Re: [ilugd] about device drivers

2004-01-05 Thread vivek khurana
Hi!
--- [EMAIL PROTECTED] wrote:
 hi,
 I want to know that how the device drivers built in
 linux.plz help me and
 suggest me some good books.
 thanks..
 The one an only LDD(linux device drivers) by orielly.
Search the net there is also an online version of this
book


bye
vivek

=
When DESTINY has closed all the DOORS;
Jump out of the WINDOW

__
Do you Yahoo!?
Find out what made the Top Yahoo! Searches of 2003
http://search.yahoo.com/top2003

___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


Re: [ilugd] How to run a webserver

2004-01-05 Thread Sudev Barar
On Mon, 2004-01-05 at 08:28, Robins Tharakan wrote:
 hi,
 
 install apache (http://httpd.apache.org)
 place the files in the appropriate directories...
Sorry some how the [SNIP] snipped more than I intended.
If Abishek has installed RH9 complete then all he has to do is:
chkconfig --level 35 htppd on
Or achieve the same by marking setup  serviceshttpd

-- 
Sudev Barar

Learning Linux


___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


Re: [ilugd] Is it possible to create users in bulk

2004-01-05 Thread Alok Sinha
Try the following

for i in `cat /file with user list`
do
  useradd $i
done
To change their password in bulk
chpasswd filename
Where filename is a file with user:password format
You may want to use chpasswd -e filename, if the file has 
user:encrypted passwd format.

regards,
alok sinha
s nagar wrote:

hi everyone

i need to ask you one thing 
that whether it is  possible to create users in bulk rather than creating single user
in case there are many users to be created and simultaneously giving them same password as their username.
in case you have some solution then please do reply.

Thanking you all
Sandeep


-
Do you Yahoo!?
Free Pop-Up Blocker - Get it now
___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
 



___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


Re: [ilugd] about device drivers

2004-01-05 Thread anindya chakraborty
book by Rubini on linux device driver is there
its a good book..
also available on net

On Mon, 05 Jan 2004 [EMAIL PROTECTED] wrote :
hi,
I want to know that how the device drivers built in linux.plz help me and
suggest me some good books.
thanks..


--
sachin jain

___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd

___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


Re: [ilugd] How to run a webserver

2004-01-05 Thread Ankit khare
Hi Friends Its me again mine previous problem has been solved but I have 
a new one.

I have a small website. Someone told me that you can check your CGI/PERL programmes on 
your computer before you publish via running a webserver. The address for accesing 
your website on your computer will be 127.0.0.1 .I know how to do that on Windows but 
can't do on Linux.
I have Linux 9.0 running on mine PC.
If any of you could help me I shall be very very grateful.
Thanks
Abhishek jain
 

Well Apache seems the best choice .. , if your are looking for *much* 
simpler and smaller options ...try  Abyss Web Server

 http://www.aprelium.com/abyssws/not GPL ...but  *free*.

Its available for Windows and Mac  also .

some  IDE's also have a built in server that can be used to test cgi's ...

regards
Ankit .
___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


RE: [ilugd] delay in bootup process - RH 8.0

2004-01-05 Thread Gurpreet Singh Sachdeva
Must be due to Time Skew Error...

Try 
#touch /etc/mail
#touch /etc/mail/*

And restart the Sendmail service...

HTH...

Regards,

 Gurpreet Singh Sachdeva



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]
On Behalf Of MALKIAT BENIPAL
Sent: Tuesday, December 30, 2003 1:17 AM
To: [EMAIL PROTECTED]
Subject: [ilugd] delay in bootup process - RH 8.0

Hello guys,
 
I have installed RH 8.0 on a HCL PC.  While booting and coming at the
stage of Starting mail it takes approx. 3-4 minutes and then
proceeds ahead. Pl. guide where is the problem. I shall be thankful to
you.
 
Best Regards,
 


MALKIAT
 
[EMAIL PROTECTED] 



-
Do you Yahoo!?
Protect your identity with Yahoo! Mail AddressGuard
___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd

___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


[ilugd] ILUG-D: about the website

2004-01-05 Thread rakesh_linux
Message from rakesh kumar:

first thing i am not going to comment of suggest any thing about the website. i just 
want your help 
i have just developed a small site and now i want to publish it . i have the 
infrastructure i,e

1) i have a real ip and computer running apaache web server ( i think no need to 
mention it is running on linux 8.0) but as new to linux i am not getting proper 
support , can u guide me

with best regards
 rakesh kumar

--
This email is brought to you by http://www.linux-delhi.org/
 

___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


[ilugd] (fwd) Linux kernel mremap vulnerability

2004-01-05 Thread Raj Mathur
[Your distribution vendor will be bringing out a new kernel soon.
Please upgrade if you use kernel 2.2, 2.4 or 2.6 -- Raju]

This is an RFC 1153 digest.
(1 message)
--

MIME-Version: 1.0
Message-ID: [EMAIL PROTECTED]
From: Paul Starzetz [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
To: [EMAIL PROTECTED], [EMAIL PROTECTED],
   [EMAIL PROTECTED]
Subject: [Full-Disclosure] Linux kernel mremap vulnerability
Date: Mon, 5 Jan 2004 13:30:32 +0100 (CET)

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Synopsis:  Linux kernel do_mremap local privilege escalation vulnerability
Product:   Linux kernel
Version:   2.2, 2.4 and 2.6 series
Vendor:http://www.kernel.org/
URL:   http://isec.pl/vulnerabilities/isec-0012-mremap.txt
CVE:   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0985
Author:Paul Starzetz [EMAIL PROTECTED], Wojciech Purczynski
   [EMAIL PROTECTED]
Date:  January 5, 2004


Issue:
==

A critical security vulnerability has been found  in  the  Linux  kernel
memory  management  code in mremap(2) system call due to incorrect bound
checks.


Details:


The mremap system call provides functionality of resizing (shrinking  or
growing)  as well as moving across process's addressable space of exist­
ing virtual memory areas (VMAs) or any of its parts.

A typical VMA covers at least one memory page (which is exactly  4kB  on
the  i386  architecture). An incorrect bound check discovered inside the
do_mremap() kernel code performing remapping of a  virtual  memory  area
may lead to creation of a virtual memory area of 0 bytes length.

The  problem  bases on the general mremap flaw that remapping of 2 pages
from inside a VMA creates a memory hole of only one page in  length  but
an  additional  VMA  of two pages. In the case of a zero sized remapping
request no VMA hole is created but an additional  VMA  descriptor  of  0
bytes in length is created.

Such  a malicious virtual memory area may disrupt the operation of other
parts of the kernel memory management subroutines finally leading to un­
expected behavior.

A  typical  process's  memory  layout  showing  invalid VMA created with
mremap system call:

08048000-0804c000 r-xp  03:05 959142 /tmp/test
0804c000-0804d000 rw-p 3000 03:05 959142 /tmp/test
0804d000-0804e000 rwxp  00:00 0
4000-40014000 r-xp  03:05 1544523/lib/ld-2.3.2.so
40014000-40015000 rw-p 00013000 03:05 1544523/lib/ld-2.3.2.so
40015000-40016000 rw-p  00:00 0
4002c000-40158000 r-xp  03:05 1544529/lib/libc.so.6
40158000-4015d000 rw-p 0012b000 03:05 1544529/lib/libc.so.6
4015d000-4015f000 rw-p  00:00 0
[*] 6000-6000 rwxp  00:00 0
bfffe000-c000 rwxp f000 00:00 0

The broken VMA in the above example has been marked with a [*].


Impact:
===

Since  no  special  privileges  are required to use the mremap(2) system
call any process may misuse its unexpected behavior to disrupt the  ker­
nel memory management subsystem. Proper exploitation of this vulnerabil­
ity may lead to local privilege escalation including execution of  arbi­
trary  code  with kernel level access. Proof-of-concept exploit code has
been created and successfully tested giving UID 0  shell  on  vulnerable
systems.

The exploitability of the discovered vulnerability is possible, although
not a trivial one. We have identified at least two different attack vec­
tors  for  the  2.4 kernel series. All users are encouraged to patch all
vulnerable systems as soon as appropriate vendor patches are released.


Credits:


Paul Starzetz [EMAIL PROTECTED] has  identified  the  vulnerability  and
performed  further  research. COPYING, DISTRIBUTION, AND MODIFICATION OF
INFORMATION PRESENTED HERE IS ALLOWED ONLY WITH  EXPRESS  PERMISSION  OF
ONE OF THE AUTHORS.


Disclaimer:
===

This  document and all the information it contains are provided as is,
for educational purposes only, without warranty of any kind, whether ex­
press or implied.

The  authors reserve the right not to be responsible for the topicality,
correctness, completeness or quality of  the  information   provided  in
this  document.  Liability  claims regarding damage caused by the use of
any information provided, including any kind of information which is in­
complete or incorrect, will therefore be rejected.

- -- 
Paul Starzetz
iSEC Security Research
http://isec.pl/

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE/+Vj2C+8U3Z5wpu4RApegAKCOkWCWg8Jy/y9S1WtEWxerkkQNbQCgk/X9
8aGjOA7fTT8EynIFw/sgoHU=
=Aw61
-END PGP SIGNATURE-


___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

--

End of this Digest
**

-- 
Raj Mathur[EMAIL PROTECTED] 

[ilugd] Re: [LIH](fwd) Linux kernel mremap vulnerability

2004-01-05 Thread Raj Mathur
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 Rishabh == Rishabh Manocha [EMAIL PROTECTED] writes:

Rishabh hello everyone, I am Rishabh...I am a 19 year old student
Rishabh at the University of Texas at Austin.I am presently in
Rishabh The hague in Holland where my parents live.  I have been
Rishabh using linux for the past year.  now as you might assume i
Rishabh do not have much of an idea of the kernel level
Rishabh activities of a LINUX system.  i have no idea what was
Rishabh written in this message.anyone have the time to decode it
Rishabh for me.also could you please tell me if there are patches
Rishabh already avaliable for the vulnerability.I am running
Rishabh kernel 2.4.23 on a debian system.  thanks a lot.  Rishabh
Rishabh Manocha

Well, actually that's why the short summary from me at the top of the
message.  If you don't understand the kernel (I don't!), just upgrade
it as soon as your distribution vendor brings out a new kernel package
- -- it's as easy as apt-get update ; apt-get upgrade (on Debian --
other distributions will have other ways of upgrading).

In any case, upgrade your system(s) on a regular basis.  It's best to
keep on top of security vulnerabilities that may cause you to lose
control over your own system, and, what is worse, become a menace to
others on the Internet.

Regards,

- -- Raju

Rishabh On Mon, 5 Jan 2004, Raj Mathur wrote:

 [Your distribution vendor will be bringing out a new kernel
 soon.  Please upgrade if you use kernel 2.2, 2.4 or 2.6 --
 Raju]
 [snip]
 
 Synopsis: Linux kernel do_mremap local privilege escalation
 vulnerability Product: Linux kernel Version: 2.2, 2.4 and 2.6
 series Vendor: http://www.kernel.org/ URL:
 http://isec.pl/vulnerabilities/isec-0012-mremap.txt CVE:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0985
 Author: Paul Starzetz [EMAIL PROTECTED], Wojciech Purczynski
 [EMAIL PROTECTED] Date: January 5, 2004
 [more snip]

- -- 
Raj Mathur[EMAIL PROTECTED]  http://kandalaya.org/
   GPG: 78D4 FC67 367F 40E2 0DD5  0FEF C968 D0EF CC68 D17F
  It is the mind that moves
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.7 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard http://www.gnupg.org/

iD8DBQE/+hbyyWjQ78xo0X8RAtvNAKCHFLO2tQQawM2U7cgKzCtH1i6HVACfSTPT
BmbdgErSS3G/kv4+ZOnIKTk=
=CcMk
-END PGP SIGNATURE-

___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


Re: [ilugd] How to run a webserver

2004-01-05 Thread Sudev Barar
On Mon, 2004-01-05 at 08:28, Robins Tharakan wrote:
 hi,
 
 install apache (http://httpd.apache.org)
 place the files in the appropriate directories...
If Abhishek has done a full RH9 install then apache is already there.
All he has to do is give command setup and from the menu there go to
service and tick httpd
This should start the apache server. Another way to achieve the same is
to give command chkconfig --level 35 httpd on
HTH
-- 
Sudev Barar [EMAIL PROTECTED]


___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


RE: [ilugd] delay in bootup process - RH 8.0

2004-01-05 Thread Sudev Barar
On Mon, 2004-01-05 at 20:59, Gurpreet Singh Sachdeva wrote:
 Must be due to Time Skew Error...
 
 Try 
 #touch /etc/mail
 #touch /etc/mail/*
 
 And restart the Sendmail service...
 
 HTH...
 
 Regards,
 
  Gurpreet Singh Sachdeva
 
 
 
 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED]
 On Behalf Of MALKIAT BENIPAL
 Sent: Tuesday, December 30, 2003 1:17 AM
 To: [EMAIL PROTECTED]
 Subject: [ilugd] delay in bootup process - RH 8.0
 
 Hello guys,
  
 I have installed RH 8.0 on a HCL PC.  While booting and coming at the
 stage of Starting mail it takes approx. 3-4 minutes and then
 proceeds ahead. Pl. guide where is the problem. I shall be thankful to
 you.
  
 Best Regards,
  
 
 
 MALKIAT
  
 [EMAIL PROTECTED] 
If you are referring to sendmail start errorI found that this always occurred when 
you installed any RH version.
The error says your sendmail files have time stamp in future...some thing like that. 
Surprisingly the error will disappear next day.
What I have inferred is that at the time of install the GMT (or probably EST USA) is 
stamped on some sendmail files and since we end up setting our system to IST the error 
remains till the local time in GMT is past the time stamp.
HTH
-- 
Sudev Barar

Learning Linux


___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


[ilugd] Re: about device drivers

2004-01-05 Thread Abhijit Menon-Sen
At 2004-01-06 09:19:56 +0530, [EMAIL PROTECTED] wrote:

 Due to some problem with GPL, the online version is un-available.

Huh?

Google for Linux Device Drivers. First link.

-- ams

___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


[ilugd] T-Shirt,LOGO and a URL

2004-01-05 Thread Tarun Dua
http://www.isc.tamu.edu/~lewing/linux/
http://www.isc.tamu.edu/~lewing/linux/notes.html
Interesting link on Linux 2.0 Penguins and how they were drawn.
[Wait before you pounce on me. I did not suggest redrawing the Maharaja Tux
yet]
-Tarun


___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


[ilugd] how to un-block the mail server from blocked lists

2004-01-05 Thread rama seshagiri
Dear friends,

Our qmail mail server was once gone into open relay
mode by mistake and afterwards it was corrected.
During that time our server was blocked by some block
lists and after the relay was closed all of them were
corrected except one list - Blars Block List. Due to
this we are not able to send any mails to rediff
accounts. When I tried to contact the web site of
blars ie. http://block.blars.org/ i find that we have
to pay some money to get the entry removed. When all
others have removed the entry free of cost this site
is asking for money. 
Has any body experienced this problem? What is the way
out. Is it only by paying the amount ? Pl. let me
know.

-- seshagiri


__
Do you Yahoo!?
Yahoo! Hotjobs: Enter the Signing Bonus Sweepstakes
http://hotjobs.sweepstakes.yahoo.com/signingbonus

___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


Re: [ilugd] Re: about device drivers

2004-01-05 Thread Vikas Upadhyay
I am sorry, i mentioned wrongly, it's GNU Free Documentation License.
Earlier, the requirements of the license were not fully complied so it was
not available as such. Nice to see it available on net.
Thanks for information.
vikas

- Original Message -
From: Abhijit Menon-Sen [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, January 06, 2004 10:28 AM
Subject: [ilugd] Re: about device drivers


 At 2004-01-06 09:19:56 +0530, [EMAIL PROTECTED] wrote:
 
  Due to some problem with GPL, the online version is un-available.

 Huh?

 Google for Linux Device Drivers. First link.

 -- ams

 ___
 ilugd mailing list
 [EMAIL PROTECTED]
 http://frodo.hserus.net/mailman/listinfo/ilugd




___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


[ilugd] Re: about device drivers

2004-01-05 Thread Abhijit Menon-Sen
At 2004-01-06 12:17:11 +0530, [EMAIL PROTECTED] wrote:

 Earlier, the requirements of the license were not fully complied so it
 was not available as such. Nice to see it available on net.

It's been available from that site for two and a half years, since the
second edition was published in June 2001.

-- ams

___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


[ilugd] Re: [LIH](fwd) Linux kernel mremap vulnerability

2004-01-05 Thread Rishabh Manocha
hello everyone,
I am Rishabh...I am a 19 year old student at the University of Texas at
Austin.I am presently in The hague in Holland where my parents live.
I have been using linux for the past year.
now as you might assume i do not have much of an idea of the kernel level
activities of a LINUX system.
i have no idea what was written in this message.anyone have the time to
decode it for me.also could you please tell me if there are patches
already avaliable for the vulnerability.I am running kernel 2.4.23 on a
debian system.
thanks a lot.
Rishabh Manocha

On Mon, 5 Jan 2004, Raj Mathur wrote:

 [Your distribution vendor will be bringing out a new kernel soon.
 Please upgrade if you use kernel 2.2, 2.4 or 2.6 -- Raju]

 This is an RFC 1153 digest.
 (1 message)
 --

 MIME-Version: 1.0
 Message-ID: [EMAIL PROTECTED]
 From: Paul Starzetz [EMAIL PROTECTED]
 Sender: [EMAIL PROTECTED]
 To: [EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED]
 Subject: [Full-Disclosure] Linux kernel mremap vulnerability
 Date: Mon, 5 Jan 2004 13:30:32 +0100 (CET)

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Synopsis:  Linux kernel do_mremap local privilege escalation vulnerability
 Product:   Linux kernel
 Version:   2.2, 2.4 and 2.6 series
 Vendor:http://www.kernel.org/
 URL:   http://isec.pl/vulnerabilities/isec-0012-mremap.txt
 CVE:   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0985
 Author:Paul Starzetz [EMAIL PROTECTED], Wojciech Purczynski
[EMAIL PROTECTED]
 Date:  January 5, 2004


 Issue:
 ==

 A critical security vulnerability has been found  in  the  Linux  kernel
 memory  management  code in mremap(2) system call due to incorrect bound
 checks.


 Details:
 

 The mremap system call provides functionality of resizing (shrinking  or
 growing)  as well as moving across process's addressable space of exist­
 ing virtual memory areas (VMAs) or any of its parts.

 A typical VMA covers at least one memory page (which is exactly  4kB  on
 the  i386  architecture). An incorrect bound check discovered inside the
 do_mremap() kernel code performing remapping of a  virtual  memory  area
 may lead to creation of a virtual memory area of 0 bytes length.

 The  problem  bases on the general mremap flaw that remapping of 2 pages
 from inside a VMA creates a memory hole of only one page in  length  but
 an  additional  VMA  of two pages. In the case of a zero sized remapping
 request no VMA hole is created but an additional  VMA  descriptor  of  0
 bytes in length is created.

 Such  a malicious virtual memory area may disrupt the operation of other
 parts of the kernel memory management subroutines finally leading to un­
 expected behavior.

 A  typical  process's  memory  layout  showing  invalid VMA created with
 mremap system call:

 08048000-0804c000 r-xp  03:05 959142 /tmp/test
 0804c000-0804d000 rw-p 3000 03:05 959142 /tmp/test
 0804d000-0804e000 rwxp  00:00 0
 4000-40014000 r-xp  03:05 1544523/lib/ld-2.3.2.so
 40014000-40015000 rw-p 00013000 03:05 1544523/lib/ld-2.3.2.so
 40015000-40016000 rw-p  00:00 0
 4002c000-40158000 r-xp  03:05 1544529/lib/libc.so.6
 40158000-4015d000 rw-p 0012b000 03:05 1544529/lib/libc.so.6
 4015d000-4015f000 rw-p  00:00 0
 [*] 6000-6000 rwxp  00:00 0
 bfffe000-c000 rwxp f000 00:00 0

 The broken VMA in the above example has been marked with a [*].


 Impact:
 ===

 Since  no  special  privileges  are required to use the mremap(2) system
 call any process may misuse its unexpected behavior to disrupt the  ker­
 nel memory management subsystem. Proper exploitation of this vulnerabil­
 ity may lead to local privilege escalation including execution of  arbi­
 trary  code  with kernel level access. Proof-of-concept exploit code has
 been created and successfully tested giving UID 0  shell  on  vulnerable
 systems.

 The exploitability of the discovered vulnerability is possible, although
 not a trivial one. We have identified at least two different attack vec­
 tors  for  the  2.4 kernel series. All users are encouraged to patch all
 vulnerable systems as soon as appropriate vendor patches are released.


 Credits:
 

 Paul Starzetz [EMAIL PROTECTED] has  identified  the  vulnerability  and
 performed  further  research. COPYING, DISTRIBUTION, AND MODIFICATION OF
 INFORMATION PRESENTED HERE IS ALLOWED ONLY WITH  EXPRESS  PERMISSION  OF
 ONE OF THE AUTHORS.


 Disclaimer:
 ===

 This  document and all the information it contains are provided as is,
 for educational purposes only, without warranty of any kind, whether ex­
 press or implied.

 The  authors reserve the right not to be responsible for the topicality,
 correctness, completeness or quality of  the  information   provided  in
 this  document.  Liability