Re: OpenSSH and debian?

2003-05-06 Thread Jamie Heilman
Phillip Hofmeister wrote: > The same information can be gathered from your MTA (if you are > running one) by doing an RCPT TO: and then an RSET. This is not universally true and is generally a matter of how the MTA is configured. -- Jamie Heilman http://audible.transient.net/~j

Re: idea for improving security

2003-05-06 Thread Robert B Wilson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, 06 May 2003 20:13:41 + Deger Cenk Erdil <[EMAIL PROTECTED]> writes: > But, if I can intercept your "trigger sequence messages" as an > attacker > on your subnet, or even on the Net, I can replicate the same > sequence > quite easily!

Re: idea for improving security

2003-05-06 Thread Dr. Freshmaker
Hi. There are two serious problems to this security scheme, either of which would be enough to make it not worthwhile to implement. 1) Ease of implementation. To implement this security measure for, let's say, ssh, every legitimate user would need special ssh client software, or a software wra

Re: idea for improving security

2003-05-06 Thread Will Aoki
On Tue, May 06, 2003 at 01:07:24PM -0500, Mark Edgington wrote: > Hi, > I'm not sure whether this idea has been considered or implemented > anywhere, but I have been thinking about it, and believe it would provide a > fairly high-level of security for systems which only run a few public > se

Re: idea for improving security

2003-05-06 Thread Alain Tesio
On Tue, 06 May 2003 13:07:24 -0500 Mark Edgington <[EMAIL PROTECTED]> wrote: > > it doesn't matter if others are > connecting to port 80, etc. while he is doing these connections, as long as > no-one > else is trying to connect to any of the ports in the trigger-sequence list -- > this is >

Re: idea for improving security

2003-05-06 Thread Tim van Erven
On Tue, 06/05/2003 13:07 -0500, Mark Edgington wrote: > incorporate functionality into inetd/xinetd/rinetd which listens for a > predefined sequence of connection attempts on certain ports. Upon noticing > the correct sequence (as specified somewhere in the config file), it opens > up certain p

Re: idea for improving security

2003-05-06 Thread Horst Pflugstaedt
On Tue, May 06, 2003 at 01:07:24PM -0500, Mark Edgington wrote: > Hi, > I'm not sure whether this idea has been considered or implemented > anywhere, but I have been thinking about it, and believe it would provide a > fairly high-level of security for systems which only run a few public > se

Re: idea for improving security

2003-05-06 Thread Alexander Reelsen
Hi On Tue, May 06, 2003 at 01:07:24PM -0500, Mark Edgington wrote: > I'm not sure whether this idea has been considered or implemented > anywhere, but I have been thinking about it, and believe it would provide a > fairly high-level of security for systems which only run a few public > serv

Re: OpenSSH and debian?

2003-05-06 Thread Phillip Hofmeister
On Tue, 06 May 2003 at 05:47:37PM +0200, Diederik de Vries wrote: > Hi there! Greets, > > Today I was surfing on SecurityFocus, and saw that there was a hole in > OpenSSH (http://www.securityfocus.com/bid/7482/info/). Debian Potato > uses OpenSSH 3.1 p1, which seems to be exploitable. > > Is th

Re: idea for improving security

2003-05-06 Thread Deger Cenk Erdil
Looks like a good idea. I am not sure it has been implemented but it has some problems though.. About the case if someone is connected to your "secret sequence" ports, you can configure your machine so that there will be a server that is always listening to those ports and not allowing any con

idea for improving security

2003-05-06 Thread Mark Edgington
Hi, I'm not sure whether this idea has been considered or implemented anywhere, but I have been thinking about it, and believe it would provide a fairly high-level of security for systems which only run a few public services. The gist of it is this: incorporate functionality into inetd/xinetd

Re: OpenSSH and debian?

2003-05-06 Thread Alexander Schmehl
* Diederik de Vries <[EMAIL PROTECTED]> [030506 17:47]: > Today I was surfing on SecurityFocus, and saw that there was a hole in > OpenSSH (http://www.securityfocus.com/bid/7482/info/). Debian Potato > uses OpenSSH 3.1 p1, which seems to be exploitable. I think you might be interessted in: http://

Re: OpenSSH and debian?

2003-05-06 Thread xbud
Yes, It's somewhat of a new bug that spawned from the media service advisory on user enumeration via a timing issue if OpenSSH is compiled with PAM support. It's not a remote root per say, but mainly an enumeration weakness. By applying 'nodelay' option for pam_unix.so, this 'feature' is remedie

Re: OpenSSH and debian?

2003-05-06 Thread Michael Bergbauer
On Tue May 06, 2003 at 05:4737PM +0200, Diederik de Vries wrote: > Hi there! > > Today I was surfing on SecurityFocus, and saw that there was a hole in > OpenSSH (http://www.securityfocus.com/bid/7482/info/). Debian Potato > uses OpenSSH 3.1 p1, which seems to be exploitable. > > Is this true, am

OpenSSH and debian?

2003-05-06 Thread Diederik de Vries
Hi there! Today I was surfing on SecurityFocus, and saw that there was a hole in OpenSSH (http://www.securityfocus.com/bid/7482/info/). Debian Potato uses OpenSSH 3.1 p1, which seems to be exploitable. Is this true, am I missing something or what? Thanks! Diederik de Vries Netnation Eur

Re: bug #80888: dnrd: Multiple buffer overflows

2003-05-06 Thread Drew Scott Daniels
On Tue, 6 May 2003, Florian Weimer wrote: > Drew Scott Daniels <[EMAIL PROTECTED]> writes: > > > This bug may be worked around (and therefore downgraded) by having a > > configuration to warn the user that they must trust the DNS servers > > (wherever this is configured), and must trust the users.

Re: bug #80888: dnrd: Multiple buffer overflows

2003-05-06 Thread Florian Weimer
Drew Scott Daniels <[EMAIL PROTECTED]> writes: > This bug may be worked around (and therefore downgraded) by having a > configuration to warn the user that they must trust the DNS servers > (wherever this is configured), and must trust the users. Are you sure that you only need to trust the DNS s