root is God? (was: Mutt tmp files)

2001-11-16 Thread Petro

On Fri, Nov 16, 2001 at 05:39:43PM +0100, Mathias Gygax wrote:
 On Fre, Nov 16, 2001 at 08:23:27AM -0800, Micah Anderson wrote:
  There is no way, nor any reason why, to setup a system in such a way
  that the maintainer of the system cannot maintain it. 
 maintainer is someone else. root is there for serving the daemons.
 administrating the machine is the next security level and this time in
 the kernel (to deactivate it). the interface is clean.

You're thinking of root as uid 0, while the other people are
thinking of root as The person who controls the machine. 

The person who administers the machine *OWNS THE MACHINE*. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Mutt tmp files

2001-11-16 Thread Petro
On Thu, Nov 15, 2001 at 10:17:39PM -0800, Wade Richards wrote:
 Also, what makes you thing root knows what he's doing?  I suspect that 
 many people with the root password could not install a tty sniffer or 
 any other spying tool unless they could type apt-get install ttysniffer.

dude, like what's this apt-get thingy, is there like a rpm for
that? 

-- 
Share and Enjoy. 



Re: Mutt tmp files

2001-11-16 Thread Petro
On Thu, Nov 15, 2001 at 11:09:41PM -0800, Craig Dickson wrote:
 Wade Richards wrote:
  I still say the bottom line is, if you don't trust root, don't use his
  machine.
  This is the sort of absolutist nonsense that gives security experts a
  bad name.  After all, anyone armed with a chainsaw can cut through a
  solid oak door in a matter of hours, so why bother installing a deadbolt
  on your door?
 To keep out all the people who don't have chainsaws, obviously. But on
 *nix machines, root has a chainsaw, and plenty of other tools also. He
 can also get a key to your deadbolt if he really wants it.

What you're trying to do is threat modeling, and quite frankly I'm
in complete agreement with the statement that if those with the
root password are in your threat model, it's time to find another
machine. 

That said, the first thing to do is set the environmental variable
TMPDIR to something under your home directory, and something only
readble by you (well, and root). This gets it out of generic land. 

-- 
Share and Enjoy. 



Re: Root is God? (was: Mutt tmp files)

2001-11-16 Thread Petro
On Fri, Nov 16, 2001 at 02:36:30PM +0100, Mathias Gygax wrote:
 On Fre, Nov 16, 2001 at 04:13:16AM -0900, Ethan Benson wrote:
Root is God. Anything you do on the system is potentially visible to
root.
 this is, with the right patches applied, not true.

And who has to apply those patches...


-- 
Share and Enjoy. 



Re: Root is God? (was: Mutt tmp files)

2001-11-16 Thread Petro
On Fri, Nov 16, 2001 at 05:39:43PM +0100, Mathias Gygax wrote:
 On Fre, Nov 16, 2001 at 08:23:27AM -0800, Micah Anderson wrote:
  There is no way, nor any reason why, to setup a system in such a way
  that the maintainer of the system cannot maintain it. 
 maintainer is someone else. root is there for serving the daemons.
 administrating the machine is the next security level and this time in
 the kernel (to deactivate it). the interface is clean.

You're thinking of root as uid 0, while the other people are
thinking of root as The person who controls the machine. 

The person who administers the machine *OWNS THE MACHINE*. 

-- 
Share and Enjoy. 



Re: Mutt tmp files

2001-11-15 Thread Petro

On Thu, Nov 15, 2001 at 11:09:41PM -0800, Craig Dickson wrote:
 Wade Richards wrote:
  I still say the bottom line is, if you don't trust root, don't use his
  machine.
  This is the sort of absolutist nonsense that gives security experts a
  bad name.  After all, anyone armed with a chainsaw can cut through a
  solid oak door in a matter of hours, so why bother installing a deadbolt
  on your door?
 To keep out all the people who don't have chainsaws, obviously. But on
 *nix machines, root has a chainsaw, and plenty of other tools also. He
 can also get a key to your deadbolt if he really wants it.

What you're trying to do is threat modeling, and quite frankly I'm
in complete agreement with the statement that if those with the
root password are in your threat model, it's time to find another
machine. 

That said, the first thing to do is set the environmental variable
TMPDIR to something under your home directory, and something only
readble by you (well, and root). This gets it out of generic land. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Vulnerable SSH versions

2001-11-12 Thread Petro

On Mon, Nov 12, 2001 at 05:54:04PM -0800, Ethan Benson wrote:
 On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote:
  I will gladly grant that the tar file may not exist for the boot
  floppies, and that I do not have on hand the CD to check it. It also
 may
  have been a Potato(e) phenominon, no longer in use. However, it did
  exist.
 yes releases before woody uses a base tarball.  thats not done
 anymore, base tarballs are obsolete.
  Which makes me wonder, why ship Woody with 2.2.20 at all? Oh well, not
  my decision.
 because 2.4 is not stable yet.

You can say that again. 
Grumble
-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Vulnerable SSH versions

2001-11-12 Thread Petro
On Mon, Nov 12, 2001 at 05:54:04PM -0800, Ethan Benson wrote:
 On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote:
  I will gladly grant that the tar file may not exist for the boot
  floppies, and that I do not have on hand the CD to check it. It also
 may
  have been a Potato(e) phenominon, no longer in use. However, it did
  exist.
 yes releases before woody uses a base tarball.  thats not done
 anymore, base tarballs are obsolete.
  Which makes me wonder, why ship Woody with 2.2.20 at all? Oh well, not
  my decision.
 because 2.4 is not stable yet.

You can say that again. 
Grumble
-- 
Share and Enjoy. 



Re: FTP and security

2001-11-08 Thread Petro
On Thu, Nov 08, 2001 at 04:57:22PM -0500, Adam Spickler wrote:
 Is there a decent Windows FTP application that supports sftp?  Unfortunately, 
 I have to use Windows at work.  :/

Well, there's always cygwin. It almost makes Windows liveable. 

 On Thu, Nov 08, 2001 at 10:55:17PM +0100, Wichert Akkerman wrote:
  Previously Lars Bjarby wrote:
   While were on the subject, is there an OpenSSH port of SFTP?
  
  openssh has a sftp subsystem, yes.
  
  Wichert.
  
  -- 
_
   /[EMAIL PROTECTED] This space intentionally left occupied \
  | [EMAIL PROTECTED]http://www.liacs.nl/~wichert/ |
  | 1024D/2FA3BC2D 576E 100B 518D 2F16 36B0  2805 3CB8 9250 2FA3 BC2D |
  
  
  -- 
  To UNSUBSCRIBE, email to [EMAIL PROTECTED]
  with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
  
 
 
 -
 Adam Spickler
 Whaddu LLC.
 http://www.whaddu.com
 WebHosting and Design/Development Unlimited
 -
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

-- 
Share and Enjoy. 



Re: Questions regarding the Security Secretary Position

2001-10-22 Thread Petro

On Mon, Oct 22, 2001 at 09:40:45AM +0300, Lauri Tischler wrote:
 Matt Zimmerman wrote:
  
   I think the security secretary, if we have one, should be a Debian
   developer.
  
  We have two of them, and they are both card-carrying developers.
  
 Unnghhh...
 'Card-carrying' sounds like fiery-eyed anarchist or extreme left
 revolutionary, some kind of luddite the least..

And the problem with this is? (No, I don't like leftists or
luddites, but I'm all in favor of fiery-eyed anarchists).

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Questions regarding the Security Secretary Position

2001-10-22 Thread Petro
On Mon, Oct 22, 2001 at 09:40:45AM +0300, Lauri Tischler wrote:
 Matt Zimmerman wrote:
  
   I think the security secretary, if we have one, should be a Debian
   developer.
  
  We have two of them, and they are both card-carrying developers.
  
 Unnghhh...
 'Card-carrying' sounds like fiery-eyed anarchist or extreme left
 revolutionary, some kind of luddite the least..

And the problem with this is? (No, I don't like leftists or
luddites, but I'm all in favor of fiery-eyed anarchists).

-- 
Share and Enjoy. 



Re: central administration techniques

2001-10-19 Thread Petro

On Fri, Oct 19, 2001 at 09:41:22AM -0700, nrvale0 wrote:
  maybe have a look at cfengine?
  or apt-cache search / freshmeat / google for other options
 
 I was down this road just a few months ago. cfengine is nice except
 that the author doesn't believe that 'administrative information' is
 something that should be protected and thus has no plans to move from
 rsh to an SSH tunnel or SSL. Imagine syncing /etc/shadow or some other
 information that should be kept secret over RSH. Yuck. 

It it's on the wire, it should be encrypted.

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: central administration techniques

2001-10-19 Thread Petro
On Fri, Oct 19, 2001 at 09:41:22AM -0700, nrvale0 wrote:
  maybe have a look at cfengine?
  or apt-cache search / freshmeat / google for other options
 
 I was down this road just a few months ago. cfengine is nice except
 that the author doesn't believe that 'administrative information' is
 something that should be protected and thus has no plans to move from
 rsh to an SSH tunnel or SSL. Imagine syncing /etc/shadow or some other
 information that should be kept secret over RSH. Yuck. 

It it's on the wire, it should be encrypted.

-- 
Share and Enjoy. 



Re: '(no

2001-09-15 Thread Petro

On Sat, Sep 15, 2001 at 10:23:45PM +0300, Momchil Velikov wrote:
  Dimitri == Dimitri Maziuk [EMAIL PROTECTED] writes:
 Dimitri In linux.debian.security, you wrote:
 Dimitri If you suspect your machine was r00ted, 
 Dimitri 1. Take it off the net _now_.
 Dimitri 2. If you want to do a post-mortem, boot from known good CD or plug
 Dimitrithe hd into a known good box.
 Dimitri 3. Post mortem or not, wipe everything out (as in fdisk) and reinstall
 Dimitrifrom scratch.
 
 Frankly, this looks a bit too harsh. Of course, it depends on the
 importance of the machine and the data on it.

No, it isn't. 

It's not just your machine you're protecting, it's every other
machine on the network. 

If your trivial little game box gets hacked, you lose nothing but
time, but the attacker now has a clean platform (in that it's not
in an IP space that can be tracked back to him) to attack *me* from,
and when I notice the attack, I track it back to *you*. Unless you
can demonstrate otherwise, then I have to assume that it's you who
is attacking me, and then you have to convince the FBI that you
didn't do it. 

If you believe that you've been hacked, fdisk and restore from
backup--if you are absolutely positive your backup is clean.
Otherwise rebuild from scratch. 

 Dimitri The reason is that the intruder could install hacked versions of utilities
 Dimitri like ps, ls, lsmod etc. that won't show backdoor processes and hacked files,
 Dimitri and/or a kernel module that does the same at OS level. Your logs may have 
 Dimitri been sanitized, too. You cannot trust any program on a r00ted box.
   ^
 
 In theory, yes. In practice, one can (marginally) trust some of the
 programs, e.g. is it likely that a rootkit has changed ``tar'' ? Or
 ``apt-get'' ? Or ``tcsh'' ?

Tar and Apt-get probably not. tcsh would be more doubtful. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: '(no

2001-09-15 Thread Petro
On Sat, Sep 15, 2001 at 10:23:45PM +0300, Momchil Velikov wrote:
  Dimitri == Dimitri Maziuk [EMAIL PROTECTED] writes:
 Dimitri In linux.debian.security, you wrote:
 Dimitri If you suspect your machine was r00ted, 
 Dimitri 1. Take it off the net _now_.
 Dimitri 2. If you want to do a post-mortem, boot from known good CD or plug
 Dimitrithe hd into a known good box.
 Dimitri 3. Post mortem or not, wipe everything out (as in fdisk) and 
 reinstall
 Dimitrifrom scratch.
 
 Frankly, this looks a bit too harsh. Of course, it depends on the
 importance of the machine and the data on it.

No, it isn't. 

It's not just your machine you're protecting, it's every other
machine on the network. 

If your trivial little game box gets hacked, you lose nothing but
time, but the attacker now has a clean platform (in that it's not
in an IP space that can be tracked back to him) to attack *me* from,
and when I notice the attack, I track it back to *you*. Unless you
can demonstrate otherwise, then I have to assume that it's you who
is attacking me, and then you have to convince the FBI that you
didn't do it. 

If you believe that you've been hacked, fdisk and restore from
backup--if you are absolutely positive your backup is clean.
Otherwise rebuild from scratch. 

 Dimitri The reason is that the intruder could install hacked versions of 
 utilities
 Dimitri like ps, ls, lsmod etc. that won't show backdoor processes and 
 hacked files,
 Dimitri and/or a kernel module that does the same at OS level. Your logs may 
 have 
 Dimitri been sanitized, too. You cannot trust any program on a r00ted box.
   ^
 
 In theory, yes. In practice, one can (marginally) trust some of the
 programs, e.g. is it likely that a rootkit has changed ``tar'' ? Or
 ``apt-get'' ? Or ``tcsh'' ?

Tar and Apt-get probably not. tcsh would be more doubtful. 

-- 
Share and Enjoy. 



Re: Why do people do this? [Was fishingboat in root]

2001-09-01 Thread Petro
On Sat, Sep 01, 2001 at 01:10:04PM +1000, CaT wrote:
 On Fri, Aug 31, 2001 at 10:48:37PM -0400, Layne wrote:
  SUCK MY COCK IF YOU SEND ME ANY MORE SPAM MAIL
 *gets out a pippet, a microscope and a vacuum cleaner*

I'd suggest using a sledge hammer with that pipette. 


A clue for Layne: 

 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

-- 
Share and Enjoy. 



Re: Layne (was: Re: Is ident secure?)

2001-09-01 Thread Petro
On Fri, Aug 31, 2001 at 11:54:40PM -0400, Ed Street wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Hello,
 
 If not is anyone up for a road trip? ;)
 
Usually.

We'll write it off as a Physical Security Seminar. 
-- 
Share and Enjoy. 



Re: HARASS ME MORE.........

2001-09-01 Thread Petro
On Sat, Sep 01, 2001 at 03:04:03PM +1000, CaT wrote:
 On Sat, Sep 01, 2001 at 12:44:15AM -0400, Layne wrote:
  I ASKED YOU MORONS NOT TO SEND ME ANYMORE E-MAIL BUT HERE YOU GO AGAIN. IS
  THERE ANY INTELLIGENT PEOPLE THERE OR IS THE PLACE RUN BY BABOONS. i'M
 
 Oook?

Yes, I'm looking for a book on summoning Dragons. 

-- 
Share and Enjoy. 



Re: HARASS ME MORE.........

2001-08-31 Thread Petro

On Sat, Sep 01, 2001 at 03:04:03PM +1000, CaT wrote:
 On Sat, Sep 01, 2001 at 12:44:15AM -0400, Layne wrote:
  I ASKED YOU MORONS NOT TO SEND ME ANYMORE E-MAIL BUT HERE YOU GO AGAIN. IS
  THERE ANY INTELLIGENT PEOPLE THERE OR IS THE PLACE RUN BY BABOONS. i'M
 
 Oook?

Yes, I'm looking for a book on summoning Dragons. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Is ident secure?

2001-08-31 Thread Petro
On Fri, Aug 31, 2001 at 01:07:05AM -0700, Christian Kurz wrote:
 On 01-08-30 Brian P. Flaherty wrote:
  I have had a lot of problems running non-Debian software when I
  disable ident.  It seems like the licensing daemons expect to find
 
 What the hell is a licensing daemon? 

It's a daemon that provides license keys for commercial software. 

 And which package contains this
 software in debian? May I suggest that you first start reading the RfC
 about Ident Protocol before you make wrong statements?

Um. He distinctly said Non-Debian software. 

Maybe you should...

-- 
Share and Enjoy. 



Re: Linux LDAP problem

2001-08-28 Thread Petro

On Tue, Aug 28, 2001 at 09:23:47AM -0400, Sunny Dubey wrote:
 Hey,
 I've got a slight problem,  at school we run two major networks, one half is 
 Novell Netware based, and the other half is unix based.  We basically one 
 centralized system of authentication, so that user don't have to remember two 
 different passwords to use either system.  We been trying to get linux to use 
 ldap to authenticate with the novell ldap server, and have had no luck.  We 
 know the novell ldap server is fine, however something seems fishy with the 
 linux side.  The problem is that when using the PAM_LDAP modules, is that 
 when a user tries to login, they are asked for a password twice, once the 
 normal password, and the second one being the ldap based password.  However, 
 even if you type in the correct passwords, LDAP says permission denied, or 
 authentication failed.  What makes it really odd is how at the same time the 
 novell netware server states it has seen the authenticated user, and even 
 gives it an OK to login.
 Anyone have any clue as to how to make it work?  Are there any docs about 
 getting Netware+linux+ldap to work?   thanks for any info that you might pass 
 along.  have a nice day.

You might want to try asking on the PAM list, which I have the 
address for somewhere around here if you need it. 

-- 
Share and Enjoy. 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




  1   2   >