Hi Raphael,
its log file with weak permissions, which might expose sensible
information or might be abused by a local user to consume all free disk
Shouldn't that be sensitive information ?
Gr.
Matthijs
signature.asc
Description: Digital signature
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Already read this link:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=267837
Jan Wagner wrote:
| -- Forwarded Message --
|
| Subject: [USN-74-1] Postfix vulnerability
| Date: Sunday 06 February 2005 23:55
| From: Wietse Venema
unsubscribe
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
unsubscribe
On Mon, 2004-01-26 at 11:40, Thiago Ribeiro wrote:
Hi,
When I run tiger, I got a follow error:
NEW: --WARN-- [rootkit004f] Chkrootkit has detected a possible rootkit
installation
NEW: Warning: Possible LKM Trojan installed
But I alredy list my proccess and did find nothing...
What's
On Mon, 2004-01-26 at 11:40, Thiago Ribeiro wrote:
Hi,
When I run tiger, I got a follow error:
NEW: --WARN-- [rootkit004f] Chkrootkit has detected a possible rootkit
installation
NEW: Warning: Possible LKM Trojan installed
But I alredy list my proccess and did find nothing...
What's
ey,
Maybe some piece of advice. I run a server with the grsecurity patch on
the kernel maybe that's also an option to run on the debian server(s)
Maybe this is already on the server, when so, i've nothing said.
Regards, Matthijs
On Fri, 2003-11-21 at 13:13, Jan Wagner wrote:
On Friday 21
ey,
Maybe some piece of advice. I run a server with the grsecurity patch on
the kernel maybe that's also an option to run on the debian server(s)
Maybe this is already on the server, when so, i've nothing said.
Regards, Matthijs
On Fri, 2003-11-21 at 13:13, Jan Wagner wrote:
On Friday 21
On Sat, 2003-08-30 at 23:37, Cajus Pollmeier wrote:
On Samstag, 30. August 2003 23:06, Matthijs Mohlmann wrote:
ey all,
I use for authentication KerberosV. For all types of data i use OpenLDAP
and for login on into a computer on a network i use PAM.
When i use KerberosV then i do so
On Sun, 2003-08-31 at 00:57, Stephen Frost wrote:
* Matthijs Mohlmann ([EMAIL PROTECTED]) wrote:
I use for authentication KerberosV. For all types of data i use OpenLDAP
and for login on into a computer on a network i use PAM.
[...]
Now i want this together. But i don't know how. I've read
ey all,
I use for authentication KerberosV. For all types of data i use OpenLDAP
and for login on into a computer on a network i use PAM.
When i use KerberosV then i do so:
auth requisite pam_securetty.so
auth requisite pam_nologin.so
auth required pam_env.so
auth sufficient pam_krb5.so
ey all,
I use for authentication KerberosV. For all types of data i use OpenLDAP
and for login on into a computer on a network i use PAM.
When i use KerberosV then i do so:
auth requisite pam_securetty.so
auth requisite pam_nologin.so
auth required pam_env.so
auth sufficient pam_krb5.so
On Sat, 2003-08-30 at 23:37, Cajus Pollmeier wrote:
On Samstag, 30. August 2003 23:06, Matthijs Mohlmann wrote:
ey all,
I use for authentication KerberosV. For all types of data i use OpenLDAP
and for login on into a computer on a network i use PAM.
When i use KerberosV then i do so
I have here also key login. It's very easy.
ssh-keygen -t dsa
You got now two files id_dsa and id_dsa.pub. You put the id_dsa.pub in
~/.ssh/authorized_keys2 and id_dsa on your client in ~/.ssh/id_dsa. When
you start now ssh on the client to the remote he take the id_dsa key and
login. :-)
I have here also key login. It's very easy.
ssh-keygen -t dsa
You got now two files id_dsa and id_dsa.pub. You put the id_dsa.pub in
~/.ssh/authorized_keys2 and id_dsa on your client in ~/.ssh/id_dsa. When
you start now ssh on the client to the remote he take the id_dsa key and
login. :-)
Installing Woody on your parents laptop ?
On Wed, 2003-07-30 at 14:01, Kjetil Kjernsmo wrote:
Hi all!
It seems I have to have an Windows XP box inside the firewall for some
time to come... :-( (It's not my network, it's my parent's, and they
have a laptop with XP, their workstation is
Installing Woody on your parents laptop ?
On Wed, 2003-07-30 at 14:01, Kjetil Kjernsmo wrote:
Hi all!
It seems I have to have an Windows XP box inside the firewall for some
time to come... :-( (It's not my network, it's my parent's, and they
have a laptop with XP, their workstation is
Why download the source from RedHat? The source from debian is also
patched with needed patches.
apt-get install kernel-source
On Mon, 2003-07-28 at 19:05, Bruce Banner wrote:
You can download Red Hats
kernel-source-2.4.20-19.9.i386.rpm run alien against
it and install the dpkg'ed
Why download the source from RedHat? The source from debian is also
patched with needed patches.
apt-get install kernel-source
On Mon, 2003-07-28 at 19:05, Bruce Banner wrote:
You can download Red Hats
kernel-source-2.4.20-19.9.i386.rpm run alien against
it and install the dpkg'ed
19 matches
Mail list logo