-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-037-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
March 7, 2001
-
leider hab ich das schon als root versucht zu installieren!
of course i tried it as root!
mfg
--
mei gehts mia heit wida guat
Sent through GMX FreeMail - http://www.gmx.net
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Wed, Mar 07, 2001 at 01:18:20AM +0100, [EMAIL PROTECTED] wrote:
gcc -D__KERNEL__ -DMODULE -DLINUX -DEXPORT_SYMTAB -D__NO_VERSION__
-I/usr/include -I. -O2 -pipe -DCONFIG_PROC_FS -DIANS -DIANS_BASE_VLAN_TAGGING
^^
That should probably be -I/usr/src/linux/include. You need to
Hi
On Wed, Mar 07, 2001 at 03:34:14PM +0100, Jrgen Persson wrote:
the subject is clear enough... I'm looking for ''native'' support for
checking the integrity of installed packets.
You might want to try the package 'debsums'. However those files are easy
to change, but perhaps it's a start if
The integrity of the files installed can be found in tripwire and aide, that
checksums the selected files into a database... its not the same you ask but can
be usefull...
On Wed, 7 Mar 2001, Alexander Reelsen wrote:
Hi
On Wed, Mar 07, 2001 at 03:34:14PM +0100, Jrgen Persson
Hi!
Anyone know where I can find a kernel patch that restricts users so..
'who' shows only the user himself
'netstat -a' only ports that root/the user owns
'ls' only files that are owned by root/the user
??
//Niklas
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of
On Mon, 5 Mar 2001, Jaan Sarv wrote:
Also, paranoid network administrators might be a little upset by it, since
Linux sends out a frame indicating it is switching into (or out
of) promiscuous mode. This is possible evidence that you're running a
sniffer of some kind (such as snort).
There is some discussion about possible /usr/bin/Mail buffer overflow.
The link is from http://lwn.net/2001/0308/security.php3
http://securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D82%26threads%3D1%26end%3D2001-03-03%26tid%3D166333%26fromthread%3D0%26start%3D2001-02-25%26
hi
hmm..
gcc -D__KERNEL__ -DMODULE -DLINUX -DEXPORT_SYMTAB -D__NO_VERSION__
-I/usr/include -I. -O2 -pipe -DCONFIG_PROC_FS -DIANS -DIANS_BASE_VLAN_TAGGING
-DIANS_BASE_VLAN_ID -c -o ans.o ans.c
Assembler messages:
FATAL: Can't create ans.o: Permission denied
In file included from
leider hab ich das schon als root versucht zu installieren!
of course i tried it as root!
mfg
--
mei gehts mia heit wida guat
Sent through GMX FreeMail - http://www.gmx.net
Well,
the subject is clear enough... I'm looking for ''native'' support for
checking the integrity of installed packets.
Jörgen
The integrity of the files installed can be found in tripwire and aide, that
checksums the selected files into a database... its not the same you ask but can
be usefull...
On Wed, 7 Mar 2001, Alexander Reelsen wrote:
Hi
On Wed, Mar 07, 2001 at 03:34:14PM +0100, Jörgen Persson
Hi!
Anyone know where I can find a kernel patch that restricts users so..
'who' shows only the user himself
'netstat -a' only ports that root/the user owns
'ls' only files that are owned by root/the user
??
//Niklas
On Wed, Mar 07, 2001 at 05:04:17PM +0100, Niklas Höglund wrote:
Anyone know where I can find a kernel patch that restricts users so..
'who' shows only the user himself
http://www.openwall.com/linux/
'netstat -a' only ports that root/the user owns
Openwall can set access rights for /proc
On Mon, 5 Mar 2001, Jaan Sarv wrote:
Also, paranoid network administrators might be a little upset by it, since
Linux sends out a frame indicating it is switching into (or out
of) promiscuous mode. This is possible evidence that you're running a
sniffer of some kind (such as snort).
This is really goofy. But I've been able to (at least in my case) narrow
the problem down to using Xircom cards. The 3Com card that I use in my
other Debian laptop works great (switching between the two demonstrates
this behavior as well, so it isn't the laptop, and the 3Com card is Cardbus
16 matches
Mail list logo