Re: mirroring security.debian.org?

2001-01-26 Thread Ron Rademaker

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I guess you could make a crontab running 'apt-get update' and 'apt-get -d
- -y upgrade', running that in times you have some bandwidth will get all
the update, but won't install them. You can now use ftp or something to
get the packages to the other machines (or make you
/var/cache/apt/archives apt-get-able for you local network).
The downside of this approach would be that you won't get any security
updates of packages not installed on the machine with the crontab. 

|---|
|Ron Rademaker  |
|---|
|GPG info:  |
|pub  1024D/DAB68799 2000-10-01 Ron Rademaker [EMAIL PROTECTED]  |
|Key fingerprint = F3D6 C4DC 6BE3 A37D B29D  D93B AC0B B72D DAB6 8799   |
|   |
|Key available from: wwwkeys.nl.pgp.net, wwwkeys.eu.pgp.net or  |
|wwwkeys.us.pgp.net |
|---|
|Powered by Debian/GNU Linux 2.2 (potato) (2.2.18 kernel)   |
|---|


On Fri, 26 Jan 2001, Berend De Schouwer wrote:

 On Fri, 26 Jan 2001 17:10:51 Giacomo Mulas wrote:
 | On Fri, 26 Jan 2001, Berend De Schouwer wrote:
 | 
 |  I am in a similar situation.  I would also like to have a local
 |  mirror, so that the multiple Debian machines do not need to go
 |  over the internet line.  Some do not even have internet access,
 |  but would be able to access a local mirror.
 | 
 | You would probably be better off installing a proxy server (such as
 | squid) on a computer connected to internet and then configuring apt-get
 | to use such a proxy.
 
 That is done, and it does help to some degree.  But the machines that
 can't access the internet can't go through the proxy server either.
 That is by design, and will not change.
 
 | Bye
 | Giacomo
 | 
 | _
 | 
 | Giacomo Mulas [EMAIL PROTECTED], [EMAIL PROTECTED]
 | _
 | 
 | OSSERVATORIO  ASTRONOMICO
 | Str. 54, Loc. Poggio dei Pini * 09012 Capoterra (CA)
 | 
 | Tel.: +39 070 71180 216 Fax : +39 070 71180 222
 | _
 | 
 | "When the storms are raging around you, stay right where you are"
 |  (Freddy Mercury)
 | _
 | 
 | 
 | --  
 | To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 | with a subject of "unsubscribe". Trouble? Contact
 | [EMAIL PROTECTED]
 | 
 Kind regards,   
 Berend  
 
 -- 
 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
 Berend De Schouwer, +27-11-712-1435, UCS
 
 
 --  
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
 
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6caDvrAu3Ldq2h5kRAuDyAKCkpyXN2eT6qU/XYbPdgMmiuHjydACgv9nN
2RD/cAgPPCu2e0sptPzLZHY=
=GT3s
-END PGP SIGNATURE-


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: mirroring security.debian.org?

2001-01-26 Thread Ron Rademaker
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I guess you could make a crontab running 'apt-get update' and 'apt-get -d
- -y upgrade', running that in times you have some bandwidth will get all
the update, but won't install them. You can now use ftp or something to
get the packages to the other machines (or make you
/var/cache/apt/archives apt-get-able for you local network).
The downside of this approach would be that you won't get any security
updates of packages not installed on the machine with the crontab. 

|---|
|Ron Rademaker  |
|---|
|GPG info:  |
|pub  1024D/DAB68799 2000-10-01 Ron Rademaker [EMAIL PROTECTED]  |
|Key fingerprint = F3D6 C4DC 6BE3 A37D B29D  D93B AC0B B72D DAB6 8799   |
|   |
|Key available from: wwwkeys.nl.pgp.net, wwwkeys.eu.pgp.net or  |
|wwwkeys.us.pgp.net |
|---|
|Powered by Debian/GNU Linux 2.2 (potato) (2.2.18 kernel)   |
|---|


On Fri, 26 Jan 2001, Berend De Schouwer wrote:

 On Fri, 26 Jan 2001 17:10:51 Giacomo Mulas wrote:
 | On Fri, 26 Jan 2001, Berend De Schouwer wrote:
 | 
 |  I am in a similar situation.  I would also like to have a local
 |  mirror, so that the multiple Debian machines do not need to go
 |  over the internet line.  Some do not even have internet access,
 |  but would be able to access a local mirror.
 | 
 | You would probably be better off installing a proxy server (such as
 | squid) on a computer connected to internet and then configuring apt-get
 | to use such a proxy.
 
 That is done, and it does help to some degree.  But the machines that
 can't access the internet can't go through the proxy server either.
 That is by design, and will not change.
 
 | Bye
 | Giacomo
 | 
 | _
 | 
 | Giacomo Mulas [EMAIL PROTECTED], [EMAIL PROTECTED]
 | _
 | 
 | OSSERVATORIO  ASTRONOMICO
 | Str. 54, Loc. Poggio dei Pini * 09012 Capoterra (CA)
 | 
 | Tel.: +39 070 71180 216 Fax : +39 070 71180 222
 | _
 | 
 | When the storms are raging around you, stay right where you are
 |  (Freddy Mercury)
 | _
 | 
 | 
 | --  
 | To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 | with a subject of unsubscribe. Trouble? Contact
 | [EMAIL PROTECTED]
 | 
 Kind regards,   
 Berend  
 
 -- 
 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
 Berend De Schouwer, +27-11-712-1435, UCS
 
 
 --  
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6caDvrAu3Ldq2h5kRAuDyAKCkpyXN2eT6qU/XYbPdgMmiuHjydACgv9nN
2RD/cAgPPCu2e0sptPzLZHY=
=GT3s
-END PGP SIGNATURE-



Re: lprng

2001-01-10 Thread Ron Rademaker

I know there's a debian package of lprng, but I don't know if the patch
you're talking about is applied to this package, I guess you should check
the changelog to find out.

Ron Rademaker

On Wed, 10 Jan 2001, V. Achiaga wrote:

 
 
 Does anyone know where can I find a debian-specific patch for the
 lprng package?
 
 Thanks in advance.
 
 Why? Just read the following...
 
  Subject: CERT Advisory CA-2000-22
  
  
  -BEGIN PGP SIGNED MESSAGE-
  
  CERT Advisory CA-2000-22 Input Validation Problems in LPRng
  
 Original release date: December 12, 2000
 Last updated: --
 Source: CERT/CC
  
 A complete revision history is at the end of this file.
  
  Systems Affected
  
   * Systems running unpatched LPRng software
  
  Overview
  
 A popular replacement software package to the BSD lpd printing service
 called LPRng contains at least one software defect, known as a "format
 string vulnerability,"[1] which may allow remote users to execute
 arbitrary code on vulnerable systems.
  
  I. Description
  
 LPRng, now being packaged in several open-source operating system
 distributions, has a missing format string argument in at least two
 calls to the syslog() function.
  
 Missing format strings in function calls allow user-supplied arguments
 to be passed to a susceptible *snprintf() function call. Remote users
 with access to the printer port (port 515/tcp) may be able to pass
 format-string parameters that can overwrite arbitrary addresses in the
 printing service's address space. Such overwriting can cause
 segmentation violations leading to denial of printing services or to
 the execution of arbitrary code injected through other means into the
 memory segments of the printer service.
  
 Sample syslog entries from successful exploitation of this
 vulnerability have been reported, as follows:
  
  Nov 26 10:01:00 foo SERVER[12345]: Dispatch_input: bad request line
  'BB{E8}{F3}{FF}{BF}{E9}{F3}{FF}{BF}{EA}{F3}{FF}{BF}{EB}{F3}{FF}{BF}
  XX%.168u%300$nsecurity.%301 $nsecurity%302$n%.192u%303$n
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}
  1{DB}1{C9}1{C0}{B0}F{CD}{80}{89}{E5}1{D2}{B2}f{89}{D0}1{C9}{89}{CB}C{89}
  ]{F8}C{89}]{F4}K{89}M{FC}{8D}M{F4}{CD}{80}1{C9}{89}E{F4}Cf{89}]{EC}f{C7}
  E{EE}{F}'{89}M{F0}{8D}E{EC}{89}E{F8}{C6}E{FC}{10}{89}{D0}{8D}
  M{F4}{CD}{80}{89}{D0}CC{CD}{80}{89}{D0}C{CD}{80}{89}{C3}1{C9}{B2}
  ?{89}{D0}{CD}{80}{89}{D0}A{CD}{80}{EB}{18}^{89}u{8}1{C0}{88}F{7}{89}
  E{C}{B0}{B}{89}{F3}{8D}M{8}{8D}U{C}{CD}{80}{E8}{E3}{FF}{FF}{FF}/bin/sh{A}'
  
 This vulnerability has been assigned the identifier CAN-2000-0917 by
 the Common Vulnerabilities and Exposures (CVE) group:
  
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2000-0917
  
 The CERT/CC has received reports of extensive probing to port 515/tcp.
 In addition, we have received some reports of systems compromised
 using this vulnerability. Tools exploiting this vulnerability have
 been posted to public forums.
  
  II. Impact
  
 A remote user may be able to execute arbitrary code with elevated
 privileges.
  
 In addition, the printing service may be disrupted or disabled
 entirely.
  
  III. Solution
  
  Apply a patch from your vendor
  
 Upgrade to a non-vulnerable version of LPRng (3.6.25), as described in
 the vendor sections below. Alternately, you can obtain the version of
 LPRng which fixes the missing format string at:
  
ftp://ftp.astart.com/pub/LPRng/LPRng/LPRng-3.6.25.tgz
  
  Disallow access to printer service ports (typically 515/tcp) using firewall
  or packet-filtering technologies
  
 Blocking access to the vulnerable service will limit your exposure to
 attacks from outside your network perimeter. However, the
 vulnerability would still allow local users to gain privileges they
 normally shouldn't have; in addition, blocking port 515/tcp at a
 network perimeter would still allow any remote user inside the
 perimeter to exploit the vulnerability.
  
  Appendix A. Vendor Information
  
  Apple
  
 Apple has conducted an inv

Re: lprng

2001-01-10 Thread Ron Rademaker
I know there's a debian package of lprng, but I don't know if the patch
you're talking about is applied to this package, I guess you should check
the changelog to find out.

Ron Rademaker

On Wed, 10 Jan 2001, V. Achiaga wrote:

 
 
 Does anyone know where can I find a debian-specific patch for the
 lprng package?
 
 Thanks in advance.
 
 Why? Just read the following...
 
  Subject: CERT Advisory CA-2000-22
  
  
  -BEGIN PGP SIGNED MESSAGE-
  
  CERT Advisory CA-2000-22 Input Validation Problems in LPRng
  
 Original release date: December 12, 2000
 Last updated: --
 Source: CERT/CC
  
 A complete revision history is at the end of this file.
  
  Systems Affected
  
   * Systems running unpatched LPRng software
  
  Overview
  
 A popular replacement software package to the BSD lpd printing service
 called LPRng contains at least one software defect, known as a format
 string vulnerability,[1] which may allow remote users to execute
 arbitrary code on vulnerable systems.
  
  I. Description
  
 LPRng, now being packaged in several open-source operating system
 distributions, has a missing format string argument in at least two
 calls to the syslog() function.
  
 Missing format strings in function calls allow user-supplied arguments
 to be passed to a susceptible *snprintf() function call. Remote users
 with access to the printer port (port 515/tcp) may be able to pass
 format-string parameters that can overwrite arbitrary addresses in the
 printing service's address space. Such overwriting can cause
 segmentation violations leading to denial of printing services or to
 the execution of arbitrary code injected through other means into the
 memory segments of the printer service.
  
 Sample syslog entries from successful exploitation of this
 vulnerability have been reported, as follows:
  
  Nov 26 10:01:00 foo SERVER[12345]: Dispatch_input: bad request line
  'BB{E8}{F3}{FF}{BF}{E9}{F3}{FF}{BF}{EA}{F3}{FF}{BF}{EB}{F3}{FF}{BF}
  XX%.168u%300$nsecurity.%301 $nsecurity%302$n%.192u%303$n
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}{90}
  {90}{90}
  1{DB}1{C9}1{C0}{B0}F{CD}{80}{89}{E5}1{D2}{B2}f{89}{D0}1{C9}{89}{CB}C{89}
  ]{F8}C{89}]{F4}K{89}M{FC}{8D}M{F4}{CD}{80}1{C9}{89}E{F4}Cf{89}]{EC}f{C7}
  E{EE}{F}'{89}M{F0}{8D}E{EC}{89}E{F8}{C6}E{FC}{10}{89}{D0}{8D}
  M{F4}{CD}{80}{89}{D0}CC{CD}{80}{89}{D0}C{CD}{80}{89}{C3}1{C9}{B2}
  ?{89}{D0}{CD}{80}{89}{D0}A{CD}{80}{EB}{18}^{89}u{8}1{C0}{88}F{7}{89}
  E{C}{B0}{B}{89}{F3}{8D}M{8}{8D}U{C}{CD}{80}{E8}{E3}{FF}{FF}{FF}/bin/sh{A}'
  
 This vulnerability has been assigned the identifier CAN-2000-0917 by
 the Common Vulnerabilities and Exposures (CVE) group:
  
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2000-0917
  
 The CERT/CC has received reports of extensive probing to port 515/tcp.
 In addition, we have received some reports of systems compromised
 using this vulnerability. Tools exploiting this vulnerability have
 been posted to public forums.
  
  II. Impact
  
 A remote user may be able to execute arbitrary code with elevated
 privileges.
  
 In addition, the printing service may be disrupted or disabled
 entirely.
  
  III. Solution
  
  Apply a patch from your vendor
  
 Upgrade to a non-vulnerable version of LPRng (3.6.25), as described in
 the vendor sections below. Alternately, you can obtain the version of
 LPRng which fixes the missing format string at:
  
ftp://ftp.astart.com/pub/LPRng/LPRng/LPRng-3.6.25.tgz
  
  Disallow access to printer service ports (typically 515/tcp) using firewall
  or packet-filtering technologies
  
 Blocking access to the vulnerable service will limit your exposure to
 attacks from outside your network perimeter. However, the
 vulnerability would still allow local users to gain privileges they
 normally shouldn't have; in addition, blocking port 515/tcp at a
 network perimeter would still allow any remote user inside the
 perimeter to exploit the vulnerability.
  
  Appendix A. Vendor Information
  
  Apple
  
 Apple has conducted an investigation

Re: Speaking of broadcasts, is this a security threat?

2000-08-09 Thread Ron Rademaker

Well, you are already telling it to 'shut up' by denying it. If you don't
want the denies to show up in your logs, you'll just have to put off the
logging option in ipchains.

Ron Rademaker

On Tue, 8 Aug 2000, Micah Anderson wrote:

 
 Every few minutes I see the following show up in my log:
 
 Aug  8 00:03:17 riseup kernel: Packet log: input DENY eth0 PROTO=17
 +10.0.0.1:1999 255.255.255.255:1999 L=94 S=0x00 I=638 F=0x4000 T=1 (#4)   
 Aug  8 00:49:40 riseup kernel: Packet log: input DENY eth0 PROTO=17   
 +10.0.0.1:1999 255.255.255.255:1999 L=94 S=0x00 I=639 F=0x4000 T=1 (#4)
 Aug  8 00:03:17 riseup kernel: Packet log: input DENY eth0 PROTO=17
 +10.0.0.1:1999 255.255.255.255:1999 L=94 S=0x00 I=638 F=0x4000 T=1 (#4)
 Aug  8 00:49:40 riseup kernel: Packet log: input DENY eth0 PROTO=17
 +10.0.0.1:1999 255.255.255.255:1999 L=94 S=0x00 I=639 F=0x4000 T=1 (#4)
 
 Now if I interpret this correctly this means that my internal network
 interface is broadcasting protocol 1999 (which is like a kerberos thing? I
 dont know, I don't have kerberos installed, enabled or anything on my
 system) - but it seems to be blasting it out and I am trying to deny
 it. Is this actually something on my end that I need to tell to shutup, or
 is someone doing this to me? Either one, how can I make it stop??
 
 Thanks!
 Micah
 
 
 --  
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
 


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Logging atempts

2000-07-17 Thread Ron Rademaker



On Mon, 17 Jul 2000, Toth Attila wrote:

 Some comments on the topic:
 
 On Mon, 17 Jul 2000, Florian Friesdorf wrote:
  On Mon, Jul 17, 2000 at 01:41:46AM +0200, A. Vije wrote:
   On Sun, 16 Jul 2000, Patrick Barr wrote:
   
What I want to do, is run a programme that will monitor my ppp0 
connection for any attempts from anyone to connect to a port and FAIL. 
I am running 2.4.0 test2 (but I will soon move back to 2.2.16 when 
potato comes out) and I dont have netfilter on, I just have hosts.deny 
set to all:all.
   
   You can just cat (or tail -f for realtime stats) your syslog (tail -f
   /var/log/syslog) for as for as i know all attempts get logged there.
  
  afaik you need the iplogger package installed,
  including tcplogd and icmplogd, doing exactly what their names sound like.
 
 As far as I know: if you are running a packet filter, and that is the
 reason why a connection attempt fails, than this event won't reach tcplog,
 but still appears in syslog (if you filter is configured in this way).
 
  for 2.2.x kernels 'ipchains -I input 1 -i ppp0 -l -y -p tcp' 
  will log all incoming tcp connection attempts through ppp0.
  -- 'man ipchains', for further details
 
 If you are using your ppp hard, this rule will produce a lot of logged 
 data. It is more reasonable to set the packet filter to log the tcp
 connections, which are REJECTed or DENYed by it. This will probably make
 less logged data. Am I right?
 
   Small note Potato ships with 2.2.17pre6. (i`m looking forward to it .. :)
 
 Will potato really ship with a pre-kernel? In this case why don't
 patch-2.4.0-test4? (I know, that this mailing list is not dedicated for
 questions like this)

Not a 2.4.0 because that's a major kernel upgrade, with new functions,
where potato is now frozen, so there can't be major upgrades whatsever
anymore.

Ron Rademaker

 
 
 Happy logging,
 Dw.
 
 
 --  
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
 


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Logging atempts

2000-07-17 Thread Ron Rademaker


On Mon, 17 Jul 2000, Toth Attila wrote:

 Some comments on the topic:
 
 On Mon, 17 Jul 2000, Florian Friesdorf wrote:
  On Mon, Jul 17, 2000 at 01:41:46AM +0200, A. Vije wrote:
   On Sun, 16 Jul 2000, Patrick Barr wrote:
   
What I want to do, is run a programme that will monitor my ppp0 
connection for any attempts from anyone to connect to a port and FAIL. 
I am running 2.4.0 test2 (but I will soon move back to 2.2.16 when 
potato comes out) and I dont have netfilter on, I just have hosts.deny 
set to all:all.
   
   You can just cat (or tail -f for realtime stats) your syslog (tail -f
   /var/log/syslog) for as for as i know all attempts get logged there.
  
  afaik you need the iplogger package installed,
  including tcplogd and icmplogd, doing exactly what their names sound like.
 
 As far as I know: if you are running a packet filter, and that is the
 reason why a connection attempt fails, than this event won't reach tcplog,
 but still appears in syslog (if you filter is configured in this way).
 
  for 2.2.x kernels 'ipchains -I input 1 -i ppp0 -l -y -p tcp' 
  will log all incoming tcp connection attempts through ppp0.
  -- 'man ipchains', for further details
 
 If you are using your ppp hard, this rule will produce a lot of logged 
 data. It is more reasonable to set the packet filter to log the tcp
 connections, which are REJECTed or DENYed by it. This will probably make
 less logged data. Am I right?
 
   Small note Potato ships with 2.2.17pre6. (i`m looking forward to it .. :)
 
 Will potato really ship with a pre-kernel? In this case why don't
 patch-2.4.0-test4? (I know, that this mailing list is not dedicated for
 questions like this)

Not a 2.4.0 because that's a major kernel upgrade, with new functions,
where potato is now frozen, so there can't be major upgrades whatsever
anymore.

Ron Rademaker

 
 
 Happy logging,
 Dw.
 
 
 --  
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 



Re: using password aging with ssh

2000-07-04 Thread Ron Rademaker

Gotten this from the release critical bugreport (last one):

Package: ssh (non-US/main)
Maintainer: Philip Hands [EMAIL PROTECTED]
[HELP] Need fix. (RB)
  51747  ssh: can't handle expired passwords
  64424  ssh:   ssh believes that xauth lives in /usr/openwin/bin
[STRATEGY] Needs to be recompiled for powerpc?
  66335  ssh: Segfault at fresh install


I guess this'll tell you enough...

Ron Rademaker


On Tue, 4 Jul 2000, thomas lakofski wrote:

 Hi,
 
 Is the above possible?  That is, when a user's password has expired, they
 should be prompted to change it somehow.  Works with telnet but that seems
 to defeat the point entirely.
 
 The behaviour as is, is that sshd just gives access denied when the
 password has aged, even if the second (expiration) period has not yet
 passed.
 
 regards,
 
 Thomas
 
 
 , , ,, ., ,. . . .. .. . . ,.
   who's watching your watchmen?
 gpg: pub 1024D/81FD4B43 sub 4096g/BB6D2B11=p.nu/d
 2B72 53DB 8104 2041 BDB4  F053 4AE5 01DF 81FD 4B43
 
 
 -- 
 Unsubscribe?  mail -s unsubscribe [EMAIL PROTECTED]  /dev/null
 
 
 
 
 --  
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 



Re: Libsafe

2000-06-19 Thread Ron Rademaker
On Mon, 19 Jun 2000, Petr Cech wrote:

 On Fri, Jun 16, 2000 at 01:30:29PM +0200 , Ron Rademaker wrote:
  libc 2.0.x versions are in slink, in potato this is upgraded to 2.1.x
  versions, so you won't be able to use libsafe with slink because the libc6
  version is to early. The newer libc6 versions won't be uploaded to slink,
 
 libsafe doesn't work with glibc 2.0?

I didn't try..

Ron

 
  you'll have to upgrade to potato (or create a slink system with a lot
  potato, but that might cause problems, I never tried) to use libsafe.
 
 but if it does, that you can trry to recompile it on your slink box.
 
   Petr Cech
 -- 
 Debian GNU/Linux maintainer - www.debian.{org,cz}
[EMAIL PROTECTED]
 
 Myth the UNIX trademark has changed hands so much no one is quite sure who 
 really owns it anymore
 
 
 --  
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 



Re: Libsafe

2000-06-16 Thread Ron Rademaker
I've packages libsafe_1.3-1_i386.deb earlier this week, I don't know if
you downloaded that version? If you got it from rademaker.dhs.org, you got
that version... As long as you are using an ldso version that is higher
then the one it depends on, it shouldn't be a problem, I would advice you
to install ld.so.preload-manager, if you want libsafe to be loaded
automatically on boot. It is used during installation, but you can also
make the library being loaded automatically manually (see docs). I've
haven't tried it on slink, only potato and woody, but I guess it'll work
as long as the depencies are correct...

Ron

On Fri, 16 Jun 2000, Richard wrote:

 Dear All
 
 I've been able to find and download libsafe_1.3-1_i386.deb
 
 Before I install it does anyone know of any issues with libsafe and
 Debian 2.1 ??  Will it just install without problems or do I need to
 alter a few config files ??
 
 Thank you
 
 -- 
 Richard
 
 Sheffield Linux
 User's Group
 
 http://www.sheflug.co.uk
 
 
 --  
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 



Re: Libsafe

2000-06-16 Thread Ron Rademaker
libc 2.0.x versions are in slink, in potato this is upgraded to 2.1.x
versions, so you won't be able to use libsafe with slink because the libc6
version is to early. The newer libc6 versions won't be uploaded to slink,
you'll have to upgrade to potato (or create a slink system with a lot
potato, but that might cause problems, I never tried) to use libsafe.

Ron



On Fri, 16 Jun 2000, Richard wrote:

 Ron
 
 Ron Rademaker wrote:
  
  I've packages libsafe_1.3-1_i386.deb earlier this week, I don't know if
  you downloaded that version? 
 
 Yes, tried to install it and the --install script came back with...
 
 dpkg: dependency problems prevent configuration of libsafe: Libsafe
 depends on libc6 (=2.12); however: version of libc6 on system is
 2.0.7
 
 I've looked round the internet for the updated libc6 and it's not
 there.  Looks like I'll have to wait until it's uploaded to an ftp
 site.
 
 Well, at least you get sensible answers with Debian :-)
 
 Thanks
 
 -- 
 Richard
 Sheffield UK
 
 http://www.sheflug.co.uk
 
 
 --  
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
 



Unknown open ports

2000-06-05 Thread Ron Rademaker
I've just run a portscan to my computer that is connected to the internet
(permanently) and there were a few ports open of which I don't know what
they are for (all ports under 1024) and neither did the portscanner, these
are the ports: 686 698 708
If I use telnet to go to one of those ports, the connection isn't closed
by the remote host (only after I've typed a few things and pressed enter a
few times).

Anybody got any ideas on what these ports are for?

Ron Rademaker



Re: Unknown open ports

2000-06-05 Thread Ron Rademaker
Well, all processes do claim to be rpc, why did you think that could not
be it (I AM neo.rademaker.dhs.org).

Ron 

PS. Thanks anyway (to all), I'll go closing ports ASAP.

On Mon, 5 Jun 2000, Greg Olszewski wrote:

 On Tue, Jun 06, 2000 at 12:22:33AM +0200, Ron Rademaker wrote:
  I've just run a portscan to my computer that is connected to the internet
  (permanently) and there were a few ports open of which I don't know what
  they are for (all ports under 1024) and neither did the portscanner, these
  are the ports: 686 698 708
  If I use telnet to go to one of those ports, the connection isn't closed
  by the remote host (only after I've typed a few things and pressed enter a
  few times).
  
  Anybody got any ideas on what these ports are for?
 
 
 Not off the top of my head. The most convienent way I've found to
 determine is lsof (apt-get install lsof-2.2 or lsof-2.0.36 depending on
 kernel). 
 
 Just do a lsof | grep TCP as root and you'll get a list with names
 pids, and open ports down the right. It's nice.
 
 Someone else suggested it was rpc, but if you are actually 
 neo.rademaker.dhs.org (That's what your headers say), that's not it.
 
 
 Oh well. 
 
 hope this helps
 
 greg
 
 
 --  
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]