Re: remote attack?

2000-12-18 Thread Damian Menscher
On Mon, 18 Dec 2000, Christian T. Steigies wrote:

 Hi,
 seems my machine was subject to an remote attack. I saw these in the logs:
 
 Dec 16 05:10:03 ap031 rpc.statd[21964]: gethostbyname error for 
 ^X÷ÿ¿^X÷ÿ¿^Y÷ÿ¿^Y÷ÿ¿^Z÷ÿ¿^Z÷ÿ¿^[÷ÿ¿^[÷ÿ¿%8x%8x%8x%8x%8x%8x%8x%8x%8x%236x%n%137x%n%10x%n%192x%n\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220\220
 [...]
 
 How can I find out where the attack came from? Plus I hope that a woody
 machine is not vulnerable?

Unless there was more in your logs, you don't find out where it came
from.  In any case, that attack was published in mid-July.  Debian 2.2
and 2.3 are both listed as vulnerable.  The fix (for Debian) was in
nfs-common_0.1.9.1-1, so if you're running that version or later then
you're safe.  Otherwise, you might want to take a *very* close look at
your system and consider reinstalling.

For more information on the attack go to www.securityfocus.com and do a
search on statd.

HTH,

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: inetd questions

2000-12-11 Thread Damian Menscher
On Mon, 11 Dec 2000, Ethan Benson wrote:

 tell what is so damn insecure about these?
 
 $ while true ; do makepasswd --chars=12 ; done
 t2nWXiWynAU8
 qdesULEdwzLG
 g3YfAxqxLG1d

Well, since you asked there is no punctuation.  Ideally, I would
like to see control characters in passwords.  Anyone know of a complete
list of which are acceptable/unacceptable?

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: instalation manual

2000-12-05 Thread Damian Menscher
On Tue, 5 Dec 2000, Tom wrote:

 My computer is 586 IBM CyrixInstead. Which Intall manual (in the page
 http://www.debian.org/releases/stable/#new-inst of the Debian page) do I use
 ?
 
 -Intel x86

This one.  (For all practical purposes, x={3,4,5,6,...} and
Intel={Intel,AMD,Cyrix}

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: OT: port scan

2000-11-28 Thread Damian Menscher
On Tue, 28 Nov 2000, Pollywog wrote:
 On Tue, 28 Nov 2000 14:40:09 -0200 (EDT), Mario Olimpio de Menezes said:
 
  One computer where I have Debian installed was scanned
   recently. Someone probed several ports (~20), maybe trying to determine
   the running OS (something like nmap does).
  Do you think this *IS* an attack? I mean, should I report this
   as *AN* attack?
 
 If someone scans several ports, I usually do report it to their ISP,
 sending them log excerpts that include the time they occurred and also my
 time zone as reported by my computer.  The ISP would probably warn the
 customer and even terminate the customer's account if they believe the
 customer was up to no good.
 
 I usually do not report attempts to connect to single ports.

You might want to keep in mind that scans of all ports are often just
general curiosity about what kind of stuff a computer is being used for,
while scans of a single port (on every machine in your subnet) is often
someone looking for a machine vulnerable to a *particular* exploit.  So
I'd say don't ignore the single-port scans.  They are as (or more)
serious.

Of course, a connection to a single port on a single machine is probably
just some idiot who mistyped an IP address

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: PPP keeps on acting *strangely* ...

2000-11-27 Thread Damian Menscher
On Mon, 27 Nov 2000, Kristian Rink wrote:

 --snip--
 
 Nov 27 17:17:24 straylight chat[1054]:  -- got it
 Nov 27 17:17:24 straylight chat[1054]: send (ATDT0192666210^M)
 Nov 27 17:17:25 straylight chat[1054]: expect (CONNECT)
 Nov 27 17:17:25 straylight chat[1054]: ^M
 
 Nov 27 17:17:52 straylight chat[1054]: ATDT0192666210^MECT 115200^M
[snip]
 Nov 27 17:18:08 straylight chat[1054]: }%B#}%}%}um$}
 }'}}(}[EMAIL PROTECTED] }9}
 }} }*} } }#}%B#}%}%}um$} }'}}(}6k~~
 Nov 27 17:18:10 straylight chat[1054]: alarm
 Nov 27 17:18:10 straylight chat[1054]: Failed
 Nov 27 17:18:11 straylight pppd[1053]: Exit.
 
 --snip--
 
 After the last time I posted here I tried:
 --changing and trying to dial with different AT-init-commands
 --turning modem echo on / off
 --dialing with chat and wvdial
 --using differen providers to prevent problems with broken ppp servers
 --setting fixed speed (i.e. 57600) via pppconfig in dialup scripts
 
 Finally, *none* of this things changed anything about the modem behaviour.
 *Sometimes* it dials a hundred times without having any problems,
 sometimes it's almost impossible to connect for days without having errors
 like these. So it's obviously not solveable only by setting AT commands...

 Especially the marked line seems *strange* to me, what the h__k happens
 here???

I would guess that that is the echo coming back from the modem.  It
repeats the dial command you gave it ATDT, dials, connects, and
tells you how fast it connected CONNECT 115200 (115.2k, including
hardware compression, etc).

I haven't been following your problem, and haven't used a modem in over
a year, but.

Have you made a log of connection speeds where you were [un]successful?  
Since the script is expecting it to say CONNECT and it gets only the
last 10 chars of that string ECT 115200 it might be assuming an error
condition.  From my days of reading up on AT commands, I remember my
modem had 4 options of verbosity of connect messages, ranging from a
number, to CONNECT/BUSY/NO DIALTONE to the full range of CONNECT
300/CONNECT 1200/CONNECT 2400/CONNECT 9600/..  You might want to try
setting yours to be less verbose so it says CONNECT instead of
CONNECT 115200.

Just a wild guess.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



teTeX path question

2000-11-26 Thread Damian Menscher
Not a specifically Debian question, but

I just upgraded my version of teTeX to 1.0.6, and discovered it no
longer seems to follow the TEXINPUTS environment variable to find
various style files, etc.  I need to get this to read in a revtex.cls
file that I've added in, but don't know how to get this included in the
search path.  I've got a feeling it has something to do with the ls-R
file, but don't know exactly what I'm doing there and don't want to mess
things up.  Could anyone provide any hints?

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: teTeX path question

2000-11-26 Thread Damian Menscher
On Sun, 26 Nov 2000, Damian Menscher wrote:

 I just upgraded my version of teTeX to 1.0.6, and discovered it no
 longer seems to follow the TEXINPUTS environment variable to find
 various style files, etc.  I need to get this to read in a revtex.cls
 file that I've added in, but don't know how to get this included in the
 search path.  I've got a feeling it has something to do with the ls-R
 file, but don't know exactly what I'm doing there and don't want to mess
 things up.  Could anyone provide any hints?

Sorry to answer my own question, but it appears that running the texhash
command updates an internal database teTeX keeps on what files are
where.  (Oh, and to answer another question I hadn't gotten around to
asking yet, you can change from the default papersize of A4 to letter by
using the texconfig command.  Dang I'm quick! ;)

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: Using PuTTY with an SSH Server

2000-11-25 Thread Damian Menscher
On Sat, 25 Nov 2000, S.Salman Ahmed wrote:

 I am using the latest (stable) release of PuTTY on Win2000 Professional
 to connect to a Debian server running OpenSSH. I have also installed
 Hummingbird Exceed 6.2 on the Win2000 machine.
 
 It seems that PuTTY doesn't support X forwarding. So how do I go about
 displaying X clients on my Win2000 desktop which has a working X server
 (Exceed) ?
 
 I tried setting $DISPLAY to :0.0 while connected to my Debian server,
 but that didn't work ?

:0.0 refers to the Debian server, not to your win2k machine.  Instead,
set $DISPLAY to win2k.machine.name:0

Keep in mind that these connections do NOT got through ssh, so anything
you send through them can be sniffed!  Therefore, don't open an xterm
and su or ssh into another machine if you do things this way!

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: more than one .sty file in a tex document!?

2000-11-23 Thread Damian Menscher
On Thu, 23 Nov 2000, Manegold wrote:
 Manuel Hendel wrote:
  On Thu, Nov 23, 2000 at 09:44:40AM +0100, Manegold wrote:
   Manuel Hendel wrote:
   
is it possible to use more than one .sty file in a tex document? For
example, let's say I use g-brief as documentclass, but also want to
use letter or dinbrief and a package called rechnung.
   
   yes and no. Some packages like footmisc, soul, which are not a document
   class can be used alonside each other. g-brief und dinbrief, however,
   are different documten classes. Same as you can't write a document based
   on book.cls and a letter (based on g-brief, letter, dinbrief or
   whatever) at the same time, you can't do that with different classes for
   a letter. This also applies for the different variants for reports,
   books or articles. If you tried, the last one will probably overwrite
   the previous if it does not give you an error.
  
  Actually I want to use the class g-breif, but I need the functions for
  the footer from the letter class or is there any package which I can
  add to my .tex file together with g-brief to get the footers?
 
 Well you can always try and see if it works. In your case try to input
 the letter class after the g-brief class. I don't think this will give
 the desired result though.
 The prelim2e package puts something at the lower edge of the each page
 that you can customize to what you want there. Maybe that does what you
 want.

Depending on your skill level, and how much you really want this, you
can try extracting the footer-related section from the letter class and
putting that in the g-brief class (or inputting it separately).  If you
do this, just make a new class.  I've done similar stuff with modifying
the seminar.cls style to get rid of borders, or modifying bibliography
styles to allow for a Bachelor's thesis.  Just keep in mind that TeX
really is a different language from LaTeX and you'll be fine

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: how to keep portmap from running?

2000-11-23 Thread Damian Menscher
On Thu, 23 Nov 2000, Robert A. Jacobs wrote:
 * Peter Jay Salzman [EMAIL PROTECTED] [231100 09:16]:
  bleah.  how do i keep this program from starting on boot?
  
  i looked in /etc/init.d.  can't even find a startup script for this thing!
  it's not in inetd.conf either.   how does this thing get started?
 
 This is more of a question to the readers of this thread than directly to 
 you Pete, but:
 
   What are the ramifications of turning portmapper on or off?  I've gotten the
   (perhaps mistaken) impression that portmapper presents some security risks
   but it almost seems like I have to have it running to get other services to
   work properly.

Portmapper maps the RPC services to ports.  The list of services it
deals with are listed in /etc/rpc.  Most of them deal with clustered
computing, so you'll need to run portmap if you're using nfs, yp, or (I
think) trying to do a beowulf-type setup.  Otherwise, you probably don't
need it.  You could try doing a `rpcinfo -p localhost` to find out what
your computer is making available.

   Is there an alternative to running portmapper?

Portmap is a fairly big security risk, since it allows lots of new
access to your machine.  You may remember a recent rpc.statd exploit
that could have been prevented if the target machine was not running
portmap.  Of course, if you need it, then you need it.  Use TCP wrappers
to protect yourself.  If you're behind a firewall, this is less of an
issue, but layered security is still the way to go.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: Adding users

2000-11-23 Thread Damian Menscher
On Thu, 23 Nov 2000, Jeff Daniels wrote:

 I need to be able to add user accounts. Is there a simple way of doing this
 from the command line.

Try using the adduser command.  Or the useradd command.

Hint: guessing command names can often be useful.  Not all unix commands
have names as cryptic as tar or cat, you know.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: Help with cron settings?

2000-11-18 Thread Damian Menscher
On Sat, 18 Nov 2000, sc wrote:

 I'm having troubles getting my backups automated.  I set up a file test 
 in the cron.d directory with the settings...
 
 5,10,15 * * * sunkcost /bin/tar -cf /home/sunkcost/test.tar 
 /home/sunkcost/test.txt
 
 I thought that cron was supposed to check through its crontab and related 
 files every minute or so, but nothing happens.  I tried restarting cron 
 manually, root as the user, and editing crontab directly, but no dice.
 
 I'm probably missing something really obvious for what seems like a 
 straightforward setup, but I'm stuck.  Can somebody give me some help 
 here?

man crontab

You're supposed to use the crontab command to modify cron
settings.  Updating files by hand won't work.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: What is NAVIDAD.exe

2000-11-14 Thread Damian Menscher
On Tue, 14 Nov 2000, -|- Hurgh! -|- wrote:

 Is this a virus or something I have just got like heaps of messages from
 people on this group and they all have this file attached. What is it??
 
 
 -|- Hurgh! -|-
 
 PS If you would like a copy of this file I will attach it but I would not
 run it, I have not yet ran it and I do not know what it does. If you want a
 copy let me know

As you have suggested, DO NOT RUN IT.  It is worm that targets idiots
who run Windows.  Note: not all idiots run windows, and not all who run
windows are idiots.  But all who run windows and execute NAVIDAD.EXE are
idiots.  Obviously there is at least one subscriber to the Debian-user
list who meets this idiot criteria.  I just hope the complaining
servers stop battling soon.  This is getting annoying.

The following is the alert I received about this from McAfee:

  *** VIRUS ALERT - W32/[EMAIL PROTECTED] 
 

Dear McAfee.com Dispatch Subscriber: 

W32/[EMAIL PROTECTED] is an Internet worm that spreads using the 
Windows email program Outlook. McAfee AVERT has given it a 
risk assessment of MEDIUM-ON WATCH, due to a significant 
increase in infection levels worldwide. 

The email can come from addresses that you will recognize. 
Attached is a file named NAVIDAD.EXE and when it is run, it 
displays a dialog box entitled, Error which reads UI. A 
blue eye icon then appears in the system tray next to the 
clock in the lower right corner of the screen, and a copy of 
the worm is saved to the file winsvrc.vxd in the WINDOWS 
SYSTEM directory. 

If your PC becomes infected with the W32/[EMAIL PROTECTED] worm, all 
subsequent emails addressed to you will be responded to 
automatically with an email from your address with the 
W32/[EMAIL PROTECTED] worm as an attachment. 

Click here for detection and removal instructions:
- http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=1956 


Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: /usr/tmp instead of /tmp

2000-11-14 Thread Damian Menscher
On Tue, 14 Nov 2000, Debian User wrote:

 I'd like to switch /tmp to /usr/tmp because /tmp is to small.
 
 umount /tmp ; mv tmp tmp2 ; rewrite /tmp to /tmp2 in /etc/fstab
 mkdir /usr/tmp ; ln -s /usr/tmp /tmp ; chown 777 /usr/tmp ; chown 777 /tmp
 chmod root:sys /usr/tmp

Well, swapping chown - chmod in what you wrote, you're pretty close.
The permissions _should_ be 1777, not just 777.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: Quick way to tell if online for use in cron script?

2000-11-08 Thread Damian Menscher
On Tue, 7 Nov 2000, Willy Lee wrote:

 I wanted to run 'ntpdate' periodically via a cron script.  However, I
 would prefer if the script would only run ntpdate if I am online (my
 dialup account), in order to avoid filling up my logs with 'can't find
 xxx.xxx.xxx.xxx' messages.  Is there something in /proc or a simple
 command that I could use to tell whether I'm dialed up?  Currently I
 am simply running 'ifconfig ppp0' to see if I'm online, but that seems
 a little inelegant to me.

Given that you're trying to see if you can access xxx.xxx.xxx.xxx how
about using ping?  That will protect you in the case you're dialed up
but the ntp server is unreachable for some reason, too.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: i am hacked atm.. what's better thing to do?

2000-11-06 Thread Damian Menscher
On Mon, 6 Nov 2000, Livia Admin wrote:

 ey guys.. pls reply to my real email add cause i'm not in the lists
 
 i think i'm compromised. cause when i do netstat i see a telnet
 connection established to my box for almost 1 hour. i do ps but see
 only 'in.telnetd'. is there any way that i will know what he is
 doing before i'll disconnect him?

A lot depends on whether you want to watch/trace/prosecute/learn
from/annoy him, or if you just want him off your system.

What I would do (since I like to do learn from the intrusions), is to
follow him around for a while.  At minimum, find out what IP address he
is coming from and how he got into your machine.

A simple packet sniffer for Debian can be obtained through `apt-get
install sniffit`, and then run `sniffit -I`.  This will at least tell
you the open connections to your machine and the IP addresses.  If you
want to see what he's doing, run a packet sniffer (tcpdump, though
sniffit can probably do it as well) to sniff packets to/from his IP.

The syslog is probably the best place to find how he got into your
system.  But it might have been tampered with.  If you think it's a
fairly recent attack, look around your directories a bit with an `ls
-lart` to show all recently-changed entries.  Script kiddie tools are
easily found this way, though better hackers can hide their tracks.

Finally, don't trust the output of ps (it may be one that hides their
tracks), login could have been replaced to have a backdoor and log your
passwords, etc.  You might run nmap against your own machine to check if
any additional ports were enabled.

Once figure out how your machine was compromised (watching other
machines get attacked from your own may give a clue here) then check the
IP he's coming from and see if it was compromised in the same way.  If
so, notify the owner.  If not, then this is the hacker's home box and
you should contact his ISP (or the authorities).

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



RE: Exec CGI

2000-11-06 Thread Damian Menscher
On Mon, 6 Nov 2000, Jason Holland wrote:

 Do you have this in your httpd.conf
 
 AddHandler cgi-script .cgi
 
 ??  You need this to map the cgi-script handler to all .cgi scripts.  And
 you probably can take that extra Options line out, you don't need to tell
 apache Options ExecCGI twice.  Also, your directory definition probably
 should look like this
 
 Directory /home/*/public_html
 
 So you grab everyone's home directory.  Hope this helps.

Alternatively, you can force your users to have a cgi-bin directory for
their scripts, and use the ScriptAlias command.  This is nice if you
only want to allow _some_ CGIs for _some_ users.

Damian

  Hi,
 
  I am wondering how to execute .cgi out of the users public_html
  directory.  I thought I had it right by adding the line to
  access.conf file?
 
  Directory /home/username/public_html/
   AllowOverride all
   Options ExecCGI
   Options Indexes FollowSymLinks ExecCGI
   Order allow,deny
   Allow from all
  /Directory
 
  I do have .cgi extentions working fine out of the main www
  directory.  If I
  view the error.log I see a line that says that Option Exec is off??
 
  Thanks
 
  Eileen Orbell
  Software  Internet Applications
  Capitol College
  mailto:[EMAIL PROTECTED]
  mailto:[EMAIL PROTECTED]
  Don't Fear the Penguin.
 
 
 
 
  --
  Unsubscribe?  mail -s unsubscribe
  [EMAIL PROTECTED]  /dev/null
 
 
 
 
 -- 
 Unsubscribe?  mail -s unsubscribe [EMAIL PROTECTED]  /dev/null
 

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: weird rpc.statd messages on potato

2000-11-06 Thread Damian Menscher
On Mon, 6 Nov 2000, Rob wrote:

 Getting the following in our /var/log/messages
 
 We use NFS between two Potato boxes, this appears on
 both :
 
 Nov  6 08:03:19 rudy Ç^F/binÇF^D/shA0ÀˆF^G‰v^LV^PN^L‰ó°^K̀°^Àèÿÿÿ
 Nov  6 08:03:21 rudy 173Nov  6 08:03:21 /sbin/rpc.statd[152]: gethostbyname 
 error for 
 ^X÷ÿ¿^X÷ÿ¿^Y÷ÿ¿^Y÷ÿ¿^Z÷ÿ¿^Z÷ÿ¿^[÷ÿ¿^[÷ÿ¿%8x%8x%8x%8x%8x%8x%8x%8x%8x%236x%n%137x%n%10x%n%192x%n1Àë|Y‰A^P‰A^HþÀ‰A^D‰ÃþÀ‰^A°f̀³^B‰Y^LÆA^N™ÆA^H^P‰I^D€A^D^Lˆ^A°f̀³^D°f̀³^E0ÀˆA^D°fÍ
 Nov  6 08:03:21 rudy Ç^F/binÇF^D/shA0ÀˆF^G‰v^LV^PN^L‰ó°^K̀°^Àèÿÿÿ

Congratulations!  Assuming you haven't patched past the default install,
you've just been hacked!

This is a well-known attack on rpc.statd that was first publicized on
bugtraq in mid-July (you can search the archives at
www.securityfocus.com).  If you haven't updated your potato since then,
you're probably a goner.  According to the page
www.debian.org/security/2000/2719a if you're running nfs-common
0.1.9.1-1 or later you should be safe.  Otherwise reinstall and apt-get
the security updates this time.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: MD5 Check (was Re: i am hacked atm.. what's better thing to do?)

2000-11-06 Thread Damian Menscher
On Mon, 6 Nov 2000, Chewie wrote:

 Here's a little known trick for a very minimalistic intrusion
 detection hack.  Debian installs a file called package.md5sums in
 the directory /var/lib/dpkg/info/.  If you move yourself to the root
 parition:
 
   bash$ cd /
 
 And run md5sum -c on the package files. 
 
   bash$ for i in /var/lib/dpkg/info/*.md5sums ; do \
md5sum -c $i ; done  /tmp/check.out 
 
 You can pipe the output to an email to see if any of your installed
 programs have been tampered with.  Tie it in with cron, and you've one
 more tool to use...
 
 ## Crontab entry for your user...
 
 00 03 * * * cd /; for i in /var/lib/dpkg/info/*.md5sums ; do \
   md5sum -c $i ; done
 
 Of course, this is no where near the same usefulness that running
 tripwire or aide might give you.  If neither of these are installed,
 this trick may add a little more info to your clue box.

A nice little trick, and something I was playing around with on some
SGIs I manage.  Not foolproof, though.  They just have to install a
trojan md5sum or update your md5sum database.  But it is certainly a
nice start, as no script kiddie will think to check your crontab for
stuff like that!

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: weird rpc.statd messages on potato

2000-11-06 Thread Damian Menscher
On Mon, 6 Nov 2000, Rob wrote:

 Hmm, well we're on nfs-utils (1:0.1.9.1-1), so would that mean
 that someone is trying the exploit on us? Any way to tell where
 this is coming from?

Given that you're running an up-to-date nfs-utils, they didn't get
in.  So the only info you have on them is the log messages.  So no,
there's no way to tell where it came from, unless you do some other sort
of logging (like running a packet sniffer at the time of the attack).

 BTW, what was the exploit, some kind of overflow?

Yes, it was an overflow.  Basically overflowing a format string
vulnerability when rpc.statd attempts to log to syslog(), which of
course runs as root.  More information can be found at
www.securityfocus.com by clicking on Vulnerabilities and searching for
keyword statd.

Damian

 On Mon, Nov 06, 2000 at 10:29:04PM -0600, Damian Menscher wrote:
  On Mon, 6 Nov 2000, Rob wrote:
  
   Getting the following in our /var/log/messages
   
   We use NFS between two Potato boxes, this appears on
   both :
   
   Nov  6 08:03:19 rudy Ç^F/binÇF^D/shA0ÀˆF^G‰v^LV^PN^L‰ó°^K̀°^Àèÿÿÿ
   Nov  6 08:03:21 rudy 173Nov  6 08:03:21 /sbin/rpc.statd[152]: 
   gethostbyname error for 
   ^X÷ÿ¿^X÷ÿ¿^Y÷ÿ¿^Y÷ÿ¿^Z÷ÿ¿^Z÷ÿ¿^[÷ÿ¿^[÷ÿ¿%8x%8x%8x%8x%8x%8x%8x%8x%8x%236x%n%137x%n%10x%n%192x%n1Àë|Y‰A^P‰A^HþÀ‰A^D‰ÃþÀ‰^A°f̀³^B‰Y^LÆA^N™ÆA^H^P‰I^D€A^D^Lˆ^A°f̀³^D°f̀³^E0ÀˆA^D°fÍ
   Nov  6 08:03:21 rudy Ç^F/binÇF^D/shA0ÀˆF^G‰v^LV^PN^L‰ó°^K̀°^Àèÿÿÿ
  
  Congratulations!  Assuming you haven't patched past the default install,
  you've just been hacked!
  
  This is a well-known attack on rpc.statd that was first publicized on
  bugtraq in mid-July (you can search the archives at
  www.securityfocus.com).  If you haven't updated your potato since then,
  you're probably a goner.  According to the page
  www.debian.org/security/2000/2719a if you're running nfs-common
  0.1.9.1-1 or later you should be safe.  Otherwise reinstall and apt-get
  the security updates this time.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: sticky bit, powersaving hdd spindown

2000-11-05 Thread Damian Menscher
On Sun, 5 Nov 2000, Damien wrote:

 i've been working on a stand alone music player for the last couple
 of months. it's currently a bit loud (being based around an old p166
 with a very noisy hdd  powersupply fan.
 
 after reading another posting by someone else on how to quieten down
 a computer, i finally got motivated to do so. but the first problem
 that struck me was the hdd having to spin up all the time
 
 currently my music player plays a series of files off a cd. it also
 has a screen blanking option which due to the hackish nature of this
 program, does a system('tput clear') (as i don't want to use the
 ncurses routines to do this)
 
 this call to tput is located on the hard disk and cached. yet after
 playing a certain amount of music, this binary is swapped out, and
 if accessed again, the hdd would have to spin down again.
 
 i remember reading somewhere that the sticky bit could be used to
 instruct certain unixs to permanently cache a program. is this the
 case with linux? if not, can anyone offer any alternative solutions?

Under DOS there was the possibility of treating some of your RAM like a
disk (hence the name ramdisk).  Not sure if Linux can do this, but if
so, then just copy the binary to a ramdisk and run it from there.

Just an idea, I don't know how to do it or even if it can be done.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: hard drive error?

2000-11-03 Thread Damian Menscher
On Fri, 3 Nov 2000, Joey Tsai wrote:

 Hi, right in the middle of my dist-upgrade-ing to xfree 4.0.1 (hurray!), I'm
 getting a physical hard drive error.
 
 My terminal says:
 
 Setting up xfonts-100dpi (4.0.1-1) ...
 md5sum: read error on stdin
 dpkg: error processing xfonts-100dpi (--configure):
 subprocess md5sum returned error exit status 2
 
 the system log (at the read error, I believe) says:
 
 Nov  3 17:05:27 corban kernel: hda: dma_intr: status=0x51 { DriveReady 
 SeekComplete Error }
 Nov  3 17:05:27 corban kernel: hda: dma_intr: error=0x40 { UncorrectableError 
 }, LBAsect=18817, sector=18754
 Nov  3 17:05:27 corban kernel: end_request: I/O error, dev 03:01 (hda), 
 sector 18754
 
 If anyone has any suggestions on what to do, I'd really appreciate it.  
 Thanks!

Couple of choices:

1. Shutdown, reboot, hope to fsck successfully, then buy a new HD and
move to it asap.

2. Assuming this is a current problem, and you're stuck there right
now  Is this an install you want to save?  Do you not care much,
though, if you trash it?  Do you not care if you trash your hard
drive?  Do you just want to save some time of a fsck and possible
reinstall?  Then pull the IDE and power cables from your drive, wait 5
secs, then plug back in.  The computer will do an IDE bus reset, and
then continue on where it left off.  Worked for me once  YMMV

Note: I'm not responsible if suggestion 2 fries anything, including you!

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: sed question (bibtex problem)

2000-11-02 Thread Damian Menscher
On Fri, 3 Nov 2000, Brian May wrote:

 bibtex likes to word-wrap/mangle/destroy my long lines (eg. URLs) into
 this form:
 
 \bibitem[Mic00]{Microsoft2000}
 Microsoft.
 \newblock Windows 2000 kerberos authentication.
 \newblock White paper, Microsoft, January 2000.
 \newblock
   
 \url=http://www.microsoft.com/technet/win2000/win2ksrv/technote/kerberos.asp%
 =.
 
 which is interpreted by LaTeX to display a percent sign at the end of
 the URL :-(

How about:
1. download source
2. fix source
3. send a patch to the maintainer

That way I won't have this problem when I use bibtex for urls in the
future.  ;)

Hmm, I guess that wasn't very helpful.  You might want to try adding a
'%' character to the end of your URL in your .bib file.  This might
survive past bibtex, and will tell LaTeX to ignore the remainder of the
line.  If the remainder of the line is just that extra character, it
might pull off what you're looking for.  Or not.  I haven't tested this.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: /usr/bin before /usr/local/bin?

2000-10-31 Thread Damian Menscher
On Tue, 31 Oct 2000, Krzys Majewski wrote:

 Any opinions on which should go first in the path: 
 /usr/bin or /usr/local/bin? 

For a user or for root?

For a user, definitely put /usr/local/bin first.  That way they can get
all of your local customizations for that machine.

For root, you want to have as little on your path as possible (to avoid
trojans, etc).  It is questionable whether /usr/local/bin should be
there at all.  Another argument is you don't want to have path problems
in the event /usr/local fails to mount properly and you are forced to
fix the problem as root.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: /usr/bin before /usr/local/bin?

2000-10-31 Thread Damian Menscher
On Tue, 31 Oct 2000, William T Wilson wrote:
 On 31 Oct 2000, Hubert Chan wrote:
 
  My sudoers file is basically just
hubert ALL=(ALL) ALL
 
 This can be extremely convenient.  But it also makes the security of the
 whole system equal to the security of your user account.
 
 If you are worried about security, and you have a situation like this, you
 have to take as much care with your personal account as you would with
 root.  So you must never type passwords unencrypted over the network,
 leave yourself logged in, etc. unless you are sure that the situation is
 secure.

You should behave in this manner anyway.  A compromised user account is
destined to become a compromised root account.  There are too many local
root exploits to ignore the danger.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: /bin/false (was Re: security questions)

2000-10-30 Thread Damian Menscher
On Mon, 30 Oct 2000, sena wrote:
 I heard that Jonathan Markevich wrote this on 29/10/00:
 
  32 bytes, huh?  24 for your source above (with spaces).  Might as well
  compile it yourself.
 
 Or, as in C the return type of a function defaults to int, we could write:
   main(){return 1;}
 even if the compiler whines about it, the source is only 17 bytes long. How
 many (kilo)bytes would be necessary to write that in BASIC? :)

Save a byte:
main(){exit(1);}

But we're pretty far off topic here

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: Any help before I go and spend $49.99 on a Book with the disks?

2000-10-26 Thread Damian Menscher
On Thu, 26 Oct 2000 [EMAIL PROTECTED] wrote:

 I am about 10 seconds from going and buying a book with 1 CD in it.  
 It may have more, who knows, I'm tired of sitting here with my
 laptop laughing at me.

If it's an official CD you're looking for, go to CheapBytes.com and
spend $6 for the 3-CD set.

If you've got a nice network connection, you might be able to upgrade by
setting your sources list to the appropriate places and doing an
apt-get update
apt-get upgrade
But I'm not an expert, so it would be good if someone who is could
comment.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: How to test HDD thoroughly? (Debian Linux unstable 2.2.16 k ernel)

2000-10-26 Thread Damian Menscher
On Thu, 26 Oct 2000 kmself@ix.netcom.com wrote:
 on Thu, Oct 26, 2000 at 11:13:44PM +0200, Shaul Karl ([EMAIL PROTECTED]) 
 wrote:
 A week or two back it started misbehaving and I asked a few of you guys 
 about
 the place about what Unknown vector XXX in CPU#0 and hda interrupt lost
 meant..
 
 Some people said that it sounds like the hard disk is on the way out. What I
 want to know is, how do I test an ext2fs formatted hard disk more 
 intensively
 than at just a filesystem level?

 If it is indeed the harddisk that has died, does anyone have any
 good-condition 1GB-8GB IDE drives? I don't think this old 486'll handle over
 8GB, that and I'm not too crash hot on using some of that 'patch my bios on
 boot' master boot sector voodoo evil :)

IIRC, you are located in Australia.  Not sure you'd want to pay shipping
for my old drive. ;)

 e2fsck
 
 I'll have to disagree.

Agreed.

[Side note: one of my pet peeves is people posting incorrect information
to the list.  Of course, more annoying is when they post a correct
response but to the wrong question.  Not sure which this one was,
but]

 Many professional system administrators strongly recommend replacing
 hard drives at the first sign of failure.   This may be overkill, but
 given the relative values of hardware to data contained, it probably
 makes a lot of sense.

Think of it this way: you value your time at $100/hour, and a user's
time at $1/hour.  Say you have 100 users, and there's a hard drive
failure on the partition with their home directories.  You now face
minimum 1 day downtime while you replace the drive and restore from
backups.  Your users lose 1 day's previous work, plus can't be
productive for another day.  Assuming they actually work 6 hours/day,
that's $1200 right there.  Factor in your time of 12 hours to get it
back online, and it's another $1200.  Would have been simpler to replace
it earlier, costing your time only (and less of it).

Of course, if it's a home system and you're the only user, most of this
doesn't apply.  Just keep regular backups and watch your system
carefully.

 Other recommendations on hardware testing appreciated.

I agree badblocks is probably the best, but you could also try bonnie
and bonnie++.  If you want to check the health of sectors already
occupied by files, I suppose a
dd if=/dev/hda of=/dev/null
wouldn't hurt.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: setup xwindows with com1 mouse

2000-10-24 Thread Damian Menscher
On Tue, 24 Oct 2000, Nick wrote:

 what /dev would i use to accomplish this?

/dev/ttyS0
(capital s, number zero)

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: GREP

2000-10-20 Thread Damian Menscher
On Fri, 20 Oct 2000, Erik Steffl wrote:

   yes, that's true, are you asking what the '?' is or are you just
 stating the fact? anyway, the other command is find, see manpages for
 find and grep for more info. find is the one that finds file (based on
 name, time last accessed, type and various other criteria), grep
 searches the files for string (regular expression). xargs is often
 useful in commands like this:
 
   find / -name '*.h' -print | xargs grep '[sf]printf'

Just curious, but is this any better/worse than doing a

find / -name '*.h' -exec grep '[sf]printf' {} \;

My way seems more straightforward, but I'm not sure about differences in
processing time, when the first match would be found, etc.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: GREP

2000-10-20 Thread Damian Menscher
On Fri, 20 Oct 2000, Erik Steffl wrote:

   the main difference is a sideeffect, sort of, if grep is called for
 with one file as an argument it only prints the line matched, not the
 filename, so you get bunch of lines (each successfull match) but you
 have no idea which files these lines are in...
 
   and probably some other more or less dirty tricks...
^^

Look in the grep manpage for the -l option  ;)

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: Debian box sick... hda lost interrupt Unknown vector 67

2000-10-16 Thread Damian Menscher
On Mon, 16 Oct 2000, Samuel Hathaway wrote:
 hogan wrote:
 
  I have a 486DX4/100 (Overdrive) with 32MB of RAM that I run Debian on..
  
  Up until yesterday it was running like a dream.. Now it does stuff like
  Unknown vector 67 in CPU#0 and after that and something about idling says
  hda interrupt lost over and over and over again.
 
 My potato box had the hda interrupt lost problem after i kinda dropped it
 a few inches while doing a file copy. i had to do a cold reboot. bah.

I had this happen to me while installing potato (has happened other
times as well, btw).  Not wanting to lose all the selections I'd made
and restart the install, I unplugged both power and data cables to the
IDE drive, waited 5 seconds, then plugged them back in.  It did an IDE
bus reset and completed the install.  Machine works fine.

Disclaimer -=  kids, don't try this at home!

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: Password Change Machine

2000-10-16 Thread Damian Menscher
On Mon, 16 Oct 2000, Jeremy Gaddis wrote:

   Set root's shell to whichever you prefer, and set
   the regular user's shell to /usr/bin/passwd.
  
  Yeah...I thought of this at first, but I need a solution that doesn't
  mess with the passwd file at all, as the passwd file is distributed to
  other machines on a regular basis, and the users actually need access to
  their shell there. :)
 
 I assume you'll have a cronjob of some sort running
 on the client machines which snags the password
 file off the server machine?  No big deal, after
 it copies the password file, run a script on it to
 change their shells back to whatever you want.
 Nothing sed, awk, or perl couldn't handle.

You seem to be thinking his master password file is stored on a machine
other than the password-server machine.  Try rereading his original
request for help.  You'll see that corrupting the master password file
isn't such an intelligent thing to do.

My suggestion follows:
One possibility is to take advantage of NIS.  On the server machine you
have a second password file (passwd.nis or something) that is a
normal password file.  In the file /etc/passwd you have the lines

root:0:0::/:/bin/bash
+:0:0:::/bin/yppasswd

and set the machine to get passwords from this NIS map (do a man on
nsswitch.conf).  In this way, you can have your cronjob scp the
passwd.nis file around, but transparently substitute in this alternate
shell when the users come in.

I know I'm leaving out a LOT of details, but hopefully you can figure
those out from this basic idea.  Good luck.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Keyboard wierdness

2000-10-13 Thread Damian Menscher
Ok, this is *really* strange:

I have a fairly new setup: woody + 2.4.0-test9 kernel.  I had everything
working fine.  I wanted to move my computer, so I shut it down, carried
it over to new location, and turn it back on.  When it comes up into XDM
I discover the keyboard does nothing.  I try a second keyboard, still
nothing.  Rebooting shows the keyboards work fine while the system is
booting, but when it gets into X they stop.  Finally, I just booted into
single user mode, and the keyboard is fine.

Ideas???

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: Keyboard wierdness

2000-10-13 Thread Damian Menscher
On Fri, 13 Oct 2000, Gary Hennigan wrote:
 Damian Menscher [EMAIL PROTECTED] writes:
  I have a fairly new setup: woody + 2.4.0-test9 kernel.  I had everything
  working fine.  I wanted to move my computer, so I shut it down, carried
  it over to new location, and turn it back on.  When it comes up into XDM
  I discover the keyboard does nothing.  I try a second keyboard, still
  nothing.  Rebooting shows the keyboards work fine while the system is
  booting, but when it gets into X they stop.  Finally, I just booted into
  single user mode, and the keyboard is fine.
 
 Just a suggestion, don't start a new thread in the group by following
 up to a message in a different thread. To anyone using a thread-aware
 newsreader, eg., gnus, mutt, VM, your post looks like it belongs to
 the thread entitled DNS lookup looks for  records.. started by
 Chris Niekel [EMAIL PROTECTED].
 Not only is it annoying to thread-using readers, it makes your post
 less likely to be seen by someone that may be able to help with your
 problem.
 If you *HAVE* to start a new thread by following up to an old one make
 *SURE* you delete the References: line!

Ahh, the things Pine does behind your back.  Not remembering the address
of the list, I replied, removed all content, etc.  Forgot about the
threading issue.  [Damian makes a mental note]

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: Keyboard wierdness

2000-10-13 Thread Damian Menscher
On Fri, 13 Oct 2000, Steve Juranich wrote:
 On Fri, 13 Oct 2000, Damian Menscher wrote:
 
  Ok, this is *really* strange:
  
  I have a fairly new setup: woody + 2.4.0-test9 kernel.  I had everything
  working fine.  I wanted to move my computer, so I shut it down, carried
  it over to new location, and turn it back on.  When it comes up into XDM
  I discover the keyboard does nothing.  I try a second keyboard, still
  nothing.  Rebooting shows the keyboards work fine while the system is
  booting, but when it gets into X they stop.  Finally, I just booted into
  single user mode, and the keyboard is fine.
  
 
 I experienced something similar a while ago.  My problem turned out to be a
 faulty mouse cable.  In my case, I had to shut down the computer, unplug the
 mouse, plug it back in and power up.  I know this is a very Redmond-like
 solution, but it fixed my problem.
 
 It's a long shot, but you might try using a different mouse.

Or a mouse at all  ;)

Knowing I wasn't going to use the mouse, I hadn't bothered plugging it
in.  I did that and everything is fine.  Incidentally, this is only a
problem with a PS/2 mouse, not a serial mouse.  I'll have to figure out
the proper place to send a bug report on this one

[By the way, sorry about not giving *complete* information.  It just
seemed *so* irrelevant!  Being a sysadmin, I should have known better.]

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: URGENT! Sendmail question (Redhat conversion) HELP!

2000-10-12 Thread Damian Menscher
On Thu, 12 Oct 2000, Ferrell, Tim wrote:

 Let me start by saying I am not a network admin... but I play one on TV

Me too!

 FEATURE(`mailertable',`hash -o /etc/mail/mailertable') 
 and in /etc/mail/mailertable I have the following line: 
 
 mcgeecorp.comSMTP:[192.168.0.6] 
 
 The config file builds ok (after squawking about empty dbs - access,
 relay_domains, and local_host_names) and sendmail runs. I receive mail
 but cannot send/relay - I get smtp Connection Refused errors in the
 mail.log. Also, under RedHat, the relay= section in the mail.log entries
 always showed the ip address of the host being relayed to (192.168.0.6)
 whereas now it shows mcgeecorp.com - why is this?

Assuming the line you give above is what is really in your mailertable
file, your problem would appear to be one of whitespace.

Put some space between the parts so it reads something like:

mcgeecorp.com   SMTP:[192.168.0.6]

BTW: if you're relaying for an entire domain, then you might want to put
a dot (.) in front of mcgeecorp.com.  See the README in the cf directory
for details.

HTH,

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: Encrypt a file

2000-10-09 Thread Damian Menscher
On Mon, 9 Oct 2000, Samuli Suonpaa wrote:
 Damian Menscher [EMAIL PROTECTED] writes:
  On Mon, 9 Oct 2000, Brian May wrote:
  While there are pros and cons in both methods, I have to wonder
  what you need to encrypt files for. For most applications,
  asymmetric encryption is better.
  No, for most applications, symmetric encryption is better.  It is
  stronger, faster, more standardized, better tested, etc.  The
  asymmetric methods often use asymmetric encryption only to encrypt a
  key for a symmetric algorithm.
 
 Umm... As you state, most applications asymmetric only for the key and
 symmetric for data. How come you still consider symmetric encryption
 to be faster?

I'm afraid I don't understand your question... but hopefully this
question will help you understand:

Why do you think the asymmetric algorithms are really just wrappers
around a symmetric algorithm?  (Answer: because the symmetric method is
faster!)

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: ipchains

2000-10-09 Thread Damian Menscher
On Mon, 9 Oct 2000, Richard Morin wrote:

 I've quickly read the docs, but don't have the time to delve much further.
 Can anyone assist me with setting up rules to allow my masq'd machines to
 play netracinglive.com?  They provide the ports which must be allowed, I
 don't think I'm far from understanding, perhaps if I had some examples of
 UDP+masq with ipchains..

Go to linuxdoc.org and look for a howto on ipchains.  I think they gave
an example of UDP masquerading in there.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: netscape crashes

2000-10-08 Thread Damian Menscher
On Sun, 8 Oct 2000, FIOL BONNIN Antonio wrote:

 The most fascinating thing is that now, most of the times it gets frozen,
 when I kill the window (I'm uning WindowMaker, and choose the Kill option
 on the window's menu), XF86_SVGA gets also killed.
 
 In fact, I have observed that XF86_SVGA only gets killed IF its CPU use is
 near to 100% at the moment I kill netscape. I mean, some of the netscape
 crashes make X to be CPU hungry, and if I kill netscape then, X crashes
 with it.

For the record, I've seen this with RedHat 6.x also.  It seems that if I
clue in that netscape has gone berserk soon enough and kill it, I'm
fine.  But if I wait a minute, it hogs so many resources the only option
is a reboot.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: Encrypt a file

2000-10-08 Thread Damian Menscher
On Mon, 9 Oct 2000, Brian May wrote:
  Francois == Francois Fayard [EMAIL PROTECTED] writes:
 
 Francois Hi, Does anyone knows a software that encrypts files
 Francois with a password ?
 
 You seem to be asking specifically for symmetric encryption here (you
 use the same key to encrypt and decrypt), as opposed to asymmetric
 encryption (where you use a public to encrypt and a private key to
 decrypt).
 
 While there are pros and cons in both methods, I have to wonder what
 you need to encrypt files for. For most applications, asymmetric
 encryption is better.

No, for most applications, symmetric encryption is better.  It is
stronger, faster, more standardized, better tested, etc.  The asymmetric
methods often use asymmetric encryption only to encrypt a key for a
symmetric algorithm.

That said, you might still consider using pgp, as I believe it has the
ability to do symmetric encryption.  Or, if you want *extremely* weak
security (but enough to confuse your kid sister) then check out the unix
command crypt.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: Simulating a mouse

2000-10-08 Thread Damian Menscher
On Sun, 8 Oct 2000, Colin Watson wrote:
 My mouse has recently developed an extreme reluctance to move the mouse
 pointer along the up/down axis; I'm assuming some sensor inside is dirty
 or something, but the cleaning I can do doesn't seem to make any
 difference. At some point I'll probably just get a new mouse, but in the
 meantime:

There will be three rollers inside.  Use a fingernail to scrape off any
junk.  It might look like a brown stripe of felt is supposed to be
there.  It isn't -- it's just dirt.  In extremely bad cases it sometimes
helps to clean the mouse ball as well, but that usually affects all
directions of movement.

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



Re: 2.2.4pre9 and modules

2000-10-06 Thread Damian Menscher
On Fri, 6 Oct 2000, mallum wrote:

 To get support for my new ata100 drive , last night I installed the 2.2.4pre9
 kernel ( using kernel-package ) . It all went fine (the drive worked) ... but
 then I noticed non of the modules Id selected seemed to be loading on boot.
 
 I checked /lib/modules/2.2.4pre9 and non of the modules Id selected during the
 kernel config were there. I tried again and again but alas no modules seemed
 to be getting compiled. I checked the docs for kernel-package and it said
 something about modules not being compiled when the kernel version has an
 epoch ?

Just to be sure, did you remember to do a
make modules
make modules_install
?

Once the modules are there in /lib/modules/release/ check that they are
listed in your /etc/modules file.

HTH,

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--



2.4.0-test kernels?

2000-10-03 Thread Damian Menscher
Can anyone provide some info on how to get working with a 2.4 kernel?  
I need to switch so I can get my scsi card working with raid support.  
Other than the kernel, I'd prefer to have everything as stable as
possible.

So far I've learned that I need to get an updated modutils, but that
causes all sorts of grief since the one in Woody depends on libc6,
etc.  And I've been unable (so far) to find any source .deb's.

BTW: what's up with #debian being an invite-only channel?

Damian Menscher
-- 
--==## Grad. student  Sys. Admin. @ U. Illinois at Urbana-Champaign ##==--
--==## [EMAIL PROTECTED] www.uiuc.edu/~menscher/ Ofc:(217)333-0038 ##==--
--==## Physics Dept, 1110 W Green, Urbana IL 61801 Fax:(217)333-9819 ##==--