Hi Raphael,
> its log file with weak permissions, which might expose sensible
> information or might be abused by a local user to consume all free disk
Shouldn't that be "sensitive information" ?
Gr.
Matthijs
signature.asc
Description: Digital signature
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Already read this link:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=267837
Jan Wagner wrote:
| -- Forwarded Message --
|
| Subject: [USN-74-1] Postfix vulnerability
| Date: Sunday 06 February 2005 23:55
| From: Wietse Venema <[EMA
unsubscribe
unsubscribe
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Mon, 2004-01-26 at 11:40, Thiago Ribeiro wrote:
> Hi,
>
> When I run tiger, I got a follow error:
>
> NEW: --WARN-- [rootkit004f] Chkrootkit has detected a possible rootkit
> installation
> NEW: Warning: Possible LKM Trojan installed
>
> But I alredy list my proccess and did find nothing...
>
On Mon, 2004-01-26 at 11:40, Thiago Ribeiro wrote:
> Hi,
>
> When I run tiger, I got a follow error:
>
> NEW: --WARN-- [rootkit004f] Chkrootkit has detected a possible rootkit
> installation
> NEW: Warning: Possible LKM Trojan installed
>
> But I alredy list my proccess and did find nothing...
>
ey,
Maybe some piece of advice. I run a server with the grsecurity patch on
the kernel maybe that's also an option to run on the debian server(s)
Maybe this is already on the server, when so, i've nothing said.
Regards, Matthijs
On Fri, 2003-11-21 at 13:13, Jan Wagner wrote:
>
ey,
Maybe some piece of advice. I run a server with the grsecurity patch on
the kernel maybe that's also an option to run on the debian server(s)
Maybe this is already on the server, when so, i've nothing said.
Regards, Matthijs
On Fri, 2003-11-21 at 13:13, Jan Wagner wrote:
>
On Sun, 2003-08-31 at 00:57, Stephen Frost wrote:
> * Matthijs Mohlmann ([EMAIL PROTECTED]) wrote:
> > I use for authentication KerberosV. For all types of data i use OpenLDAP
> > and for login on into a computer on a network i use PAM.
> [...]
> > Now i want this togeth
On Sun, 2003-08-31 at 00:57, Stephen Frost wrote:
> * Matthijs Mohlmann ([EMAIL PROTECTED]) wrote:
> > I use for authentication KerberosV. For all types of data i use OpenLDAP
> > and for login on into a computer on a network i use PAM.
> [...]
> > Now i want this togeth
On Sat, 2003-08-30 at 23:37, Cajus Pollmeier wrote:
> On Samstag, 30. August 2003 23:06, Matthijs Mohlmann wrote:
> > ey all,
> >
> > I use for authentication KerberosV. For all types of data i use OpenLDAP
> > and for login on into a computer on a network i use PAM.
&
ey all,
I use for authentication KerberosV. For all types of data i use OpenLDAP
and for login on into a computer on a network i use PAM.
When i use KerberosV then i do so:
auth requisite pam_securetty.so
auth requisite pam_nologin.so
auth required pam_env.so
auth sufficient pam_krb5.so
a
On Sat, 2003-08-30 at 23:37, Cajus Pollmeier wrote:
> On Samstag, 30. August 2003 23:06, Matthijs Mohlmann wrote:
> > ey all,
> >
> > I use for authentication KerberosV. For all types of data i use OpenLDAP
> > and for login on into a computer on a network i use PAM.
&
ey all,
I use for authentication KerberosV. For all types of data i use OpenLDAP
and for login on into a computer on a network i use PAM.
When i use KerberosV then i do so:
auth requisite pam_securetty.so
auth requisite pam_nologin.so
auth required pam_env.so
auth sufficient pam_krb5.so
a
I have here also key login. It's very easy.
ssh-keygen -t dsa
You got now two files id_dsa and id_dsa.pub. You put the id_dsa.pub in
~/.ssh/authorized_keys2 and id_dsa on your client in ~/.ssh/id_dsa. When
you start now ssh on the client to the remote he take the id_dsa key and
login. :-)
That's
I have here also key login. It's very easy.
ssh-keygen -t dsa
You got now two files id_dsa and id_dsa.pub. You put the id_dsa.pub in
~/.ssh/authorized_keys2 and id_dsa on your client in ~/.ssh/id_dsa. When
you start now ssh on the client to the remote he take the id_dsa key and
login. :-)
That's
Installing Woody on your parents laptop ?
On Wed, 2003-07-30 at 14:01, Kjetil Kjernsmo wrote:
> Hi all!
>
> It seems I have to have an Windows XP box inside the firewall for some
> time to come... :-( (It's not my network, it's my parent's, and they
> have a laptop with XP, their workstation is
Installing Woody on your parents laptop ?
On Wed, 2003-07-30 at 14:01, Kjetil Kjernsmo wrote:
> Hi all!
>
> It seems I have to have an Windows XP box inside the firewall for some
> time to come... :-( (It's not my network, it's my parent's, and they
> have a laptop with XP, their workstation is
Why download the source from RedHat? The source from debian is also
patched with needed patches.
apt-get install kernel-source
On Mon, 2003-07-28 at 19:05, Bruce Banner wrote:
> You can download Red Hats
> kernel-source-2.4.20-19.9.i386.rpm run alien against
> it and install the dpkg'ed kernel-
Why download the source from RedHat? The source from debian is also
patched with needed patches.
apt-get install kernel-source
On Mon, 2003-07-28 at 19:05, Bruce Banner wrote:
> You can download Red Hats
> kernel-source-2.4.20-19.9.i386.rpm run alien against
> it and install the dpkg'ed kernel-
20 matches
Mail list logo