Re: promiscuous mode

2003-05-23 Thread SLeiBt
Le sam 24/05/2003 à 00:24, Ian Goodall a écrit : > >Try using tcpdump to investigate the problem. Make sure you use the > >'-p' flag to tcpdump to tell it not to set the interface into > >promiscuous mode. Something like > ># tcpdump -i eth0 -p -n > > I have no idea what all the output means. Be

Updated kernels with security fixes

2003-05-23 Thread Herbert Xu
Hi: If you're looking for Debian alpha/i386 kernel-images with all the recent security alerts (ptrace, ioperm, net hash) fixed, look no further. For users of unstable, fixed packages are now in the archive. They will enter testing in about 10 days. For users of stable (woody), please get them f

Re: promiscuous mode

2003-05-23 Thread Ian Goodall
>Try using tcpdump to investigate the problem. Make sure you use the >'-p' flag to tcpdump to tell it not to set the interface into >promiscuous mode. Something like ># tcpdump -i eth0 -p -n I have no idea what all the output means. Below is an extract from the output: 23:17:22.564132 172.16.3

Re: promiscuous mode

2003-05-23 Thread Ian Goodall
>Try using tcpdump to investigate the problem. Make sure you use the >'-p' flag to tcpdump to tell it not to set the interface into >promiscuous mode. Something like ># tcpdump -i eth0 -p -n I have no idea what all the output means. Below is an extract from the output: 23:17:22.564132 172.16.3

Re: promiscuous mode

2003-05-23 Thread Ian Goodall
> What's the other end of your ethernet cable plugged into? A switch. This is what is confusing me. Its a very cheap netgear switch so it is probably sending out all the packets any way...

Re: md5sums

2003-05-23 Thread Tib
Added the post-invoke line to apt.conf and have debsums installed now. Is there a way to wipe the current md5sums and generate all new ones? Tib On Fri, 23 May 2003, xavier renaut wrote: > On Wed, May 21, 2003 at 01:33:02PM -0700, Tib wrote: > | > |Well I found the debsums program, but unfortu

New listing of security bugs

2003-05-23 Thread Drew Scott Daniels
Colin Watson has written new code for the BTS to allow it to display bugs with certain tags, like security [1]. The new URL for bugs tagged security is http://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=security and the old URL that's no longer linked to from qa.debian.org is still being updated at

Re: promiscuous mode

2003-05-23 Thread Noah Meyerhans
On Fri, May 23, 2003 at 08:32:27PM +0100, Ian Goodall wrote: > > I have not got multicast enabled either so I don't know what is causing > this... > > Oops looks like I have guys. I have read man 8 ifconfig but it will still > not switch off. Is this what is causing it? You probably don't want to

Re: md5sums

2003-05-23 Thread xavier renaut
On Wed, May 21, 2003 at 01:33:02PM -0700, Tib wrote: | |Well I found the debsums program, but unfortunately that hasn't solved |anything. Here's what I run and this is what I get. There are a LOT more |failures than just these, but these are the only two types of failures. |How do I properly fix th

Re: promiscuous mode

2003-05-23 Thread Mike Dresser
On Fri, 23 May 2003, Ian Goodall wrote: > I have premoved promiscuous mode from my card. When checking ifconfig (eth0) > I am still getting all the network traffic flowing through my computer or at > least a lot of it. The system is sitting idle and I can see the traffic > going up a few meg a min

Re: promiscuous mode

2003-05-23 Thread Ian Goodall
> I have not got multicast enabled either so I don't know what is causing this... Oops looks like I have guys. I have read man 8 ifconfig but it will still not switch off. Is this what is causing it? The output from ifconfig is: eth0Link encap:Ethernet HWaddr inet addr:172.16.5.

Re: PPTP or L2TP ?

2003-05-23 Thread Stefano Canepa
Thursday 22 May 2003, alle 18:08, Theo Cabrerizo Diem: : Hi, : : I like to know what u think about VPNs using PPTP/L2TP protocols ... : I think freeswan is much better choise .. but I need to connect some : clients to my network .. and those clients doesn't use linux :( .. but I : do =) : So

Re: promiscuous mode

2003-05-23 Thread Ian Goodall
I have premoved promiscuous mode from my card. When checking ifconfig (eth0) I am still getting all the network traffic flowing through my computer or at least a lot of it. The system is sitting idle and I can see the traffic going up a few meg a minute with no one accessing it. I have re-installed

Re: Kernel 2.4 ioperm

2003-05-23 Thread Adam ENDRODI
On Fri, May 23, 2003 at 04:16:22PM +0200, Steffen Schulz wrote: > > Am I right that a local User is able to crash the system > by putting evil data into these mysterious I/O-Ports? I'm not sure, but I don't *think* that the attacker is free to chose any target port. > Is privilege escalation pos

Re: Kernel 2.4 ioperm

2003-05-23 Thread Thomas Krennwallner
Hi! On Fri May 23, 2003 at 04:16:22PM +0200, Steffen Schulz wrote: > Am I right that a local User is able to crash the system > by putting evil data into these mysterious I/O-Ports? > Is privilege escalation possible? > > Is this exploitable out of a chroot-jail(ssh,postfix)? AFAICS this bug is

Re: Kernel 2.4 ioperm

2003-05-23 Thread Steffen Schulz
On 030523 at 13:20, Martin Helas wrote: > On Don Mai 22, 2003 at 10:1621 +0100, Simon Huggins <[EMAIL PROTECTED]> wrote: > > On Thu, May 22, 2003 at 01:50:51PM -0600, xbud wrote: > > > FYI, http://marc.theaimsgroup.com/?|=linux-kernel&m=105271679705571&w=2 > > > > You say 2.4 in the subject and it

Re: promiscuous mode

2003-05-23 Thread Halil Demirezen
On Fri, May 23, 2003 at 01:32:36AM +0100, Ian Goodall wrote: > A while ago I installed snort on my debian woody box. After removing snort > the card is still stuck in promiscuous mode. How can I stop this? If it > helps my network is a FA310tx running on a tulip driver. man 8 ifconfig Try it, may

Re: Recommended security management packages

2003-05-23 Thread Phillip Hofmeister
On Wed, 21 May 2003 at 01:01:10PM -0700, Tib wrote: > > nmap (port scan) or Nessus> (vulnerability scans) scans from outside the > > box, > nmap installed, helped to block a bunch of ports with iptables Your policy/rules should block ALL traffic (and ALL Ports) and explicitly allow certain ports/

NIS (mis)configuration and MySQL alternative.

2003-05-23 Thread David Ramsden
Hi, I'm using NIS on my network. It's locked down as much as it can be from the outside world (ipfilter and tcp_wrappers) but I've just noticed any normal use can use ypcat to look at the shadow map and obviously be able to see other users encrypted passwords. Although root isn't listed it's still

Re: Setting up "pristine" system

2003-05-23 Thread Javier Fernández-Sanguino Peña
On Thu, May 22, 2003 at 08:52:12PM -0400, Rob French wrote: > Hello again, (...) > > So any thoughts as far as what I need to make sure I have standing by when > I try to set all this up? Thanks! > Sure! Just read the "Securing Debian Manual" modulo the sections that do not apply to you: http:

Re: md5sums

2003-05-23 Thread Javier Fernández-Sanguino Peña
On Wed, May 21, 2003 at 01:33:02PM -0700, Tib wrote: > > Well I found the debsums program, but unfortunately that hasn't solved > anything. Here's what I run and this is what I get. There are a LOT more > failures than just these, but these are the only two types of failures. > How do I properly f

Re: Recommended security management packages

2003-05-23 Thread Javier Fernández-Sanguino Peña
On Tue, May 20, 2003 at 08:58:16PM -0700, Tib wrote: > I'm looking for information on packages that will do a nice job of keeping > an eye on my system security-wise. PackageS because I know that no one > packages can do it all. http://www.debian.org/doc/manuals/securing-debian-howto/ch-sec-tools

Re: Tiger checkmd5sums module

2003-05-23 Thread Javier Fernández-Sanguino Peña
On Wed, May 21, 2003 at 01:10:37PM -0700, Tib wrote: > Where is it pulling it's md5sums for comparison? I keep getting failures > off freshly installed packages and would love to have this part actually > work as it is quite helpful I'm sure. > If you are running the deb_checkmd5sums check, it us

Re: rpc.mountd

2003-05-23 Thread Jamie Heilman
Baran YURDAGUL wrote: > Is there any problem occurs If I bind mountd to just one port under > 1024 ? Cause mount.d bind to 4 different port when it is started via > automatically ? these are the Medium marked ISS scan results .. Just to make sure I follow, an ISS scanner complained about finding

Re: rpc.mountd

2003-05-23 Thread Baran YURDAGUL
Is there any problem occurs If I bind mountd to just one port under 1024 ? Cause mount.d bind to 4 different port when it is started via automatically ? these are the Medium marked ISS scan results ..   Jamie Heilman wrote: Baran YURDAGUL wrote: > I have to questions firts one how can I configure

Re: Should I use Snort/PortSentry?

2003-05-23 Thread Rolf Kutz
* Quoting Kristof Goossens ([EMAIL PROTECTED]): > On Thu, May 22, 2003 at 08:46:47PM -0400, Rob French wrote: > > So, are any network/port-related tools useful? > > In my personal opinion it is ALWAYS usefull to know what is going on on your > system. No mather how little ports are open... > > Yo

Re: rpc.mountd

2003-05-23 Thread Jamie Heilman
Baran YURDAGUL wrote: > I have to questions firts one how can I configure mount.d on linux > use reserved ports ? man rpc.mountd -p or --port Force rpc.mountd to bind to the specified port, instead of using the random port number assigned by

Re: Should I use Snort/PortSentry?

2003-05-23 Thread Kristof Goossens
On Thu, May 22, 2003 at 08:46:47PM -0400, Rob French wrote: [snip] > So, are any network/port-related tools useful? In my personal opinion it is ALWAYS usefull to know what is going on on your system. No mather how little ports are open... You said it was for your laptop, and thats why you sho

rpc.mountd

2003-05-23 Thread Baran YURDAGUL
Hi All, I have to questions firts one how can I configure mount.d on linux use reserved ports ? and the second is about the apache sever, how can i disable http trace ? thanks..   --  Baran YURDAGUL