Re: Grave apache dos possible through byterange requests

2011-08-28 Thread Thomas Hungenberg
Carlos Alberto Lopez Perez wrote:
> The new advisory [1] recommends this:
> 
>  # Drop the Range header when more than 5 ranges.
>  # CVE-2011-3192
>  SetEnvIf Range (?:,.*?){5,5} bad-range=1
>  RequestHeader unset Range env=bad-range
> 
>  # We always drop Request-Range; as this is a legacy
>  # dating back to MSIE3 and Netscape 2 and 3.
>  RequestHeader unset Request-Range
> 
>  # optional logging.
>  CustomLog /var/log/apache2/range-CVE-2011-3192.log common 
> env=bad-range
>  CustomLog /var/log/apache2/range-CVE-2011-3192.log common 
> env=bad-req-range

What's the use of the second CustomLog line?
'bad-req-range' is never set, is it?

  - Thomas


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4e5aa494.8030...@demonium.de



Re: aptitude upgrade vs. apt-get upgrade

2011-04-01 Thread Thomas Hungenberg
Piotr Drozdek wrote:
> I don't have any packages with 'id' status in my system. I don't know
> what they mean. Maybe somebody can help?

I think 'd' marks packages for deletion?
However, I have not requested to delete all these packages.

> But - to resolve your problem: can you just do this upgrade (8 packages)
> now?
> And upgrade tex-common manually:
> aptitude install tex-common=2.08.1

The problem with the missing update of tex-common can be solved by
using either 'apt-get upgrade' or 'aptitude full-upgrade'.

However, I still wonder what's going wrong with 'aptitude update'.
Maybe a lot of other people who update their systems this way are
missing some security updates?


- Thomas


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d95bc67.9070...@demonium.de



Re: aptitude upgrade vs. apt-get upgrade

2011-04-01 Thread Thomas Hungenberg
Piotr Drozdek wrote:
> Dnia 2011-03-31, o godz. 20:11:40
> Thomas Hungenberg  napisaƂ(a):
> 
>> Piotr Drozdek wrote:
>> > Show me results of
>> > apt-cache policy tex-common
>> 
>> tex-common:
>>   Installed: 2.08
>>   Candidate: 2.08.1
>>   Version table:
>>  2.08.1 0
>> 500 http://security.debian.org/ squeeze/updates/main i386
>> Packages *** 2.08 0
>> 500 http://ftp.de.debian.org/debian/ squeeze/main i386
>> Packages 100 /var/lib/dpkg/status
>> 
>> 
>> > dpkg --get-selections |grep tex-common
>> 
>> tex-common  install
>> 
>> 
>>- Thomas
>> 
>> 
> 
> Everything looks fine. Candidate is a new version.
> Do upgrade by typing:
> 
> apt-get update
> aptitude full-upgrade

Interesting... 'aptitude full-upgrade' works:

# aptitude -s full-upgrade
The following packages will be upgraded:
  bind9-host dnsutils libbind9-60 libdns69 libisc62 libisccc60 libisccfg62 
liblwres60
tex-common
9 packages upgraded, 0 newly installed, 0 to remove and 0 not upgraded.

but 'aptitude update' misses the security update for 'tex-common':

# aptitude -s upgrade
The following packages will be upgraded:
  bind9-host dnsutils libbind9-60 libdns69 libisc62 libisccc60 libisccfg62 
liblwres60
8 packages upgraded, 0 newly installed, 0 to remove and 1 not upgraded.


I just noticed that the package 'tex-common' is marked 'id' in aptitude:

# aptitude search tex-common
id  tex-common  - common infrastructure for building and installing TeX

Maybe this is the reason?
There are dozens of other packages marked 'id', like debian-keyring, strace, ...
I don't think this was the case before the upgrade from lenny to squeeze.


- Thomas


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d958d30.9070...@demonium.de



Re: aptitude upgrade vs. apt-get upgrade

2011-03-31 Thread Thomas Hungenberg
Piotr Drozdek wrote:
> Show me results of
> apt-cache policy tex-common

tex-common:
  Installed: 2.08
  Candidate: 2.08.1
  Version table:
 2.08.1 0
500 http://security.debian.org/ squeeze/updates/main i386 Packages
 *** 2.08 0
500 http://ftp.de.debian.org/debian/ squeeze/main i386 Packages
100 /var/lib/dpkg/status


> dpkg --get-selections |grep tex-common

tex-common  install


   - Thomas


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d94c3dc.6050...@demonium.de



Re: aptitude upgrade vs. apt-get upgrade

2011-03-31 Thread Thomas Hungenberg
Hector Oron wrote:
> Can you check which it is the status of tex-common, is it held by any
> reason? aptitude frontend it is very good to find out such things.

'aptitude search ~ahold' returns no results.

$ dpkg -l tex-common
Desired=Unknown/Install/Remove/Purge/Hold

| Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend

|/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad)
||/ Name  Version
Description
+++-=-=-==
ii  tex-common2.08  
common
infrastructure for building and installing TeX

Looks ok for me.


   - Thomas


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d94c36f.80...@demonium.de



aptitude upgrade vs. apt-get upgrade

2011-03-31 Thread Thomas Hungenberg
Hi,

since upgrading from lenny to squeeze, I've noticed several times that aptitude
does not install all available security updates whereas apt-get does.

Currently, this looks like:

# aptitude -s upgrade
The following packages will be upgraded:
  bind9-host dnsutils libbind9-60 libdns69 libisc62 libisccc60 libisccfg62 
liblwres60
8 packages upgraded, 0 newly installed, 0 to remove and 1 not upgraded.

# apt-get -s upgrade
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages will be upgraded:
  bind9-host dnsutils libbind9-60 libdns69 libisc62 libisccc60 libisccfg62 
liblwres60
tex-common
9 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.

What's the reason for this?

   - Thomas


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4d94784f.3080...@demonium.de



Re: DSA-1494-1 - Graphics errors

2008-02-21 Thread Thomas Hungenberg
Thomas Hungenberg schrieb am 14.02.2008 15:40:
> I was using linux-image-2.6.18-5 on my Thinkpad notebook (ATI graphics)
> without problems.
> Now I installed linux-image-2.6.18-6 from DSA-1494-1.
> After booting the new kernel version, I experienced graphics errors
> (horizontal lines below the mouse pointer) and X.org eats up lots of
> CPU ressources.
> With the old kernel version everything still runs fine.
> 
> Anyone having similar problems with the new kernel version?

Problem solved:
I am using the fglrx driver for x.org and did not notice that the
corresponding kernel module was not build and installed correctly
with m-a for the new kernel version.
After installing the fglrx kernel module correctly everything runs
fine with the new kernel.

I am a little bit surprised that - apart from small graphics errors
and some performance issues - the fglrx driver runs fine without
the kernel module.
I thought that starting x.org would fail if the kernel module is not
available.


- Thomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: DSA-1494-1 - Graphics errors

2008-02-18 Thread Thomas Hungenberg
Florian Weimer schrieb am 18.02.2008 22:33:
> Could you please post "uname -a" output from the old and new kernels?

Linux xyz 2.6.18-5-686 #1 SMP Mon Dec 24 16:41:07 UTC 2007 i686 GNU/Linux

Linux xyz 2.6.18-6-686 #1 SMP Sun Feb 10 22:11:31 UTC 2008 i686 GNU/Linux


   - Thomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: DSA-1494-1 - Graphics errors

2008-02-14 Thread Thomas Hungenberg
Riku Valli schrieb am 14.02.2008 18:04:
> I just installed 2.6.18-6-686 and compiled my Ati's properitier drivers 
> for this kernel. No problems. I used Thinkpad too (T61) if i remember 
> right.

I'm using X.org's ATI driver on a T60.


   - Thomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



DSA-1494-1 - Graphics errors

2008-02-14 Thread Thomas Hungenberg
Hi,

I was using linux-image-2.6.18-5 on my Thinkpad notebook (ATI graphics)
without problems.
Now I installed linux-image-2.6.18-6 from DSA-1494-1.
After booting the new kernel version, I experienced graphics errors
(horizontal lines below the mouse pointer) and X.org eats up lots of
CPU ressources.
With the old kernel version everything still runs fine.

Anyone having similar problems with the new kernel version?


   - Thomas


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: sshd: Logging illegal users

2004-08-24 Thread Thomas Hungenberg
On Thu, 19 Aug 2004 11:52:51 +0300 (EEST), Martin Fluch wrote:

> Do you really want to log those illegal user names? If you do so, you 
> would run into danger to log passwords in plain text as well, when you 
> accidently enter the password when ssh asks you for the user name...

I'm aware of that, but there are situations when logging the usernames
is quite interesting.
For example, if there is an increase in ssh scanning like over the
last weeks, it is nice to put a machine on the net which offers no
other services (kind of a honeypot) and see what usernames the
attackers are trying.


  - Thomas

-- 
PGP: 2047Bit RSA, ID 0x668E601D - Encrypted mail welcome!


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: sshd: Logging illegal users

2004-08-24 Thread Thomas Hungenberg
On Fri, 20 Aug 2004 02:26:17 -0600, Will Aoki wrote:

>> > Set "LogLevel VERBOSE" in /etc/ssh/sshd_config
>> 
>> LogLevel is already set to VERBOSE. But even with LogLevel DEBUG the
>> invalid usernames are not logged. :-(
>> I tested that on three different machines running Debian/woody.
>
> It works for me on all of my machines running woody, including a fresh
> installation I did last week.

I just figured out that when setting "UsePrivilegeSeparation" to "no"
in sshd_config, also sshd on Debian/woody logs 

sshd[xxx]: Failed  for illegal user  from xxx.xxx.xxx.xxx port 
x ssh2

But with PrivilegeSeparation turned on, the username is not logged.

However, sshd from Debian/sarge also logs the illegal usernames with
PrivilegeSeparation turned on.


So I wonder if you do not use PrivilegeSeparation on your woody
installations?


  - Thomas

-- 
PGP: 2047Bit RSA, ID 0x668E601D - Encrypted mail welcome!


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: sshd: Logging illegal users

2004-08-19 Thread Thomas Hungenberg
On Sun, 15 Aug 2004 12:34:59 -0600, Will Aoki wrote:

>> Is there a way to make the sshd included with Debian/woody to also log
>> the usernames an attacker tried to connect with?
>
> Set "LogLevel VERBOSE" in /etc/ssh/sshd_config

LogLevel is already set to VERBOSE. But even with LogLevel DEBUG the
invalid usernames are not logged. :-(
I tested that on three different machines running Debian/woody.

Could this be a PAM issue? Is there perhaps a configuration variable
to turn on logging of invalid usernames in PAM like LOG_UNKFAIL_ENAB 
in /etc/login.defs?


  - Thomas

-- 
PGP: 2047Bit RSA, ID 0x668E601D - Encrypted mail welcome!


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



sshd: Logging illegal users

2004-08-15 Thread Thomas Hungenberg
Hello,

sshd included with Debian/sarge logs connection attempts with illegal
usernames this way:

sshd[xxx]: Illegal user  from xxx.xxx.xxx.xxx
sshd[xxx]: Failed unknown for illegal user  from xxx.xxx.xxx.xxx port x 
ssh2

However, the older sshd version from Debian/woody by default only logs
the following when trying to connect with an illegal username:

sshd[xxx]: Connection from xxx.xxx.xxx.xxx port x
sshd[xxx]: Enabling compatibility mode for protocol 2.0

Is there a way to make the sshd included with Debian/woody to also log
the usernames an attacker tried to connect with?


  - Thomas

-- 
PGP: 2047Bit RSA, ID 0x668E601D - Encrypted mail welcome!


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]