Re: [ilugd] Help Require to divide Bandwidth

2004-01-16 Thread Abhi

 I have Lease Line of Bharti (64k in 1:4). Presently it is connected as

 Lease Line (Copper Pair)- RAD HTU E1--RAD FCD-2---Cisco
Router 1720
 (WIC1T)--Gateway Server

 Gateway Server (RHL 7.3 with IPChains) have 3 NIC's which are connected as

 Eth0--Cisco Router
 Eth1--Switch (For Server's)
 Eth2--Switch(For Users)

 Now we are going to upgrade this Lease Line to 128k as one new sister
concern is
 going to open in the same premises. Management wants to divide this 128k
into 50-50%
 in parent  sister concern. Can we achieve it on Gateway ? If any other
solution has,
 please suggest.

Google for HTB CBQ

and/or simply goto

http://lartc.org/lartc.html

Regards,
Abhi


___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


Re: [ilugd] Mentor Required

2004-01-16 Thread Ritesh Agrawal

hello friends,
pls send me some tips and tricks about linux

 To follow the path:
look to the master,
follow the master,
walk with the master,
see through the master,
become the master. 

-- the zen master



regards
Ritesh Agrawal

- Original Message - 
From: govinda da raj [EMAIL PROTECTED]
To: The Linux-Delhi mailing list [EMAIL PROTECTED]
Sent: Friday, January 16, 2004 11:31 AM
Subject: Re: [ilugd] Mentor Required




hello friends,
pls send me some tips and tricks about linux
___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd




___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


[ilugd] New resource - linux softwares available

2004-01-16 Thread Adarsh Kr sharma
Hi,
I ll be pleased to join the LUG Delhi meet at faridabad for the very first time as i m 
also from faridabad only.
I have downloaded following Linux softwares n can share with members in the meet 
1. Knoppix 3.3
2. Mandrake linux 9.2 three cd set
3. Oracle 9i for Linux three cd set
4. knoppiX-Mame Knoppix based game console containing 1200 arcade games single cd
http://freshmeat.net/projects/knoppixmame/
 
These cds can be available at meet on request sent latest by saturday evening through 
email   @Rs.40.
 
Thanks and regards,
Adarsh Sharma 
011-33117295
Ps.disregard this mail if have broken any rule by sending this mail


-
Do you Yahoo!?
Yahoo! Hotjobs: Enter the Signing Bonus Sweepstakes
___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


Re: [ilugd] Directions to reach venue of meet

2004-01-16 Thread Anand Shankar
From Nehru Place you can easily take CNG mini buses running upto Badarpur
border. Then walkover to the Auto Stand on Faridabad side, may be some 200m.
All the autos ply upto atleast Neelam Flyover.

Anand Shankar
- Original Message -
From: anindya chakraborty [EMAIL PROTECTED]
To: The Linux-Delhi mailing list [EMAIL PROTECTED]
Sent: Friday, January 16, 2004 11:55 AM
Subject: [ilugd] Directions to reach venue of meet


Hello Everybody,


  I am new to delhi and I leave near neheru place...can anyone
please tell me how to reach LUG meet in jan in faridabad..preferably
if bus route numbers are given it will very helpful to me.

thanks,
anindya
___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


Re: [ilugd] Directions to reach venue of meet

2004-01-16 Thread Sudev Barar
On Sat, 2004-01-17 at 08:32, Anand Shankar wrote:
 From Nehru Place you can easily take CNG mini buses running upto Badarpur
 border. Then walkover to the Auto Stand on Faridabad side, may be some 200m.
 All the autos ply upto atleast Neelam Flyover.
 
Neelam flyover is the fifth signalled crossing.

 Anand Shankar
If you ask for Bata Flyover it will be better and all of them get there.
This is the sixth signal. Walk across or take a rickshaw from there to
Bata factory.
Thanks Anand Good work.
-- 
Sudev Barar

Learning Linux


___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


Re: [ilugd] Directions to reach venue of meet

2004-01-16 Thread Sudev Barar
On Fri, 2004-01-16 at 07:30, Anand Shankar wrote:
 Sudev: Can u please give the Postal Address of the venue?? Sector?? etc.
Postal Address is 
Faridabad Industries Association,
Opposite Bata Factory,
New Industrial Area (or as is more commonly known NIT)
Faridabad 
-- 
Sudev Barar

Learning Linux


___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


[ilugd] Can't access internet through proxy server

2004-01-16 Thread Bhaskar Dutta
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


Hi,
 I am having problems trying to configure a system running Red Hat 9 to access 
the internet through a proxy server. The university has setup a new proxy 
server recently and I came to know that any system running linux did not work 
after the proxy got installed. I have no experience whatsoever with proxy 
servers but after googling got a few pointers. 

I checked all the settings of internet explorer which work properly. 
Tried all those settings in netscape and konqueror. Still cant access the name 
servers. I dont know what login procedure the proxy uses but I was reported 
that the systems dont need to authenticate. How's that possible? Maybe the 
administrators saved authentication information in windows and my prof 
doesn't know about it. How can I figure that out ?

Just firing up windoz get the systems online. I tried to intall mozilla 
browser for windows and it also works with the proxy settings. Read somewhere 
on the net that some microsoft proxy servers use propreitory protocols. 
Anyone has any ideas what this is?

I exported http_proxy=http://xxx.xxx.xxx.xxx:3128/ and other vars but I guess 
the system is not being able to authenticate at all. I can only ping the 
gateway. 
Also set the local network access to work without proxy as set in IE browser. 
Still no use. 

Anyone has any ideas what is missing?

Regards,
Bhaskar.

- -- 

___

 Bhaskar Dutta [EMAIL PROTECTED] [EMAIL PROTECTED]
 GPG .eq. AA56 1EB5 D7E8 DD9C 298E  8F4D 375F D416 01D5 671C
- ---
 http://qhotwire.sourceforge.net/bhaskar-gpg-public.key
___


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQFACMM0N1/UFgHVZxwRAtiRAJ9Sr4bt0c13EixNm3kCb+X1QBgGrACfaCgM
hV9pvnXe3YgnfkBleI9gLWo=
=FMX2
-END PGP SIGNATURE-


___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


Re: Re: [ilugd] Help Require to divide Bandwidth

2004-01-16 Thread Veforks IT SOLUTIONS
just define the output size in the ipchains (-o [maxsize]) on the desired network 
interface. . .  I hope u 'll b using a seperate interface for the new sister concern's 
network or just describe the new structure in details. 
 
Nitin Tiwari 
 
On Fri, 16 Jan 2004 Abhi wrote : 
 
  I have Lease Line of Bharti (64k in 1:4). Presently it is connected as 
  
  Lease Line (Copper Pair)- RAD HTU E1--RAD FCD-2---Cisco 
Router 1720 
  (WIC1T)--Gateway Server 
  
  Gateway Server (RHL 7.3 with IPChains) have 3 NIC's which are connected as 
  
  Eth0--Cisco Router 
  Eth1--Switch (For Server's) 
  Eth2--Switch(For Users) 
  
  Now we are going to upgrade this Lease Line to 128k as one new sister 
concern is 
  going to open in the same premises. Management wants to divide this 128k 
into 50-50% 
  in parent  sister concern. Can we achieve it on Gateway ? If any other 
solution has, 
  please suggest. 
 
Google for HTB CBQ 
 
and/or simply goto 
 
http://lartc.org/lartc.html 
 
Regards, 
Abhi 
 
 
___ 
ilugd mailing list 
[EMAIL PROTECTED] 
http://frodo.hserus.net/mailman/listinfo/ilugd 
___
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd


[ilugd] (fwd) Multiple MetaDot Vulnerabilities [ All Versions ]

2004-01-16 Thread Raj Mathur
[Please upgrade if you use the MetaDot web portal system -- Raju]

This is an RFC 1153 digest.
(1 message)
--

Message-ID: [EMAIL PROTECTED]
From: JeiAr [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Multiple MetaDot Vulnerabilities [ All Versions ]
Date: 16 Jan 2004 01:10:47 -



Vendor  : Metadot Corporation
URL : http://www.metadot.com
Version : MetaDot Portal 5.6.5.4b5  Earlier [ All Versions ]
Risk: Multiple Vulnerabilities



Description:
Metadot is a popular open source portal software (GPL) recognized for its 
revolutionary 
ease-of-use. It provides content management like file, page and link management, 
collaboration 
features like discussion forums and polls and personalization like My Yahoo. It is 
powered by 
Perl  MySQL. Users range from home users to government, banks, universities and even 
NASA ;)



SQL Injection Vulnerability:
It may be possible for an attacker to influence SQL queries by passing unexpected data 
to
certain variables including the id and key variable. Even if an attacker is not 
successful
with influencing an SQL query he can cause the outputted error message to execute 
script into
an unsuspecting users browser thus causing a Cross Site Scripting attack. Also, the 
SQL error
messages reveal a great deal of data about the server. Below is an example error 
message. The
URI used to create this error was 
index.pl?isa=Sessionop=auto_loginnew_user=key='[Problem]

--[ Begin Error Message 
]

sqlSelect: SQL statement:BRBRSELECT userid, lastonline, sessioninfo FROM sessions 
WHERE 
sessionid=''[Problem]'
Error: You have an error in your SQL syntax near '[Problem]' ' at line 1BRBR
at /home/sharem/metadot/metadot/index.pl

DBAccess::DBIObj::sqlSelect('DBAccess::MySQL=HASH(0x85de6a8)', 'userid, lastonline, 
sessioninfo', 
'sessions', 'sessionid=\'\'[Problem]\'') called at 
/home/sharem/metadot/metadot/DBAccess.pm line 129 
DBAccess::sqlSelect('DBAccess', 'userid, lastonline, sessioninfo', 'sessions', 
'sessionid=\'\'[Problem]\'') 
called at /home/sharem/metadot/metadot/Session.pm line 508 
Session::_initialize('Session=HASH(0xb1be85c)', 
'\'[Problem]') called at /home/sharem/metadot/metadot/Session.pm line 161 
Session::restore('Session', 
'\'[Problem]') called at 
/home/sharem/metadot/metadot/Metadot/SessionHandler/CookieSessionHandler.pm line 
97 
Metadot::SessionHandler::CookieSessionHandler::restore_session('Metadot::SessionHandler::
CookieSessionHandler=HASH(0x8c443f8)', '\'[Problem]')called at 
/home/sharem/metadot/metadot/Metadot/
Authenticator.pm line 63 
Metadot::Authenticator::authenticate('Metadot::Authenticator::UserPassAuthenticator
=HASH(0x9d34338)') called at /home/sharem/metadot/metadot/Portal.pm line 3863 
Portal::_web_init('Portal
=HASH(0xb4c271c)') called at 
/home/sharem/metadot/metadot/Metadot/Implementations/Portal/Default.pm line 52 
Metadot::Implementations::Portal::Default::initialize('Metadot::Implementations::Portal::Default',
 'Portal
=HASH(0xb4c271c)') called at /home/sharem/metadot/metadot/Portal.pm line 2830 
Portal::_initialize('Portal
=HASH(0xb4c271c)') called at /home/sharem/metadot/metadot/Portal.pm line 160 
Portal::new('Portal', 1) called
at /home/sharem/metadot/metadot/index.pl line 43 
Apache::ROOT::metadot::index_2epl::handler('Apache=SCALAR
(0xb421470)') called at 
/usr/local/lib/perl5/site_perl/5.6.1/i686-linux/Apache/Registry.pm line 149 eval 
{...} called at /usr/local/lib/perl5/site_perl/5.6.1/i686-linux/Apache/Registry.pm 
line 149 Apache::Registry
::handler('Apache=SCALAR(0xb421470)') called at /dev/null line 0 eval {...} called at 
/dev/null line 0

-

Below are some examples URI's that will allow an attacker to influence queries, gather 
info or XSS. 

/index.pl?id=[Evil_Query]
/index.pl?iid=[Evil_Query]
/index.pl?isa=Sessionop=auto_loginnew_user=key=[Evil_Query]



Information Disclosure  Path Disclosure:
There is a great deal of information given up by interrupting the SQL query, but can 
also be caused
in other ways than the previously mentioned. Lets look at 
/index.pl?iid=[ValidID]isa=Discussionop=
Where [ValidID] is should be a valid id number such as 1000 or whatever it may be.

--[ Begin Error Message 
]

Software error:
must provide operation name at /home/sharem/metadot/metadot/Auditable.pm line 196
Auditable::is_allowed_to_do('Discussion=HASH(0xae19218)', '', 
'Metadot::User::FlexUser=HASH(0xb414f70)', 1) 
called at /home/sharem/metadot/metadot/index.pl line 232 
Apache::ROOT::metadot::index_2epl::handler
('Apache=SCALAR(0xacf893c)') called at 
/usr/local/lib/perl5/site_perl/5.6.1/i686-linux/Apache/Registry.pm 
line 149 eval {...} called at 
/usr/local/lib/perl5/site_perl/5.6.1/i686-linux/Apache/Registry.pm line 149

[ilugd] (fwd) [SECURITY] [DSA 424-1] New mc packages fix buffer overflow

2004-01-16 Thread Raj Mathur
[Please upgrade if you use mc (Midnight Commander) on any distribution
-- Raju]

This is an RFC 1153 digest.
(1 message)
--

Message-ID: [EMAIL PROTECTED]
From: Matt Zimmerman [EMAIL PROTECTED]
Sender: Matt Zimmerman [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [SECURITY] [DSA 424-1] New mc packages fix buffer overflow
Date: Fri, 16 Jan 2004 13:20:41 -0800

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 424-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Matt Zimmerman
January 16th, 2004  http://www.debian.org/security/faq
- --

Package: mc
Vulnerability  : buffer overflow
Problem-Type   : remote
Debian-specific: no
CVE Ids: CAN-2003-1023

A vulnerability was discovered in Midnight Commander, a file manager,
whereby a malicious archive (such as a .tar file) could cause
arbitrary code to be executed if opened by Midnight Commander.

For the current stable distribution (woody) this problem has been
fixed in version 4.5.55-1.2woody2.

For the unstable distribution (sid) this problem has been fixed in
version 1:4.6.0-4.6.1-pre1-1.

We recommend that you update your mc package.

Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- 

  Source archives:

http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2.dsc
  Size/MD5 checksum:  797 0d6f8c733c81707b6da81e27f877b271
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2.diff.gz
  Size/MD5 checksum:33293 ce42d50c572b58ac0abd28e0dd9cc076
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55.orig.tar.gz
  Size/MD5 checksum:  4850321 82772e729bb2ecfe486a6c219ebab09f

  Alpha architecture:

http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_alpha.deb
  Size/MD5 checksum:  1182848 57163da15f3055e26800903e6418d8a7
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_alpha.deb
  Size/MD5 checksum:   560976 98e635c74d4fc62e36ed70a443496081

http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_alpha.deb
  Size/MD5 checksum:  1350990 2695fce52f1289067b590405c321715c

  ARM architecture:

http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_arm.deb
  Size/MD5 checksum:  1024972 a76436b6216f272e65a44cab92107924
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_arm.deb
  Size/MD5 checksum:   478210 beedf3b65a86a09f86b954a6a2aff08a

http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_arm.deb
  Size/MD5 checksum:  1351086 0b7b4ff418f8c15d185b1881ee2e74f0

  Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_i386.deb
  Size/MD5 checksum:   992058 10fe505f8cd59699485bb156a2139913
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_i386.deb
  Size/MD5 checksum:   453560 8c45b201009d084f2aeb850190446ad8

http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_i386.deb
  Size/MD5 checksum:  1351046 637e5c75a130c7813e4b3d71be82acfe

  Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_ia64.deb
  Size/MD5 checksum:  1431172 fcc33e82760761298baab4a89b273de5
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_ia64.deb
  Size/MD5 checksum:   686630 3015bc29165e1caf53bf7f21c2b1d518

http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_ia64.deb
  Size/MD5 checksum:  1350982 1a68362464c0a7f1b55f68b8db7c0974

  HP Precision architecture:

http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_hppa.deb
  Size/MD5 checksum:  1142252 d3d9e252387aad10007e1ac4d0393d49
http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_hppa.deb
  Size/MD5 checksum:   539770 1b4e84762374c4710d0a73f14e217f99

http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_hppa.deb
  Size/MD5 checksum:  1351372 e010eb84f208b214f22052fac962349a

  Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_m68k.deb
  Size/MD5 checksum:   955782