Todd Troxell wrote:
It seems to me that it would be a good idea to notify root upon upgrade
to a security-fixed kernel so the admin knows to reboot the machine. It
could take place in the form of an email at the simplest. (or News.Debian)
It would then be simple to compare the date of the mail with
Hai
In my POP server i see the following on netstat
tcp0 0 192.168.4.222:110
192.168.100.235:56597 TIME_WAIT
tcp0 0 192.168.4.222:110
192.168.100.235:56580 TIME_WAIT
tcp0 0 192.168.4.222:110
192.168.100.235:56582 TIME_WAIT
tcp
On Monday 04 April 2005 21:46, Todd Troxell wrote:
> What about running daemons that depend on security-fixed
> libraries?
You'll need to restart those manually.
I use the attached script that I keep in /usr/local/sbin to check for
daemons that need restarting after library updates. (It's not ext
It seems to me that it would be a good idea to notify root upon upgrade
to a security-fixed kernel so the admin knows to reboot the machine. It
could take place in the form of an email at the simplest. (or News.Debian)
It would then be simple to compare the date of the mail with uptime (or
version
Hi Rolf.Joschke,
On Monday, 04 Apr 2005, you wrote:
>
> Dear Martin,
>
> I have been unable to find the security-fixed version samba 3.0.10-1. Can
> you mail me the URL where to get it from.
>
have a look on http://packages.debian.org/testing/net/samba and choose
your architecture.
Greetings
M
Dear Martin,
I have been unable to find the security-fixed version samba 3.0.10-1. Can
you mail me the URL where to get it from.
Thank you in advance.
Dr.Rolf Joschke
Senior Technical IT Consultant
Phone(home):+49 (0)7662 94 78 50
Mobile: +49 (0)171 70 86 029
--
To UNSUBSCRIBE, email t
On Mon, Apr 04, 2005 at 10:50:48AM -0700, Chris Adams wrote:
They were also never portrayed as such - merely an additional layer of
protection
It's not an additional layer if you replace passwords with keys.
It allows you to step in the middle of the process - it's not simply a
question of dro
Michael Stone wrote:
Depending on the attack. That's the point I'm making--rsa keys protect
against certain attacks but do absolutely nothing about other attacks
and shouldn't be seen as a magic bullet.
They were also never portrayed as such - merely an additional layer of
protection which has the
On Mon, Apr 04, 2005 at 09:46:26AM -0700, Chris Adams wrote:
Policy was the wrong word - the basic idea is just that either way the
users have a password but a private key isn't directly replayable since
the attacker doesn't actually receive the key information or password.
Depending on the attac
Michael Stone wrote:
On Fri, Apr 01, 2005 at 11:43:07AM -0800, Chris Adams wrote:
There's no difference between the two as regards policy - it's a
one-line command to change either a password or key,
There's no difference? All of the tools to automatically expire
passwords at a given interval, ma
Incoming from Henrique de Moraes Holschuh:
> On Sun, 03 Apr 2005, chad wrote:
> > where trying to get into me from. so i wrote a script to do it for me.
>
> I would change that script to trigger only with two or more attempts from
> the same IP...
... And realize that reports like this are routi
Greetings,
Am Montag 04 April 2005 11:03 schrieb Moritz Muehlenhoff:
> Jan Lühr wrote:
> > Is Samba going to be the next mozilla?
> > The Sama 2.2 tree is obsolete and not provided with upstream fixes.[1]
>
> Have a look at the size of upstream's patch and you'll see why it took so
> long.
Is the
On domenica 03 aprile 2005, alle 20:03, Jan Lühr wrote:
> is there any progress in providing fixed kernels for stable?
> I was just wondering 'cause I expected 'em three months ago.
I think this mail from Martin Schulze, answer this question.
http://lists.debian.org/debian-devel-announce/2005/04/
Jan Lühr wrote:
> Is Samba going to be the next mozilla?
> The Sama 2.2 tree is obsolete and not provided with upstream fixes.[1]
Have a look at the size of upstream's patch and you'll see why it took so
long.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Troubl
14 matches
Mail list logo