Re: Strange segmentation faults and Zombies

2003-09-17 Thread Ralf Dreibrodt
Hi, Markus Schabel wrote: > > I've seen some strange things on my (stable with security-updates) > server: the last apt-get update didn't work because gzip segfaultet. > I've copied gzip from another server over the version on this server, > but it also crashed. Interesting was that the executabl

about sendmail hole - relay restrictions bypassed

2003-09-17 Thread Hideki Yamane
Hi list, You know, as DSA-384-1, sendmail buffer overflow vulnerability is fixed but another hole "sendmail relay access restrictions can be bypassed with bogus DNS"(*) is NOT fixed yet. * http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=174907 Do you know why maintainer let this issue alo

about sendmail hole - relay restrictions bypassed

2003-09-17 Thread Hideki Yamane
Hi list, You know, as DSA-384-1, sendmail buffer overflow vulnerability is fixed but another hole "sendmail relay access restrictions can be bypassed with bogus DNS"(*) is NOT fixed yet. * http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=174907 Do you know why maintainer let this issue alo

Re: Strange segmentation faults and Zombies

2003-09-17 Thread Laurent Corbes {Caf'}
On Wed, 17 Sep 2003 22:29:58 +0200 Markus Schabel <[EMAIL PROTECTED]> wrote: > I've seen some strange things on my (stable with security-updates) > server: the last apt-get update didn't work because gzip segfaultet. > I've copied gzip from another server over the version on this server, > but it

Re: Strange segmentation faults and Zombies

2003-09-17 Thread Laurent Corbes {Caf'}
On Wed, 17 Sep 2003 22:29:58 +0200 Markus Schabel <[EMAIL PROTECTED]> wrote: > I've seen some strange things on my (stable with security-updates) > server: the last apt-get update didn't work because gzip segfaultet. > I've copied gzip from another server over the version on this server, > but it

Strange segmentation faults and Zombies

2003-09-17 Thread Markus Schabel
Hello! I've seen some strange things on my (stable with security-updates) server: the last apt-get update didn't work because gzip segfaultet. I've copied gzip from another server over the version on this server, but it also crashed. Interesting was that the executable was bigger after the segfau

Re: Pat on the back

2003-09-17 Thread Antti Tolamo
Viestissä Keskiviikko 17. Syyskuuta 2003 18:18, Robert Brockway kirjoitti: > Hi. I just wanted to say thanks to the security team for the rapid > deployment of the fixed versions of OpenSSH (twice). > > Often people are quick to post negative emails and not so quick to post > positive emails, so I

Strange segmentation faults and Zombies

2003-09-17 Thread Markus Schabel
Hello! I've seen some strange things on my (stable with security-updates) server: the last apt-get update didn't work because gzip segfaultet. I've copied gzip from another server over the version on this server, but it also crashed. Interesting was that the executable was bigger after the segfaul

Re: Pat on the back

2003-09-17 Thread Antti Tolamo
Viestissä Keskiviikko 17. Syyskuuta 2003 18:18, Robert Brockway kirjoitti: > Hi. I just wanted to say thanks to the security team for the rapid > deployment of the fixed versions of OpenSSH (twice). > > Often people are quick to post negative emails and not so quick to post > positive emails, so I

Re: Pat on the back

2003-09-17 Thread Christopher Taylor
Robert Brockway wrote: Hi. I just wanted to say thanks to the security team for the rapid deployment of the fixed versions of OpenSSH (twice). I fully agree. thanks a lot! --Chris

Re: [d-security] Re: ssh vulnerability in the wild

2003-09-17 Thread Rich Puhek
Adrian von Bidder wrote: On Tuesday 16 September 2003 22:30, Rich Puhek wrote: [mix stable/testing/unstable] This is what I usually do - and usually, it works quite fine. Right now, though, I've been pulling in more and more from testing/unstable since some things depend on the new glibc, a

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Joey Hess
Arthur de Jong wrote: > This will only work for a little while as a colleague of mine noted. This > will block > * IN A 64.94.110.11 > but not > * IN NS 64.94.110.11 > which is a valid delegation. The 64.94.110.11 nameserver should then only > return 64.94.110.11 for all requests for

Re: Verisign and Bind update

2003-09-17 Thread Ilkka Tuohela
ke, 2003-09-17 kello 18:12, James Miller kirjoitti: > Will the package maintainers of BIND be integrating the patches from > ISC-BIND to negate Verisign's recent shenanigans? Well, it's not only a patch, it's part of bind upstream releases, so yes of course it will eventually be in the packaged v

RE: Verisign and Bind update

2003-09-17 Thread James Miller
Ack, sorry folks.. I need to finish reading my mail before sending anything out. -Original Message- From: James Miller [mailto:[EMAIL PROTECTED] Sent: Wednesday, September 17, 2003 10:12 AM To: debian-security@lists.debian.org Subject: Verisign and Bind update Will the package maintain

Pat on the back

2003-09-17 Thread Robert Brockway
Hi. I just wanted to say thanks to the security team for the rapid deployment of the fixed versions of OpenSSH (twice). Often people are quick to post negative emails and not so quick to post positive emails, so I just wanted to say that many of us really do appreciate the work the security team

Verisign and Bind update

2003-09-17 Thread James Miller
Will the package maintainers of BIND be integrating the patches from ISC-BIND to negate Verisign's recent shenanigans? --from ISC's web site -- In response to high demand from our users, ISC is releasing a patch for BIND to support the declaration of "delegation-only" zones in caching/recursive

Re: Pat on the back

2003-09-17 Thread Christopher Taylor
Robert Brockway wrote: Hi. I just wanted to say thanks to the security team for the rapid deployment of the fixed versions of OpenSSH (twice). I fully agree. thanks a lot! --Chris -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: [d-security] Re: ssh vulnerability in the wild

2003-09-17 Thread Rich Puhek
Adrian von Bidder wrote: On Tuesday 16 September 2003 22:30, Rich Puhek wrote: [mix stable/testing/unstable] This is what I usually do - and usually, it works quite fine. Right now, though, I've been pulling in more and more from testing/unstable since some things depend on the new glibc, and

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Joey Hess
Arthur de Jong wrote: > This will only work for a little while as a colleague of mine noted. This > will block > * IN A 64.94.110.11 > but not > * IN NS 64.94.110.11 > which is a valid delegation. The 64.94.110.11 nameserver should then only > return 64.94.110.11 for all requests for

unsubscribe

2003-09-17 Thread Daniel Lampertseder

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Thomas Horsten
On Wed, 17 Sep 2003, Gaël Le Mignot wrote: > > What precisely have they done? I'd not heard about > > their latest idiocy... > > They decided to answer to all requests for a non-existing domain in > .com or .net with the IP of some of their computers, hosting an > advertising page...

Re: Verisign and Bind update

2003-09-17 Thread Ilkka Tuohela
ke, 2003-09-17 kello 18:12, James Miller kirjoitti: > Will the package maintainers of BIND be integrating the patches from > ISC-BIND to negate Verisign's recent shenanigans? Well, it's not only a patch, it's part of bind upstream releases, so yes of course it will eventually be in the packaged v

RE: Verisign and Bind update

2003-09-17 Thread James Miller
Ack, sorry folks.. I need to finish reading my mail before sending anything out. -Original Message- From: James Miller [mailto:[EMAIL PROTECTED] Sent: Wednesday, September 17, 2003 10:12 AM To: [EMAIL PROTECTED] Subject: Verisign and Bind update Will the package maintainers of BIND be

Pat on the back

2003-09-17 Thread Robert Brockway
Hi. I just wanted to say thanks to the security team for the rapid deployment of the fixed versions of OpenSSH (twice). Often people are quick to post negative emails and not so quick to post positive emails, so I just wanted to say that many of us really do appreciate the work the security team

Unidentified subject!

2003-09-17 Thread Vít Vomáčko

Verisign and Bind update

2003-09-17 Thread James Miller
Will the package maintainers of BIND be integrating the patches from ISC-BIND to negate Verisign's recent shenanigans? --from ISC's web site -- In response to high demand from our users, ISC is releasing a patch for BIND to support the declaration of "delegation-only" zones in caching/recursive

unsubscribe

2003-09-17 Thread Mark Pingert

unsubscribe

2003-09-17 Thread Daniel Lampertseder
-- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

security updates vs. proposed-updates

2003-09-17 Thread Marcin Owsiany
Hi! Many people asked (in messages to [EMAIL PROTECTED]) how to get the security updates when there's a newer version of the package in question in proposed-updates, so I thought that posting this here could be useful. Here's the way I do it recently: Add (for every package you need) an entry li

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Thomas Horsten
On Wed, 17 Sep 2003, Gaël Le Mignot wrote: > > What precisely have they done? I'd not heard about > > their latest idiocy... > > They decided to answer to all requests for a non-existing domain in > .com or .net with the IP of some of their computers, hosting an > advertising page...

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Arthur de Jong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > While the "first generation" patches work with hardcoded values, there > are others that are much more general. Check the link of the ISC patch > for a description: > > http://www.isc.org/products/BIND/delegation-only.html This will only work for

Unidentified subject!

2003-09-17 Thread Vít Vomáčko
-- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

unsubscribe

2003-09-17 Thread Mark Pingert
-- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Andy Coates
Dale Amon ([EMAIL PROTECTED]) wrote: > On Wed, Sep 17, 2003 at 11:57:16AM +0100, Andy Coates wrote: > > They've put a wildcard DNS entry for .com and .net to resolve to their > > product called "SiteFinder" which offers a IE/MSN like "Did you mean > > to type " services. > > > > So any domain

Re: OpenSSH

2003-09-17 Thread Emmanuel Lacour
On Wed, Sep 17, 2003 at 12:41:48PM +0200, Lukas Ruf wrote: > > do you also provide the sources of your unofficial distribution? > I just uploaded them (http://debian.home-dn.net/woody/ssh/) apt-get source should work too -- Emmanuel Lacour Easter-eggs 44

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Dale Amon
On Wed, Sep 17, 2003 at 11:57:16AM +0100, Andy Coates wrote: > They've put a wildcard DNS entry for .com and .net to resolve to their > product called "SiteFinder" which offers a IE/MSN like "Did you mean > to type " services. > > So any domain that doesn't exist, or in the PENDING/DELETE stat

security updates vs. proposed-updates

2003-09-17 Thread Marcin Owsiany
Hi! Many people asked (in messages to [EMAIL PROTECTED]) how to get the security updates when there's a newer version of the package in question in proposed-updates, so I thought that posting this here could be useful. Here's the way I do it recently: Add (for every package you need) an entry li

Re: OpenSSH

2003-09-17 Thread Lukas Ruf
Emmanuel, > Emmanuel Lacour <[EMAIL PROTECTED]> [2003-09-17 12:33]: > > On Wed, Sep 03, 2003 at 11:20:45AM +0200, Matthias Faulstich wrote: > > Hello, > > > > does anybody know, whether the chroot-patch will be included in future > > versions of the official ssh package? > > > > I maintain an

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Mike Hommey
On Wednesday 17 September 2003 12:46, Dale Amon wrote: > What precisely have they done? I'd not heard about > their latest idiocy... [EMAIL PROTECTED]:~$ dig verisign-go-fuck-yourself.com ;; Truncated, retrying in TCP mode. ; <<>> DiG 9.2.2 <<>> verisign-go-fuck-yourself.com ;; global options: p

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Adrian von Bidder
On Wednesday 17 September 2003 12:46, Dale Amon wrote: > What precisely have they done? I'd not heard about > their latest idiocy... They have registered domains like http://www.islandone-is-bad.org to point to their own web site. (Note: the web site is overloaded and thus frequently doesn't work

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Gaël Le Mignot
> What precisely have they done? I'd not heard about > their latest idiocy... They decided to answer to all requests for a non-existing domain in .com or .net with the IP of some of their computers, hosting an advertising page... -- Gael Le Mignot "Kilobug" - [EMAIL PROTECTED] - htt

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Andy Coates
Dale Amon ([EMAIL PROTECTED]) wrote: > What precisely have they done? I'd not heard about > their latest idiocy... > > [I note that I just got html mail from them about > a domain renewal... I just delete html mail > without reading.] They've put a wildcard DNS entry for .com and .net to res

Re: OpenSSH

2003-09-17 Thread A.Bory G2MS
> > does anybody know, whether the chroot-patch will be included in future > > versions of the official ssh package? thanks to Emmanuel Lacour, there is also a private repository with ssh+chroot for woody: http://debian.home-dn.net/woody/ssh/ Alexis Bory

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Adrian von Bidder
On Wednesday 17 September 2003 11:57, Ronny Adsetts wrote: > Better to get Verisign to revoke this stupidity. After all, another TLD > did the same some time ago and the US government intervened, IIRC, to > get it changed back (.biz?). > host sdkljhsdlfkjsdfkljsdf.cc sdkljhsdlfkjsdfkljsdf.cc has

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Arthur de Jong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > While the "first generation" patches work with hardcoded values, there > are others that are much more general. Check the link of the ISC patch > for a description: > > http://www.isc.org/products/BIND/delegation-only.html This will only work for

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Dale Amon
What precisely have they done? I'd not heard about their latest idiocy... [I note that I just got html mail from them about a domain renewal... I just delete html mail without reading.] -- -- IN MY NAME:Dale Amon, CEO/MD

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Oliver Hitz
On 17 Sep 2003, Ronny Adsetts wrote: > Adding this *hard coded* value to an official Debian package that could > be around for a couple of years (in stable) would be foolish IMHO. I > haven't reviewed the patch, so may be wrong about the nature of it... > (anyone have a link for the patch?) While

Re: OpenSSH

2003-09-17 Thread Emmanuel Lacour
On Wed, Sep 03, 2003 at 11:20:45AM +0200, Matthias Faulstich wrote: > Hello, > > does anybody know, whether the chroot-patch will be included in future > versions of the official ssh package? > I maintain an unofficial at : deb http://debian.home-dn.net/woody ssh/ (up to date with last secur

RE: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Boyan Krosnov
It is not hardcoded. A new configuration directive has been added, and it is completely up to the administrator to decide to use it. http://www.isc.org/products/BIND/delegation-only.html Boyan Krosnov, CCIE#8701 http://boyan.ludost.net/ just another techie speaking for himself > -Original Me

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Ronny Adsetts
Adrian von Bidder said the following on 17/09/03 10:11: Patches for various dns servers to get back to the old behaviour of the dns system have been published. For example, the ISC has just released an "official" patch for BIND9. I wonder if there are plans to make security upgrades of the dns

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Andy Coates
Dale Amon ([EMAIL PROTECTED]) wrote: > On Wed, Sep 17, 2003 at 11:57:16AM +0100, Andy Coates wrote: > > They've put a wildcard DNS entry for .com and .net to resolve to their > > product called "SiteFinder" which offers a IE/MSN like "Did you mean > > to type " services. > > > > So any domain

Re: OpenSSH

2003-09-17 Thread Emmanuel Lacour
On Wed, Sep 17, 2003 at 12:41:48PM +0200, Lukas Ruf wrote: > > do you also provide the sources of your unofficial distribution? > I just uploaded them (http://debian.home-dn.net/woody/ssh/) apt-get source should work too -- Emmanuel Lacour Easter-eggs 44

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Dale Amon
On Wed, Sep 17, 2003 at 11:57:16AM +0100, Andy Coates wrote: > They've put a wildcard DNS entry for .com and .net to resolve to their > product called "SiteFinder" which offers a IE/MSN like "Did you mean > to type " services. > > So any domain that doesn't exist, or in the PENDING/DELETE stat

Re: OpenSSH

2003-09-17 Thread Lukas Ruf
Emmanuel, > Emmanuel Lacour <[EMAIL PROTECTED]> [2003-09-17 12:33]: > > On Wed, Sep 03, 2003 at 11:20:45AM +0200, Matthias Faulstich wrote: > > Hello, > > > > does anybody know, whether the chroot-patch will be included in future > > versions of the official ssh package? > > > > I maintain an

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Mike Hommey
On Wednesday 17 September 2003 12:46, Dale Amon wrote: > What precisely have they done? I'd not heard about > their latest idiocy... [EMAIL PROTECTED]:~$ dig verisign-go-fuck-yourself.com ;; Truncated, retrying in TCP mode. ; <<>> DiG 9.2.2 <<>> verisign-go-fuck-yourself.com ;; global options: p

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Adrian von Bidder
On Wednesday 17 September 2003 10:48, Oliver Hitz wrote: > Patches for various dns servers to get back to the old behaviour of the > dns system have been published. For example, the ISC has just released > an "official" patch for BIND9. > > I wonder if there are plans to make security upgrades of

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Adrian von Bidder
On Wednesday 17 September 2003 12:46, Dale Amon wrote: > What precisely have they done? I'd not heard about > their latest idiocy... They have registered domains like http://www.islandone-is-bad.org to point to their own web site. (Note: the web site is overloaded and thus frequently doesn't work

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Gaël Le Mignot
> What precisely have they done? I'd not heard about > their latest idiocy... They decided to answer to all requests for a non-existing domain in .com or .net with the IP of some of their computers, hosting an advertising page... -- Gael Le Mignot "Kilobug" - [EMAIL PROTECTED] - htt

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Andy Coates
Dale Amon ([EMAIL PROTECTED]) wrote: > What precisely have they done? I'd not heard about > their latest idiocy... > > [I note that I just got html mail from them about > a domain renewal... I just delete html mail > without reading.] They've put a wildcard DNS entry for .com and .net to res

Re: OpenSSH

2003-09-17 Thread A.Bory G2MS
> > does anybody know, whether the chroot-patch will be included in future > > versions of the official ssh package? thanks to Emmanuel Lacour, there is also a private repository with ssh+chroot for woody: http://debian.home-dn.net/woody/ssh/ Alexis Bory -- To UNSUBSCRIBE, email to [EMAIL

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Adrian von Bidder
On Wednesday 17 September 2003 11:57, Ronny Adsetts wrote: > Better to get Verisign to revoke this stupidity. After all, another TLD > did the same some time ago and the US government intervened, IIRC, to > get it changed back (.biz?). > host sdkljhsdlfkjsdfkljsdf.cc sdkljhsdlfkjsdfkljsdf.cc has

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Dale Amon
What precisely have they done? I'd not heard about their latest idiocy... [I note that I just got html mail from them about a domain renewal... I just delete html mail without reading.] -- -- IN MY NAME:Dale Amon, CEO/MD

Debian + Verisign's .com/.net hijack

2003-09-17 Thread Oliver Hitz
Hi all, By now probably everybody has heard about Verisign's latest change to the .net and .com domains (otherwise read about it in your favourite tech news site). While the security of dns per se is not really affected, the change influences other services such as spam countermeasures. Patches f

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Oliver Hitz
On 17 Sep 2003, Ronny Adsetts wrote: > Adding this *hard coded* value to an official Debian package that could > be around for a couple of years (in stable) would be foolish IMHO. I > haven't reviewed the patch, so may be wrong about the nature of it... > (anyone have a link for the patch?) While

Re: OpenSSH

2003-09-17 Thread Emmanuel Lacour
On Wed, Sep 03, 2003 at 11:20:45AM +0200, Matthias Faulstich wrote: > Hello, > > does anybody know, whether the chroot-patch will be included in future > versions of the official ssh package? > I maintain an unofficial at : deb http://debian.home-dn.net/woody ssh/ (up to date with last secur

RE: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Boyan Krosnov
It is not hardcoded. A new configuration directive has been added, and it is completely up to the administrator to decide to use it. http://www.isc.org/products/BIND/delegation-only.html Boyan Krosnov, CCIE#8701 http://boyan.ludost.net/ just another techie speaking for himself > -Original Me

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Ronny Adsetts
Adrian von Bidder said the following on 17/09/03 10:11: Patches for various dns servers to get back to the old behaviour of the dns system have been published. For example, the ISC has just released an "official" patch for BIND9. I wonder if there are plans to make security upgrades of the dns s

Re: SSH Update for Potato?

2003-09-17 Thread Andreas Barth
* Shane Machon ([EMAIL PROTECTED]) [030917 06:50]: > On a more general note, is potato still supported by the Security Team? No. There was a notice sometimes ago. Cheers, Andi -- http://home.arcor.de/andreas-barth/ PGP 1024/89FB5CE5 DC F1 85 6D A6 45 9C 0F 3B BE F1 D0 C5 D1 D9 0C

Re: [d-security] Re: ssh vulnerability in the wild

2003-09-17 Thread Birzan George Cristian
On Wed, Sep 17, 2003 at 12:12:35AM -0700, Rick Moen wrote: > I note: > http://incoming.debian.org/ssh_3.6.1p2-8_i386.deb > http://incoming.debian.org/ssh_3.6.1p2-8_mipsel.deb > http://incoming.debian.org/ssh_3.6.1p2-8_powerpc.deb > > ...and would guess they're built from upstream's v. 3.7.1. >

Re: Debian + Verisign's .com/.net hijack

2003-09-17 Thread Adrian von Bidder
On Wednesday 17 September 2003 10:48, Oliver Hitz wrote: > Patches for various dns servers to get back to the old behaviour of the > dns system have been published. For example, the ISC has just released > an "official" patch for BIND9. > > I wonder if there are plans to make security upgrades of

Unidentified subject!

2003-09-17 Thread peyyala phillip
To,Digital Brand Manager,clear express web support,from: [EMAIL PROTECTED]Dear brother Christ,common Name:Peyyala PhillipOrganisation Name:Mr&Mrs Peyyala Phillip marys ministries we have already rigistered delphi advanced mail registration membership option 3 paid US $15 to delphi forms LLC.USA  da

Re: [d-security] Re: ssh vulnerability in the wild

2003-09-17 Thread Rick Moen
Quoting Jan Niehusmann ([EMAIL PROTECTED]): > So I guess we all have to upgrade again. Didn't see packages with > patches derived from 3.7.1, yet. I note: http://incoming.debian.org/ssh_3.6.1p2-8_i386.deb http://incoming.debian.org/ssh_3.6.1p2-8_mipsel.deb http://incoming.debian.org/ssh_3.6.1p

Re: [d-security] Re: ssh vulnerability in the wild

2003-09-17 Thread Adrian von Bidder
On Tuesday 16 September 2003 22:30, Rich Puhek wrote: [mix stable/testing/unstable] This is what I usually do - and usually, it works quite fine. Right now, though, I've been pulling in more and more from testing/unstable since some things depend on the new glibc, and some other things randomly

Re: [d-security] Re: ssh vulnerability in the wild

2003-09-17 Thread Jan Niehusmann
On Wed, Sep 17, 2003 at 08:24:43AM +0300, Birzan George Cristian wrote: > According to the DSA, this is based on the 3.7 fix. OpenSSH's site lists > the only not vulnerable version as 3.7.1. In my mind, that means the ssh > version on security.debian.org right now is _STILL_ vulnerable. I'm not > a

ssh v2 hostbased authentication after woody security upgrade

2003-09-17 Thread Norbert Preining
Hi all! After the woody security fix of ssh (new version 3.4p1-1.1) we cannot use HostBased Authentication for SSH V.2. There was no change in the configuration files or the host keys, besides, interestingly the /etc/ssh/ssh_host_key (responsible for V.1 authentication, thus uninteresing

Debian + Verisign's .com/.net hijack

2003-09-17 Thread Oliver Hitz
Hi all, By now probably everybody has heard about Verisign's latest change to the .net and .com domains (otherwise read about it in your favourite tech news site). While the security of dns per se is not really affected, the change influences other services such as spam countermeasures. Patches f

Re: [d-security] Re: ssh vulnerability in the wild

2003-09-17 Thread Colin Watson
On Tue, Sep 16, 2003 at 09:51:43PM +0200, Matthias Merz wrote: > So only one problem remains: The version in woody-proposed-updates is > 1:3.4p1-1.woody.1 which is "newer" than the patched version. So I had to > manually "downgrade" my proposed-updates-version to get the fix. > (apt-get dist-upgrad

Re: [d-security] Re: ssh vulnerability in the wild

2003-09-17 Thread Colin Watson
On Tue, Sep 16, 2003 at 01:10:34PM -0400, Dossy wrote: > On 2003.09.16, Christian Hammers <[EMAIL PROTECTED]> wrote: > > The new version has already been installed. This was quick. Good work, > > security team. > > > > openssh (1:3.4p1-1.1) stable-security; urgency=high > > > > * NMU by the se

Re: SSH Update for Potato?

2003-09-17 Thread Andreas Barth
* Shane Machon ([EMAIL PROTECTED]) [030917 06:50]: > On a more general note, is potato still supported by the Security Team? No. There was a notice sometimes ago. Cheers, Andi -- http://home.arcor.de/andreas-barth/ PGP 1024/89FB5CE5 DC F1 85 6D A6 45 9C 0F 3B BE F1 D0 C5 D1 D9 0C --

Re: [d-security] Re: ssh vulnerability in the wild

2003-09-17 Thread Birzan George Cristian
On Wed, Sep 17, 2003 at 12:12:35AM -0700, Rick Moen wrote: > I note: > http://incoming.debian.org/ssh_3.6.1p2-8_i386.deb > http://incoming.debian.org/ssh_3.6.1p2-8_mipsel.deb > http://incoming.debian.org/ssh_3.6.1p2-8_powerpc.deb > > ...and would guess they're built from upstream's v. 3.7.1. >

Re: [d-security] Re: ssh vulnerability in the wild

2003-09-17 Thread Birzan George Cristian
On Tue, Sep 16, 2003 at 05:31:06PM +0200, Christian Hammers wrote: > The new version has already been installed. This was quick. Good work, > security team. > > openssh (1:3.4p1-1.1) stable-security; urgency=high > > * NMU by the security team. > * Merge patch from OpenBSD to fix a security

Unidentified subject!

2003-09-17 Thread peyyala phillip
To,Digital Brand Manager,clear express web support,from: [EMAIL PROTECTED]Dear brother Christ,common Name:Peyyala PhillipOrganisation Name:Mr&Mrs Peyyala Phillip marys ministries we have already rigistered delphi advanced mail registration membership option 3 paid US $15 to delphi forms LLC.USA  da

Re: [d-security] Re: ssh vulnerability in the wild

2003-09-17 Thread Rick Moen
Quoting Jan Niehusmann ([EMAIL PROTECTED]): > So I guess we all have to upgrade again. Didn't see packages with > patches derived from 3.7.1, yet. I note: http://incoming.debian.org/ssh_3.6.1p2-8_i386.deb http://incoming.debian.org/ssh_3.6.1p2-8_mipsel.deb http://incoming.debian.org/ssh_3.6.1p

Re: [d-security] Re: ssh vulnerability in the wild

2003-09-17 Thread Adrian von Bidder
On Tuesday 16 September 2003 22:30, Rich Puhek wrote: [mix stable/testing/unstable] This is what I usually do - and usually, it works quite fine. Right now, though, I've been pulling in more and more from testing/unstable since some things depend on the new glibc, and some other things randomly

Re: [d-security] Re: ssh vulnerability in the wild

2003-09-17 Thread Jan Niehusmann
On Wed, Sep 17, 2003 at 08:24:43AM +0300, Birzan George Cristian wrote: > According to the DSA, this is based on the 3.7 fix. OpenSSH's site lists > the only not vulnerable version as 3.7.1. In my mind, that means the ssh > version on security.debian.org right now is _STILL_ vulnerable. I'm not > a