Re: [ilugd] Help Require to divide Bandwidth
I have Lease Line of Bharti (64k in 1:4). Presently it is connected as Lease Line (Copper Pair)- RAD HTU E1--RAD FCD-2---Cisco Router 1720 (WIC1T)--Gateway Server Gateway Server (RHL 7.3 with IPChains) have 3 NIC's which are connected as Eth0--Cisco Router Eth1--Switch (For Server's) Eth2--Switch(For Users) Now we are going to upgrade this Lease Line to 128k as one new sister concern is going to open in the same premises. Management wants to divide this 128k into 50-50% in parent sister concern. Can we achieve it on Gateway ? If any other solution has, please suggest. Google for HTB CBQ and/or simply goto http://lartc.org/lartc.html Regards, Abhi ___ ilugd mailing list [EMAIL PROTECTED] http://frodo.hserus.net/mailman/listinfo/ilugd
Re: [ilugd] Mentor Required
hello friends, pls send me some tips and tricks about linux To follow the path: look to the master, follow the master, walk with the master, see through the master, become the master. -- the zen master regards Ritesh Agrawal - Original Message - From: govinda da raj [EMAIL PROTECTED] To: The Linux-Delhi mailing list [EMAIL PROTECTED] Sent: Friday, January 16, 2004 11:31 AM Subject: Re: [ilugd] Mentor Required hello friends, pls send me some tips and tricks about linux ___ ilugd mailing list [EMAIL PROTECTED] http://frodo.hserus.net/mailman/listinfo/ilugd ___ ilugd mailing list [EMAIL PROTECTED] http://frodo.hserus.net/mailman/listinfo/ilugd
[ilugd] New resource - linux softwares available
Hi, I ll be pleased to join the LUG Delhi meet at faridabad for the very first time as i m also from faridabad only. I have downloaded following Linux softwares n can share with members in the meet 1. Knoppix 3.3 2. Mandrake linux 9.2 three cd set 3. Oracle 9i for Linux three cd set 4. knoppiX-Mame Knoppix based game console containing 1200 arcade games single cd http://freshmeat.net/projects/knoppixmame/ These cds can be available at meet on request sent latest by saturday evening through email @Rs.40. Thanks and regards, Adarsh Sharma 011-33117295 Ps.disregard this mail if have broken any rule by sending this mail - Do you Yahoo!? Yahoo! Hotjobs: Enter the Signing Bonus Sweepstakes ___ ilugd mailing list [EMAIL PROTECTED] http://frodo.hserus.net/mailman/listinfo/ilugd
Re: [ilugd] Directions to reach venue of meet
From Nehru Place you can easily take CNG mini buses running upto Badarpur border. Then walkover to the Auto Stand on Faridabad side, may be some 200m. All the autos ply upto atleast Neelam Flyover. Anand Shankar - Original Message - From: anindya chakraborty [EMAIL PROTECTED] To: The Linux-Delhi mailing list [EMAIL PROTECTED] Sent: Friday, January 16, 2004 11:55 AM Subject: [ilugd] Directions to reach venue of meet Hello Everybody, I am new to delhi and I leave near neheru place...can anyone please tell me how to reach LUG meet in jan in faridabad..preferably if bus route numbers are given it will very helpful to me. thanks, anindya ___ ilugd mailing list [EMAIL PROTECTED] http://frodo.hserus.net/mailman/listinfo/ilugd ___ ilugd mailing list [EMAIL PROTECTED] http://frodo.hserus.net/mailman/listinfo/ilugd
Re: [ilugd] Directions to reach venue of meet
On Sat, 2004-01-17 at 08:32, Anand Shankar wrote: From Nehru Place you can easily take CNG mini buses running upto Badarpur border. Then walkover to the Auto Stand on Faridabad side, may be some 200m. All the autos ply upto atleast Neelam Flyover. Neelam flyover is the fifth signalled crossing. Anand Shankar If you ask for Bata Flyover it will be better and all of them get there. This is the sixth signal. Walk across or take a rickshaw from there to Bata factory. Thanks Anand Good work. -- Sudev Barar Learning Linux ___ ilugd mailing list [EMAIL PROTECTED] http://frodo.hserus.net/mailman/listinfo/ilugd
Re: [ilugd] Directions to reach venue of meet
On Fri, 2004-01-16 at 07:30, Anand Shankar wrote: Sudev: Can u please give the Postal Address of the venue?? Sector?? etc. Postal Address is Faridabad Industries Association, Opposite Bata Factory, New Industrial Area (or as is more commonly known NIT) Faridabad -- Sudev Barar Learning Linux ___ ilugd mailing list [EMAIL PROTECTED] http://frodo.hserus.net/mailman/listinfo/ilugd
[ilugd] Can't access internet through proxy server
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, I am having problems trying to configure a system running Red Hat 9 to access the internet through a proxy server. The university has setup a new proxy server recently and I came to know that any system running linux did not work after the proxy got installed. I have no experience whatsoever with proxy servers but after googling got a few pointers. I checked all the settings of internet explorer which work properly. Tried all those settings in netscape and konqueror. Still cant access the name servers. I dont know what login procedure the proxy uses but I was reported that the systems dont need to authenticate. How's that possible? Maybe the administrators saved authentication information in windows and my prof doesn't know about it. How can I figure that out ? Just firing up windoz get the systems online. I tried to intall mozilla browser for windows and it also works with the proxy settings. Read somewhere on the net that some microsoft proxy servers use propreitory protocols. Anyone has any ideas what this is? I exported http_proxy=http://xxx.xxx.xxx.xxx:3128/ and other vars but I guess the system is not being able to authenticate at all. I can only ping the gateway. Also set the local network access to work without proxy as set in IE browser. Still no use. Anyone has any ideas what is missing? Regards, Bhaskar. - -- ___ Bhaskar Dutta [EMAIL PROTECTED] [EMAIL PROTECTED] GPG .eq. AA56 1EB5 D7E8 DD9C 298E 8F4D 375F D416 01D5 671C - --- http://qhotwire.sourceforge.net/bhaskar-gpg-public.key ___ -BEGIN PGP SIGNATURE- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQFACMM0N1/UFgHVZxwRAtiRAJ9Sr4bt0c13EixNm3kCb+X1QBgGrACfaCgM hV9pvnXe3YgnfkBleI9gLWo= =FMX2 -END PGP SIGNATURE- ___ ilugd mailing list [EMAIL PROTECTED] http://frodo.hserus.net/mailman/listinfo/ilugd
Re: Re: [ilugd] Help Require to divide Bandwidth
just define the output size in the ipchains (-o [maxsize]) on the desired network interface. . . I hope u 'll b using a seperate interface for the new sister concern's network or just describe the new structure in details. Nitin Tiwari On Fri, 16 Jan 2004 Abhi wrote : I have Lease Line of Bharti (64k in 1:4). Presently it is connected as Lease Line (Copper Pair)- RAD HTU E1--RAD FCD-2---Cisco Router 1720 (WIC1T)--Gateway Server Gateway Server (RHL 7.3 with IPChains) have 3 NIC's which are connected as Eth0--Cisco Router Eth1--Switch (For Server's) Eth2--Switch(For Users) Now we are going to upgrade this Lease Line to 128k as one new sister concern is going to open in the same premises. Management wants to divide this 128k into 50-50% in parent sister concern. Can we achieve it on Gateway ? If any other solution has, please suggest. Google for HTB CBQ and/or simply goto http://lartc.org/lartc.html Regards, Abhi ___ ilugd mailing list [EMAIL PROTECTED] http://frodo.hserus.net/mailman/listinfo/ilugd ___ ilugd mailing list [EMAIL PROTECTED] http://frodo.hserus.net/mailman/listinfo/ilugd
[ilugd] (fwd) Multiple MetaDot Vulnerabilities [ All Versions ]
[Please upgrade if you use the MetaDot web portal system -- Raju] This is an RFC 1153 digest. (1 message) -- Message-ID: [EMAIL PROTECTED] From: JeiAr [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Multiple MetaDot Vulnerabilities [ All Versions ] Date: 16 Jan 2004 01:10:47 - Vendor : Metadot Corporation URL : http://www.metadot.com Version : MetaDot Portal 5.6.5.4b5 Earlier [ All Versions ] Risk: Multiple Vulnerabilities Description: Metadot is a popular open source portal software (GPL) recognized for its revolutionary ease-of-use. It provides content management like file, page and link management, collaboration features like discussion forums and polls and personalization like My Yahoo. It is powered by Perl MySQL. Users range from home users to government, banks, universities and even NASA ;) SQL Injection Vulnerability: It may be possible for an attacker to influence SQL queries by passing unexpected data to certain variables including the id and key variable. Even if an attacker is not successful with influencing an SQL query he can cause the outputted error message to execute script into an unsuspecting users browser thus causing a Cross Site Scripting attack. Also, the SQL error messages reveal a great deal of data about the server. Below is an example error message. The URI used to create this error was index.pl?isa=Sessionop=auto_loginnew_user=key='[Problem] --[ Begin Error Message ] sqlSelect: SQL statement:BRBRSELECT userid, lastonline, sessioninfo FROM sessions WHERE sessionid=''[Problem]' Error: You have an error in your SQL syntax near '[Problem]' ' at line 1BRBR at /home/sharem/metadot/metadot/index.pl DBAccess::DBIObj::sqlSelect('DBAccess::MySQL=HASH(0x85de6a8)', 'userid, lastonline, sessioninfo', 'sessions', 'sessionid=\'\'[Problem]\'') called at /home/sharem/metadot/metadot/DBAccess.pm line 129 DBAccess::sqlSelect('DBAccess', 'userid, lastonline, sessioninfo', 'sessions', 'sessionid=\'\'[Problem]\'') called at /home/sharem/metadot/metadot/Session.pm line 508 Session::_initialize('Session=HASH(0xb1be85c)', '\'[Problem]') called at /home/sharem/metadot/metadot/Session.pm line 161 Session::restore('Session', '\'[Problem]') called at /home/sharem/metadot/metadot/Metadot/SessionHandler/CookieSessionHandler.pm line 97 Metadot::SessionHandler::CookieSessionHandler::restore_session('Metadot::SessionHandler:: CookieSessionHandler=HASH(0x8c443f8)', '\'[Problem]')called at /home/sharem/metadot/metadot/Metadot/ Authenticator.pm line 63 Metadot::Authenticator::authenticate('Metadot::Authenticator::UserPassAuthenticator =HASH(0x9d34338)') called at /home/sharem/metadot/metadot/Portal.pm line 3863 Portal::_web_init('Portal =HASH(0xb4c271c)') called at /home/sharem/metadot/metadot/Metadot/Implementations/Portal/Default.pm line 52 Metadot::Implementations::Portal::Default::initialize('Metadot::Implementations::Portal::Default', 'Portal =HASH(0xb4c271c)') called at /home/sharem/metadot/metadot/Portal.pm line 2830 Portal::_initialize('Portal =HASH(0xb4c271c)') called at /home/sharem/metadot/metadot/Portal.pm line 160 Portal::new('Portal', 1) called at /home/sharem/metadot/metadot/index.pl line 43 Apache::ROOT::metadot::index_2epl::handler('Apache=SCALAR (0xb421470)') called at /usr/local/lib/perl5/site_perl/5.6.1/i686-linux/Apache/Registry.pm line 149 eval {...} called at /usr/local/lib/perl5/site_perl/5.6.1/i686-linux/Apache/Registry.pm line 149 Apache::Registry ::handler('Apache=SCALAR(0xb421470)') called at /dev/null line 0 eval {...} called at /dev/null line 0 - Below are some examples URI's that will allow an attacker to influence queries, gather info or XSS. /index.pl?id=[Evil_Query] /index.pl?iid=[Evil_Query] /index.pl?isa=Sessionop=auto_loginnew_user=key=[Evil_Query] Information Disclosure Path Disclosure: There is a great deal of information given up by interrupting the SQL query, but can also be caused in other ways than the previously mentioned. Lets look at /index.pl?iid=[ValidID]isa=Discussionop= Where [ValidID] is should be a valid id number such as 1000 or whatever it may be. --[ Begin Error Message ] Software error: must provide operation name at /home/sharem/metadot/metadot/Auditable.pm line 196 Auditable::is_allowed_to_do('Discussion=HASH(0xae19218)', '', 'Metadot::User::FlexUser=HASH(0xb414f70)', 1) called at /home/sharem/metadot/metadot/index.pl line 232 Apache::ROOT::metadot::index_2epl::handler ('Apache=SCALAR(0xacf893c)') called at /usr/local/lib/perl5/site_perl/5.6.1/i686-linux/Apache/Registry.pm line 149 eval {...} called at /usr/local/lib/perl5/site_perl/5.6.1/i686-linux/Apache/Registry.pm line 149
[ilugd] (fwd) [SECURITY] [DSA 424-1] New mc packages fix buffer overflow
[Please upgrade if you use mc (Midnight Commander) on any distribution -- Raju] This is an RFC 1153 digest. (1 message) -- Message-ID: [EMAIL PROTECTED] From: Matt Zimmerman [EMAIL PROTECTED] Sender: Matt Zimmerman [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [SECURITY] [DSA 424-1] New mc packages fix buffer overflow Date: Fri, 16 Jan 2004 13:20:41 -0800 -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 424-1 [EMAIL PROTECTED] http://www.debian.org/security/ Matt Zimmerman January 16th, 2004 http://www.debian.org/security/faq - -- Package: mc Vulnerability : buffer overflow Problem-Type : remote Debian-specific: no CVE Ids: CAN-2003-1023 A vulnerability was discovered in Midnight Commander, a file manager, whereby a malicious archive (such as a .tar file) could cause arbitrary code to be executed if opened by Midnight Commander. For the current stable distribution (woody) this problem has been fixed in version 4.5.55-1.2woody2. For the unstable distribution (sid) this problem has been fixed in version 1:4.6.0-4.6.1-pre1-1. We recommend that you update your mc package. Upgrade Instructions - wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - Source archives: http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2.dsc Size/MD5 checksum: 797 0d6f8c733c81707b6da81e27f877b271 http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2.diff.gz Size/MD5 checksum:33293 ce42d50c572b58ac0abd28e0dd9cc076 http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55.orig.tar.gz Size/MD5 checksum: 4850321 82772e729bb2ecfe486a6c219ebab09f Alpha architecture: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_alpha.deb Size/MD5 checksum: 1182848 57163da15f3055e26800903e6418d8a7 http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_alpha.deb Size/MD5 checksum: 560976 98e635c74d4fc62e36ed70a443496081 http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_alpha.deb Size/MD5 checksum: 1350990 2695fce52f1289067b590405c321715c ARM architecture: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_arm.deb Size/MD5 checksum: 1024972 a76436b6216f272e65a44cab92107924 http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_arm.deb Size/MD5 checksum: 478210 beedf3b65a86a09f86b954a6a2aff08a http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_arm.deb Size/MD5 checksum: 1351086 0b7b4ff418f8c15d185b1881ee2e74f0 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_i386.deb Size/MD5 checksum: 992058 10fe505f8cd59699485bb156a2139913 http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_i386.deb Size/MD5 checksum: 453560 8c45b201009d084f2aeb850190446ad8 http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_i386.deb Size/MD5 checksum: 1351046 637e5c75a130c7813e4b3d71be82acfe Intel IA-64 architecture: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_ia64.deb Size/MD5 checksum: 1431172 fcc33e82760761298baab4a89b273de5 http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_ia64.deb Size/MD5 checksum: 686630 3015bc29165e1caf53bf7f21c2b1d518 http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_ia64.deb Size/MD5 checksum: 1350982 1a68362464c0a7f1b55f68b8db7c0974 HP Precision architecture: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_hppa.deb Size/MD5 checksum: 1142252 d3d9e252387aad10007e1ac4d0393d49 http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody2_hppa.deb Size/MD5 checksum: 539770 1b4e84762374c4710d0a73f14e217f99 http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody2_hppa.deb Size/MD5 checksum: 1351372 e010eb84f208b214f22052fac962349a Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody2_m68k.deb Size/MD5 checksum: 955782