Re: [ilugd] Re: [LIG] [OT] Sarovar, Fairplay, Apple

2004-04-17 Thread Viksit Gaur
Hmm.. 

Just some thoughts..

I'm totally with the Freedom to create and
distribute tag. But, what if you think from the
corporate viewpoint?

Suppose my company (i dont work for any, btw :) has
spent a million bucks in developing and promoting a
technology,  would I like it if someone was to develop
something which circumvents my security measures and
possibly eat into or even trivialize my profits?

As the management in charge of the company, I might
*personally* appreciate original work being done by
hackers and the community in general, but officially?
Arent they just a pain which i'd want to counter ASAP?


--
vik



=
--
Viksit Gaur   http://www.viksit.com
me[at]viksit.com
viksit[at]linux-delhi[dot]org

'Not all who wander are lost.' 
  - J.R.R. Tolkien, The Fellowship of the Ring




__
Do you Yahoo!?
Yahoo! Tax Center - File online by April 15th
http://taxes.yahoo.com/filing.html

___
ilugd mailinglist -- [EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/[EMAIL PROTECTED]/


Re: [ilugd] Re: [LIG] [OT] Sarovar, Fairplay, Apple

2004-04-17 Thread Sandip Bhattacharya
Viksit Gaur wrote:
Suppose my company (i dont work for any, btw :) has
spent a million bucks in developing and promoting a
technology,  would I like it if someone was to develop
something which circumvents my security measures and
possibly eat into or even trivialize my profits?
This is actually a gray area - while Free Software is about *creating* 
gray area and not stealing ideas from others, some times it becomes 
imperative that a proprietary technology is made available to the 
public(through a Free software ofcourse) when the technology becomes 
critical for the masses - e.g. making software which reads MSOffice 
files(Abiword,OOo), or making software which interoperates with MS 
machines in a file sharing network(Samba).

1. But the general idea of problems of this nature is - that if you dont 
like the policies of the company who creates this technology in the 
first place - dont buy it. Nobody is forcing you to do so!

2. On the other hand, people have strong opinions on the very terms 
under which this technology is given and find it unfairly restrictive.

It is a gray area, and a persons opinion varies according to where he 
prefers drawing a line between these two arguments.

- Sandip

--
Sandip Bhattacharya
sandip (at) puroga.com
Puroga Technologies Pvt. Ltd.
Work: http://www.puroga.comHome: http://www.sandipb.net
GPG: 51A4 6C57 4BC6 8C82 6A65 AE78 B1A1 2280 A129 0FF3

--
Sandip Bhattacharya
sandip (at) puroga.com
Puroga Technologies Pvt. Ltd.
Work: http://www.puroga.comHome: http://www.sandipb.net
GPG: 51A4 6C57 4BC6 8C82 6A65 AE78 B1A1 2280 A129 0FF3

___
ilugd mailinglist -- [EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/[EMAIL PROTECTED]/


[ilugd] (fwd) [SECURITY] [DSA 431-2] New perl packages fix information leak in suidperl

2004-04-17 Thread Raj Mathur
[Please upgrade Perl -- Raju]

This is an RFC 1153 digest.
(1 message)
--

Message-ID: [EMAIL PROTECTED]
From: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [Full-Disclosure] [SECURITY] [DSA 431-2] New perl packages fix information 
leak in suidperl
Date: Fri, 16 Apr 2004 18:51:19 -0700

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 431-2 [EMAIL PROTECTED]
http://www.debian.org/security/ Matt Zimmerman
April 16th, 2004http://www.debian.org/security/faq
- --

Package: perl
Vulnerability  : information leak
Problem-Type   : local
Debian-specific: no
CVE Ids: CAN-2003-0618

Paul Szabo discovered a number of similar bugs in suidperl, a helper
program to run perl scripts with setuid privileges.  By exploiting
these bugs, an attacker could abuse suidperl to discover information
about files (such as testing for their existence and some of their
permissions) that should not be accessible to unprivileged users.

DSA 431-1 incorporated a partial fix for this problem.  This advisory
includes a more complete fix which corrects some additional cases.

For the current stable distribution (woody) this problem has been
fixed in version 5.6.1-8.7.

For the unstable distribution, this problem has been fixed in version
5.8.3-3.

We recommend that you update your perl package if you have the
perl-suid package installed.

Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- 

  Source archives:

http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.7.dsc
  Size/MD5 checksum:  687 a991455e0aceb15577058550a4e7a58b
http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.7.diff.gz
  Size/MD5 checksum:   157187 c4142d9553724963475e3ac83b7cfa75
http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1.orig.tar.gz
  Size/MD5 checksum:  5983695 ec1ff15464809b562aecfaa2e65edba6

  Architecture independent components:


http://security.debian.org/pool/updates/main/p/perl/libcgi-fast-perl_5.6.1-8.7_all.deb
  Size/MD5 checksum:30986 605d678c5351a04c559eb91c92224330
http://security.debian.org/pool/updates/main/p/perl/perl-doc_5.6.1-8.7_all.deb
  Size/MD5 checksum:  3892174 622ee5f4426479eac9923ce8a615f8bb
http://security.debian.org/pool/updates/main/p/perl/perl-modules_5.6.1-8.7_all.deb
  Size/MD5 checksum:  1284502 c502b6581cddcbec73603365ba2b3c91

  Alpha architecture:

http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.6.1-8.7_alpha.deb
  Size/MD5 checksum:   620294 07e38c51c8ca20102b088fdce1fab354
http://security.debian.org/pool/updates/main/p/perl/libperl5.6_5.6.1-8.7_alpha.deb
  Size/MD5 checksum:   435786 ecadd53c15edb37aa6919210dfa71a7d
http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.7_alpha.deb
  Size/MD5 checksum:  1217702 66bbe713ab6017e91dd050d2bc3a3626
http://security.debian.org/pool/updates/main/p/perl/perl-base_5.6.1-8.7_alpha.deb
  Size/MD5 checksum:   208726 98fb9debca3d28a7b92454a03fba23da
http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.6.1-8.7_alpha.deb
  Size/MD5 checksum:  2826500 8998d4bb47b35558e302cddce343a79a
http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.6.1-8.7_alpha.deb
  Size/MD5 checksum:34570 b706eb26f78cc37ebc1d037301a98160

  ARM architecture:

http://security.debian.org/pool/updates/main/p/perl/libperl-dev_5.6.1-8.7_arm.deb
  Size/MD5 checksum:   516692 c767fd61532053e819d860b59120adfc
http://security.debian.org/pool/updates/main/p/perl/libperl5.6_5.6.1-8.7_arm.deb
  Size/MD5 checksum:   362950 17996f407fec576584b7f57c13d335f9
http://security.debian.org/pool/updates/main/p/perl/perl_5.6.1-8.7_arm.deb
  Size/MD5 checksum:  1164306 b94f9f79d1cfc369146d13ce87d5b13a
http://security.debian.org/pool/updates/main/p/perl/perl-base_5.6.1-8.7_arm.deb
  Size/MD5 checksum:   545424 ef03138c3fbf6e4814d9bfcec3c3778a
http://security.debian.org/pool/updates/main/p/perl/perl-debug_5.6.1-8.7_arm.deb
  Size/MD5 checksum:  2307408 962e45a6371c99305a9fb9a5ab9a4ec2
http://security.debian.org/pool/updates/main/p/perl/perl-suid_5.6.1-8.7_arm.deb
  Size/MD5 checksum: 

[ilugd] (fwd) [SECURITY] [DSA 488-1] New logcheck packages fix insecure temporary directory

2004-04-17 Thread Raj Mathur
[Please upgrade if you have logcheck installed on any distribution -- Raju]

This is an RFC 1153 digest.
(1 message)
--

Message-ID: [EMAIL PROTECTED]
From: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [Full-Disclosure] [SECURITY] [DSA 488-1] New logcheck packages fix insecure 
temporary directory
Date: Fri, 16 Apr 2004 19:17:29 -0700

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 488-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Matt Zimmerman
April 16th, 2004 http://www.debian.org/security/faq
- --

Package: logcheck
Vulnerability  : insecure temporary directory
Problem-Type   : local
Debian-specific: no
CVE Ids: CAN-2004-0404

Christian Jaeger reported a bug in logcheck which could potentially be
exploited by a local user to overwrite files with root privileges.
logcheck utilized a temporary directory under /var/tmp without taking
security precautions.  While this directory is created when logcheck
is installed, and while it exists there is no vulnerability, if at
any time this directory is removed, the potential for exploitation exists.

For the current stable distribution (woody) this problem has been
fixed in version 1.1.1-13.1woody1.

For the unstable distribution (sid), this problem has been fixed in
version 1.1.1-13.2.

We recommend that you update your logcheck package.

Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- 

  Source archives:


http://security.debian.org/pool/updates/main/l/logcheck/logcheck_1.1.1-13.1woody1.dsc
  Size/MD5 checksum:  613 8e01951f551f262ad2ca57543f8e365a

http://security.debian.org/pool/updates/main/l/logcheck/logcheck_1.1.1-13.1woody1.diff.gz
  Size/MD5 checksum:24812 e4e98736893194d3d59d01ba34e2f3e7
http://security.debian.org/pool/updates/main/l/logcheck/logcheck_1.1.1.orig.tar.gz
  Size/MD5 checksum:29998 51c91fff337e30958df368c648911647

  Architecture independent components:


http://security.debian.org/pool/updates/main/l/logcheck/logcheck-database_1.1.1-13.1woody1_all.deb
  Size/MD5 checksum:16450 f14aed68d079c1a64651c6c75ef1ab14

http://security.debian.org/pool/updates/main/l/logcheck/logcheck_1.1.1-13.1woody1_all.deb
  Size/MD5 checksum:25146 c6f1446b5d520e42384ffb3408da864e

http://security.debian.org/pool/updates/main/l/logcheck/logtail_1.1.1-13.1woody1_all.deb
  Size/MD5 checksum: 9338 5bfca1c9d03ee43a18d54df1be5891d9

  These files will probably be moved into the stable distribution on
  its next revision.

- -
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: [EMAIL PROTECTED]
Package info: `apt-cache show pkg' and http://packages.debian.org/pkg
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFAgJOnArxCt0PiXR4RAiR+AJ9KtFWwZp6r/1ICXsPJkeYFTndPwQCeMOx9
lnvjNqt8qi8Jpfm+mkZX+7o=
=pB4y
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

--

End of this Digest
**

-- 
Raj Mathur[EMAIL PROTECTED]  http://kandalaya.org/
   GPG: 78D4 FC67 367F 40E2 0DD5  0FEF C968 D0EF CC68 D17F
  It is the mind that moves

___
ilugd mailinglist -- [EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/[EMAIL PROTECTED]/


[ilugd] Re: [LIH](fwd) [SECURITY] [DSA 431-2] New perl packages fix information leak in suidperl

2004-04-17 Thread Suresh Ramasubramanian
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[4/17/2004 12:07 PM]  Raj Mathur :

| [Please upgrade Perl -- Raju]

urgent only if you use suid-perl

srs
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (MingW32)
iD8DBQFAgNHpRB4r9e3t77kRAnnNAKCG2/YUYuMc2WQVEM6clY5QQMeVWACg00Uu
eA+IRURowfDugMkjWZI/+HM=
=0eRG
-END PGP SIGNATURE-
___
ilugd mailinglist -- [EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/[EMAIL PROTECTED]/


Re: [ilugd] Re: [LIG] [OT] Sarovar, Fairplay, Apple

2004-04-17 Thread Raj Mathur
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 Viksit == Viksit Gaur [EMAIL PROTECTED] writes:

Viksit Hmm.. Just some thoughts..

Viksit I'm totally with the Freedom to create and distribute
Viksit tag. But, what if you think from the corporate viewpoint?

Viksit Suppose my company (i dont work for any, btw :) has spent
Viksit a million bucks in developing and promoting a technology,
Viksit would I like it if someone was to develop something which
Viksit circumvents my security measures and possibly eat into or
Viksit even trivialize my profits?

You may not like it but you'd have to live with it.  Just as you have
the right to embed security into your software, others have the right
to study, hack and bypass that security.

I think you're missing the important point here -- stealing music is
illegal, but providing tools that MAY be used to steal music isn't.
If we support the banning of tools that may possibly be used for
illegal purposes we'll have to ban just about everything -- starting
with computers, Winduhs, Linux, gdb, nmap, C compilers, Perl, netstat,
ping, mutt, Emacs, EVERYTHING!

Viksit As the management in charge of the company, I might
Viksit *personally* appreciate original work being done by
Viksit hackers and the community in general, but officially?
Viksit Arent they just a pain which i'd want to counter ASAP?

No.  If you want to protect your music don't protect the people who
write software -- prosecute those who use the software to perform
illegal acts.

Remember -- it's not the tool that is illegal, it's the use to which
it is put by an individual that is or is not.

Regards,

- -- Raju
- -- 
Raj Mathur[EMAIL PROTECTED]  http://kandalaya.org/
   GPG: 78D4 FC67 367F 40E2 0DD5  0FEF C968 D0EF CC68 D17F
  It is the mind that moves
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.8 http://mailcrypt.sourceforge.net/

iD8DBQFAgNN7yWjQ78xo0X8RAoQeAJ9UKaujdXJvSKoXvJ+og0BtV8euFACdHTeU
WTDYMeib523PgB4M/rd0dV8=
=ydUJ
-END PGP SIGNATURE-

___
ilugd mailinglist -- [EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/[EMAIL PROTECTED]/


Re: [ilugd] Re: [LIG] [OT] Sarovar, Fairplay, Apple

2004-04-17 Thread Viksit Gaur

 
 This is actually a gray area - while Free Software
 is about *creating* 
 gray area and not stealing ideas from others, some
 times it becomes 
 imperative that a proprietary technology is made
 available to the 
 public(through a Free software ofcourse) when the
 technology becomes 
 critical for the masses - e.g. making software which
 reads MSOffice 
 files(Abiword,OOo), or making software which
 interoperates with MS 
 machines in a file sharing network(Samba).
 

Well, as for this argument, the companies in question
wouldnt go against such programs because the End
Result is the propogation of their own technology - be
it Word files or Win interoperability. But in terms of
Apple's itunes or other such programs, I'm sure the
arguments dont hold.

 1. But the general idea of problems of this nature
 is - that if you dont 
 like the policies of the company who creates this
 technology in the 
 first place - dont buy it. Nobody is forcing you to
 do so!
Exactly. But I'm *not* buying it. I'm creating an
alternative for myself and thousands of others, to get
the product yet not paying for it. Maybe this is where
the creation of Gray areas comes in.. 

 2. On the other hand, people have strong opinions on
 the very terms 
 under which this technology is given and find it
 unfairly restrictive.
 
But can you blame a company from trying to make
profits by selling a service - Apple hasnt exactly put
in unfair trade practices or something, which might
lead to ideological differences? 

--
vik

=
--
Viksit Gaur   http://www.viksit.com
me[at]viksit.com
viksit[at]linux-delhi[dot]org

'Not all who wander are lost.' 
  - J.R.R. Tolkien, The Fellowship of the Ring




__
Do you Yahoo!?
Yahoo! Tax Center - File online by April 15th
http://taxes.yahoo.com/filing.html

___
ilugd mailinglist -- [EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/[EMAIL PROTECTED]/


Re: [ilugd] Re: [LIG] [OT] Sarovar, Fairplay, Apple

2004-04-17 Thread Viksit Gaur
Hey!

 No.  If you want to protect your music don't protect
 the people who
 write software -- prosecute those who use the
 software to perform
 illegal acts.
 
True. Brings to mind the RIAA suing that 12 year old
girl though! Brianna Something, from NYC.

 Remember -- it's not the tool that is illegal, it's
 the use to which
 it is put by an individual that is or is not.
 
Well put.

--
vik

=
--
Viksit Gaur   http://www.viksit.com
me[at]viksit.com
viksit[at]linux-delhi[dot]org

'Not all who wander are lost.' 
  - J.R.R. Tolkien, The Fellowship of the Ring




__
Do you Yahoo!?
Yahoo! Tax Center - File online by April 15th
http://taxes.yahoo.com/filing.html

___
ilugd mailinglist -- [EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/[EMAIL PROTECTED]/


Re: [ilugd] Re: [LIG] [OT] Sarovar, Fairplay, Apple

2004-04-17 Thread Sandip Bhattacharya
Raj Mathur wrote:
Remember -- it's not the tool that is illegal, it's the use to which
it is put by an individual that is or is not.
I agree. This is probably the assumption under which guns are allowed in 
USA. But what about a country like ours, where people are not allowed 
(easily) to keep guns because they have a potential of hurting others?

- Sandip

--
Sandip Bhattacharya
sandip (at) puroga.com
Puroga Technologies Pvt. Ltd.
Work: http://www.puroga.comHome: http://www.sandipb.net
GPG: 51A4 6C57 4BC6 8C82 6A65 AE78 B1A1 2280 A129 0FF3

___
ilugd mailinglist -- [EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/[EMAIL PROTECTED]/


Re: [ilugd] Re: [LIG] [OT] Sarovar, Fairplay, Apple

2004-04-17 Thread Viksit Gaur

 I agree. This is probably the assumption under which
 guns are allowed in 
 USA. But what about a country like ours, where
 people are not allowed 
 (easily) to keep guns because they have a potential
 of hurting others?
 
The reasons are probably political, not to mention
archaic laws and the absence of good lawmakers (who're
actually supported in parliament!). 

I mean, legalizing guns would probably be better,
because most are available illegally, and thus
untraceable after a situation. But, this opens up a
totally new debate, one which has raged the US for
eons : Gun law regulations.


--
vik

=
--
Viksit Gaur   http://www.viksit.com
me[at]viksit.com
viksit[at]linux-delhi[dot]org

'Not all who wander are lost.' 
  - J.R.R. Tolkien, The Fellowship of the Ring




__
Do you Yahoo!?
Yahoo! Tax Center - File online by April 15th
http://taxes.yahoo.com/filing.html

___
ilugd mailinglist -- [EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/[EMAIL PROTECTED]/


Re: [ilugd] Re: [LIG] [OT] Sarovar, Fairplay, Apple

2004-04-17 Thread Sanjeev \Ghane\ Gupta
On Saturday, April 17, 2004 2:49 PM [GMT+0800=SGT],
Raj Mathur [EMAIL PROTECTED] wrote:

 You may not like it but you'd have to live with it.  Just as
 you have the right to embed security into your software, others
 have the right to study, hack and bypass that security.

Rights are defined by law, and law may make such study illegal.
There are no innate rights in the Indian Constitution[1].  Rights
which are granted today may be removed tomorrow[2].

 I think you're missing the important point here -- stealing
 music is illegal, but providing tools that MAY be used to steal
 music isn't. If we support the banning of tools that may
 possibly be used for illegal purposes we'll have to ban just
 about everything -- starting with computers, Winduhs, Linux,
 gdb, nmap, C compilers, Perl, netstat, ping, mutt, Emacs,
 EVERYTHING!

 Remember -- it's not the tool that is illegal, it's the use to
 which it is put by an individual that is or is not.

True, in general.  However, tools may be banned, even if the purpose
that they may be used for is not clear, or proven.  Examples include
the ban of knifes with blades longer than 6 inches[3], the transport
of cultures for communicable diseases, etc.

Raju, I agree with you fully, and we are in good company, Hume,
Franklin, Mills, et al.  However, the law is what the law says it is,
not what is right, or reasonable.

==

[1] The US Declaration of Independance states that some rights are
inalienable, and among these are the rights to life, liberty, and
the pursuit of happiness.  However, the Declaration has no legal
value, the Constitution does, and that grants rights, not recognizes
their existance.

[2] cf The right to Property.  This was a Fundumental Right under the
1950 Constitution.  Look for Section Article 19 (f).  Look carefully.
Then look at the 44th Amendment.  Also, look for Article 31, Right to
Property.

[3] Being in possesion of a knife with blade longer than 6 inches is
not in itself illegal, but the Court will accept that as evidence
adducing against you.  Inaccurately but pithily, you are guilty unless
you can prove yourself innocent.  Similar laws exist about the
carrying of lock picks.

--
Sanjeev


___
ilugd mailinglist -- [EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/[EMAIL PROTECTED]/


Re: [ilugd] Re: [LIG] [OT] Sarovar, Fairplay, Apple

2004-04-17 Thread Raj Mathur
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Ghane,

 Ghane == Sanjeev Gupta Sanjeev writes:

Ghane On Saturday, April 17, 2004 2:49 PM [GMT+0800=SGT], Raj
Ghane Mathur [EMAIL PROTECTED] wrote:

 You may not like it but you'd have to live with it.  Just as
 you have the right to embed security into your software, others
 have the right to study, hack and bypass that security.

Ghane Rights are defined by law, and law may make such study
Ghane illegal.  There are no innate rights in the Indian
Ghane Constitution[1].  Rights which are granted today may be
Ghane removed tomorrow[2].

Agreed.

 I think you're missing the important point here -- stealing
 music is illegal, but providing tools that MAY be used to steal
 music isn't. If we support the banning of tools that may
 possibly be used for illegal purposes we'll have to ban just
 about everything -- starting with computers, Winduhs, Linux,
 gdb, nmap, C compilers, Perl, netstat, ping, mutt, Emacs,
 EVERYTHING!
 
 Remember -- it's not the tool that is illegal, it's the use to
 which it is put by an individual that is or is not.

Ghane True, in general.  However, tools may be banned, even if
Ghane the purpose that they may be used for is not clear, or
Ghane proven.  Examples include the ban of knifes with blades
Ghane longer than 6 inches[3], the transport of cultures for
Ghane communicable diseases, etc.

Ghane Raju, I agree with you fully, and we are in good company,
Ghane Hume, Franklin, Mills, et al.  However, the law is what the
Ghane law says it is, not what is right, or reasonable.

Also agreed.  However in this case the right to innovate, even if it
hurts a business, has not been assigned or declined.  Apple is
assuming that they do have the right to stop development and
propagation of a program that may hurt their business.  I believe that
we should fight that assumption.

If we do fight, the outcome is unclear.  The free software community,
the hacker community, all of us may lose.  However it's not on my
agenda to lie back and accept the inevitable, and inevitable it
certainly shall be if we don't question the whole basis of Apple's
legality in sending the notice.

Regards,

- -- Raju

Ghane [snip]

- -- 
Raj Mathur[EMAIL PROTECTED]  http://kandalaya.org/
   GPG: 78D4 FC67 367F 40E2 0DD5  0FEF C968 D0EF CC68 D17F
  It is the mind that moves
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.8 http://mailcrypt.sourceforge.net/

iD8DBQFAgOCryWjQ78xo0X8RAgYcAKCLmTGpcTPxeQsHzTERawxE+5/NtwCgjh7c
Fx8PVEvC8jRWmafZFTNyK+w=
=s/qU
-END PGP SIGNATURE-

___
ilugd mailinglist -- [EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/[EMAIL PROTECTED]/


[ilugd] Open Source Software:-

2004-04-17 Thread Arun Kumar.A,delhi
Hi all,
 Can anyone provide a single session lecture on Open Source Software.This is for a few 
group.
Kindly advice.

regards,
 ARUN KUMAR.A
___
ilugd mailinglist -- [EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/[EMAIL PROTECTED]/


[ilugd] (fwd) [SECURITY] [DSA 490-1] New Zope packages fix arbitrary code execution

2004-04-17 Thread Raj Mathur
[Please upgrade if you use Zope with the ZCatalog plug-in on any
platform -- Raju]

This is an RFC 1153 digest.
(1 message)
--

Message-Id: [EMAIL PROTECTED]
From: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [Full-Disclosure] [SECURITY] [DSA 490-1] New Zope packages fix arbitrary code 
execution
Date: Sat, 17 Apr 2004 17:42:05 +0200 (CEST)

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 490-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
April 17th, 2004http://www.debian.org/security/faq
- --

Package: zope
Vulnerability  : arbitrary code execution
Problem-Type   : remote
Debian-specific: no
CVE ID : CVE-2002-0688

A vulnerability has been discovered in the index support of the
ZCatalog plug-in in Zope, an open source web application server.  A
flaw in the security settings of ZCatalog allows anonymous users to
call arbitrary methods of catalog indexes.  The vulnerability also
allows untrusted code to do the same.

For the stable distribution (woody) this problem has been fixed in
version 2.5.1-1woody1.

For the unstable distribution (sid) this problem has been fixed in
version 2.6.0-0.1 and higher.

We recommend that you upgrade your zope package.


Upgrade Instructions
- 

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- 

  Source archives:

http://security.debian.org/pool/updates/main/z/zope/zope_2.5.1-1woody1.dsc
  Size/MD5 checksum:  684 bae9669b048bb73ff0fb4de1cba378d4
http://security.debian.org/pool/updates/main/z/zope/zope_2.5.1-1woody1.diff.gz
  Size/MD5 checksum:88172 d8461358bc98af430ed32dd89a45dbcb
http://security.debian.org/pool/updates/main/z/zope/zope_2.5.1.orig.tar.gz
  Size/MD5 checksum:  2165141 65d502b2acf986693576decad6b837cf

  Alpha architecture:

http://security.debian.org/pool/updates/main/z/zope/zope_2.5.1-1woody1_alpha.deb
  Size/MD5 checksum:  2236994 a0eb7df5046ae357d760d18ef8a2619e

  ARM architecture:

http://security.debian.org/pool/updates/main/z/zope/zope_2.5.1-1woody1_arm.deb
  Size/MD5 checksum:  2148088 dba70d7c78d850557783603038bc9947

  Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/z/zope/zope_2.5.1-1woody1_i386.deb
  Size/MD5 checksum:  2130316 5172bd775bcd0ae107242525cf67b443

  Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/z/zope/zope_2.5.1-1woody1_ia64.deb
  Size/MD5 checksum:  2388054 51c1ad0503162c4f0e152f233a45b3ca

  HP Precision architecture:

http://security.debian.org/pool/updates/main/z/zope/zope_2.5.1-1woody1_hppa.deb
  Size/MD5 checksum:  2240312 bbac2d795c157069d27e63ffaf0f3b5c

  Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/z/zope/zope_2.5.1-1woody1_m68k.deb
  Size/MD5 checksum:  2133690 1662a0ece415a56d4e25ad6f31576b9f

  Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/z/zope/zope_2.5.1-1woody1_mips.deb
  Size/MD5 checksum:  2172370 5f127d8ac54046e75c6ab9bbfe9224c1

  Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/z/zope/zope_2.5.1-1woody1_mipsel.deb
  Size/MD5 checksum:  2170856 f57b6a66116df5b30f499f5e4cdab6aa

  PowerPC architecture:

http://security.debian.org/pool/updates/main/z/zope/zope_2.5.1-1woody1_powerpc.deb
  Size/MD5 checksum:  2168352 2b66d671fe1cb86a84df066902c503d0

  IBM S/390 architecture:

http://security.debian.org/pool/updates/main/z/zope/zope_2.5.1-1woody1_s390.deb
  Size/MD5 checksum:  2153234 97df94cbfc71001ce67d6f02e6dde798

  Sun Sparc architecture:

http://security.debian.org/pool/updates/main/z/zope/zope_2.5.1-1woody1_sparc.deb
  Size/MD5 checksum:  2212970 5a660d1befe3b8ba2be26439eb1d1b21


  These files will probably be moved into the stable distribution on
  its next update.

- -
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: [EMAIL PROTECTED]
Package info: `apt-cache show pkg' and http://packages.debian.org/pkg

-BEGIN PGP SIGNATURE-
Version: 

[ilugd] debian linux cds i am totally confused

2004-04-17 Thread Surendra Verma
Hi,
I downloaded the Debian Linux 3.02 but i am
totally confused as to why there are so many cds there
(totalling 
8 as compared to generally 3 in others).
Is it becuase that it has a lot more packages
there or is it because the source code is included in
it.the site http://www.debian.org seems to br blank on
this issue too.
  If anybody is using it please clarify which are the
cds 
i need to write(i dont need the source code).
Regards.

=
Surendra Verma,
WD-22,Shivalik House,
IIT Delhi,
New Delhi-110016,
India.
ph -11-26527315


Yahoo! India Matrimony: Find your partner online. 
http://yahoo.shaadi.com/india-matrimony/

___
ilugd mailinglist -- [EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/[EMAIL PROTECTED]/