Re: Bind stop working right.

2001-05-30 Thread Jamie Heilman
> It is the bind 1:8.2.3-0.potato.1 > Is there any fixes/know problems to this version? http://bugs.debian.org/cgi-bin/pkgreport.cgi?pkg=bind >From a security standpoint there are always problems with bind, but no matter, there are much better DNS servers out there. I believe I saw maradns enter

Bind stop working right.

2001-05-30 Thread Carlos Barros
I have some problems on one server. Some times bind doesn't respond any more until it is restarted. Then I only see domain traffic outgoing, not incoming and no reponses from others servers. It is the bind 1:8.2.3-0.potato.1 Is there any fixes/know problems to this version? -- Carlos Barros.

Re: Bind stop working right.

2001-05-30 Thread Jamie Heilman
> It is the bind 1:8.2.3-0.potato.1 > Is there any fixes/know problems to this version? http://bugs.debian.org/cgi-bin/pkgreport.cgi?pkg=bind >From a security standpoint there are always problems with bind, but no matter, there are much better DNS servers out there. I believe I saw maradns enter

Bind stop working right.

2001-05-30 Thread Carlos Barros
I have some problems on one server. Some times bind doesn't respond any more until it is restarted. Then I only see domain traffic outgoing, not incoming and no reponses from others servers. It is the bind 1:8.2.3-0.potato.1 Is there any fixes/know problems to this version? -- Carlos Barros.

Re: root fs/crypted

2001-05-30 Thread Hubert Chan
On Wed, 30 May 2001, Aaron Dewell wrote: > > Having a crypto install option (even if it's a little more complex to > get) is still better than not having one. I agree. I just wanted to remind people that we would need two sets of install disks if we were to bundle crypto into the installation p

Re: root fs/crypted

2001-05-30 Thread Aaron Dewell
Having a crypto install option (even if it's a little more complex to get) is still better than not having one. At this point, all one can do is encrypt a filesystem off of a non- encrypted root partition. Like removable media or something else that is mounted by hand. There are some logistical

Re: root fs/crypted

2001-05-30 Thread Hubert Chan
On Wed, 30 May 2001, Zak Kipling wrote: > Although in some countries (eg Britain) you can be required by law to > disclose the decryption keys, and imprisoned if you fail to do so. The > only way around this is to use a steganographic approach where, in the > absence of the passphrase for a given

Re: root fs/crypted

2001-05-30 Thread Hubert Chan
On Wed, 30 May 2001, Aaron Dewell wrote: > > Having a crypto install option (even if it's a little more complex to > get) is still better than not having one. I agree. I just wanted to remind people that we would need two sets of install disks if we were to bundle crypto into the installation

Re: root fs/crypted

2001-05-30 Thread Aaron Dewell
Having a crypto install option (even if it's a little more complex to get) is still better than not having one. At this point, all one can do is encrypt a filesystem off of a non- encrypted root partition. Like removable media or something else that is mounted by hand. There are some logistica

Re: security in general

2001-05-30 Thread Peter Cordes
On Wed, May 30, 2001 at 11:55:33AM +0200, kjfsgjks ksjgkfhfd wrote: > > >- use things like tripwire (but that?s only 100% safe if you set it up > > before the machine?s connected to the net the first time) > Yeah I wanted to do that, but unfortunately I already had it connected for > like 24h o

Re: root fs/crypted

2001-05-30 Thread Jim Breton
On Tue, May 29, 2001 at 11:54:29PM -0800, Ethan Benson wrote: > trouble is when your dealing with corrupt/fascist/evil > government/regimes encryption isn't going to do you much good, either > they will throw you in prison for refusing to disclose the decryption > key or worse they will use methods

clarifying use of snort [was - Re: security in general]

2001-05-30 Thread Robert L. Yelvington
> >Sounds like you've almost everything covered. About the only things I > >could recommend would be to run nessus against yourself and install > >snort in IDS mode. > I could try that, I'd have to look up some info on the program. I assume > nessus checks for known vulnerabilities? Sounds ok, neve

Re: root fs/crypted

2001-05-30 Thread Hubert Chan
On Wed, 30 May 2001, Zak Kipling wrote: > Although in some countries (eg Britain) you can be required by law to > disclose the decryption keys, and imprisoned if you fail to do so. The > only way around this is to use a steganographic approach where, in the > absence of the passphrase for a given

Re: root fs/crypted

2001-05-30 Thread Jim Zajkowski
On Wed, May 30, 2001 at 02:30:48AM -0700, Jon Leonard wrote: > I'm not aware of any actual implementations, unfortunately. Rubberhose, www.rubberhose.org, implements deniable crypto, exactly as you described. --Jim -- Jim Zajkowski System Administrator ITCS Contract Services

Re: security in general

2001-05-30 Thread Peter Cordes
On Wed, May 30, 2001 at 11:55:33AM +0200, kjfsgjks ksjgkfhfd wrote: > > >- use things like tripwire (but that?s only 100% safe if you set it up > > before the machine?s connected to the net the first time) > Yeah I wanted to do that, but unfortunately I already had it connected for > like 24h

Re: root fs/crypted

2001-05-30 Thread Jim Breton
On Tue, May 29, 2001 at 11:54:29PM -0800, Ethan Benson wrote: > trouble is when your dealing with corrupt/fascist/evil > government/regimes encryption isn't going to do you much good, either > they will throw you in prison for refusing to disclose the decryption > key or worse they will use method

clarifying use of snort [was - Re: security in general]

2001-05-30 Thread Robert L. Yelvington
> >Sounds like you've almost everything covered. About the only things I > >could recommend would be to run nessus against yourself and install > >snort in IDS mode. > I could try that, I'd have to look up some info on the program. I assume > nessus checks for known vulnerabilities? Sounds ok, nev

Re: root fs/crypted

2001-05-30 Thread clemens
it should also be possible to include basic network support into the initrd to enable 'entering' a password remote. we can't support all methods allowed by /etc/network/interfaces (ppp/wvdial should be omitted..) but static/dhcp/bootp are possible. there authorization process could beneath readin

Re: root fs/crypted

2001-05-30 Thread clemens
On Wed, May 30, 2001 at 12:17:35PM +0900, Curt Howland wrote: > [cut] > but that only works at startup. if the system is running, > having the entire disk encrypted is no different than the > fact it's all in hex already. an individual user based > encryption means all you have to do is logout, no

Re: root fs/crypted

2001-05-30 Thread clemens
On Tue, May 29, 2001 at 08:02:50PM -0700, Paul Lowe wrote: > I like this. Would it be difficult to modify Debian, so that > upon install, it creates an encrypted root volume and starts > things off the right way? 3 things are needed to that upon installation: - losetup -e /dev/loop0 /dev/ (for

Re: root fs/crypted

2001-05-30 Thread clemens
On Wed, May 30, 2001 at 10:46:19AM +0200, Jan Niehusmann wrote: > On Wed, May 30, 2001 at 01:08:21AM -0700, [EMAIL PROTECTED] wrote: > > Couldn't you say something like "I'm so sorry, I can't remember the pass > > phrase, my mind has failed me...etc?" > What about a more provable approach: > > Th

Re: root fs/crypted

2001-05-30 Thread Jim Zajkowski
On Wed, May 30, 2001 at 02:30:48AM -0700, Jon Leonard wrote: > I'm not aware of any actual implementations, unfortunately. Rubberhose, www.rubberhose.org, implements deniable crypto, exactly as you described. --Jim -- Jim Zajkowski System Administrator ITCS Contract Services -- To UNSUBSC

Re: root fs/crypted

2001-05-30 Thread clemens
it should also be possible to include basic network support into the initrd to enable 'entering' a password remote. we can't support all methods allowed by /etc/network/interfaces (ppp/wvdial should be omitted..) but static/dhcp/bootp are possible. there authorization process could beneath readi

Re: security in general

2001-05-30 Thread kjfsgjks ksjgkfhfd
From: "Ingmar Schrey" <[EMAIL PROTECTED]> Real system administrators are a bit paranoid I´m told... ...so that´s ok I think. ;) hehe they *made* me paranoid! - use things like tripwire (but that´s only 100% safe if you set it up before the machine´s connected to the net the first time) Yeah

Re: root fs/crypted

2001-05-30 Thread clemens
On Wed, May 30, 2001 at 12:17:35PM +0900, Curt Howland wrote: > [cut] > but that only works at startup. if the system is running, > having the entire disk encrypted is no different than the > fact it's all in hex already. an individual user based > encryption means all you have to do is logout, n

Re: root fs/crypted

2001-05-30 Thread clemens
On Tue, May 29, 2001 at 08:02:50PM -0700, Paul Lowe wrote: > I like this. Would it be difficult to modify Debian, so that > upon install, it creates an encrypted root volume and starts > things off the right way? 3 things are needed to that upon installation: - losetup -e /dev/loop0 /dev/ (fo

Re: root fs/crypted

2001-05-30 Thread clemens
On Wed, May 30, 2001 at 10:46:19AM +0200, Jan Niehusmann wrote: > On Wed, May 30, 2001 at 01:08:21AM -0700, [EMAIL PROTECTED] wrote: > > Couldn't you say something like "I'm so sorry, I can't remember the pass > > phrase, my mind has failed me...etc?" > What about a more provable approach: > > T

Re: root fs/crypted

2001-05-30 Thread Zak Kipling
On Wed, 30 May 2001, Jon Leonard wrote: > I'm not aware of any actual implementations, unfortunately. http://www.mcdonald.org.uk/StegFS/

Re: root fs/crypted

2001-05-30 Thread Jon Leonard
On Wed, May 30, 2001 at 10:46:19AM +0200, Jan Niehusmann wrote: > On Wed, May 30, 2001 at 01:08:21AM -0700, [EMAIL PROTECTED] wrote: > > Couldn't you say something like "I'm so sorry, I can't remember the pass > > phrase, my mind has failed me...etc?" > > What about a more provable approach: > >

Re: root fs/crypted

2001-05-30 Thread Jan Niehusmann
On Wed, May 30, 2001 at 01:08:21AM -0700, [EMAIL PROTECTED] wrote: > Couldn't you say something like "I'm so sorry, I can't remember the pass > phrase, my mind has failed me...etc?" What about a more provable approach: The passphrase could be changed automatically on every system boot, and the n

Re: root fs/crypted

2001-05-30 Thread paul
Couldn't you say something like "I'm so sorry, I can't remember the pass phrase, my mind has failed me...etc?" Are there real truth serums? hehe, Paul Ethan Benson wrote: > On Wed, May 30, 2001 at 03:01:17AM +0200, clemens wrote: > > > > SAWFASP^* > > > > as laws around the globe are forged to

Re: root fs/crypted

2001-05-30 Thread Ethan Benson
On Wed, May 30, 2001 at 03:01:17AM +0200, clemens wrote: > > SAWFASP^* > > as laws around the globe are forged to weak personal privacy, > police knocking on one's door, because of portscanning a > previously hacked website, and - i don't have to tell those > of you, which are reading slashdot -

Re: root fs/crypted

2001-05-30 Thread Zak Kipling
On Tue, 29 May 2001 [EMAIL PROTECTED] wrote: > I see it as more than this. I see it as ensuring that the data on the disk > does > not get accessed by anyone never intended to see it. (physically, of course). > I guess this would mostly be cool for thwarting things like police raids, Although in

Re: security in general

2001-05-30 Thread kjfsgjks ksjgkfhfd
>From: "Ingmar Schrey" <[EMAIL PROTECTED]> >Real system administrators are a bit paranoid I´m told... >...so that´s ok I think. ;) hehe they *made* me paranoid! >- use things like tripwire (but that´s only 100% safe if you set it up > before the machine´s connected to the net the first time) Y

Re: root fs/crypted

2001-05-30 Thread Zak Kipling
On Wed, 30 May 2001, Jon Leonard wrote: > I'm not aware of any actual implementations, unfortunately. http://www.mcdonald.org.uk/StegFS/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: root fs/crypted

2001-05-30 Thread Jon Leonard
On Wed, May 30, 2001 at 10:46:19AM +0200, Jan Niehusmann wrote: > On Wed, May 30, 2001 at 01:08:21AM -0700, [EMAIL PROTECTED] wrote: > > Couldn't you say something like "I'm so sorry, I can't remember the pass > > phrase, my mind has failed me...etc?" > > What about a more provable approach: >

Re: root fs/crypted

2001-05-30 Thread Jan Niehusmann
On Wed, May 30, 2001 at 01:08:21AM -0700, [EMAIL PROTECTED] wrote: > Couldn't you say something like "I'm so sorry, I can't remember the pass > phrase, my mind has failed me...etc?" What about a more provable approach: The passphrase could be changed automatically on every system boot, and the

Re: root fs/crypted

2001-05-30 Thread paul
I see it as more than this. I see it as ensuring that the data on the disk does not get accessed by anyone never intended to see it. (physically, of course). I guess this would mostly be cool for thwarting things like police raids, servers vulnerable in remote locations (e.g. colocation, etc). My o

Re: root fs/crypted

2001-05-30 Thread paul
Couldn't you say something like "I'm so sorry, I can't remember the pass phrase, my mind has failed me...etc?" Are there real truth serums? hehe, Paul Ethan Benson wrote: > On Wed, May 30, 2001 at 03:01:17AM +0200, clemens wrote: > > > > SAWFASP^* > > > > as laws around the globe are forged t

Re: root fs/crypted

2001-05-30 Thread Ethan Benson
On Wed, May 30, 2001 at 03:01:17AM +0200, clemens wrote: > > SAWFASP^* > > as laws around the globe are forged to weak personal privacy, > police knocking on one's door, because of portscanning a > previously hacked website, and - i don't have to tell those > of you, which are reading slashdot

Re: root fs/crypted

2001-05-30 Thread Zak Kipling
On Tue, 29 May 2001 [EMAIL PROTECTED] wrote: > I see it as more than this. I see it as ensuring that the data on the disk does > not get accessed by anyone never intended to see it. (physically, of course). > I guess this would mostly be cool for thwarting things like police raids, Although in s