On Tue, Nov 13, 2001 at 02:06:56AM -0200, phadell wrote:
> hello there,
>
> I would like to do a rule that mirror the packets that incoming from a
> portscanner.
> The rule must return the packets to the source. If anyone scan my machine
> ports, the result will be the list of source address o
On 2001-11-12 16:54 Ethan Benson wrote:
On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote:
CH> Which makes me wonder, why ship Woody with 2.2.20 at all? Oh well, not
CH> my decision.
EB> because 2.4 is not stable yet.
*applause* I was hoping for that. Great decision. In fact the o
hello there,
I would like to do a rule that mirror the packets that incoming from a
portscanner.
The rule must return the packets to the source. If anyone scan my machine
ports, the result will be the list of source address open ports.
Anyone could help me with this rule?
phadell
ps.: sorry
On Tue, Nov 13, 2001 at 02:06:56AM -0200, phadell wrote:
> hello there,
>
> I would like to do a rule that mirror the packets that incoming from a
> portscanner.
> The rule must return the packets to the source. If anyone scan my machine
> ports, the result will be the list of source address
On 2001-11-12 16:54 Ethan Benson wrote:
On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote:
CH> Which makes me wonder, why ship Woody with 2.2.20 at all? Oh well, not
CH> my decision.
EB> because 2.4 is not stable yet.
*applause* I was hoping for that. Great decision. In fact the
While the traffic load on debian-user, for instance, makes subscribing
just to ask one question somewhat hazardous to ones mailspool, I agree
with making debian-security "posting by subscriber only". It really
isn't "moderating", and doesn't take anyones time.
To whom should we address the suggest
On 2001-11-10 00:17 Vineet Kumar wrote:
> * Sebastiaan ([EMAIL PROTECTED]) [011109 14:44]:
> > High,
> >
> > On Fri, 9 Nov 2001, Ed Street wrote:
> >
> > > Hey,
> > >
> > > Is there *anything* we can do about all this Spam that's getting on this
> > > list?
> > >
>
> Yes. We can silently ignore th
hello there,
I would like to do a rule that mirror the packets that incoming from a
portscanner.
The rule must return the packets to the source. If anyone scan my machine
ports, the result will be the list of source address open ports.
Anyone could help me with this rule?
phadell
ps.: sorr
On Mon, Nov 12, 2001 at 05:54:04PM -0800, Ethan Benson wrote:
> On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote:
> > I will gladly grant that the tar file may not exist for the boot
> > floppies, and that I do not have on hand the CD to check it. It also
> may
> > have been a Potato
On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote:
> I will gladly grant that the tar file may not exist for the boot
> floppies, and that I do not have on hand the CD to check it. It also may
> have been a Potato(e) phenominon, no longer in use. However, it did
> exist.
yes releases
I will gladly grant that the tar file may not exist for the boot
floppies, and that I do not have on hand the CD to check it. It also may
have been a Potato(e) phenominon, no longer in use. However, it did
exist.
Which makes me wonder, why ship Woody with 2.2.20 at all? Oh well, not
my decision.
On Tue, Nov 13, 2001 at 09:41:54AM +0900, Howland, Curtis wrote:
> The tar file that contains the "base" Woody install, which is used as
> the jumping off point for installation.
there is no such thing.
> The tar file has binary kernel, /boot, /proc and other directories, I'm
> not sure exactly w
On Tue, 13 Nov 2001, Howland, Curtis wrote:
> The tar file that contains the "base" Woody install, which is used as
> the jumping off point for installation.
There isn't one, at least not for bootflopies. We use debootstrap to fetch
the most up-to-date packages of that distribution and install the
The tar file that contains the "base" Woody install, which is used as
the jumping off point for installation.
The tar file has binary kernel, /boot, /proc and other directories, I'm
not sure exactly what the limit to its contents is. I found this out by
building a CD via the "assemble the CD image
On Tue, Nov 13, 2001 at 09:25:29AM +0900, Howland, Curtis wrote:
> Thanks.
>
> I've been keeping it up to date weekly or so, but just to be sure I
> changed the sources.list to be "... potato/..." instead of "...
> stable/..." for when "stable" changes.
>
> Even a blank-disk install of Woody wasn
While the traffic load on debian-user, for instance, makes subscribing
just to ask one question somewhat hazardous to ones mailspool, I agree
with making debian-security "posting by subscriber only". It really
isn't "moderating", and doesn't take anyones time.
To whom should we address the sugges
Thanks.
I've been keeping it up to date weekly or so, but just to be sure I
changed the sources.list to be "... potato/..." instead of "...
stable/..." for when "stable" changes.
Even a blank-disk install of Woody wasn't straight forward. The kernel
in the distribution tar file was 2.2.xx, changi
On 2001-11-10 00:17 Vineet Kumar wrote:
> * Sebastiaan ([EMAIL PROTECTED]) [011109 14:44]:
> > High,
> >
> > On Fri, 9 Nov 2001, Ed Street wrote:
> >
> > > Hey,
> > >
> > > Is there *anything* we can do about all this Spam that's getting on this
> > > list?
> > >
>
> Yes. We can silently ignore t
On Tue, Nov 13, 2001 at 09:02:56AM +0900, Howland, Curtis wrote:
> A quick question concerning such things...
>
> I have a remote server that I do not trust myself to upgrade from
> Potato(e) to Woody, and such vulnerabilities do worry me a little. Is
> there any general expectation that such "bac
Previously Howland, Curtis wrote:
> I have a remote server that I do not trust myself to upgrade from
> Potato(e) to Woody, and such vulnerabilities do worry me a little. Is
> there any general expectation that such "back porting" will continue
> once Woody is released?
I expect only for a limited
A quick question concerning such things...
I have a remote server that I do not trust myself to upgrade from
Potato(e) to Woody, and such vulnerabilities do worry me a little. Is
there any general expectation that such "back porting" will continue
once Woody is released?
Curt-
-Original Mess
On Mon, Nov 12, 2001 at 05:54:04PM -0800, Ethan Benson wrote:
> On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote:
> > I will gladly grant that the tar file may not exist for the boot
> > floppies, and that I do not have on hand the CD to check it. It also
> may
> > have been a Potat
On Tue, Nov 13, 2001 at 10:10:10AM +0900, Howland, Curtis wrote:
> I will gladly grant that the tar file may not exist for the boot
> floppies, and that I do not have on hand the CD to check it. It also may
> have been a Potato(e) phenominon, no longer in use. However, it did
> exist.
yes release
I will gladly grant that the tar file may not exist for the boot
floppies, and that I do not have on hand the CD to check it. It also may
have been a Potato(e) phenominon, no longer in use. However, it did
exist.
Which makes me wonder, why ship Woody with 2.2.20 at all? Oh well, not
my decision.
On Tue, Nov 13, 2001 at 09:41:54AM +0900, Howland, Curtis wrote:
> The tar file that contains the "base" Woody install, which is used as
> the jumping off point for installation.
there is no such thing.
> The tar file has binary kernel, /boot, /proc and other directories, I'm
> not sure exactly
On Tue, 13 Nov 2001, Howland, Curtis wrote:
> The tar file that contains the "base" Woody install, which is used as
> the jumping off point for installation.
There isn't one, at least not for bootflopies. We use debootstrap to fetch
the most up-to-date packages of that distribution and install th
The tar file that contains the "base" Woody install, which is used as
the jumping off point for installation.
The tar file has binary kernel, /boot, /proc and other directories, I'm
not sure exactly what the limit to its contents is. I found this out by
building a CD via the "assemble the CD imag
On Tue, Nov 13, 2001 at 09:25:29AM +0900, Howland, Curtis wrote:
> Thanks.
>
> I've been keeping it up to date weekly or so, but just to be sure I
> changed the sources.list to be "... potato/..." instead of "...
> stable/..." for when "stable" changes.
>
> Even a blank-disk install of Woody was
Thanks.
I've been keeping it up to date weekly or so, but just to be sure I
changed the sources.list to be "... potato/..." instead of "...
stable/..." for when "stable" changes.
Even a blank-disk install of Woody wasn't straight forward. The kernel
in the distribution tar file was 2.2.xx, chang
On Tue, Nov 13, 2001 at 09:02:56AM +0900, Howland, Curtis wrote:
> A quick question concerning such things...
>
> I have a remote server that I do not trust myself to upgrade from
> Potato(e) to Woody, and such vulnerabilities do worry me a little. Is
> there any general expectation that such "ba
Previously Howland, Curtis wrote:
> I have a remote server that I do not trust myself to upgrade from
> Potato(e) to Woody, and such vulnerabilities do worry me a little. Is
> there any general expectation that such "back porting" will continue
> once Woody is released?
I expect only for a limite
A quick question concerning such things...
I have a remote server that I do not trust myself to upgrade from
Potato(e) to Woody, and such vulnerabilities do worry me a little. Is
there any general expectation that such "back porting" will continue
once Woody is released?
Curt-
-Original Mes
Thus spake Benoît MARTINET, on Mon, Nov 12, 2001 at 02:52:15PM +0100:
> > > I've just compiled & installed openssh-3.0p1 on my Debian 2.2 but
> > > failed to login using root and users' passwords. Password
> > > authentication failed all the time and it prompted "Permission Denied"
>
> [...]
> > I've just compiled & installed openssh-3.0p1 on my Debian 2.2 but
> > failed to login using root and users' passwords. Password
> > authentication failed all the time and it prompted "Permission Denied"
[...]
> Have you configured it with:
>
> --with-md5-passwords ?
Thanks, that solve
On Mon, Nov 12, 2001 at 02:21:11PM +0100, Carsten Nottebohm wrote:
> Looks fine to me.
> I think OpenSSH uses /etc/pam.d/sshd (Note the "d" in the end). Try renaming
> your pam config file.
To be exact, SSH uses whatever the binary is named. So if you name it
opensshd it'll use /etc/pam.d/openssh
> I've just compiled & installed openssh-3.0p1 on my Debian 2.2 but
> failed
> to login using root and users' passwords. Password authentication failed
> all the time and it prompted "Permission Denied" on the command line.
>
> A message, "Failed password for [user] from .." was lo
Thus spake Benoît MARTINET, on Mon, Nov 12, 2001 at 02:52:15PM +0100:
> > > I've just compiled & installed openssh-3.0p1 on my Debian 2.2 but
> > > failed to login using root and users' passwords. Password
> > > authentication failed all the time and it prompted "Permission Denied"
>
> [...]
This sounds like something I had to help a friend out with this
recently. Took me ~15sec to tell him his problem. Configure openssh3
like so:
./configure --with-pam
If it whines about the pam headers, pop into dselect and grab 'em, then
try it again, compile, install, restart ssh, give a go-round
> > I've just compiled & installed openssh-3.0p1 on my Debian 2.2 but
> > failed to login using root and users' passwords. Password
> > authentication failed all the time and it prompted "Permission Denied"
[...]
> Have you configured it with:
>
> --with-md5-passwords ?
Thanks, that solve
On Mon, Nov 12, 2001 at 02:21:11PM +0100, Carsten Nottebohm wrote:
> Looks fine to me.
> I think OpenSSH uses /etc/pam.d/sshd (Note the "d" in the end). Try renaming your
>pam config file.
To be exact, SSH uses whatever the binary is named. So if you name it
opensshd it'll use /etc/pam.d/openssh
> I've just compiled & installed openssh-3.0p1 on my Debian 2.2 but
> failed
> to login using root and users' passwords. Password authentication failed
> all the time and it prompted "Permission Denied" on the command line.
>
> A message, "Failed password for [user] from .." was l
Have you configured it with:
--with-md5-passwords
?
Thus spake Benoît MARTINET, on Mon, Nov 12, 2001 at 12:00:12PM +0100:
> (Sorry, I've already post this message, but without subject...)
>
> Hi,
>
> I've just compiled & installed openssh-3.0p1 on my Debian 2.2 but failed
> to login using
* Michal Kara <[EMAIL PROTECTED]> [02 11:35]:
> Hi there!
Hi
> During this weekend, there has been paper posted to bugtraq named
> "Analysis of SSH crc32 compensation attack detector exploit". It
> talks about a recorded successful exploit using overflow in CRC32
> compensation atta
(Sorry, I've already post this message, but without subject...)
Hi,
I've just compiled & installed openssh-3.0p1 on my Debian 2.2 but failed
to login using root and users' passwords. Password authentication failed all
the time and it prompted "Permission Denied" on the command line.
A me
Am Mon, 12. Nov 2001, 11:30:49 +0100 schrieb Michal Kara:
> Hi there!
>
> During this weekend, there has been paper posted to bugtraq named "Analysis
> of
> SSH crc32 compensation attack detector exploit". It talks about a recorded
> successful exploit using overflow in CRC32 compensation att
On Mon, Nov 12, 2001 at 11:30:49AM +0100, Michal Kara wrote:
> Hi there!
>
> During this weekend, there has been paper posted to bugtraq named "Analysis
> of
> SSH crc32 compensation attack detector exploit". It talks about a recorded
> successful exploit using overflow in CRC32 compensation
Hi there!
During this weekend, there has been paper posted to bugtraq named "Analysis of
SSH crc32 compensation attack detector exploit". It talks about a recorded
successful exploit using overflow in CRC32 compensation attack detection code, a
hole, which was discovered in February this year.
On Mon, Nov 12, 2001 at 10:46:13AM +0100, Beno?t MARTINET wrote:
> Hi,
>
> I've just compiled & installed openssh-3.0p1 on my Debian 2.2 but failed
> to login
> using root and users' passwords. Password authentication failed all the time
> and it
> prompted "Permission Denied" on the command l
This sounds like something I had to help a friend out with this
recently. Took me ~15sec to tell him his problem. Configure openssh3
like so:
./configure --with-pam
If it whines about the pam headers, pop into dselect and grab 'em, then
try it again, compile, install, restart ssh, give a go-roun
Hi,
I've just compiled & installed openssh-3.0p1 on my Debian 2.2 but failed
to login
using root and users' passwords. Password authentication failed all the time
and it
prompted "Permission Denied" on the command line.
A message, "Failed password for [user] from .." was logged in
aut
Have you configured it with:
--with-md5-passwords
?
Thus spake Benoît MARTINET, on Mon, Nov 12, 2001 at 12:00:12PM +0100:
> (Sorry, I've already post this message, but without subject...)
>
> Hi,
>
> I've just compiled & installed openssh-3.0p1 on my Debian 2.2 but failed
> to login using
* Michal Kara <[EMAIL PROTECTED]> [02 11:35]:
> Hi there!
Hi
> During this weekend, there has been paper posted to bugtraq named
> "Analysis of SSH crc32 compensation attack detector exploit". It
> talks about a recorded successful exploit using overflow in CRC32
> compensation att
(Sorry, I've already post this message, but without subject...)
Hi,
I've just compiled & installed openssh-3.0p1 on my Debian 2.2 but failed
to login using root and users' passwords. Password authentication failed all
the time and it prompted "Permission Denied" on the command line.
A m
Am Mon, 12. Nov 2001, 11:30:49 +0100 schrieb Michal Kara:
> Hi there!
>
> During this weekend, there has been paper posted to bugtraq named "Analysis of
> SSH crc32 compensation attack detector exploit". It talks about a recorded
> successful exploit using overflow in CRC32 compensation attac
On Mon, Nov 12, 2001 at 11:30:49AM +0100, Michal Kara wrote:
> Hi there!
>
> During this weekend, there has been paper posted to bugtraq named "Analysis of
> SSH crc32 compensation attack detector exploit". It talks about a recorded
> successful exploit using overflow in CRC32 compensation at
Hi there!
During this weekend, there has been paper posted to bugtraq named "Analysis of
SSH crc32 compensation attack detector exploit". It talks about a recorded
successful exploit using overflow in CRC32 compensation attack detection code, a
hole, which was discovered in February this year
On Mon, Nov 12, 2001 at 10:46:13AM +0100, Beno?t MARTINET wrote:
> Hi,
>
> I've just compiled & installed openssh-3.0p1 on my Debian 2.2 but failed
> to login
> using root and users' passwords. Password authentication failed all the time
> and it
> prompted "Permission Denied" on the command
Hi,
I've just compiled & installed openssh-3.0p1 on my Debian 2.2 but failed
to login
using root and users' passwords. Password authentication failed all the time
and it
prompted "Permission Denied" on the command line.
A message, "Failed password for [user] from .." was logged in
au
58 matches
Mail list logo