also. Through this
customised versions of ssh the cracker harvested every password that
was used during ssh logins and ssh sessions.
We are winning the battle and will in the next few weeks try do the
analysis of what went wrong.
Regards
Johann
--
Johann Spies Telefoon: 021-808 4599
: /etc/.java
[10:35:48] Warning: Hidden directory found: /dev/.udev
[10:35:48] Warning: Hidden directory found: /dev/.initramfs
I think the last three lines are not problematic but in /dev/shm/r I found:
spawn /bin/bash
interact
Do I have reason to be worried?
Regards
Johann
--
Johann Spies
to do
interrupt the boot process to get root access.
Thanks to all the people contributing to this thread.
Regards.
Johann
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
Do all things without murmurings and disputings:
That ye
the hash must have to be accepted.
Regards
Johann
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
Do all things without murmurings and disputings:
That ye may be blameless and harmless, the sons of
God, without rebuke
one
password. That is on a 2xquadcore Intel server.
By the way, I am not trying to break in. I am testing the
effectiveness of John.
Regards
Johann
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
I press toward the mark for the prize
Any help to get pass this obstacle will be appreciated.
Regards
Johann
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
Jesus said unto her, I am the resurrection, and the
life; he that believeth in me, though he were dead
message
Exiting
And in user1's environment:
~ echo $SGE_ROOT
/usr/local/sge
Any idea how I can solve this one?
Regards
Johann
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
But where shall wisdom be found? and where is the
place
for
the solution which I think I found now: Moving the env_keep line in
/etc/sudoers to a position after the other defaults were set, made
user fluent keep SGE_ROOT while executing the job.
Regards
Johann
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
. That does not necessarily mean that it is an
inferior product to closed source
What Do you think about this? Do you know reasons for ClamAV's unusual high
number of bugs? Would you abandon ClamAV for server side mail scanning in
favor of other scanners?
No.
Regards
Johann
--
Johann Spies
submit it as a Debian bug, and I'll forward it
upstream.
I will try and find examples of those files. The problem is that it
is on a mail server handling 8 - 10 deliveries per day.
Regards
Johann
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van
with upstream about it.
Would that be the cause of a lot of entries like this in our exim logs:
2008-02-27 06:28:19 1JUDru-0007jl-Va spam acl condition: error reading
from spamd socket: Connection timed out
?
Regards
Johann
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie
On Wed, Feb 27, 2008 at 01:06:33PM +, Stephen Gran wrote:
This one time, at band camp, Johann Spies said:
On Wed, Feb 27, 2008 at 11:54:19AM +, Stephen Gran wrote:
report to say:
There is a hard coded path in clamscan that calls internal unpackers
for zip and rar before
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
Blessed is the man that trusteth in the LORD, and
whose hope the LORD is.Jeremiah 17:7
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble
On Fri, Jul 08, 2005 at 04:07:49PM +1000, Matt Hope wrote:
On 7/7/05, Steve Kemp [EMAIL PROTECTED] wrote:
On Thu, Jul 07, 2005 at 12:22:36PM +0200, Johann Spies wrote:
I have read http://www.debian-administration.org/articles/174 about
this topic and have done what the article
using SUDO - without enabling him to kill any process on the
machine.
Regards
Johann
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
And I saw a great white throne, and him that sat on
it, from whose face the earth and the heaven fled
On Fri, Jul 08, 2005 at 12:58:44PM +0200, Florian Weimer wrote:
* Johann Spies:
alias specification Cmnd_Alias BACKUP =
/opt/tivoli/tsm/client/ba/bin/dsm, \
/opt/tivoli/tsm/client/ba/bin/dsmadmc, \
/opt/tivoli/tsm/client/ba/bin/dsmc, \
/opt/tivoli/tsm/client/ba/bin/dsmagent,\
/opt
is not configured to use shadow passwords ...
How do I change that after an installation that did not ask beforehand
about shadow passwords?
I did a 'sudo shadowconfig on' but suspect that will only have an
effect on new passwords - or not?
Regards
Johann
--
Johann Spies Telefoon: 021-808 4036
On Thu, Jul 07, 2005 at 04:48:51AM -0400, Bill Marcum wrote:
On Thu, Jul 07, 2005 at 09:49:17AM +0200, Johann Spies wrote:
I am busy building two new proxy servers. I installed the first from
debian-install CD with the normal installer. As an exercise in
disaster recovery I decided
are certain that this
is what you want to do.
Is this a bug or how do I solve this problem?
Regards
Johann
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
But Jesus said, Let the little children come to me,
and do not hinder them
Hello Steve,
On Thu, Jul 07, 2005 at 12:26:32PM +0100, Steve Kemp wrote:
On Thu, Jul 07, 2005 at 12:22:36PM +0200, Johann Spies wrote:
I have read http://www.debian-administration.org/articles/174 about
this topic and have done what the article suggested:
~# gpg --keyserver
On Thu, Jul 07, 2005 at 01:39:57PM +0100, Steve Kemp wrote:
On Thu, Jul 07, 2005 at 02:14:51PM +0200, Johann Spies wrote:
Ok, but the archive on archive3.sun.ac.za is just a mirror from a
primary debian upstream source. Do I have to generate a spesific key
for my server?
Strange
On Tue, Dec 21, 2004 at 01:28:00PM +0100, martin f krafft wrote:
Stop using PHP. Learn Zope and PostgreSQL.
Pity plone2 is not available with Debian.
Regards
Johann
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
For a child
Johann
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
One thing have I desired of the LORD, that will I seek
after; that I may dwell in the house of the LORD all
the days of my life, to behold the beauty of the LORD
On Tue, Jun 29, 2004 at 10:03:50AM +0200, Javier Fernández-Sanguino Peña wrote:
On Tue, Jun 29, 2004 at 09:28:00AM +0200, Johann Spies wrote:
Does anyone know whether there are woody packages for these corrected
versions?
Actually no, I'm not sure wether the Security Team will publish
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
A new commandment I give unto you; That ye love one
another. As I have loved you, so ye also must love one
another. By this shall all men know that ye are my
disciples
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
A new commandment I give unto you; That ye love one
another. As I have loved you, so ye also must love one
another. By this shall all men know that ye are my
disciples
In the past I mirrored security.debian.org twice a day for debian
users on our campus. After the fire the new site does not seem to
have a debian-security module for the rsync-server.
Is there a possibility that we can have it back please?
Regards.
Johann
--
Johann Spies Telefoon: 021
In the past I mirrored security.debian.org twice a day for debian
users on our campus. After the fire the new site does not seem to
have a debian-security module for the rsync-server.
Is there a possibility that we can have it back please?
Regards.
Johann
--
Johann Spies Telefoon: 021
On Wed, Nov 20, 2002 at 03:43:43PM +0100, Kjetil Kjernsmo wrote:
On Tuesday 19 November 2002 09:43, Johann Spies wrote:
Can we expect something similar from Debian? Or if not, how can we
protect our systems in another way?
I don't know much about the issues involved, but I have noted
On Wed, Nov 20, 2002 at 03:43:43PM +0100, Kjetil Kjernsmo wrote:
On Tuesday 19 November 2002 09:43, Johann Spies wrote:
Can we expect something similar from Debian? Or if not, how can we
protect our systems in another way?
I don't know much about the issues involved, but I have noted
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
To show forth thy lovingkindness in the morning, and
thy faithfulness every night. Psalms 92:2
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
To show forth thy lovingkindness in the morning, and
thy faithfulness every night. Psalms 92:2
to `X509_get_pubkey'
/tmp/cc5fIiWn.o: In function `ssl_disconnect':
/tmp/cc5fIiWn.o(.text+0x1640): undefined reference to `EVP_PKEY_free'
/tmp/cc5fIiWn.o(.text+0x1660): undefined reference to `X509_free'
collect2: ld returned 1 exit status
Regards.
Johann
--
Johann Spies Telefoon: 021-808
On Fri, Sep 20, 2002 at 11:08:25AM +0200, Johann Spies wrote:
On Fri, Sep 20, 2002 at 09:18:44AM +0200, Bjarne Østby wrote:
Reading on the list about the slapper worm I thought I should check what
my servers return when tested with the openssl-sslv2-master script
(http://cert.uni
was restarted after upgrade of ssl)
/home/bjarne# ./ssl-test xxx.xxx.xxx.31
xxx.xxx.xxx.31 443 PATCHED: detects small overflow, but crashes (0.9.6e)
The output I get is constantly:
xxx.xxx.xxx.xxx.31 443 UNDECIDED: initial connection failed
Is that normal?
Johann
--
Johann Spies Telefoon
to `X509_get_pubkey'
/tmp/cc5fIiWn.o: In function `ssl_disconnect':
/tmp/cc5fIiWn.o(.text+0x1640): undefined reference to `EVP_PKEY_free'
/tmp/cc5fIiWn.o(.text+0x1660): undefined reference to `X509_free'
collect2: ld returned 1 exit status
Regards.
Johann
--
Johann Spies Telefoon: 021-808
On Fri, Sep 20, 2002 at 11:08:25AM +0200, Johann Spies wrote:
On Fri, Sep 20, 2002 at 09:18:44AM +0200, Bjarne Østby wrote:
Reading on the list about the slapper worm I thought I should check what
my servers return when tested with the openssl-sslv2-master script
(http://cert.uni
was restarted after upgrade of ssl)
/home/bjarne# ./ssl-test xxx.xxx.xxx.31
xxx.xxx.xxx.31 443 PATCHED: detects small overflow, but crashes (0.9.6e)
The output I get is constantly:
xxx.xxx.xxx.xxx.31 443 UNDECIDED: initial connection failed
Is that normal?
Johann
--
Johann Spies Telefoon
this is shipped by default (to add it to the
Securing Debian Manual
Where is the problem ? You are installing a system. If you dont like
the prompt, dont look at it.
I did not understand his question as a problem - rather a request for
information. I would also like to know.
Johann
--
Johann Spies
this is shipped by default (to add it to the
Securing Debian Manual
Where is the problem ? You are installing a system. If you dont like
the prompt, dont look at it.
I did not understand his question as a problem - rather a request for
information. I would also like to know.
Johann
--
Johann Spies
-files.
How do you set up those files?
http://www.robotstxt.org/wc/robots.html
Thanks Johann!
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
Go ye therefore, and teach all nations, baptizing them
in the name of the Father
.
How do you set up those files?
http://www.robotstxt.org/wc/robots.html
Thanks Johann!
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
Go ye therefore, and teach all nations, baptizing them
in the name of the Father
interested in this. I experience frequent visits from a web
robot on our ftp-site (with a web front). Going to the home page of
this robot at www.inktomi.com there was a remark that the robot respects
robot.txt-files.
How do you set up those files?
Johann
--
Johann Spies Telefoon: 021-808
interested in this. I experience frequent visits from a web
robot on our ftp-site (with a web front). Going to the home page of
this robot at www.inktomi.com there was a remark that the robot respects
robot.txt-files.
How do you set up those files?
Johann
--
Johann Spies Telefoon: 021-808
On Wed, Nov 28, 2001 at 03:07:40PM +0100, op wrote:
Also sprach Johann Spies:
One can always make use of /etc/hosts.allow and and /etc/hosts.deny.
not for specific users right?
No - only using IP addresses.
Johann
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie
On Wed, Nov 28, 2001 at 03:07:40PM +0100, op wrote:
Also sprach Johann Spies:
One can always make use of /etc/hosts.allow and and /etc/hosts.deny.
not for specific users right?
No - only using IP addresses.
Johann
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie
can always make use of /etc/hosts.allow and and /etc/hosts.deny.
Johann
--
Johann Spies Telefoon: 021-808 4036
Informasietegnologie, Universiteit van Stellenbosch
Thou, even thou, art LORD alone; thou hast made
heaven, the heaven of heavens, with all their host
47 matches
Mail list logo