Re: Securetty: limits root login while allowing 'su -'

2003-10-23 Thread Russell Coker
On Fri, 24 Oct 2003 10:50, Bernd Eckenfels wrote: > In article <[EMAIL PROTECTED]> you wrote: > > I discovered I could 'su -' to root in the excluded ttys. Do you think > > this is normal behaviour or does my system need re-configuration ? > > This is the intended normal behaviour. Idea behind it

Re: Securetty: limits root login while allowing 'su -'

2003-10-23 Thread Bernd Eckenfels
In article <[EMAIL PROTECTED]> you wrote: > I discovered I could 'su -' to root in the excluded ttys. Do you think > this is normal behaviour or does my system need re-configuration ? This is the intended normal behaviour. Idea behind it is to avoid random admins logging into the system as root s

Re: Securetty: limits root login while allowing 'su -'

2003-10-23 Thread Tom Goulet (UID0)
On Thu, Oct 23, 2003 at 10:13:16PM +, Ennio-Sr wrote: > I limited root login to two ttys only (in /etc/securetty) but yesterday > I discovered I could 'su -' to root in the excluded ttys. Do you think > this is normal behaviour Yes. | [EMAIL PROTECTED]:/etc/pam.d# grep securetty * | login:

Re: Securetty: limits root login while allowing 'su -'

2003-10-23 Thread Russell Coker
On Fri, 24 Oct 2003 10:50, Bernd Eckenfels wrote: > In article <[EMAIL PROTECTED]> you wrote: > > I discovered I could 'su -' to root in the excluded ttys. Do you think > > this is normal behaviour or does my system need re-configuration ? > > This is the intended normal behaviour. Idea behind it

Re: Securetty: limits root login while allowing 'su -'

2003-10-23 Thread Bernd Eckenfels
In article <[EMAIL PROTECTED]> you wrote: > I discovered I could 'su -' to root in the excluded ttys. Do you think > this is normal behaviour or does my system need re-configuration ? This is the intended normal behaviour. Idea behind it is to avoid random admins logging into the system as root s

Securetty: limits root login while allowing 'su -'

2003-10-23 Thread Ennio-Sr
Hi, everybody on the NG. This is my first post here and I hope it won't be the last one too :-) [Using Debian/Woody-3.0 on knl 2.2.22 on a home PC.] I limited root login to two ttys only (in /etc/securetty) but yesterday I discovered I could 'su -' to root in the excluded ttys. Do you think this

Re: Securetty: limits root login while allowing 'su -'

2003-10-23 Thread Tom Goulet (UID0)
On Thu, Oct 23, 2003 at 10:13:16PM +, Ennio-Sr wrote: > I limited root login to two ttys only (in /etc/securetty) but yesterday > I discovered I could 'su -' to root in the excluded ttys. Do you think > this is normal behaviour Yes. | [EMAIL PROTECTED]:/etc/pam.d# grep securetty * | login:

Securetty: limits root login while allowing 'su -'

2003-10-23 Thread Ennio-Sr
Hi, everybody on the NG. This is my first post here and I hope it won't be the last one too :-) [Using Debian/Woody-3.0 on knl 2.2.22 on a home PC.] I limited root login to two ttys only (in /etc/securetty) but yesterday I discovered I could 'su -' to root in the excluded ttys. Do you think this

Re: Why not use /bin/noshell? (was Re: Why do system users have valid shells)

2003-10-23 Thread Javier Fernández-Sanguino Peña
On Thu, Oct 23, 2003 at 12:57:53PM +0100, Dale Amon wrote: > If one isn't available, they are damn easy to write. I've > probably got source laying around somewhere for one I wrote > for NeXT's about a decade ago. Well, Titan's noshell source code is available, I'm not sure if it's license is DFS

Re: Why not use /bin/noshell? (was Re: Why do system users have valid shells)

2003-10-23 Thread Javier Fernández-Sanguino Peña
On Thu, Oct 23, 2003 at 10:35:26AM -0500, Micah Anderson wrote: > Try the package "falselogin" > That's not what I was looking for. I was looking for something that logged connection attempts, which falselogin does not. Regards Javi pgpvmmHktDV88.pgp Description: PGP signature

Re: Why not use /bin/noshell? (was Re: Why do system users have valid shells)

2003-10-23 Thread Javier Fernández-Sanguino Peña
On Thu, Oct 23, 2003 at 12:57:53PM +0100, Dale Amon wrote: > If one isn't available, they are damn easy to write. I've > probably got source laying around somewhere for one I wrote > for NeXT's about a decade ago. Well, Titan's noshell source code is available, I'm not sure if it's license is DFS

Re: Why not use /bin/noshell? (was Re: Why do system users have valid shells)

2003-10-23 Thread Micah Anderson
Try the package "falselogin" micah Javier Fern?ndez-Sanguino Pe?a schrieb am Thursday, den 23. October 2003: > On Wed, Oct 22, 2003 at 09:45:24AM +0200, Tobias Reckhard wrote: > > Hi > > > > We recently noticed that a stock woody install produces an /etc/passwd > > in which most, if not all, s

Re: Why not use /bin/noshell? (was Re: Why do system users have valid shells)

2003-10-23 Thread Javier Fernández-Sanguino Peña
On Thu, Oct 23, 2003 at 10:35:26AM -0500, Micah Anderson wrote: > Try the package "falselogin" > That's not what I was looking for. I was looking for something that logged connection attempts, which falselogin does not. Regards Javi pgp0.pgp Description: PGP signature

Squid package containing buffer overrun ??

2003-10-23 Thread enyc
I'm just sending this out as a 'request for comment' really -- I notice debian-stable has a package for squid which (besides being security-updated already) still has a known buffer overflow in it (although it is apparently of 'unknown risk'). See: http://www.squid-cache.org/Versions/v2/2.4/bug

Re: Why not use /bin/noshell? (was Re: Why do system users have valid shells)

2003-10-23 Thread Micah Anderson
Try the package "falselogin" micah Javier Fern?ndez-Sanguino Pe?a schrieb am Thursday, den 23. October 2003: > On Wed, Oct 22, 2003 at 09:45:24AM +0200, Tobias Reckhard wrote: > > Hi > > > > We recently noticed that a stock woody install produces an /etc/passwd > > in which most, if not all, s

Re: Why not use /bin/noshell? (was Re: Why do system users have valid shells)

2003-10-23 Thread Dale Amon
On Thu, Oct 23, 2003 at 12:52:19PM +0200, Javier Fern?ndez-Sanguino Pe?a wrote: > I have meant to ask this question for some time too. Specially since some > distributions (such as RedHat) provide system users with a /bin/noshell > shell. I'm not sure if this is the same shell as the one provided

Squid package containing buffer overrun ??

2003-10-23 Thread enyc
I'm just sending this out as a 'request for comment' really -- I notice debian-stable has a package for squid which (besides being security-updated already) still has a known buffer overflow in it (although it is apparently of 'unknown risk'). See: http://www.squid-cache.org/Versions/v2/2.4/bug

Why not use /bin/noshell? (was Re: Why do system users have valid shells)

2003-10-23 Thread Javier Fernández-Sanguino Peña
On Wed, Oct 22, 2003 at 09:45:24AM +0200, Tobias Reckhard wrote: > Hi > > We recently noticed that a stock woody install produces an /etc/passwd > in which most, if not all, system users have a valid shell entry of > /bin/sh. They're all unable to login due to having no valid password, > but be

Re: Why not use /bin/noshell? (was Re: Why do system users have valid shells)

2003-10-23 Thread Dale Amon
On Thu, Oct 23, 2003 at 12:52:19PM +0200, Javier Fern?ndez-Sanguino Pe?a wrote: > I have meant to ask this question for some time too. Specially since some > distributions (such as RedHat) provide system users with a /bin/noshell > shell. I'm not sure if this is the same shell as the one provided

Why not use /bin/noshell? (was Re: Why do system users have valid shells)

2003-10-23 Thread Javier Fernández-Sanguino Peña
On Wed, Oct 22, 2003 at 09:45:24AM +0200, Tobias Reckhard wrote: > Hi > > We recently noticed that a stock woody install produces an /etc/passwd > in which most, if not all, system users have a valid shell entry of > /bin/sh. They're all unable to login due to having no valid password, > but be