Re: server problems- strange portsa nd processes

2006-01-18 Thread Anthony DeRobertis
edgar wrote: > A few days ago there were some problems on the server. we couldn't ssh > to it, the network card was in promiscous mode (it seems it was > attacked). Could it be that somone cracked it? Sounds like it. And considering they managed to set promisc, sounds like they got root. > The l

Re: post-fix-upgrade procedures notification

2005-04-06 Thread Anthony DeRobertis
Riku Valli wrote: Yes, security-fixed libraries is problem, most people don't restart daemons which depend changed libraries. So i recommed when that happens in DSA or package is lsof |grep DEL|more reminder at least. There is a script in debian-goodies (at least on sarge) called checkrestart as

Re: strange reboot on woody

2003-11-29 Thread Anthony DeRobertis
On Thu, 2003-11-27 at 07:59, Haim Ashkenazi wrote: > ... > ov 26 22:26:16 ns-ilweb1 init: Switching to runlevel: 6 > Nov 26 22:26:19 ns-ilweb1 qmail: 1069878379.427182 status: exiting > Nov 26 22:26:20 ns-ilweb1 ntpd[32551]: ntpd exiting on signal 15 > Nov 26 22:26:22 ns-ilweb1 exiting on signal 1

Re: development of sarge

2003-11-29 Thread Anthony DeRobertis
On Thu, 2003-11-27 at 06:42, [EMAIL PROTECTED] wrote: > Hi. Does the attack on the servers and the work that has to be done related > to > the attack, slow down the development of Sarge very much? Certainly by at least a week. After all, we are without the testing scripts running for a week now.

Re: strange reboot on woody

2003-11-29 Thread Anthony DeRobertis
On Thu, 2003-11-27 at 07:59, Haim Ashkenazi wrote: > ... > ov 26 22:26:16 ns-ilweb1 init: Switching to runlevel: 6 > Nov 26 22:26:19 ns-ilweb1 qmail: 1069878379.427182 status: exiting > Nov 26 22:26:20 ns-ilweb1 ntpd[32551]: ntpd exiting on signal 15 > Nov 26 22:26:22 ns-ilweb1 exiting on signal 1

Re: development of sarge

2003-11-29 Thread Anthony DeRobertis
On Thu, 2003-11-27 at 06:42, [EMAIL PROTECTED] wrote: > Hi. Does the attack on the servers and the work that has to be done related to > the attack, slow down the development of Sarge very much? Certainly by at least a week. After all, we are without the testing scripts running for a week now. An

Re: Debian servers "hacked"?

2003-11-27 Thread Anthony DeRobertis
On Nov 26, 2003, at 15:34, Matt Zimmerman wrote: None of those packages are new; they are all from security.debian.org and correspnod to security advisories released since 3.0r1. Really? There were 13 or so things on 3.0r2 that my machines never picked up from security.debian.org. Don't stable re

Re: Debian servers "hacked"?

2003-11-27 Thread Anthony DeRobertis
On Nov 26, 2003, at 15:34, Matt Zimmerman wrote: None of those packages are new; they are all from security.debian.org and correspnod to security advisories released since 3.0r1. Really? There were 13 or so things on 3.0r2 that my machines never picked up from security.debian.org. Don't sta

Re: communication structures crumbled

2003-11-27 Thread Anthony DeRobertis
On Nov 25, 2003, at 17:16, Dan Jacobson wrote: With the mailing lists affected, what would average user me do to learn the latest on the situation, irc.debian.org #debian

Re: communication structures crumbled

2003-11-27 Thread Anthony DeRobertis
On Nov 25, 2003, at 17:16, Dan Jacobson wrote: With the mailing lists affected, what would average user me do to learn the latest on the situation, irc.debian.org #debian -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Mail relay attempts

2002-09-04 Thread Anthony DeRobertis
On Thursday, Aug 29, 2002, at 09:34 US/Eastern, Nathan E Norman wrote: This is why all ISPs should apply filters at their ingress/egress points. Unfortunately, many do not. While I don't want to start a flame war here, as all discussions of this topic seem to become, I'd just like to point

Re: Bug#149714: libfam0 Does not depend on fam

2002-08-23 Thread Anthony DeRobertis
You could set up a pseudo-package that provides it, unless its a versioned dependency (haven't checked). There is a package for doing that (setting up those pseudo-packages) but I don't remember the name. Sorry :-(

Re: RUS-CERT Advisory 2002-08:02: Flaw in calloc and similar routines

2002-08-12 Thread Anthony DeRobertis
On Sun, 2002-08-11 at 23:23, Andres Salomon wrote: > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=155529&repeatmerged=yes Thank you! signature.asc Description: This is a digitally signed message part

RUS-CERT Advisory 2002-08:02: Flaw in calloc and similar routines

2002-08-08 Thread Anthony DeRobertis
http://online.securityfocus.com/archive/1/286087/2002-07-30/2002-08-05/0 I haven't seen anything about this from Debian. They site "GNU libc 2.2.5" as being vulnerbale, and that is the version of libc6 on my system. The last vulnerability fix I see in the changelog is the resolver one. signatur

Re: [Fwd: ISS Advisory: OpenSSH Remote Challenge Vulnerability]

2002-06-27 Thread Anthony DeRobertis
On Wed, 2002-06-26 at 14:59, Lupe Christoph wrote: > I've spent several hours updating left and right, and now this? > How shall I justify this to my client? I can't really charge for > falling for Theo. Seems I took a firm stand and bent over for him. See Wichert's message: <[EMAIL PROTECTED]>

Re: the openssh exploit

2002-06-25 Thread Anthony DeRobertis
On Tuesday, June 25, 2002, at 12:00 , Paul Baker wrote: Does anyone know if the openssh exploit that 3.3 is supposed to not fix, but do damage control for, is it still exploitable if you have set your /etc/hosts.deny to deny all hosts, and then /etc/hosts.allow to only allow from trusted ips.

Re: the openssh exploit

2002-06-25 Thread Anthony DeRobertis
On Tuesday, June 25, 2002, at 12:39 , Paul Baker wrote: but potentially maybe someone could craft a malicious packet that appears to come from one of the trusted ips?? SSH uses TCP, not UDP. In order for the kernel to pass any data to OpenSSH, the following must happen: REMOTE send

DSA-134-1

2002-06-24 Thread Anthony DeRobertis
$VENDOR says it's broken $VENDOR won't provide details $VENDOR says upgrade two minor releases $VENDOR says upgrading doesn't actually fix the problem $VENDOR says upgrading will break things Woody security update comes out before potato one. That makes for the weirdest DSA I can remember. PS: W

Re: Proposal for new Security subsection for non-US

2002-06-24 Thread Anthony DeRobertis
On Sunday, June 23, 2002, at 05:21 , Matthew Sackman wrote: If I've missed something obvious, please shout at me ;-) Only problem is that a Snort that has reached its second birthday may not be happy with the new definitions. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of

Re: Proposal for new Security subsection for non-US

2002-06-24 Thread Anthony DeRobertis
On Sunday, June 23, 2002, at 01:29 , Peter Cordes wrote: Still, is anybody working on adding rsync support to apt? That would, CPU-wise, kill the server. Last I checked (and please correct me if the Samba folks have managed the impossible), having hundreds of concurrent rsyncs running is no

Re: Updated Apache packages for testing?

2002-06-23 Thread Anthony DeRobertis
On Sat, 2002-06-22 at 21:08, Brendan Hack wrote: > I've had this problem before with apache spontaneously seg faulting when > trying to execute it. I know we all hate killing the uptime but if I > rebooted it would solve the problem. Maybe it ran out of sysv shared memory? You can use ipcs to ch

Re: chkrootkit-0.31 and possible bug?

2002-06-07 Thread Anthony DeRobertis
> And if so, what could make chkproc think, seeing something what is > probably not there? Perhaps some kind of runtime failure in the C code? Well, remember that you're running on a pre-emptivly scheduled system. Processes can be created and destroyed during that code's running. Although you did

Re: A more secure form of .htaccess?

2002-05-05 Thread Anthony DeRobertis
On Fri, 2002-04-26 at 20:27, martin f krafft wrote: > never say impossible. Quite. Way too many people will click continue to all the "this certificate is not certified by anyone trusted" and "this certificate certifies a different site" warnings. Most people would click continue if their browse

Re: A more secure form of .htaccess?

2002-05-04 Thread Anthony DeRobertis
On Fri, 2002-04-26 at 20:27, martin f krafft wrote: > never say impossible. Quite. Way too many people will click continue to all the "this certificate is not certified by anyone trusted" and "this certificate certifies a different site" warnings. Most people would click continue if their brows

Re: Makejail

2002-02-20 Thread Anthony DeRobertis
On Tuesday, February 19, 2002, at 09:05 AM, Davy Gigan wrote: I would also notify another evident thing : due to the fact i'm running two syslog-ng servers on my machine, the configure script killed all of them => normal. No that is normal. The scripts should be using pid files. To quote po

Re: Makejail

2002-02-20 Thread Anthony DeRobertis
On Tuesday, February 19, 2002, at 09:05 AM, Davy Gigan wrote: > I would also notify another > evident thing : due to the fact i'm running two syslog-ng servers > on my machine, the configure script killed all of them => normal. No that is normal. The scripts should be using pid files. To quot

RE: HELP I've been cracked

2002-02-14 Thread Anthony DeRobertis
On Wed, 2002-02-13 at 20:37, Jeff Bonner wrote: > I have not, knock on wood, had a box compromised in > any way, so I have no practical experience in that regard. Whether > that's the result of my security efforts, or just pure luck, who knows. I've had to deal with boxes built and maintained by

RE: HELP I've been cracked

2002-02-14 Thread Anthony DeRobertis
On Wed, 2002-02-13 at 20:37, Jeff Bonner wrote: > I have not, knock on wood, had a box compromised in > any way, so I have no practical experience in that regard. Whether > that's the result of my security efforts, or just pure luck, who knows. I've had to deal with boxes built and maintained b

Re: HELP I've been cracked

2002-02-13 Thread Anthony DeRobertis
On Monday, February 11, 2002, at 02:54 PM, Jeff Bonner wrote: But if the machine is restarted, those changes either do not persist (same kernel) or are quite obvious (modified kernel overwrites the old one, etc). On the other hand, having a hostile module inserted into the kernel not only al

Re: HELP I've been cracked

2002-02-13 Thread Anthony DeRobertis
On Monday, February 11, 2002, at 02:54 PM, Jeff Bonner wrote: > > But if the machine is restarted, those changes either do not persist > (same kernel) or are quite obvious (modified kernel overwrites the old > one, etc). On the other hand, having a hostile module inserted > into the > kernel n

Re: HELP I've been cracked

2002-02-11 Thread Anthony DeRobertis
On Saturday, February 9, 2002, at 01:47 PM, Jeff Bonner wrote: One of the things I did with my firewall was compile all the needed modules into the kernel, so that no additional modules can be loaded -- which is one way a hacker can install things. If you have root, you can just write to kern

Re: /etc/passwd->shell

2002-01-14 Thread Anthony DeRobertis
On Saturday, January 12, 2002, at 02:46 PM, Hubert Chan wrote: I think that if you boot into single mode (e.g. type "linux single" at the LILO prompt), you'll drop into whatever shell is defined for root. More importantly, will it break if, e.g., fsck fails and drops you into single-user mod

Re: /etc/passwd->shell

2002-01-14 Thread Anthony DeRobertis
On Saturday, January 12, 2002, at 02:46 PM, Hubert Chan wrote: > > I think that if you boot into single mode (e.g. type "linux single" at > the LILO prompt), you'll drop into whatever shell is defined for root. More importantly, will it break if, e.g., fsck fails and drops you into single-user

Re: A 2.4.[57] kernel crypto problem

2002-01-07 Thread Anthony DeRobertis
On Sunday, January 6, 2002, at 04:00 , Pavel Minev Penev wrote: There are about 3304 proceses with sequential PIDs and names of "[loop7 ]", and are all zombies. Are you calling fork in your code? Are you calling waitpid or friends? Who's children are those? (try ps fxa)

Re: A 2.4.[57] kernel crypto problem

2002-01-07 Thread Anthony DeRobertis
On Sunday, January 6, 2002, at 04:00 , Pavel Minev Penev wrote: > There are about 3304 proceses with sequential PIDs and names of > "[loop7 ]", and are all zombies. Are you calling fork in your code? Are you calling waitpid or friends? Who's children are those? (try ps fxa) -- To UNSUBSCRIB

Re: Secure 2.4.x kernel - readonly

2001-12-26 Thread Anthony DeRobertis
On Tuesday, December 25, 2001, at 08:34 , Alvin Oga wrote: On Mon, 24 Dec 2001, Anthony DeRobertis wrote: making the disks readonly is not trivial ... lots of work to make it readonly.. a fun project ... Not really. Nothing should write anywhere except /var and /tmp (did I miss any

Re: Secure 2.4.x kernel - readonly

2001-12-26 Thread Anthony DeRobertis
On Tuesday, December 25, 2001, at 08:34 , Alvin Oga wrote: > > > On Mon, 24 Dec 2001, Anthony DeRobertis wrote: > >>> making the disks readonly is not trivial ... >>> lots of work to make it readonly.. a fun project ... >> >> Not really. Nothing

Re: Secure 2.4.x kernel

2001-12-25 Thread Anthony DeRobertis
It doesn't need to spawn a new shell to allow root access. It can just load the a properly-linked shell into memory (not calling execve), then jump to main. Or it can not use a shell at all. Shells aren't special in any way. True, shells aren't special. But if someone tries to smash the stack,

Re: Secure 2.4.x kernel

2001-12-25 Thread Anthony DeRobertis
>> It doesn't need to spawn a new shell to allow root access. It >> can just load the a properly-linked shell into memory (not >> calling execve), then jump to main. >> >> Or it can not use a shell at all. Shells aren't special in any way. > > True, shells aren't special. But if someone tries to

Re: Secure 2.4.x kernel

2001-12-24 Thread Anthony DeRobertis
On Monday, December 24, 2001, at 10:52 , Gary MacDougall wrote: Someone said that St. Jude was what I was looking for, and I think its pretty much *exactly* what I was pointing out. Can't, in general, stop an attack. All the attacker has to do is not do unusual calls which jude monitors, whi

Re: Secure 2.4.x kernel

2001-12-24 Thread Anthony DeRobertis
making the disks readonly is not trivial ... lots of work to make it readonly.. a fun project ... Not really. Nothing should write anywhere except /var and /tmp (did I miss any). Also, if you have users, then /home. In particular, if it is in $PATH, make it read-only. Many root kits trojan

Re: Secure 2.4.x kernel

2001-12-24 Thread Anthony DeRobertis
On Monday, December 24, 2001, at 10:52 , Gary MacDougall wrote: > Someone said that St. Jude was what I was looking for, and I think > its pretty much *exactly* what I was pointing out. Can't, in general, stop an attack. All the attacker has to do is not do unusual calls which jude monitors, w

Re: Secure 2.4.x kernel

2001-12-24 Thread Anthony DeRobertis
> making the disks readonly is not trivial ... > lots of work to make it readonly.. a fun project ... Not really. Nothing should write anywhere except /var and /tmp (did I miss any). Also, if you have users, then /home. In particular, if it is in $PATH, make it read-only. Many root kits troja

Re: Secure 2.4.x kernel

2001-12-24 Thread Anthony DeRobertis
On Saturday, December 22, 2001, at 07:22 , System Administrator wrote: The assembly statement "jsr" (jump to subroutine) puts the return address on the same stack, where space for local variables is reserved. Local variables, parameters, temporaries, etc. Yes, it's all the same stack on ev

Re: Secure 2.4.x kernel

2001-12-24 Thread Anthony DeRobertis
On Friday, December 21, 2001, at 03:25 , Gary MacDougall wrote: Wouldn't it be nice to be able to run the kernel in "secure mode"? I'm curious to know if we could limit the amount of "root exploits" by this method, it would REALLY harden up security on a Linux box... anyone have any opinions on

Re: Secure 2.4.x kernel

2001-12-24 Thread Anthony DeRobertis
On Saturday, December 22, 2001, at 07:22 , System Administrator wrote: > The assembly statement "jsr" (jump to subroutine) puts the > return address > on the same stack, where space for local variables is reserved. > Local variables, parameters, temporaries, etc. Yes, it's all the same stack

Re: Secure 2.4.x kernel

2001-12-24 Thread Anthony DeRobertis
On Friday, December 21, 2001, at 03:25 , Gary MacDougall wrote: > Wouldn't it be nice to be able to run the kernel in "secure mode"? > I'm curious to know if we could limit the amount of "root exploits" > by this method, it would REALLY harden up security on a > Linux box... anyone have any opin

Re: question about something, but don't know if it exists...

2001-11-10 Thread Anthony DeRobertis
On Thursday, November 8, 2001, at 06:07 , martin f krafft wrote: * Bryan Andersen <[EMAIL PROTECTED]> [2001.11.06 05:23:05-0600]: Another possibility would be to have them replace the hubs with switches, this assumes you are using twisted pair, not thin net or thick net. which is not secure

Re: Debconf and noexec on /tmp

2001-11-10 Thread Anthony DeRobertis
On Thursday, November 8, 2001, at 08:08 , Wichert Akkerman wrote: Previously Ethan Benson wrote: sorry i don't leave known security holes wide open on my boxes. only an idiot does that. If you think your box does not have currently unknown holes you are naive :) Unless its unplugged. But

Re: question about something, but don't know if it exists...

2001-11-10 Thread Anthony DeRobertis
On Thursday, November 8, 2001, at 06:07 , martin f krafft wrote: > * Bryan Andersen <[EMAIL PROTECTED]> [2001.11.06 05:23:05-0600]: >> Another possibility would be to have them replace the hubs with >> switches, this assumes you are using twisted pair, not thin net >> or thick net. > > which is

Re: Debconf and noexec on /tmp

2001-11-10 Thread Anthony DeRobertis
On Thursday, November 8, 2001, at 08:08 , Wichert Akkerman wrote: > Previously Ethan Benson wrote: >> sorry i don't leave known security holes wide open on my boxes. only >> an idiot does that. > > If you think your box does not have currently unknown holes you are > naive :) > Unless its unpl

Re: A thought on Layne

2001-09-01 Thread Anthony DeRobertis
Can we subscribe him, WITHOUT posting priveleges, to every list debian hosts? And then linux-kernel as well? After that, spam-l and a news-to-mail of nanae? Please?

Re: A thought on Layne

2001-09-01 Thread Anthony DeRobertis
Can we subscribe him, WITHOUT posting priveleges, to every list debian hosts? And then linux-kernel as well? After that, spam-l and a news-to-mail of nanae? Please? -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]