Re: FW: Try security update from the Microsoft

2003-06-20 Thread Kay-Michael Voit
A Windows-worm in the debian-security list? Great :D BM> - Original message follows - BM> Microsoft Consumer BM> this is the latest version of security update, the BM> "June 2003, Cumulative Patch" update which eliminates all BM> known security vulnerabilities affecting Internet Explore

Re: FW: Try security update from the Microsoft

2003-06-20 Thread Kay-Michael Voit
A Windows-worm in the debian-security list? Great :D BM> - Original message follows - BM> Microsoft Consumer BM> this is the latest version of security update, the BM> "June 2003, Cumulative Patch" update which eliminates all BM> known security vulnerabilities affecting Internet Explore

Re[2]: MAC-based ssh

2003-05-02 Thread Kay-Michael Voit
DDC> using mac addresses for client authentication seems to me as an extremely DDC> risky business as a mac address can easily be copied/cloned/spoofed... DDC> imho, it does not offer any authentication at all... i under stood it as additional security to certificates or passwords (more like secu

Re: MAC-based ssh

2003-05-02 Thread Kay-Michael Voit
did you consider just to blockother mac-addresses through iptables? but... i don't know, what you are doing there, but are you sure you want to grant every user ssh access? i assume you need to be root for this? how are you going to solve it over ssh? and how do you prevent users from just shuttin

Re[2]: Port forwarding wrong after days

2003-04-29 Thread Kay-Michael Voit
-BEGIN PGP SIGNED MESSAGE- Hash: MD5 >> I've search for something like this, but did not find anything. How do >> I flush it? RK> It would have been the NAT table anyway (my RK> mistake). You flush it with iptables -F -t nat. RK> The reboot done the job, so it must be something RK> else.

Port forwarding wrong after days

2003-04-29 Thread Kay-Michael Voit
-BEGIN PGP SIGNED MESSAGE- Hash: MD5 Hi, I'm running a small router and firewall at home. eth0 -> LAN eth1 -> access point -> WLAN eth2 -> WAN On a client im running a donkeyclient, so I had to forward port (it works without, but then you get a so called "low id" with result in worse downl

Re[6]: Chkrootkit

2003-04-27 Thread Kay-Michael Voit
AE> Sorry, I see now. This case, the proper solution would be fixing AE> the program which emits the incorrect warning, isn't it? the program is chrootkit, isn't it? -- Public Key erhältlich auf den PGP-Keyservern, sowie mit weiteren Informationen auf http:\\www.voits.net. Fingerprint: 9b482c5c

Re: is this a mistake? i ywdaha3ak

2003-04-27 Thread Kay-Michael Voit
is what what? i cannot see anything, only an unloadable and linked image... is this a spam mail? if not, please do not send such mails but plaintext AW> Erase your email record here. AW> -- AW> To UNSUBSCRIBE, email to [EMAIL PROTECTED] AW> with a subject of "unsubscribe". Trouble? Contact [

Re[2]: Chkrootkit

2003-04-24 Thread Kay-Michael Voit
-BEGIN PGP SIGNED MESSAGE- Hash: MD5 DCE> for (1) I guess you can put the binaries in a read-only medium and run DCE> them from there, like a CD-ROM or a write-protected floppy/flash-medium. Well, the attacker could just stop the cronjob... but great idea though. My server is a remote root

Chkrootkit

2003-04-24 Thread Kay-Michael Voit
-BEGIN PGP SIGNED MESSAGE- Hash: MD5 Hi, I'm just setting up my first webserver in a productive environment. Now I wonder how I could use chkrootkit. My first idea was to run a cronjob, butI have two problems with this solution: 1) An attacker could just change the chkrootkit binaries. I

Re: WAS: HELP, my Debian Server was hacked!

2003-04-24 Thread Kay-Michael Voit
IRvD> PS I would really like to see you perlscript, if you could send it to me personallyI would really apriciate it. place me on the list, too, please. IRvD> On Thu, 24 Apr 2003 14:17:48 +0200, [EMAIL PROTECTED] wrote: >> On Thu, Apr 24, 2003 at 11:43:06AM +0200, I.R. van Dongen wrote: >

Firewall Logs on Dialup Server

2003-04-13 Thread Kay-Michael Voit
Hi, how do you suggest dealing with firewall logs from a computer which is connected through a dialup connection? For I receive a new IP every 24h hours, my logs are full of P2P connection attempts. How can I log iptables LOG outputs somewherer different from the standard output? And is there any