Re: [PATCH] Add dist-f12 to the static repos.

2009-03-30 Thread Mike McGrath


On Mon, 30 Mar 2009, Ricky Zhou wrote:

> On 2009-03-30 08:44:29 PM, Jesse Keating wrote:
> > We're allowing for early branching now.
> > ---
> >  configs/build/update-static-repos.py |2 +-
> >  1 files changed, 1 insertions(+), 1 deletions(-)
> >
> > diff --git a/configs/build/update-static-repos.py 
> > b/configs/build/update-static-repos.py
> > index 16ee6ac..98d48c9 100755
> > --- a/configs/build/update-static-repos.py
> > +++ b/configs/build/update-static-repos.py
> > @@ -4,7 +4,7 @@ import os
> >  import sys
> >  import koji
> >
> > -TAGS = ('dist-olpc2-build', 'dist-olpc3-build', 'dist-olpc4-build', 
> > 'dist-f8-build', 'dist-f9-build', 'dist-f10-build', 'dist-f11-build', 
> > 'dist-rawhide', 'olpc2-update1', 'olpc2-ship2')
> > +TAGS = ('dist-olpc2-build', 'dist-olpc3-build', 'dist-olpc4-build', 
> > 'dist-f9-build', 'dist-f10-build', 'dist-f11-build', 'dist-f12-build', 
> > 'dist-rawhide', 'olpc2-update1', 'olpc2-ship2')
> >  STATICPATH = '/mnt/koji/static-repos'
> >  SUFFIX = '-current'
> >
> > --
> +1
>

+1

-Mike

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: More auth options

2009-03-30 Thread Mike McGrath
On Mon, 30 Mar 2009, Todd Zullinger wrote:

> Dennis Gilmore wrote:
> > ubikey is max USD$25 where  the etoken is probably at least USD$30.
> > I would think that with yubikey we could work out a deal with them
> > to get a discount in return for us being a case study/prominent user
> > of there product.  all of the software for yubikey AFAICT is open
> > source.  some of it would require packaging.
>
> A friend of mine bought a Yubikey recently and I helped him package up
> libyubikey-client and pam_yubico.  In case anyone wants to look into
> this and doesn't want to have to start completely from stratch, these
> spec files might help: http://tmz.fedorapeople.org/specs/
>

Interesting, if you wouldn't mind having him join the list or blog about
his experiences, I'd be interested in reading it.

-Mike

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: sysadmin group

2009-03-30 Thread Mike McGrath
On Mon, 30 Mar 2009, Rino Mardo wrote:

> ok i found a FIG and it's called sysadmin. i think this is the closest
> to my actual experience.
>
> i want to join sysadmin. should i apply now or wait for a nod?
>

Yep, that's a good one to apply for as any other sysadmin-* groups require
it.  Let me know once you've applied and I'll make sure to sponsor you...
beware though... you'll start getting nagios alerts.

-Mike

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: An Introduction

2009-03-30 Thread Mike McGrath
On Mon, 30 Mar 2009, Rino Mardo wrote:

> Hello, my name is Ferino Mardo but you can call me Rino. I am a
> network professional having been in the industry for more than 18
> years. I used to be a coder (from assembler to C) but now working as a
> network manager. I don't consider myself a newbie though I also don't
> call myself a h4ck3r :-) but I do know my way around computers and the
> Internet.
>
> I have time available and want to contribute it to this dynamic team.
> i used to do shell scripts but that part is now rusted because my
> company now is using closed source softwares. As the nature of things
> outside of the US, we techies don't have any specialization to speak
> of. If you know a little sql command, bang!, you're the dba. but i do
> know my dns (also rusty), firewalls (closed source too), WAN
> management, UTP network cabling (handmade), install and maintain
> server OS, do patches, and other things as needed to do the job.
>
> Lookin at the FIG, I'm not sure which to join I hope someone can
> suggest a starting point?
>
> Am looking forward to contribute and hope to "see" you soon!
>
>
> Regards,
>
> Rino Mardo
>

Welcome Rino, a good place to start is to stop by #fedora-admin on
irc.freenode.net and say hey.  If you cannot thats totally ok too and you
can participate on the list.

-Mike

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: [PATCH] Add dist-f12 to the static repos.

2009-03-30 Thread Ricky Zhou
On 2009-03-30 08:44:29 PM, Jesse Keating wrote:
> We're allowing for early branching now.
> ---
>  configs/build/update-static-repos.py |2 +-
>  1 files changed, 1 insertions(+), 1 deletions(-)
> 
> diff --git a/configs/build/update-static-repos.py 
> b/configs/build/update-static-repos.py
> index 16ee6ac..98d48c9 100755
> --- a/configs/build/update-static-repos.py
> +++ b/configs/build/update-static-repos.py
> @@ -4,7 +4,7 @@ import os
>  import sys
>  import koji
>  
> -TAGS = ('dist-olpc2-build', 'dist-olpc3-build', 'dist-olpc4-build', 
> 'dist-f8-build', 'dist-f9-build', 'dist-f10-build', 'dist-f11-build', 
> 'dist-rawhide', 'olpc2-update1', 'olpc2-ship2')
> +TAGS = ('dist-olpc2-build', 'dist-olpc3-build', 'dist-olpc4-build', 
> 'dist-f9-build', 'dist-f10-build', 'dist-f11-build', 'dist-f12-build', 
> 'dist-rawhide', 'olpc2-update1', 'olpc2-ship2')
>  STATICPATH = '/mnt/koji/static-repos'
>  SUFFIX = '-current'
>  
> -- 
+1

Thanks,
Ricky


pgpujOls9fbFA.pgp
Description: PGP signature
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


[PATCH] Add dist-f12 to the static repos.

2009-03-30 Thread Jesse Keating
We're allowing for early branching now.
---
 configs/build/update-static-repos.py |2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)

diff --git a/configs/build/update-static-repos.py 
b/configs/build/update-static-repos.py
index 16ee6ac..98d48c9 100755
--- a/configs/build/update-static-repos.py
+++ b/configs/build/update-static-repos.py
@@ -4,7 +4,7 @@ import os
 import sys
 import koji
 
-TAGS = ('dist-olpc2-build', 'dist-olpc3-build', 'dist-olpc4-build', 
'dist-f8-build', 'dist-f9-build', 'dist-f10-build', 'dist-f11-build', 
'dist-rawhide', 'olpc2-update1', 'olpc2-ship2')
+TAGS = ('dist-olpc2-build', 'dist-olpc3-build', 'dist-olpc4-build', 
'dist-f9-build', 'dist-f10-build', 'dist-f11-build', 'dist-f12-build', 
'dist-rawhide', 'olpc2-update1', 'olpc2-ship2')
 STATICPATH = '/mnt/koji/static-repos'
 SUFFIX = '-current'
 
-- 
1.5.5.6

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: More auth options

2009-03-30 Thread Todd Zullinger
Dennis Gilmore wrote:
> ubikey is max USD$25 where  the etoken is probably at least USD$30.
> I would think that with yubikey we could work out a deal with them
> to get a discount in return for us being a case study/prominent user
> of there product.  all of the software for yubikey AFAICT is open
> source.  some of it would require packaging.

A friend of mine bought a Yubikey recently and I helped him package up
libyubikey-client and pam_yubico.  In case anyone wants to look into
this and doesn't want to have to start completely from stratch, these
spec files might help: http://tmz.fedorapeople.org/specs/

-- 
ToddOpenPGP -> KeyID: 0xBEAF0CE3 | URL: www.pobox.com/~tmz/pgp
~~
I am free of all prejudice. I hate everyone equally.
-- W. C. Fields



pgp71ho5VF9eo.pgp
Description: PGP signature
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


sysadmin group

2009-03-30 Thread Rino Mardo
ok i found a FIG and it's called sysadmin. i think this is the closest
to my actual experience.

i want to join sysadmin. should i apply now or wait for a nod?

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


An Introduction

2009-03-30 Thread Rino Mardo
Hello, my name is Ferino Mardo but you can call me Rino. I am a
network professional having been in the industry for more than 18
years. I used to be a coder (from assembler to C) but now working as a
network manager. I don't consider myself a newbie though I also don't
call myself a h4ck3r :-) but I do know my way around computers and the
Internet.

I have time available and want to contribute it to this dynamic team.
i used to do shell scripts but that part is now rusted because my
company now is using closed source softwares. As the nature of things
outside of the US, we techies don't have any specialization to speak
of. If you know a little sql command, bang!, you're the dba. but i do
know my dns (also rusty), firewalls (closed source too), WAN
management, UTP network cabling (handmade), install and maintain
server OS, do patches, and other things as needed to do the job.

Lookin at the FIG, I'm not sure which to join I hope someone can
suggest a starting point?

Am looking forward to contribute and hope to "see" you soon!


Regards,

Rino Mardo

Key fingerprint = 71E1 31C1 7CE8 9E5A 295E  36B9 8BE8 C3B5 414B FCBD

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: More auth options

2009-03-30 Thread Stephen John Smoogen
On Mon, Mar 30, 2009 at 11:57 AM, Dennis Gilmore  wrote:
> So doing a liitle looking around I cane across some options that look
> interesting,  the following options would mean you need to physically have
> something to login.
>
> yubikey
> http://www.yubico.com/products/yubikey/
> It would require a pam module and for us to setup a server for managing keys.
> it looks to be fairly low cost.   it would implement a 2 facter
> authentication.
>
> etoken
> http://www.aladdin.com/etoken/devices/pro-usb.aspx
>

These do look interesting and maybe better than the S/Key 64 bit key.
I remember some bad stories about one of the 'Aladdin' companies
(there are quite a few who use that name for security products).. but
not sure which.

The bigger question is who can we get some 'professional' opinions
from? My crypto math is not good so I could not give an opinion of
whether one usage of AES-128 versus another usage was equivalent,
better, or worse. I would hate for us to end up with any solution that
would end up on Shneier's Snake Oil pages. [I remember one token
device that some people I know evaluated a while back that while it
stored the key encrypted in AES-128 etc.. it had a register where it
stored the unencrypted user token and could be looked at under any OS
other than Windows.]



-- 
Stephen J Smoogen. -- BSD/GNU/Linux
How far that little candle throws his beams! So shines a good deed
in a naughty world. = Shakespeare. "The Merchant of Venice"

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: More auth options

2009-03-30 Thread Matthew Galgoci
> Date: Mon, 30 Mar 2009 12:57:23 -0500
> From: Dennis Gilmore 
> Reply-To: Fedora Infrastructure 
> To: Fedora Infrastructure 
> Subject: More auth options
>
> So doing a liitle looking around I cane across some options that look
> interesting,  the following options would mean you need to physically have
> something to login.
>
> yubikey
> http://www.yubico.com/products/yubikey/
> It would require a pam module and for us to setup a server for managing keys.
> it looks to be fairly low cost.   it would implement a 2 facter
> authentication.
>
> etoken
> http://www.aladdin.com/etoken/devices/pro-usb.aspx
>
> it moves the public key from your hard drive to something you physically need
> to have
>
>
> ubikey is max USD$25 where  the etoken is probably at least USD$30.  I would
> think that with yubikey we could work out a deal with them to get a discount
> in return for us being a case study/prominent user of there product.  all of
> the software for yubikey AFAICT is open source.  some of it would require
> packaging.

Dennis,

I know RSA is a bit expensive, but it might be worth thinking about RSA
tokens as well. They have a OTP that changes every 60 seconds plus you
have to add a PIN as well.

Matt

-- 
Matthew Galgoci
Network Operations
Red Hat, Inc
919.754.3700 x44155

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: More auth options

2009-03-30 Thread David Nalley
On Mon, Mar 30, 2009 at 2:12 PM, Matthew Galgoci  wrote:
>> Date: Mon, 30 Mar 2009 12:57:23 -0500
>> From: Dennis Gilmore 
>> Reply-To: Fedora Infrastructure 
>> To: Fedora Infrastructure 
>> Subject: More auth options
>>
>> So doing a liitle looking around I cane across some options that look
>> interesting,  the following options would mean you need to physically have
>> something to login.
>>
>> yubikey
>> http://www.yubico.com/products/yubikey/
>> It would require a pam module and for us to setup a server for managing keys.
>> it looks to be fairly low cost.   it would implement a 2 facter
>> authentication.
>>
>> etoken
>> http://www.aladdin.com/etoken/devices/pro-usb.aspx
>>
>> it moves the public key from your hard drive to something you physically need
>> to have
>>
>>
>> ubikey is max USD$25 where  the etoken is probably at least USD$30.  I would
>> think that with yubikey we could work out a deal with them to get a discount
>> in return for us being a case study/prominent user of there product.  all of
>> the software for yubikey AFAICT is open source.  some of it would require
>> packaging.
>
> Just FYI, Aladdin refused, REFUSED to sell me 4 keys when I attempted
> to purchase them through CDW because I did have or want to have an
> Aladdin PKI Console software license. Nevermind that I didn't actually
> need their Console software or that Red Hat has a PKI management
> product.
>
> In my opinion, avoid Aladdin even if you can manage to get keys through
> a tertiary party.


+1 - Aladdin makes a lot of DRM (for software, not media (that I know
of)) stuff too; all the more reason to avoid them.

If Ubikey is supplying an open source stack to go with their hardware
that sounds a more logical fit for the Fedora Project, and a more
symbiotic relationship.

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: More auth options

2009-03-30 Thread Matthew Galgoci
> Date: Mon, 30 Mar 2009 12:57:23 -0500
> From: Dennis Gilmore 
> Reply-To: Fedora Infrastructure 
> To: Fedora Infrastructure 
> Subject: More auth options
>
> So doing a liitle looking around I cane across some options that look
> interesting,  the following options would mean you need to physically have
> something to login.
>
> yubikey
> http://www.yubico.com/products/yubikey/
> It would require a pam module and for us to setup a server for managing keys.
> it looks to be fairly low cost.   it would implement a 2 facter
> authentication.
>
> etoken
> http://www.aladdin.com/etoken/devices/pro-usb.aspx
>
> it moves the public key from your hard drive to something you physically need
> to have
>
>
> ubikey is max USD$25 where  the etoken is probably at least USD$30.  I would
> think that with yubikey we could work out a deal with them to get a discount
> in return for us being a case study/prominent user of there product.  all of
> the software for yubikey AFAICT is open source.  some of it would require
> packaging.

Just FYI, Aladdin refused, REFUSED to sell me 4 keys when I attempted
to purchase them through CDW because I did have or want to have an
Aladdin PKI Console software license. Nevermind that I didn't actually
need their Console software or that Red Hat has a PKI management
product.

In my opinion, avoid Aladdin even if you can manage to get keys through
a tertiary party.

-- 
Matthew Galgoci
Network Operations
Red Hat, Inc
919.754.3700 x44155

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


More auth options

2009-03-30 Thread Dennis Gilmore
So doing a liitle looking around I cane across some options that look 
interesting,  the following options would mean you need to physically have 
something to login. 

yubikey
http://www.yubico.com/products/yubikey/
It would require a pam module and for us to setup a server for managing keys.  
it looks to be fairly low cost.   it would implement a 2 facter 
authentication.

etoken 
http://www.aladdin.com/etoken/devices/pro-usb.aspx

it moves the public key from your hard drive to something you physically need 
to have


ubikey is max USD$25 where  the etoken is probably at least USD$30.  I would 
think that with yubikey we could work out a deal with them to get a discount 
in return for us being a case study/prominent user of there product.  all of 
the software for yubikey AFAICT is open source.  some of it would require 
packaging.


Dennis

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Update

2009-03-30 Thread Mike McGrath
On Mon, 30 Mar 2009, susmit shannigrahi wrote:

> >> Supposedly, they will not have access to the mobile device/pager where
> >> this single time password will be sent.
> >>
> >
> > Interestingly I saw someone doing something very similar to this at pycon
> > using asterisk.
>
>
> You mean, pretend to be another number using asterix
> and grab this single time passwd?
>
>

I mean calling people when they try to log in.

-Mike

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Update

2009-03-30 Thread Jim Meyering
Damian Myerscough wrote:
> I have just done some research on SSH and S/Key and I read that S/Key
> cannot withstand a brute forced attack [1]
>
> [1] http://www.gentoo-wiki.info/OpenSSH_skey

OTPW looks better:

  http://en.wikipedia.org/wiki/OTPW

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Update

2009-03-30 Thread Stephen John Smoogen
On Mon, Mar 30, 2009 at 9:46 AM, Mike McGrath  wrote:
> On Mon, 30 Mar 2009, Damian Myerscough wrote:
>
>> Hello,
>>
>> What about the use of S/Key (one-time passwords) I think it is possible to
>> deploy SSH with S/Key authentication. I haven't look into it that much but it
>> could be a possible solution?
>>
>
> If someone had my username, password, and ssh key.  How would that prevent
> them from getting a otp?
>
>        -Mike
>

Well normally they would have only your 1st password... and you would
need a new OTP to become root etc. The big problem with S/KEY is the
short search space (8 ASCII  characters basically which can still take
Petabytes for a dictionary attack).

A place I used to work at had a similar problem a couple of years ago.
Lessons learned was that OTP passwords were one of the most effective
limiters. The second limiter was time limits on kerberos keys which
limited how long having an OTP was useful to the attacker.  Where
people had gotten around this, we ran into issues:

1) Kerberos tickets with long lifes.
2) Forwarding tickets with high trust between all systems.
3) Proxiable tickets working between clusters
4) sudo without password

Where people run into problems are:

1) Writing down the OTP passwords in their computer
2) Running the OTP calculator on their computer versus seperate device.
3) OTP passwords with 2 short of a length (8 minimum)

Also in the end some processes MUST have human interaction. Depending
on the level of trust you wish to impart on something, packages may
only be signed on certain machines, from certain terminals, booted
from cold boot via secure media, etc etc.


-- 
Stephen J Smoogen. -- BSD/GNU/Linux
How far that little candle throws his beams! So shines a good deed
in a naughty world. = Shakespeare. "The Merchant of Venice"

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Update

2009-03-30 Thread susmit shannigrahi
>> Supposedly, they will not have access to the mobile device/pager where
>> this single time password will be sent.
>>
>
> Interestingly I saw someone doing something very similar to this at pycon
> using asterisk.


You mean, pretend to be another number using asterix
and grab this single time passwd?


-- 
Regards,
Susmit.

=
ssh
0x86DD170A
http://www.fedoraproject.org/wiki/user:susmit
=
Sent from: Calcutta WB India.

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Update

2009-03-30 Thread susmit shannigrahi
On Mon, Mar 30, 2009 at 9:22 PM, Damian Myerscough
 wrote:
> I have just done some research on SSH and S/Key and I read that S/Key cannot
> withstand a brute forced attack [1]
>
> [1] http://www.gentoo-wiki.info/OpenSSH_skey


True, but We can lock out an account after 10 (or 100) invalid attempts.

Brute-force will require more than that number of attempts.

A six latter password will require few hundred (~380) million generations.

-- 
Regards,
Susmit.

=
ssh
0x86DD170A
http://www.fedoraproject.org/wiki/user:susmit
=
Sent from: Calcutta WB India.

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Update

2009-03-30 Thread Mike McGrath
On Mon, 30 Mar 2009, susmit shannigrahi wrote:

> > If someone had my username, password, and ssh key.  How would that prevent
> > them from getting a otp?
>
>
> Supposedly, they will not have access to the mobile device/pager where
> this single time password will be sent.
>

Interestingly I saw someone doing something very similar to this at pycon
using asterisk.

-Mike___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Update

2009-03-30 Thread Jim Meyering
Mike McGrath wrote:
> On Mon, 30 Mar 2009, Damian Myerscough wrote:
>> What about the use of S/Key (one-time passwords) I think it is possible to
>> deploy SSH with S/Key authentication. I haven't look into it that much but it
>> could be a possible solution?
>
> If someone had my username, password, and ssh key.  How would that prevent
> them from getting a otp?

To do that, they'd need to know your otp passphrase.

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Update

2009-03-30 Thread Matthew Galgoci
> Date: Mon, 30 Mar 2009 16:52:24 +0100
> From: Damian Myerscough 
> To: Mike McGrath 
> Cc: Fedora Infrastructure 
> Subject: Re: Intrusion Update
>
> I have just done some research on SSH and S/Key and I read that S/Key cannot
> withstand a brute forced attack [1]
>
> [1] http://www.gentoo-wiki.info/OpenSSH_skey

In addition, skey-like authentication schemes only work if the end users
of aren't automating their login process and keep the skey-like program
on a separate system like a pda.

Believe me, if you implement an skey-alike you will have users dumb enough
to automate their login processes and run the skey-like calculator on the
same machine they are logging in from.

-- 
Matthew Galgoci
Network Operations
Red Hat, Inc
919.754.3700 x44155

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Update

2009-03-30 Thread susmit shannigrahi
> If someone had my username, password, and ssh key.  How would that prevent
> them from getting a otp?


Supposedly, they will not have access to the mobile device/pager where
this single time password will be sent.


-- 
Regards,
Susmit.

=
ssh
0x86DD170A
http://www.fedoraproject.org/wiki/user:susmit
=
Sent from: Calcutta WB India.

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Update

2009-03-30 Thread Damian Myerscough
I have just done some research on SSH and S/Key and I read that S/Key 
cannot withstand a brute forced attack [1]


[1] http://www.gentoo-wiki.info/OpenSSH_skey

Mike McGrath wrote:

On Mon, 30 Mar 2009, Damian Myerscough wrote:


Hello,

What about the use of S/Key (one-time passwords) I think it is possible to
deploy SSH with S/Key authentication. I haven't look into it that much but it
could be a possible solution?



If someone had my username, password, and ssh key.  How would that prevent
them from getting a otp?

-Mike


susmit shannigrahi wrote:

So I'm not quite sure how to 'fix' this problem.  By that I mean, even if
we knew this attack was going to happen I'm not totally sure of a feasible
solution, using only free software, that we could have used to fix it.
Obviously a physical rsa key or the like would have worked but I don't
think we have the manpower nor budget to implement such a system.  So I
ask the list, any ideas?

A single use random code/passwd mailed/texted each time one tries to
login and invalidated just after use??

Basically I am referring to RFC 2289[1]

[1]http://www.ietf.org/rfc/rfc2289.txt

Thanks.


--
Regards,
Damian Myerscough

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list





--
Regards,
Damian Myerscough

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Update

2009-03-30 Thread Mike McGrath
On Mon, 30 Mar 2009, Damian Myerscough wrote:

> Hello,
>
> What about the use of S/Key (one-time passwords) I think it is possible to
> deploy SSH with S/Key authentication. I haven't look into it that much but it
> could be a possible solution?
>

If someone had my username, password, and ssh key.  How would that prevent
them from getting a otp?

-Mike

> susmit shannigrahi wrote:
> > > So I'm not quite sure how to 'fix' this problem.  By that I mean, even if
> > > we knew this attack was going to happen I'm not totally sure of a feasible
> > > solution, using only free software, that we could have used to fix it.
> > > Obviously a physical rsa key or the like would have worked but I don't
> > > think we have the manpower nor budget to implement such a system.  So I
> > > ask the list, any ideas?
> >
> > A single use random code/passwd mailed/texted each time one tries to
> > login and invalidated just after use??
> >
> > Basically I am referring to RFC 2289[1]
> >
> > [1]http://www.ietf.org/rfc/rfc2289.txt
> >
> > Thanks.
> >
>
> --
> Regards,
> Damian Myerscough
>
> ___
> Fedora-infrastructure-list mailing list
> Fedora-infrastructure-list@redhat.com
> https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list
>

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: [Change Request] Transifex 0.5.1-2

2009-03-30 Thread Toshio Kuratomi
Xavier Lamien wrote:
> 2009/3/30 Mike McGrath :
>> On Mon, 30 Mar 2009, Diego Búrigo Zacarão wrote:
>>
>>> I'm sorry guys, but we had a minor problem with the tar.gz on the previous 
>>> RPM.
>>> Can I have +1's for a new update on app1 to the 0.5.1-2 building?
>>>
>>> http://buildsys.fedoraproject.org/plague-results/fedora-5-epel/transifex/0.5.1-2.el5/noarch/
>>>
>> +1
> 
> +1
> 
+1

-Toshio



signature.asc
Description: OpenPGP digital signature
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Update

2009-03-30 Thread Damian Myerscough

Opps Sorry I didn't check the link Susmit posted.

susmit shannigrahi wrote:

So I'm not quite sure how to 'fix' this problem.  By that I mean, even if
we knew this attack was going to happen I'm not totally sure of a feasible
solution, using only free software, that we could have used to fix it.
Obviously a physical rsa key or the like would have worked but I don't
think we have the manpower nor budget to implement such a system.  So I
ask the list, any ideas?


A single use random code/passwd mailed/texted each time one tries to
login and invalidated just after use??

Basically I am referring to RFC 2289[1]

[1]http://www.ietf.org/rfc/rfc2289.txt

Thanks.



--
Regards,
Damian Myerscough

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Update

2009-03-30 Thread Damian Myerscough

Hello,

What about the use of S/Key (one-time passwords) I think it is possible 
to deploy SSH with S/Key authentication. I haven't look into it that 
much but it could be a possible solution?


susmit shannigrahi wrote:

So I'm not quite sure how to 'fix' this problem.  By that I mean, even if
we knew this attack was going to happen I'm not totally sure of a feasible
solution, using only free software, that we could have used to fix it.
Obviously a physical rsa key or the like would have worked but I don't
think we have the manpower nor budget to implement such a system.  So I
ask the list, any ideas?


A single use random code/passwd mailed/texted each time one tries to
login and invalidated just after use??

Basically I am referring to RFC 2289[1]

[1]http://www.ietf.org/rfc/rfc2289.txt

Thanks.



--
Regards,
Damian Myerscough

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Update

2009-03-30 Thread susmit shannigrahi
> So I'm not quite sure how to 'fix' this problem.  By that I mean, even if
> we knew this attack was going to happen I'm not totally sure of a feasible
> solution, using only free software, that we could have used to fix it.
> Obviously a physical rsa key or the like would have worked but I don't
> think we have the manpower nor budget to implement such a system.  So I
> ask the list, any ideas?

A single use random code/passwd mailed/texted each time one tries to
login and invalidated just after use??

Basically I am referring to RFC 2289[1]

[1]http://www.ietf.org/rfc/rfc2289.txt

Thanks.

-- 
Regards,
Susmit.

=
ssh
0x86DD170A
http://www.fedoraproject.org/wiki/user:susmit
=
Sent from: Calcutta WB India.

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: Intrusion Update

2009-03-30 Thread Mike McGrath


On Mon, 30 Mar 2009, Mike McGrath wrote:

> For those not on the announce list:
>
> https://www.redhat.com/archives/fedora-announce-list/2009-March/msg00010.html
>

Oh!  I forgot something too, I've been waiting for this to go out so we
could discuss authentication mechanisms.  Passwords + ssh keys just aren't
the most secure method of authentication.  Our policy on private keys is
pretty clear now but there's always room for improvement.

So I'm not quite sure how to 'fix' this problem.  By that I mean, even if
we knew this attack was going to happen I'm not totally sure of a feasible
solution, using only free software, that we could have used to fix it.
Obviously a physical rsa key or the like would have worked but I don't
think we have the manpower nor budget to implement such a system.  So I
ask the list, any ideas?

-Mike

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Intrusion Update

2009-03-30 Thread Mike McGrath
For those not on the announce list:

https://www.redhat.com/archives/fedora-announce-list/2009-March/msg00010.html

-Mike

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: [Change Request] Transifex 0.5.1-2

2009-03-30 Thread Xavier Lamien
2009/3/30 Mike McGrath :
> On Mon, 30 Mar 2009, Diego Búrigo Zacarão wrote:
>
>> I'm sorry guys, but we had a minor problem with the tar.gz on the previous 
>> RPM.
>> Can I have +1's for a new update on app1 to the 0.5.1-2 building?
>>
>> http://buildsys.fedoraproject.org/plague-results/fedora-5-epel/transifex/0.5.1-2.el5/noarch/
>>
>
> +1

+1



-- 
Xavier.t Lamien
--
http://fedoraproject.org/wiki/XavierLamien
GPG-Key ID: F3903DEB
Fingerprint: 0F2A 7A17 0F1B 82EE FCBF 1F51 76B7 A28D F390 3DEB

___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


Re: [Change Request] Transifex 0.5.1-2

2009-03-30 Thread Mike McGrath
On Mon, 30 Mar 2009, Diego Búrigo Zacarão wrote:

> I'm sorry guys, but we had a minor problem with the tar.gz on the previous 
> RPM.
> Can I have +1's for a new update on app1 to the 0.5.1-2 building?
>
> http://buildsys.fedoraproject.org/plague-results/fedora-5-epel/transifex/0.5.1-2.el5/noarch/
>

+1

-Mike___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list


[Change Request] Transifex 0.5.1-2

2009-03-30 Thread Diego Búrigo Zacarão
I'm sorry guys, but we had a minor problem with the tar.gz on the previous
RPM.
Can I have +1's for a new update on app1 to the 0.5.1-2 building?

http://buildsys.fedoraproject.org/plague-results/fedora-5-epel/transifex/0.5.1-2.el5/noarch/

Thanks

-- 
Diego Búrigo Zacarão
http://diegobz.net
Linux User #402589
USE SOFTWARE LIVRE
___
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list