chroot, su and sudo

2003-06-16 Thread Mario Ohnewald
Hello! I want to chroot a application/gameserver. What is the better/securest way? 1.) "Chroot /path" and then do a "su -s /bin/sh user -c start.sh" or 2.) "su -s /bin/sh user" and then do the "chroot /path" as normal user and execute the "start.sh" in the chroot? Solution 2 does not need a root

Re: chroot, su and sudo

2003-06-16 Thread Vincent Hanquez
On Mon, Jun 16, 2003 at 10:22:49AM +0200, Mario Ohnewald wrote: > Hello! > I want to chroot a application/gameserver. > > What is the better/securest way? > 1.) "Chroot /path" and then do a "su -s /bin/sh user -c start.sh" > or > 2.) "su -s /bin/sh user" and then do the "chroot /path" as normal u

Re: Someone scanned my ssh daemon

2003-06-16 Thread Nick
maybe someone's using scanssh ? apt-cache show scanssh - Original Message - From: "Halil Demirezen" <[EMAIL PROTECTED]> To: "TiM" <[EMAIL PROTECTED]> Cc: Sent: Monday, June 16, 2003 11:00 AM Subject: Re: Someone scanned my ssh daemon

RE: chroot, su and sudo

2003-06-16 Thread Mario Ohnewald
Hi, >-Original Message- >From: Vincent Hanquez [mailto:[EMAIL PROTECTED] >Sent: Monday, June 16, 2003 10:46 AM >To: Mario Ohnewald >Cc: debian-security@lists.debian.org >Subject: Re: chroot, su and sudo > > >On Mon, Jun 16, 2003 at 10:22:49AM +0200, Mario Ohnewald wrote: >> Hello! >> I wan

Re: chroot, su and sudo

2003-06-16 Thread Blars Blarson
In article <[EMAIL PROTECTED]> [EMAIL PROTECTED] writes: >Hello! >I want to chroot a application/gameserver. > >What is the better/securest way? >1.) "Chroot /path" and then do a "su -s /bin/sh user -c start.sh" >or >2.) "su -s /bin/sh user" and then do the "chroot /path" as normal user and >exec

Re: cracked? "rm uses obsolete (PF_INET,SOCK_PACKET)"

2003-06-16 Thread Stefan Neufeind
On 15 Jun 2003 at 10:36, Noah Meyerhans wrote: > In terms of protecting against breakin, it seems like a lot of people > here have been advocating the grsecurity kernel patch. I have no > experience with it, but the list of features certainly makes it sound > like it will protect against some of

Re: chroot, su and sudo

2003-06-16 Thread Vincent Hanquez
On Mon, Jun 16, 2003 at 10:54:54AM +0200, Mario Ohnewald wrote: > Not even with sudo? Hmm, this way it will work -- Tab pgpNe4F7mIpKh.pgp Description: PGP signature

Re: chroot, su and sudo

2003-06-16 Thread Lars Ellenberg
On Mon, Jun 16, 2003 at 10:22:49AM +0200, Mario Ohnewald wrote: > I want to chroot a application/gameserver. I played with pam_chroot recently... unfortunately I found not much documentation about its intended usage. whether it realy suits my needs, I don't know yet. I'd like to read your comme

Re: kernel-source 2.4.20 + grsecurity + freeswan

2003-06-16 Thread Vinai Kopp
On Thu, Jun 05, 2003 at 10:32:59PM +0200, Vinai Kopp wrote: > currently I'm setting up a gateway machine for a small office > network. After the recent threads about rooted woody boxes I feel it > would be iresponsible to set up a box without a grsecurity patched > kernel. > The problem is I also

Re: Someone scanned my ssh daemon

2003-06-16 Thread Stefan Neufeind
On 16 Jun 2003 at 7:00, Halil Demirezen wrote: > > My Debian box: > > Connection closed by foreign host. > > [EMAIL PROTECTED]:~> telnet xx.com 22 > > Trying 203.167.224.... > > Connected to xx.com. > > Escape character is '^]'. > > SSH-2.0-OpenSSH_3.4p1 Debian 1:3.4p1-1 > > To be bri

Re: Someone scanned my ssh daemon

2003-06-16 Thread Tomasz Papszun
On Mon, 16 Jun 2003 at 14:26:33 +0200, Stefan Neufeind wrote: > On 16 Jun 2003 at 7:00, Halil Demirezen wrote: > > > To be brief, I don't usually come accross that there is an exploit for > > only effective to debian boxes. Plus, There are lots of ways to learn > > what distribution you are runnin

1/2 Price Omaha Steaks Plus 3 FREE Gifts!

2003-06-16 Thread Omaha Steaks
Dear Friend, Take advantage of unbelievable savings from Omaha Steaks! Right now you can get delicious Omaha Steaks at 1/2 PRICE! 6 (6 oz.) Top Sirloins (#628CRL) Reg. Price $52.99, E-mail Exclusive Price $26.49, Save $26.50! http://offer.omahasteaks.com/cgi-bin10/DM/y/eUuO0Fjmf30IWt0wRU0Am 4 (

Re: 1/2 Price Omaha Steaks Plus 3 FREE Gifts!

2003-06-16 Thread John Holroyd
On Mon, 2003-06-16 at 15:26, Omaha Steaks wrote: > Dear Friend, > Seriously, Does Debian have much success in forcing these spammers to pay the fin fees mentioned on the mailing list pages? -- John Holroyd <[EMAIL PROTECTED]> Demos Technosis Ltd signature.asc Description: This is a di

Re: chroot, su and sudo

2003-06-16 Thread Steve Johnson
Why not just use the start-stop-daemon prog that comes with debian? Using the --chuid and --chroot flags? I've used those to start MOHAA servers with no issues? Anyone else know if this way is actually secure? thanks, steve On Mon, 2003-06-16 at 03:22, Mario Ohnewald wrote: > Hello! > I want

Re: 1/2 Price Omaha Steaks Plus 3 FREE Gifts!

2003-06-16 Thread Hall Stevenson
At 04:47 PM 6/16/2003 +, John Holroyd wrote: On Mon, 2003-06-16 at 15:26, Omaha Steaks wrote: > Dear Friend, > Seriously, Does Debian have much success in forcing these spammers to pay the fin fees mentioned on the mailing list pages? Not sure about debian-security, but debian-user,

Re: 1/2 Price Omaha Steaks Plus 3 FREE Gifts!

2003-06-16 Thread Peter Cordes
On Mon, Jun 16, 2003 at 12:43:26PM -0400, Hall Stevenson wrote: > At 04:47 PM 6/16/2003 +, John Holroyd wrote: > >On Mon, 2003-06-16 at 15:26, Omaha Steaks wrote: > >> Dear Friend, > >> > > > > > >Seriously, > > > >Does Debian have much success in forcing these spammers to pay the > >fin fe

[unconfirmed] new atftp vulnerabilities

2003-06-16 Thread Drew Scott Daniels
I'm writing [unconfirmed] now when I've found new advisories or bugs but haven't had time to fully research them and see if they really are vulnerabilities and whether Debian is vulnerable (potato, woody, sarge, sid). It seems that since mdz has been put on the Security Team proper that he's releas

Re: [SECURITY] [DSA-320-1] New mikmod packages fix buffer overflow

2003-06-16 Thread Peter Cordes
On Fri, Jun 13, 2003 at 07:44:39PM -0400, Matt Zimmerman wrote: > Package: mikmod > Vulnerability : buffer overflow > Problem-Type : local > Debian-specific: no > CVE Id : CAN-2003-0427 > > Ingo Saitz discovered a bug in mikmod whereby a long filename inside > an archive file ca

Re: Probable SSH Vulnerability

2003-06-16 Thread Nick Boyce
On Sun, 15 Jun 2003 09:01:00 +0200, Florian Weimer wrote: >Tim Peeler <[EMAIL PROTECTED]> writes: > >> I've come to the conclusion that the SSH1 protocol is the most >> likely cause of this problem. > >Attacks on the SSH v1 protocol are relatively sophisticated. It's >more likely that some token

chroot, su and sudo

2003-06-16 Thread Mario Ohnewald
Hello! I want to chroot a application/gameserver. What is the better/securest way? 1.) "Chroot /path" and then do a "su -s /bin/sh user -c start.sh" or 2.) "su -s /bin/sh user" and then do the "chroot /path" as normal user and execute the "start.sh" in the chroot? Solution 2 does not need a root

Re: chroot, su and sudo

2003-06-16 Thread Vincent Hanquez
On Mon, Jun 16, 2003 at 10:22:49AM +0200, Mario Ohnewald wrote: > Hello! > I want to chroot a application/gameserver. > > What is the better/securest way? > 1.) "Chroot /path" and then do a "su -s /bin/sh user -c start.sh" > or > 2.) "su -s /bin/sh user" and then do the "chroot /path" as normal u

Re: Someone scanned my ssh daemon

2003-06-16 Thread Nick
maybe someone's using scanssh ? apt-cache show scanssh - Original Message - From: "Halil Demirezen" <[EMAIL PROTECTED]> To: "TiM" <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]> Sent: Monday, June 16, 2003 11:00 AM Subject: Re: Someone scanned my ssh daemon -- To UNSUBSCRIBE, email to [

RE: chroot, su and sudo

2003-06-16 Thread Mario Ohnewald
Hi, >-Original Message- >From: Vincent Hanquez [mailto:[EMAIL PROTECTED] >Sent: Monday, June 16, 2003 10:46 AM >To: Mario Ohnewald >Cc: [EMAIL PROTECTED] >Subject: Re: chroot, su and sudo > > >On Mon, Jun 16, 2003 at 10:22:49AM +0200, Mario Ohnewald wrote: >> Hello! >> I want to chroot a a

Re: chroot, su and sudo

2003-06-16 Thread Blars Blarson
In article <[EMAIL PROTECTED]> [EMAIL PROTECTED] writes: >Hello! >I want to chroot a application/gameserver. > >What is the better/securest way? >1.) "Chroot /path" and then do a "su -s /bin/sh user -c start.sh" >or >2.) "su -s /bin/sh user" and then do the "chroot /path" as normal user and >exec

Re: cracked? "rm uses obsolete (PF_INET,SOCK_PACKET)"

2003-06-16 Thread Stefan Neufeind
On 15 Jun 2003 at 10:36, Noah Meyerhans wrote: > In terms of protecting against breakin, it seems like a lot of people > here have been advocating the grsecurity kernel patch. I have no > experience with it, but the list of features certainly makes it sound > like it will protect against some of

Re: chroot, su and sudo

2003-06-16 Thread Vincent Hanquez
On Mon, Jun 16, 2003 at 10:54:54AM +0200, Mario Ohnewald wrote: > Not even with sudo? Hmm, this way it will work -- Tab pgp0.pgp Description: PGP signature

Re: kernel-source 2.4.20 + grsecurity + freeswan

2003-06-16 Thread Vinai Kopp
On Thu, Jun 05, 2003 at 10:32:59PM +0200, Vinai Kopp wrote: > currently I'm setting up a gateway machine for a small office > network. After the recent threads about rooted woody boxes I feel it > would be iresponsible to set up a box without a grsecurity patched > kernel. > The problem is I also

Re: chroot, su and sudo

2003-06-16 Thread Lars Ellenberg
On Mon, Jun 16, 2003 at 10:22:49AM +0200, Mario Ohnewald wrote: > I want to chroot a application/gameserver. I played with pam_chroot recently... unfortunately I found not much documentation about its intended usage. whether it realy suits my needs, I don't know yet. I'd like to read your comme

Re: Someone scanned my ssh daemon

2003-06-16 Thread Stefan Neufeind
On 16 Jun 2003 at 7:00, Halil Demirezen wrote: > > My Debian box: > > Connection closed by foreign host. > > [EMAIL PROTECTED]:~> telnet xx.com 22 > > Trying 203.167.224.... > > Connected to xx.com. > > Escape character is '^]'. > > SSH-2.0-OpenSSH_3.4p1 Debian 1:3.4p1-1 > > To be bri

Re: Someone scanned my ssh daemon

2003-06-16 Thread Tomasz Papszun
On Mon, 16 Jun 2003 at 14:26:33 +0200, Stefan Neufeind wrote: > On 16 Jun 2003 at 7:00, Halil Demirezen wrote: > > > To be brief, I don't usually come accross that there is an exploit for > > only effective to debian boxes. Plus, There are lots of ways to learn > > what distribution you are runnin

1/2 Price Omaha Steaks Plus 3 FREE Gifts!

2003-06-16 Thread Omaha Steaks
Dear Friend, Take advantage of unbelievable savings from Omaha Steaks! Right now you can get delicious Omaha Steaks at 1/2 PRICE! 6 (6 oz.) Top Sirloins (#628CRL) Reg. Price $52.99, E-mail Exclusive Price $26.49, Save $26.50! http://offer.omahasteaks.com/cgi-bin10/DM/y/eUuO0Fjmf30IWt0wRU0Am 4 (

Re: 1/2 Price Omaha Steaks Plus 3 FREE Gifts!

2003-06-16 Thread John Holroyd
On Mon, 2003-06-16 at 15:26, Omaha Steaks wrote: > Dear Friend, > Seriously, Does Debian have much success in forcing these spammers to pay the fin fees mentioned on the mailing list pages? -- John Holroyd <[EMAIL PROTECTED]> Demos Technosis Ltd signature.asc Description: This is a di

Re: chroot, su and sudo

2003-06-16 Thread Steve Johnson
Why not just use the start-stop-daemon prog that comes with debian? Using the --chuid and --chroot flags? I've used those to start MOHAA servers with no issues? Anyone else know if this way is actually secure? thanks, steve On Mon, 2003-06-16 at 03:22, Mario Ohnewald wrote: > Hello! > I want

Re: 1/2 Price Omaha Steaks Plus 3 FREE Gifts!

2003-06-16 Thread Hall Stevenson
At 04:47 PM 6/16/2003 +, John Holroyd wrote: On Mon, 2003-06-16 at 15:26, Omaha Steaks wrote: > Dear Friend, > Seriously, Does Debian have much success in forcing these spammers to pay the fin fees mentioned on the mailing list pages? Not sure about debian-security, but debian-user, for e

Re: 1/2 Price Omaha Steaks Plus 3 FREE Gifts!

2003-06-16 Thread Peter Cordes
On Mon, Jun 16, 2003 at 12:43:26PM -0400, Hall Stevenson wrote: > At 04:47 PM 6/16/2003 +, John Holroyd wrote: > >On Mon, 2003-06-16 at 15:26, Omaha Steaks wrote: > >> Dear Friend, > >> > > > > > >Seriously, > > > >Does Debian have much success in forcing these spammers to pay the > >fin fe

[unconfirmed] new atftp vulnerabilities

2003-06-16 Thread Drew Scott Daniels
I'm writing [unconfirmed] now when I've found new advisories or bugs but haven't had time to fully research them and see if they really are vulnerabilities and whether Debian is vulnerable (potato, woody, sarge, sid). It seems that since mdz has been put on the Security Team proper that he's releas

Re: [SECURITY] [DSA-320-1] New mikmod packages fix buffer overflow

2003-06-16 Thread Peter Cordes
On Fri, Jun 13, 2003 at 07:44:39PM -0400, Matt Zimmerman wrote: > Package: mikmod > Vulnerability : buffer overflow > Problem-Type : local > Debian-specific: no > CVE Id : CAN-2003-0427 > > Ingo Saitz discovered a bug in mikmod whereby a long filename inside > an archive file ca

Re: Probable SSH Vulnerability

2003-06-16 Thread Nick Boyce
On Sun, 15 Jun 2003 09:01:00 +0200, Florian Weimer wrote: >Tim Peeler <[EMAIL PROTECTED]> writes: > >> I've come to the conclusion that the SSH1 protocol is the most >> likely cause of this problem. > >Attacks on the SSH v1 protocol are relatively sophisticated. It's >more likely that some token