Re: Watch out! vsftpd anonymous access always enabled!

2003-09-21 Thread Daniel Jacobowitz
t; ftp: Login failed. > ftp> quit > 221 Goodbye. > 22:36:39:toxa $ > > I use vsftpd.user_list with users allowed to acces to my box, ofcourse > there's > no 'ftp' user in it. If that's built for FreeBSD then it probably doesn't use PAM. This is a bug in the Debian PAM configuration. -- Daniel Jacobowitz MontaVista Software Debian GNU/Linux Developer

Re: Watch out! vsftpd anonymous access always enabled!

2003-09-21 Thread Daniel Jacobowitz
e. If you're running something in situations that could be "quite a disaster", I suggest you immediately rething using the version of vsftpd from _unstable_. -- Daniel Jacobowitz MontaVista Software Debian GNU/Linux Developer

Re: Watch out! vsftpd anonymous access always enabled!

2003-09-21 Thread Daniel Jacobowitz
ata > on his box), this could have been quite a disaster. > > 'funny': > |Description: The Very Secure FTP Daemon > | A lightweight, efficient FTP server written from the ground up with > | security in mind. > > Ahem. I'm working on it. Something is wrong with the PAM config... -- Daniel Jacobowitz MontaVista Software Debian GNU/Linux Developer

Re: Watch out! vsftpd anonymous access always enabled!

2003-09-21 Thread Daniel Jacobowitz
t; ftp: Login failed. > ftp> quit > 221 Goodbye. > 22:36:39:toxa $ > > I use vsftpd.user_list with users allowed to acces to my box, ofcourse there's > no 'ftp' user in it. If that's built for FreeBSD then it probably doesn't use PAM. This is a b

Re: Watch out! vsftpd anonymous access always enabled!

2003-09-21 Thread Daniel Jacobowitz
e. If you're running something in situations that could be "quite a disaster", I suggest you immediately rething using the version of vsftpd from _unstable_. -- Daniel Jacobowitz MontaVista Software Debian GNU/Linux Developer -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Watch out! vsftpd anonymous access always enabled!

2003-09-21 Thread Daniel Jacobowitz
ata > on his box), this could have been quite a disaster. > > 'funny': > |Description: The Very Secure FTP Daemon > | A lightweight, efficient FTP server written from the ground up with > | security in mind. > > Ahem. I'm working on it. Something is wrong w

Re: dpkg-buildpackage (-rfakeroot) leaves setuid binaries

2002-01-21 Thread Daniel Jacobowitz
On Tue, Jan 22, 2002 at 01:11:18AM +0100, Christian Jaeger wrote: > This can be a real security hole, at least when you are not aware of > it (I have just discovered a working way to exploit it on one of my > machines). And isn't that a bug in the package in question? :) -- Dan

Re: dpkg-buildpackage (-rfakeroot) leaves setuid binaries

2002-01-21 Thread Daniel Jacobowitz
On Tue, Jan 22, 2002 at 01:11:18AM +0100, Christian Jaeger wrote: > This can be a real security hole, at least when you are not aware of > it (I have just discovered a working way to exploit it on one of my > machines). And isn't that a bug in the package in question? :) -- Dan

Re: faq? rpc.statd: gethostbyname error for

2001-12-31 Thread Daniel Jacobowitz
On Mon, Dec 31, 2001 at 09:11:41PM +0100, David Gestel wrote: > What is this? I don't think anyone got in though, everything seems to be > fine. > I'm running woody and rpc.statd version 0.3.3 Yep. The fact that it was logged in this particular case means you're fine

Re: faq? rpc.statd: gethostbyname error for

2001-12-31 Thread Daniel Jacobowitz
On Mon, Dec 31, 2001 at 09:11:41PM +0100, David Gestel wrote: > What is this? I don't think anyone got in though, everything seems to be > fine. > I'm running woody and rpc.statd version 0.3.3 Yep. The fact that it was logged in this particular case means you're fine

Re: apt sources.list

2001-08-21 Thread Daniel Jacobowitz
security is especially important to you, run stable with security updates, or track unstable daily and hope maintainers are responsive. We try to see that woody is in coherent shape just before release, but we can't supply fixes for it on any more urgent basis. It moves too fast. -- Daniel Jac

Re: rpc.statd being attacked?

2001-08-21 Thread Daniel Jacobowitz
You're safe. It was fixed before potato; it would not have been logged if it had succeeded. -- Daniel Jacobowitz Carnegie Mellon University MontaVista Software Debian GNU/Linux Developer

Re: apt sources.list

2001-08-21 Thread Daniel Jacobowitz
security is especially important to you, run stable with security updates, or track unstable daily and hope maintainers are responsive. We try to see that woody is in coherent shape just before release, but we can't supply fixes for it on any more urgent basis. It moves too fast. -- Daniel Jac

Re: rpc.statd being attacked?

2001-08-21 Thread Daniel Jacobowitz
You're safe. It was fixed before potato; it would not have been logged if it had succeeded. -- Daniel Jacobowitz Carnegie Mellon University MontaVista Software Debian GNU/Linux Developer -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with

Re: shared root account

2001-07-17 Thread Daniel Jacobowitz
; whats really needed is a passwd command that behaves exactly the same > as passwd, only with alternate passwd files. Hmm, shouldn't some PAM-aware passwd implementation be able to do this? -- Daniel Jacobowitz Carnegie Mellon University MontaVista Software Debian GNU/Linux Developer

Re: shared root account

2001-07-17 Thread Daniel Jacobowitz
; whats really needed is a passwd command that behaves exactly the same > as passwd, only with alternate passwd files. Hmm, shouldn't some PAM-aware passwd implementation be able to do this? -- Daniel Jacobowitz Carnegie Mellon University MontaVista Software

Re: setting up sudo for tail

2001-04-11 Thread Daniel Jacobowitz
ure. -- Daniel Jacobowitz Debian GNU/Linux Developer Monta Vista Software Debian Security Team "I am croutons!"

Re: setting up sudo for tail

2001-04-11 Thread Daniel Jacobowitz
ure. -- Daniel Jacobowitz Debian GNU/Linux Developer Monta Vista Software Debian Security Team "I am croutons!" -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe".

Re: rpc.statd

2001-04-08 Thread Daniel Jacobowitz
20\220\220\220\220\220\220 > > It looks like statd is still running. Is rpc still vulnerable? Is there a Nope, you're safe if you saw the % signs in your logs. > way to track down who > connected to rpc.statd? Run a tcp logger, like ippl. -- Daniel Jacobowitz

Re: rpc.statd

2001-04-08 Thread Daniel Jacobowitz
20\220\220\220\220\220\220 > > It looks like statd is still running. Is rpc still vulnerable? Is there a Nope, you're safe if you saw the % signs in your logs. > way to track down who > connected to rpc.statd? Run a tcp logger, like ippl. -- Daniel Jacobowitz

Re: Applications using Linux capabilities

2001-03-23 Thread Daniel Jacobowitz
; - xntp3 w/patch (just keeps CAP_SYS_TIME, drops uid 0) Vsftpd does, too. I'm fairly sure there's a lot more - you can access them through PAM somehow, I think... -- Daniel Jacobowitz Debian GNU/Linux Developer Monta Vista Software Debian Security Team "I am croutons!"

Re: Applications using Linux capabilities

2001-03-23 Thread Daniel Jacobowitz
; - xntp3 w/patch (just keeps CAP_SYS_TIME, drops uid 0) Vsftpd does, too. I'm fairly sure there's a lot more - you can access them through PAM somehow, I think... -- Daniel Jacobowitz Debian GNU/Linux Developer Monta Vista Software

Re: Bug#88055: security hole in joe

2001-02-28 Thread Daniel Jacobowitz
ault (core dumped) joe foo > > I wonder what's the best fix for this bug... check ownership of ./.joerc > file before trying to read it? Not read it at all? Don't read it at all, please. I guess there's a command line option to choose an rc file? If so, I'd have no qualms about killing this behavior. -- Daniel Jacobowitz Debian GNU/Linux Developer Monta Vista Software Debian Security Team

Re: Bug#88055: security hole in joe

2001-02-28 Thread Daniel Jacobowitz
> > I wonder what's the best fix for this bug... check ownership of ./.joerc > file before trying to read it? Not read it at all? Don't read it at all, please. I guess there's a command line option to choose an rc file? If so, I'd have no qualms about killing this behavi

Re: Food for thought - SECURITY (design flaw?)

2001-02-12 Thread Daniel Jacobowitz
n for stable it has no purpose. It is preparation for becoming stable, but not "on half a moment's notice". Security fixes go into unstable and trickle into testing. The principal, I think, is that we can throttle the packages being allowed into testing for an easier release cycle.

Re: Food for thought - SECURITY (design flaw?)

2001-02-12 Thread Daniel Jacobowitz
ration for stable it has no purpose. It is preparation for becoming stable, but not "on half a moment's notice". Security fixes go into unstable and trickle into testing. The principal, I think, is that we can throttle the packages being allowed into testing for an easier rel

Re: How to use apt to install security updates ?

2001-02-11 Thread Daniel Jacobowitz
t support that any more; you should upgrade to potato, which has been out since last August. The web page does not reference slink any more... Dan /\ /\ | Daniel Jacobowitz|__|SCS Class of 2002

Re: How to use apt to install security updates ?

2001-02-11 Thread Daniel Jacobowitz
upport that any more; you should upgrade to potato, which has been out since last August. The web page does not reference slink any more... Dan /\ /\ | Daniel Jacobowitz|__|SCS Class of 2002

Re: Disappointment in security handling in Debian

2001-02-01 Thread Daniel Jacobowitz
ing language for this page ? The web people tell me that this was a bug in the automatic regeneration of the web pages; it should be fixed. Dan /\ /--------\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian

Re: Disappointment in security handling in Debian

2001-02-01 Thread Daniel Jacobowitz
ing language for this page ? The web people tell me that this was a bug in the automatic regeneration of the web pages; it should be fixed. Dan /\ /--------\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian

Re: Disappointment in security handling in Debian

2001-02-01 Thread Daniel Jacobowitz
tainly accurate, but to my knowledge lprng is the only thing to slip through the cracks that way in a year. We're often behind with fixes in general, but when we post a fix the advisory generally goes out the same day! Dan /----\ /----

Re: Disappointment in security handling in Debian

2001-01-31 Thread Daniel Jacobowitz
tainly accurate, but to my knowledge lprng is the only thing to slip through the cracks that way in a year. We're often behind with fixes in general, but when we post a fix the advisory generally goes out the same day! Dan /----\ /----

Re: rpc.statd attack?

2001-01-09 Thread Daniel Jacobowitz
uld have crashed well beforehand. Dan /\ /--------\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian GNU/Linux Developer__Carnegie Mellon University | | [EMAIL PROTECTED] | | [EMAIL PROTECTED] | \/ \/

Re: rpc.statd attack?

2001-01-09 Thread Daniel Jacobowitz
would have crashed well beforehand. Dan /\ /--------\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian GNU/Linux Developer__Carnegie Mellon University | | [EMAIL PROTE

Re: Problems with root on network clients

2000-11-26 Thread Daniel Jacobowitz
pb/project/openafs/debian packages/ for some preliminary packages. Dan /--------\ /\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian GNU/Linux Developer__Carnegie Mellon University | | [EMAIL PROTECTED] | | [EMAIL PROTECTED] | \/ \/

Re: Problems with root on network clients

2000-11-26 Thread Daniel Jacobowitz
pb/project/openafs/debian packages/ for some preliminary packages. Dan /--------\ /\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian GNU/Linux Developer__Carnegie Mellon Univer

Re: task-unstable-security-updates?

2000-11-20 Thread Daniel Jacobowitz
es getting all fixes compiled on all architectures for unstable. That's impractical; we do the best that we can, but it's too time consuming and too complicated, especially given the quirks of some of our architectures. Dan /\ /-

Re: task-unstable-security-updates?

2000-11-20 Thread Daniel Jacobowitz
es getting all fixes compiled on all architectures for unstable. That's impractical; we do the best that we can, but it's too time consuming and too complicated, especially given the quirks of some of our architectures. Dan /\ /-

Re: task-unstable-security-updates?

2000-11-19 Thread Daniel Jacobowitz
st - debian-security-announce. That's what it's for :) Dan /--------\ /\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian GNU/Linux Developer__Carnegie Mellon University | | [EMAIL PROTECTED] | | [EMAIL PROTECTED] | \/ \/

Re: task-unstable-security-updates?

2000-11-19 Thread Daniel Jacobowitz
st - debian-security-announce. That's what it's for :) Dan /--------\ /\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian GNU/Linux Developer__Carnegie Mellon Universi

Re: Bug#77257: FWD: Joe's Own Editor File Link Vulnerability

2000-11-17 Thread Daniel Jacobowitz
h - that's the whole use of it. It shows what files were being edited when joe was killed. Dan /----\ /\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian GNU/Linux Developer__Carnegie Mellon University | | [EMAIL PROTECTED] | | [EMAIL PROTECTED] | \/ \/

Re: Bug#77257: FWD: Joe's Own Editor File Link Vulnerability

2000-11-17 Thread Daniel Jacobowitz
crash - that's the whole use of it. It shows what files were being edited when joe was killed. Dan /----\ /\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian GNU/Linux Developer__Carnegie Mello

Re: vixie cron... (fwd)

2000-11-17 Thread Daniel Jacobowitz
t clean Debian installs it is not mode 0700. There will be a security advisory shortly. Dan /\ /\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian GNU/Linux Developer__Carnegie Mellon University | | [EMAIL PROTECTED] | | [EMAIL PROTECTED] | \/ \/

Re: vixie cron... (fwd)

2000-11-17 Thread Daniel Jacobowitz
t clean Debian installs it is not mode 0700. There will be a security advisory shortly. Dan /\ /\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian GNU/Linux Developer__

Re: security.debian.org mirrors?

2000-10-22 Thread Daniel Jacobowitz
ly (when possible), yes > - I should use potato security fixes with woody Well, it's safe to list it as an apt source, and there will occasionally be things available there before in unstable. But fixes also tend to go straight into unstable. Dan /

Re: security.debian.org mirrors?

2000-10-22 Thread Daniel Jacobowitz
ly (when possible), yes > - I should use potato security fixes with woody Well, it's safe to list it as an apt source, and there will occasionally be things available there before in unstable. But fixes also tend to go straight into unstable. Dan /

Re: security.debian.org mirrors?

2000-10-20 Thread Daniel Jacobowitz
gt; fixes for nonus packages (if any)? I believe it is a matter of trust and of instant distribution; we can provide uploads to everyone using the security site in a very limited amount of time. Dan /\ /--------\ | Daniel Jacobowitz

Re: php3 security update breaks imp webmailer

2000-10-20 Thread Daniel Jacobowitz
t the broken functionality. The PHP folks know about it, and > hopefully. 3.0.18 will be out soon. Yep, so I've gathered. I'll do a new security upload when this happens. Dan /----\ /----\ | Daniel Jacobowitz|__|

Re: security.debian.org mirrors?

2000-10-20 Thread Daniel Jacobowitz
gt; fixes for nonus packages (if any)? I believe it is a matter of trust and of instant distribution; we can provide uploads to everyone using the security site in a very limited amount of time. Dan /\ /--------\ | Daniel Jacobowitz

Re: php3 security update breaks imp webmailer

2000-10-20 Thread Daniel Jacobowitz
o hit the broken functionality. The PHP folks know about it, and > hopefully. 3.0.18 will be out soon. Yep, so I've gathered. I'll do a new security upload when this happens. Dan /----\ /----\ | Daniel Jacobowitz

Re: what is on port 13223

2000-10-12 Thread Daniel Jacobowitz
erbenson/ Probably some current trojan. Maybe a sub7 variant? There's a trojan list on the web somewhere. Dan /\ /--------\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian GNU/Linux Developer__

Re: what is on port 13223

2000-10-11 Thread Daniel Jacobowitz
erbenson/ Probably some current trojan. Maybe a sub7 variant? There's a trojan list on the web somewhere. Dan /\ /--------\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian GNU/Linux Developer__

Re: file ownership in liblockfile1 1.01 (sparc)

2000-10-11 Thread Daniel Jacobowitz
On Wed, Oct 11, 2000 at 08:01:57AM -0700, andy wrote: > On Wed, 11 Oct 2000, Daniel Jacobowitz wrote: > > > On Wed, Oct 11, 2000 at 07:18:23AM -0700, andy wrote: > > > just ran tiger on a fresh debian (2.2) install, and received the following > > > warnings: >

Re: file ownership in liblockfile1 1.01 (sparc)

2000-10-11 Thread Daniel Jacobowitz
are you installing from? I can't reproduce this. Dan /--------\ /\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian GNU/Linux Developer__Carnegie Mellon University | | [EMAIL PROTECTED] | | [EMAIL PROTECTED] | \/ \/

Re: file ownership in liblockfile1 1.01 (sparc)

2000-10-11 Thread Daniel Jacobowitz
On Wed, Oct 11, 2000 at 08:01:57AM -0700, andy wrote: > On Wed, 11 Oct 2000, Daniel Jacobowitz wrote: > > > On Wed, Oct 11, 2000 at 07:18:23AM -0700, andy wrote: > > > just ran tiger on a fresh debian (2.2) install, and received the following > > > warnings: >

Re: file ownership in liblockfile1 1.01 (sparc)

2000-10-11 Thread Daniel Jacobowitz
are you installing from? I can't reproduce this. Dan /--------\ /\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian GNU/Linux Developer__Carnegie Mellon University | | [EMAIL PROTECTED] | | [EMAIL PROTECTED] | \---

Re: funny rpc.statd events

2000-10-10 Thread Daniel Jacobowitz
On Tue, Oct 10, 2000 at 10:28:39PM -0400, Ben Pfaff wrote: > Daniel Jacobowitz <[EMAIL PROTECTED]> writes: > > > This was fixed a month or two before potato was released. > > I've seen those too, on up-to-date woody, so I don't think it > really got fixed.

Re: funny rpc.statd events

2000-10-10 Thread Daniel Jacobowitz
in advance. > > > herbert > > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] > > Dan /\ /\ | Daniel Jacobowi

Re: funny rpc.statd events

2000-10-10 Thread Daniel Jacobowitz
On Tue, Oct 10, 2000 at 10:28:39PM -0400, Ben Pfaff wrote: > Daniel Jacobowitz <[EMAIL PROTECTED]> writes: > > > This was fixed a month or two before potato was released. > > I've seen those too, on up-to-date woody, so I don't think it > really got fixed.

Re: funny rpc.statd events

2000-10-10 Thread Daniel Jacobowitz
in advance. > > > herbert > > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] > > Dan /\ /\ | Daniel Jacobowi

Re: su vulnerability

2000-10-09 Thread Daniel Jacobowitz
) (even though thats only a DoS solved easily by disk > file quotas) I'll say this for the fifth time this week... We are backlogged. There aren't very many of us, and we have over half a dozen half-written advisories. They will be going out soon. I posted on bugtraq that the vulnera

Re: su vulnerability

2000-10-09 Thread Daniel Jacobowitz
le quotas) I'll say this for the fifth time this week... We are backlogged. There aren't very many of us, and we have over half a dozen half-written advisories. They will be going out soon. I posted on bugtraq that the vulnerability had been fixed in debian, informally,

Re: Is Open Source software really more secure?

2000-10-08 Thread Daniel Jacobowitz
distributions are generally fairly well looked-over and tested. Dan /--------\ /\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian GNU/Linux Developer__Carnegie Mellon University | | [EMAIL PROTECTED] | | [EMAIL PROTECTED] | \/ \/

Re: Is Open Source software really more secure?

2000-10-08 Thread Daniel Jacobowitz
distributions are generally fairly well looked-over and tested. Dan /--------\ /\ | Daniel Jacobowitz|__|SCS Class of 2002 | | Debian GNU/Linux Developer__Carnegie Mellon Universit